Feral Jundi

Tuesday, November 17, 2009

PMC 2.0: Soldiers Track Each Other With Smart PDAs

Filed under: PMC 2.0,Technology — Tags: , , , , , — Matt @ 8:27 AM

   Very cool, and Wired Danger Room pumped out a little deal about this as well.  I don’t think us security contractors will ever have access to this PDA, but really, we don’t need to.  We have access to a multitude of PDA’s or smart phones.  I currently deploy with a iPhone 3GS wrapped in an Otterbox Defender Case, and love it.  For secure communications, I just use Hushmail.  For navigation purposes, I use Google Maps with the GPS interface.  For information collection, I just use Google Search, and can find what I need on a normal browser.  For communications, I can use the phone, text message, or email using 3G or Wifi.  Lots of options. The iPhone is amazing, and it is one of my best investments as far as technology is concerned. The battery life is not too bad either, but that could always be better.  And it will.

   I am also seeing a lot of contractors with smart phones now. It’s either a Blackberry or iPhone, and I think most go with the Blackberry.  With that said, companies need to get on board with getting mobile friendly, and explore the numerous ways that they can tap into this technology that all of us are using now.  And believe me, there will come a point where everyone will get a PDA with their mobile plans, and basic cellphones will just kind of fade away.  Better to start thinking about this stuff now in my opinion. –Matt

—————————————————————–

iPhone 3GS in Otterbox Defender Case

iPhone 3GS in Otterbox Defender Case.

Soldiers Track Each Other With Smart PDAs

December 2009

By Grace V. Jean

Many of the military’s ground vehicles are equipped with blue force tracking systems that help troops monitor the locations of friendly units and enemy forces. But when soldiers dismount to patrol an area on foot, they lose that digital awareness of their surroundings.

The Army’s troubled Land Warrior program — a wearable computer, GPS, radio and monocle display technology ensemble — was designed to give dismounted troops that battlefield information. The program is still alive and showing progress, according to Army officials.

A team at Lockheed Martin Corp.’s Advanced Technology Laboratories in Cherry Hill, N.J., meanwhile, has developed a Land Warrior-like handheld computer for small infantry units to track and communicate with each other on the ground.

The “distributed operations,” or “DisOps,” system consists of a group of PDAs and a software package that can be installed on a laptop.

(more…)

Tuesday, October 27, 2009

PMC 2.0: Bullets and Blogs–New Media and the Warfighter

Filed under: PMC 2.0,Publications,Technology — Tags: , , , , — Matt @ 11:37 PM

    Hear me now. All of you CEO’s and upper level management throughout all of the companies need to pay attention.  If you do not have a new media strategy, then you are in the wrong.  Just think of it this way.  Companies invest in vehicles, armor, training, and weapons to protect their contractors, so they in turn can protect their client.  So why are companies not investing in new media protocols in order to protect their clients from information warfare attacks?

   If the enemy attacks your motorcade in a population center, then films the exchange of fire and then purposely shoots a few civilians and then films that, and then claims that they were shot by contractors. Then they post it on the internet immediately afterwards and spreads that poison throughout the new media battle space.  Then all those journalists and contractor haters, along with the John Q public, all take it in and label your company as evil, and without question.  Is your company set up to defend against that? Can you defend against a Nisour Square style propaganda attack?

   How about journalists using new media to promote personal agendas, as opposed to being fair or balanced in their reportage?  Guess what?  That’s a threat to your client as well.  Is your company set up to defend against that? It should be, because if you were fully involved with new media strategy and counter-attacks, then you would have the foresight to do what is necessary.  It is called being prepared–one of the many tenets of Jundism.

   The report below can be summed up in one main theme:

Recognize that the winning strategy is “information engagement,” not “information control;” 

Embrace new media as a significant enabler of “that element of combat power called  information;” 

   So is your company set up for ‘information engagement’?  From the looks of it, most of the companies out there are doing a terrible job of information engagement.  And believe me, I am a security contractor who also happens to be a new media practitioner, and I have yet to see any of the companies take the necessary measures to operate in the new media battle space.  At least the military is talking about it, and bravo to them. –Matt

——————————————————————

Executive summary

Winning in the new media battlespace: Workshop top takeaways

For the U.S. military, new media and the Global Information Environment (GIE) present sustained challenges and opportunities. In recent years, new adversaries — armed with new media capabilities and an information-led warfighting strategy — have proven themselves capable of stopping the most powerful militaries in the world.

The current and future geo-strategic environment requires preparation for a battlespace in which symbolic informational wins may precipitate strategic effects equivalent to, or greater than, lethal operations. It demands a paradigm shift away from an emphasis on information control and towards information engagement. It will require cultural and organizational change within the Department of Defense (DOD) as it adapts to the world of digital natives – its own savvy Soldiers, Sailors, Airmen and Marines and their communicative expectations, proclivities, potential and risk; as well as its current and over-the-horizon opponents. Most of all, it will force the sustained adaptation and transformation of the way the U.S. military thinks and fights.

(more…)

Wednesday, October 14, 2009

Building Snowmobiles: Israeli Niv Calderon, Social Media Warriors, and Cyber Tribes

    As you guys know, I am always looking into the future of warfare, and the possible uses of today’s technologies.  No rock is left unturned here, and I love coming back to this stuff.  The theme of this post is that in order to apply these new Web 2.0 tools to warfare and business, we must study how others did it and build a snowmobile out of it.

   Now on to the meat of what I am getting at.  If you are a PMC, or even trying to start a grass roots cyber tribe revolution, then you need to study what Niv Calderon and his gang did during the last Israeli war in Gaza.  They were on the cutting edge of mixing Web 2.0 and their war effort, and the outcomes of that effort should be studied by all who are interested.  I know I am, and articles in the past on FJ, in regards to Web 2.0 and warfare, have been influence by these types of uses.

   Last week I made a comment on Steven Pressfield’s blog about the concept of starting a cyber tribe, to support the various tribes in the war that he thought would be helpful in winning the war in Afghanistan.  I discussed the concept of starting a social networking site that had the similar framework as President Obama’s social networking site, or even American Sniper’s website. The idea is to have sites that tap into the legions of supporters, possible supporters, and diaspora throughout the world, all with the goal of cheering on and supplying a tribe on the ground with what it needs to defeat a shared enemy.

   I would say that this ‘cyber tribe’ concept, is a way for chieftains to expand their immediate tribes, and really call on all of the supporters throughout the world for help and for supplies. It is a way to get the middle man out of the way (aid groups and government), and connect the supporters with the tribe directly.  The cyber tribes would have little donation buttons on the site, give calls of action, allow for personal pages, foster a community, set up encrypted email, and post Youtube videos of ambushing and killing the Taliban, all with the idea of bringing the cyber tribe together with the local tribe on the ground.

   Most of all, if the cyber tribe was able to make some money for the cause (google adsense, ad sales, e-books, donations), then the real tribe could conceivably ask for volunteers and pay them at cost for their services– and all through a cyber tribe system.  Call it a Cyber Tribe Co-op.  lol

    Hell, make it a non-profit so people can donate to the cause and benefit in their taxes (in the US at least). Or not, and this would be the choice of the tribe to decide upon.  I say non-profit, because if NGO’s can call themselves a non-profit, a cyber tribe can call themselves a non-profit too, just as long as the aid given by the cyber tribes is not a profit game, but purely a supply and demand game. (Jake had an awesome post about the non-profit PSC, for further exploration)

   With a Cyber Tribe Co-op, the chieftain could put out to the two tribes (cyber and local) what would be a good use of the money earned on the site? (Just an idea)  With a well structured social networking site and a truly democratic bunch of supporters, the crowd will decide how much they want to give to something like that, or how much they want to throw down for a contracted specialist.

    They could even put it out there for true volunteers.  You know, guys that actually want to go up in the hills and fight with their tribal brothers for free, all because they believe in the cause of their tribe.  I know Soldier of Fortune is filled with stories of guys going out to volunteer their time in war zones, all for the sake of assisting underfunded and undertrained groups.  That and to do a story about it afterwards, so they have material for the magazine.  I even remember SoF sending guys out to assist the Mujahideen during the Soviet Occupation of Afghanistan, and there were tons of these types of stories. Cyber tribe reporters could be doing the same thing as SoF did, but for adding content to the cyber tribe’s website, thus increasing the SEO of the site, and then getting more traffic because of it!

   So that is all I have on this one, and I look forward to any replies on this.  I also suggest starting a cyber tribe if you think you can do it, and put some action to an idea out there.  There is no rule that you can only have one cyber tribe per local tribe.  You could have thousands of cyber tribes supporting one tribe.  Or maybe Steven will put something together, because I know he is really stoked on anything to do with tribes.  –Matt

—————————————————————–

 

Social media warriors at work in the war room for pro-Israel “Stand With Us”

How Social Media War Was Waged in Gaza-Israel Conflict

by Jaron Gilinsky

February 13, 2009

Both sides deployed dangerous new media weapons during this latest round of fighting in Gaza. Armed with Facebook profiles, Twitter accounts, and Lavazza espresso, warriors fearlessly and tirelessly scoured the cyber battlefield searching for enemy (blog) outposts. Outfitted with high-tech ammunition like HD videocameras, firewire 800s, and white phosphorescent keyboards, they attacked one-sided videos, slanted essays, and enemy propaganda with propaganda of their own. Instead of grad rockets, they launched grad school wits. Instead of anti-tank missiles, they battled with anti-spamming technology. In 22 days of combat in Gaza, these were the young fighters tasked with winning the merciless war of public opinion for their side.

(more…)

Wednesday, October 7, 2009

Funny Stuff: Somali Pirates Mistake French Military Vessel for Commercial Ship

   Matt sent me this one via iPhone, and I think that is a FJ first. (PMC 2.0)  Although many folks write me via smart phone, Matt actually sent me a story that is certainly funny and pertinent.

   I thought to myself, you just can’t make this one up.  These dorks are so blinded by greed and bravado, that they actually attacked a Naval vessel thinking it was a commercial boat?  Bwa ha ha ha ha.

   Or we can look at this another way.  The Q Ships that I talked about awhile back, seem like more of a better idea all the time.  I think we could catch quite a few flies with that kind of bait.  Something to think about for you naval strategists out there that are running the maritime security effort. –Matt

——————————————————————

Somali Pirates Mistake French Military Vessel for Commercial Ship

Thursday, October 08, 2009

Somali pirates in two skiffs fired on a French navy vessel early Wednesday after apparently mistaking it for a commercial boat, the French military said. The French ship gave chase and captured five suspected pirates.

No one was wounded by the volleys from the Kalashnikov rifles directed at La Somme, a 3,800-ton refueling ship, said Rear Admiral Christophe Prazuck, a military spokesman.

La Somme “was probably taken for a commercial ship by the two small skiffs” some 250 nautical miles off the coast of Somalia, said Prazuck.

“They understood their mistake too late,” Prazuck said.

One skiff fled, and La Somme pursued the second one in an hour-long chase.

“There were five suspected pirates on board. No arms, no water, no food,” Prazuck said.

France is a key member of the European Union’s naval mission, Operation Atalanta, fighting Somali pirates in the Gulf of Aden. It has aggressively tracked and caught suspected pirates and handed over at least 22 to Kenya. An additional 15 suspects were brought to France for prosecution after allegedly seizing French nationals’ boats.

President Nicolas Sarkozy called for tougher action against piracy last year after dozens of attacks.

Story here.

Crime: NY Pair Used Twitter and Cell Phones to Direct Protests During G-20, Pittsburgh

Filed under: Crime,Pennsylvania,PMC 2.0,Technology — Tags: , , , , , — Matt @ 10:50 AM

    I wanted to post this to show how these technologies are being used for command and control of events like this.  The key elements to this, are using pre-paid cellphones that are basically disposable, and Twitter, all with the intent of directing a protest or riot for maximum effect.  I wonder when we will hear of the first terror cell usage of Twitter, to direct a Mumbai style complex assault?  I know for the Mumbai deal, they used text messaging for command and control.     With Twitter, a leader can send orders to massive groups, and in turn, that leader can track reports coming from the various sectors of the battlefield, all using quick little reports coming through Twitter.  And with the advent of cloud computing, the most active sectors will come front and center in everyone’s Twitter account, and everyone can see where the focus should be in the protest.  It is a way to make a group more connected and more responsive to whatever police forces are doing. Just as long as they all have a connection with their phones. Now couple that with Google Maps and the common GPS features in today’s smart phones, and now you have some super empowered hooligans. Interesting stuff. –Matt

——————————————————————

New York pair accused of directing protesters during G-20 in Pittsburgh

By Jeremy BorenTRIBUNE-REVIEWSunday, October 4, 2009

State police have accused two anarchists from New York of using cell phones and the Internet messaging service Twitter to direct the movements of protesters during the Group of 20 summit in Pittsburgh.

Police arrested Elliot M. Madison, 41, and Michael Wallschlaeger, 46, both of Jackson Heights, N.Y., after they found them Sept. 24 in a Kennedy Township hotel room full of computers, police scanners and Pittsburgh-area maps, according to a state police criminal complaint.

FBI agents spent 16 hours Friday raiding the home of Madison and his wife, Elena, according to a federal court motion filed in Brooklyn, N.Y., by Madison’s attorney Martin R. Stolar seeking the return of Madison’s possessions that were seized in the raid.

Stolar did not return a message seeking comment Saturday. No one answered the phone at a number listed for Madison.

Wallschlaeger and Madison wore headphones and microphones as they sat in front of computers they used to send Twitter messages to protesters in Pittsburgh to help them move about the city “and to inform the protesters and groups of the movements and actions of law enforcement,” the state police complaint states.

(more…)

« Newer PostsOlder Posts »

Powered by WordPress