Feral Jundi

Thursday, March 1, 2012

Technology: Urgent Tweet In Kenya Village–Help, Sheep Missing

Filed under: Africa,Kenya — Tags: , , , , — Matt @ 12:19 PM

This is another great use of technology and leveraging the established networks and their personal technologies to increase the security and commerce in a rural place. Notice the tools being used?  Basic cell towers, cellphones with SMS capability, basic low cost cell services, and an administrative chief building a snowmobile out of all of those pieces. The end result is that a government can communicate with it’s people, and the people can communicate back. A people scattered and remote, yet still brought closer together because of technology like this. That network has now increased it’s security and commerce, because it can plan and react based on better information coming in.

Some other things with this is that the local populations are using this technology and getting educated on all the various ways of connectivity with the tools they have. They have learned how to post a tweet using their text messaging feature and basic services on their phone. Wow, that is awesome. Just imagine each village with a smart phone or computer?  It will happen, they will learn how to use it and exploit it, and governments need to pay attention. It empowers the citizenry, and it empowers the government to react to the needs of that citizenry. Doom on that government that does not pay attention to this interconnected and knowledge empowered citizenry. Especially if a government has depended upon it’s people not knowing what it is doing, or what it has done in one city/region versus the other. The light is definitely threatening the darkness…..

I also like the addition of this technology to what is already popular and available. That would be radio. A broadcast on a radio can now be met by a population that can answer back with their cellphones. That is quite the capability if used correctly. You could create offense industries with that set up, and possibly use RIM and these networks to find guys like Joseph Kony and his army. –Matt

 

Urgent tweet in Kenya village: Help, sheep missing
By TOM ODULA
Feb 15, 2012
When the administrative chief of this western Kenyan village received an urgent 4 a.m. call that thieves were invading a school teacher’s home, he sent a message on Twitter. Within minutes residents in this village of stone houses gathered outside the home, and the thugs fled.
“My wife and I were terrified,” said teacher Michael Kimotho. “But the alarm raised by the chief helped.”
The tweet from Francis Kariuki was only his latest attempt to improve village life by using the micro-blogging site Twitter. Kariuki regularly sends out tweets about missing children and farm animals, showing that the power of social media has reached even into a dusty African village. Lanet Umoja is 100 miles (160 kilometers) west of the capital, Nairobi.
“There is a brown and white sheep which has gone missing with a nylon rope around its neck and it belongs to Mwangi’s father,” he tweeted recently in the Swahili language. The sheep was soon recovered.
Kariuki said that even the thieves in his village follow him on Twitter. Earlier this year, he tweeted about the theft of a cow, and later the cow was found abandoned, tied to a pole.

(more…)

Monday, August 15, 2011

Blogs: DynCorp Starts A Blog And A Youtube Channel!

Filed under: Blogs,Industry Talk — Tags: , , , , , , — Matt @ 12:37 PM

Very cool and it is about time. Although I do have a few misgivings about the blog itself, and this is stuff that can easily be fixed. First, there needs to be an RSS feed for the thing. I continue to see companies make this mistake, and it is just a simple little deal that makes a blog more useful. Guys like myself hunt for RSS feeds to put into our readers, and if you don’t have one then we just kind of forget about your site.

Some other ideas is to have a moderated comments section. If you check out my comments section on this blog, you will see that folks have the choice of entering a name and email, or signing in using Twitter or Facebook. This is the way to go, just because the easier it is for readers to sign in, the easier it will be for them to interact on the site. I use Intense Debate, but there are others out there.

Which is the other thing that kind of strikes me here. Who is the author?  Is it Ashley Burke, the media relations person or who? So definitely sign off on who wrote the posts, and most of all, get that individual to interact with the readership. Especially if the CEO writes a post. Blogs are great tools for interacting with your readership. And the best thing with moderated comments, is that you can filter out those who have no interest in having a reasonable conversation or who are spammers.

Some technical issues would be to have a more complete site map at the footer, and have clear links going to the DynCorp corporate page, and clear links going to the blog.  So really make it easy for the reader to know where they are at, and give them a map and clear signage as to where to go throughout your websites. An archives is important to, and put a search box on there so folks can search through your posts. Also, I did not see any tags, and that isn’t cool. All of this stuff is important to Search Engine Optimization (SEO), and if DI wants to own the story about the ‘their’ company, then they need to do the things necessary that pleases Google Search.

Which along those lines, DI should also set up an official Twitter and Facebook Page. Even a Linkedin Page would be cool, although they might already have that. Either way, get hooked up on all the top social networking sites, and then link all of them together so that every time you make a post on the blog, the post automatically goes to those sites. Google Search really likes that kind of stuff, and it will help in SEO. You would really be top notch if you linked your jobs to all of those sites, and put a RSS feed on your career section.  That way, as soon as new jobs come up, folks can find out about them and jump on it. (US Training Center has an excellent jobs section, that has all of the important information and tools that job seekers like) Oh, and don’t forget about a newsletter or some kind of subscription service.  Those are very easy to set up using stuff like Feedburner or whatever.

Just some ideas, and it’s a step in the right direction guys. It is also a challenge to the other PSC’s and PMC’s in this industry. If DI has a blog, where is your blog? –Matt

 

About Inside DI
June 10, 2011
Learn more about the people of DynCorp International, our most recent company news, key contract wins, the causes we support and other fun facts.
Link to blog here.

Thursday, June 24, 2010

Building Snowmobiles: Human-flesh Search Warfare

     Sinnreich adds a psychological component. “A lot of us really know next to nothing about what’s really going on militarily in Afghanistan,” he says, “so when a schism like this opens up, we think, ‘There must be more to this.’ ” A “collective detection mentality” takes over, he says, and thousands of people start piecing together thousands of bits of information to get a bigger picture.

*****

     If anyone is wondering how I come up with this stuff, I will explain.  I will read about one interesting concept, store it away in my brain, and then when I hit some trip wire ideas that fit in with that prior concept, some ‘illumination’ occurs. In this case, I was reading about human-flesh search engines a week or so ago, and then the Rolling Stone atomic bomb of a story comes out, and I started putting two and two together.

   First, let’s discuss what each component is and then we can discuss how they fit together, and then finish up on how to weaponize the concept (if possible).  Because if you look at what happened here, the best general that the US had, second only to Petraeus, was effectively removed from his post, all because of what was said in an article and the flash fire effects of new media.  That is one hell of an attack if you could figure out how to reproduce it.

   The first part of the concept is the human desire to want to know.  And the tools we have available to us these days, give us the ability to ‘know’ what is going on very quickly.  The news cycle and people’s ability to get that news, and how it allows us to pass it on to the next guy is mind boggling fast.  It doesn’t combust like a fire, it explodes like a bomb, and new media/social media is the facilitator for everyone who wants to know.

   For example, when the McChrystal ‘Runaway General’ news came out, I had heard about it via Facebook, Twitter, newsletters, updates via email, and my RSS reader.  I also got the news via my iPhone, which means I did not have to wait until I got home to read all of this stuff. The news exploded, and like most, I passed that news on to my network.  I then got to work on posting a blog entry about the thing, because it was a big story.  And so did thousands of other journalists, bloggers, forum participants, etc.  So analyzing the whole thing kicked in instantly as well.

   On my RSS reader, I saw multiple blog posts coming up from all over about the story.  People analyzing and giving opinions, and everyone was reading everyone else’s stuff and trying to come up with the best conclusions.  Partly because they wanted to know the real deal, and partly because they wanted to choose the right angle on the whole thing so they would not look like an ass to their readers and friends. So not only did bloggers want to ‘know’, they wanted to be the ones that looked like they ‘knew’.  All of these bloggers, to include myself, were furiously going over the material as it came out over the internet.  Our business is to know, and believe me, we were trying to do that.

   That process of wanting to know, or what the professor up top worded as ‘collective detection mentality’ is the first part to understand here. We are human, we are competitive, and knowledge is power.  When everyone is fighting to learn and know what is going on, that process creates the informational tsunami.  That information wave can also do much to force an action and create a desired outcome for whomever originally intended to create such a thing.  If you look at how President Obama and the upper command reacted to this incident, it is startling.  This didn’t happen over the course of weeks or days.  It happened virtually overnight and a top general has been removed from power.

     The second concept to look at is the idea of human-flesh search engines.  This is a concept out of China that has equally startling results. If a person is made a target by whomever on a forum, and whatever act this target did was sufficient to bring on interest and vengeance, well then you have all the elements of a human-flesh search.  People want to ‘know’ why this target did what they did, they want to ‘know’ who they are, what they are doing, where they live, and most importantly, they want to make sure the target suffers for any wrong doing.

   It is that power of wanting to ‘know’ that fuels the crowd in sort of virtual lynch mob.  A prime example of this was the whole Jax Desmond affair here on the blog and forums.  When it came out that Jax was lying about who he was, this industry reacted to it much like how the Chinese human-flesh search engines turned out.  My readers were at first picking apart the guy’s lies, which was great, but then you could see on the forums that people wanted vengeance.  Folks were posting his address, real name, etc. and doing all they could to get back at Jax.  In their minds, he deserved everything he got, and each person out there was going to contribute to his demise. My point with this is that a crowd with the desire to ‘know’, coupled with the desire for vengeance against an individual they perceive as bad, can be quite impressive to watch and certainly damaging to the intended target. As a result, the Jax Desmond name is mud in this industry, and when the crowd decided they ‘knew’ enough to act, they quickly dispensed their justice.

      Now let’s put them together, and build a snowmobile.  Could you initiate a human-flesh search attack (HSA), that could create a desired result? I think you can, but only with a multi-faceted approach, and persistence. You must identify your target, identify the element that the crowd would like to ‘know’, and really exploit the virtual mob mentality if that target has done something that would be considered immoral. Your HSA strategy should strive to mimic other incidents that showed all the hallmarks what is mentioned in these two articles, and the examples I have provided. Most importantly, persistence is key, because you cannot say for sure if your HSA will work the first time out.  It would take a constant attack from multiple angles, to be successful. It helps to throw the match in the right places though, and that is the key.  The forest fire analogy fits well with conducting HSA.  If you can keep shooting flares into pockets of unburned fuel, from across the canyon, eventually you will get one of the pockets burning and they will start the fire that you wanted to start.

   The other thing about Human-flesh Search Warfare is defending against such a thing.  Yet again, I look at the forest fire fighting analogy for the defense.  You must create fire breaks to defend crucial aspects of your forest.  Or in terms of what we are talking about here, you must protect yourself or your principle by insuring you have the appropriate defenses in place.  Having journalists from Rolling Stone hanging out with you for a couple of weeks is probably not a good idea–no buffer there.  Making wild and false claims online about your company or your personal actions, would also not be a good idea–not much buffer there either.

     But most of all, you need good intelligence that focuses on you and the enemy.  ‘Know yourself, know your enemy’ as Sun Tzu would say.  Because if you know yourself, you will know what weaknesses, immoralities, etc. that the enemy might possibly use against you in this kind of attack.  Knowing your enemy will help you to figure out their intentions towards you or folks like you, and how they like to conduct HSA. You should also stay up to date with technology and ‘knowing’ yourself. Use the same tools and resources that your enemy uses, if you want to really know what he knows. You can also try to copy your enemy’s strategy and tactics, and add one little technological or operational piece to that package to get an edge.  If your information officer, or whomever is assigned to be your virtual body guard cannot do these basic things, then you should look at firing them. Because this is something any good practitioner of strategic communications or new media should be wary of and try to understand, so they know how to best build that fire break or place the match in the right patch of fuel in the forest.

   Well, let me know what you think.  If I am missing something here, or you have something to add to this stew of ideas, I would be interested to hear what you got.(be sure to read both stories below because they are relevant to this post) –Matt

New media too speedy to outflank

China’s Cyberposse

Edit: 6/25/2010- I wanted to add one more human-flesh search warfare case to this, for further thought.  Wikileaks is an excellent example of the power of human-flesh search, and what it could do to the war effort.  Some Army Intel kid leaked the videos anonymously to Wikileaks, and that was all that was necessary to spark the human-flesh search engine. Media was linking to the videos and site, and overnight, war leaders and politicians had to deal with this.  When that came out, it exploded as well.  But if you look at Wikileaks, what was the element about it, that would attract that Army Intel kid to contribute in the first place.  That is why this is such an intriguing idea to talk about.

——————————————————————-

New media too speedy to outflank

By John Timpane

Jun. 24, 2010

It began as a scattering of acid remarks within earshot of a Rolling Stone reporter. But – thanks in large part to Twitter, the Web, and cable news – barely two days after those remarks were disclosed, a media firestorm ended Gen. Stanley A. McChrystal’s tenure as commander of U.S. and NATO Coalition Forces in Afghanistan.

Fast, overwhelming, decisive: It’s a case study in how tightly connected 21st-century media can whip a story into a full-on tsunami, with startling consequences for individual careers and national policy.

“Rolling Stone broke the story, but it was Twitter that got the story rolling,” says Aram Sinnreich, a media professor at Rutgers University in New Brunswick, N.J. “The peer-produced social media are doing to cable-news networks what cable news did to broadcast. We’ve gone from the one-day news cycle to every hour on the hour to second by second.”

Noah Shachtman, a nonresident fellow at the Brookings Institution and a blogger at Wired magazine, says: “The fact so many of us are networked together enabled the information to spread speed-of-light fast. That turned what might have been a slower-burning flame into an instant conflagration.”

(more…)

Thursday, November 19, 2009

Building Snowmobiles: Using Social Media To Win the Fight

   It’s been awhile since I posted a good Building Snowmobiles article, and I think I might have stumbled upon something with some meat.  Or at least I hope. So with that said, here it is.  Instead of chastising ‘citizen journalists’, we should instead encourage what good citizen journalism should be, and better yet, encourage the kind of reporting that would help us to win the fight in whatever battle we are fighting at the time.  That battle could be a flood, a fire, a terrorist attack, or even some crazy Black Swan type event. To not take advantage of the human nodes that are closest to those events, is like not taking advantage of the high ground in a battle.

   I will even take this a step further.  The Department of Homeland Security should actually have Incident Command Teams established to work with and manage the information coming in from these nodes.  Citizens with smart phones, who are savvy with Twitter and Facebook, or a personal blog, should be tapped into and we should work with them, as opposed to ignoring or fearing what they have to say.  And if we were proactive, DHS could promote what good reportage is and what they are trying to do in these emergencies. It would take commercials and online marketing to get the word out, but once the online community in the US knows the protocols, I think the impact for future incidents would be amazing.

   This Incident Command Team could be collecting real time information in a sort of social media fusion center, and that team would be sorting through the information using data mining, cloud computing and any other various methods.  The emphasis would be on information engagement, not information control.  Especially if the Incident Command Team had a online presence on Twitter and Facebook, or a Team or Incident website. I have seen websites that IC Teams have put up before for fires, so this is not new.

     There is so much information coming in from these incidents, and with a little help and guidance to all of these citizen journalists walking around on the scene of the incident, we could be getting some life saving information to the first responders. And with the advent of everyone carrying smart phones, with cameras and microphones built into them, along with access to the internet, then the possibilities are endless.  In essence, these citizen journalists should be looked at as walking human sensors or social media warriors, feeding the war room with the kind of information needed to gain the advantage in a quickly evolving fight.  A fight that is taking place in the physical, with wounded and dead, and a fight taking place online where the impact of that carnage is being used to fuel a propaganda campaign.

   The IC Team could be feeding information to law enforcement agencies that are responding.  The medical personnel responding could get a better idea of how many wounded and the kind of injuries, based on these reports.  The local community leaders could have better information to respond to their constituents and media with. Military response could get a better picture of the battlefield. The Team media relations officer could have a more complete info packet to give to the media, and also work with the media to help in the fight. Etc., etc. etc.

    A team like this could also track inappropriate information that only works against the fight, and engage with that individual and communicate what the team needs them to do.  Mrs. Moore (in the article below) could have been given guidance while she was out there.  All she wants to do is help, and a Incident Command Team could have been able to reach her and give her guidance before she did any more damage. Better yet, they could work with her and actually get some usable information out of what she is experiencing.

   This team can also be used to identify social media enemies on the scene.  No doubt, the enemy is reading this stuff and thinking about the possibilities (kind of entering 5th Gen warfare realm now).  They could easily assemble a team to work against this Incident Command team and fuel the fire of dis-information, and a real time information war can take place.  It is a fight over information, and we must be organized and technologically savvy to deal with this real time information assault.  They could have guys running around with camera phones, and posting pictures of the dead and wounded all over the place.  They could film the scene, and post it on youtube with the typical jihadi music and banners.

     The mobile smart phone is something that we must deal with, when it comes to these incidents, and if we are smart, we can create super empowered individuals with similar smart phones to counter these enemies.  Just imagine if Mrs. Moore was working for the other side during this incident?  Just imagine the kind of information she could instantly send out that would help the propaganda campaigns of the enemy? Or if the enemy was fueling a unknowing Mrs. Moore as to the kinds of things she should post.  They could be egging her on, to only help their cause, and she might not even know that she is helping.  That is why we must be prepared and we must be organized to deal with this.

   Finally, to really emphasize how important this is.  Disasters are a natural part of life, and tornados or fires do not Twitter or use Facebook.  But the enemy (criminals, states, terrorists, insane super empowered individuals, etc.) can use Twitter and Facebook, and all other types of social media technologies.  So if the enemy has the same access to these technologies as we do, then how do we get an edge in the fight?  We must be more organized and prepared, and we must apply OODA to the fight. We must also be better learning organizations and apply Kaizen to all aspects of that organization, so that we can continue to stay one step ahead of the enemy(s).  That is the only way in my view, and if we do not, we will definitely lose on the social media battlefield when confronted by a social media empowered enemy, or a citizen journalist that does not know what damage they are inflicting. –Matt

——————————————————————

Die Hard

Twitter-@John_McClane, ‘I just shot one of them in the face, ten more to go. I need a cigarette.’

Ft. Hood Soldier Causes Stir on Twitter

During Fort Hood Shooting, Soldier Uses Twitter, Shares Pictures in Real-Time

By KI MAE HEUSSNER

Nov. 11, 2009—

Amid the tragedy last week at Fort Hood, as officials worked to secure the Texas military base, treat the wounded and account for the dead, one soldier turned to Twitter, sending a stream of up-to-the-minute reports from inside a hospital where the injured were being taken for treatment.

Some messages were simple observations, others expletive-laced commentary.

But in the shooting’s aftermath, the soldier, Tearah Moore, 30, has found herself at the center of a sharp debate about the real-time sharing and whether the military should police the use of new media.

As news started to break about the deadly shooting that killed 12 soldiers and wounded 30 others, some users of the micro-blogging site Twitter started to notice the messages from one user in particular.

(more…)

Wednesday, October 7, 2009

Crime: NY Pair Used Twitter and Cell Phones to Direct Protests During G-20, Pittsburgh

Filed under: Crime,Pennsylvania,PMC 2.0,Technology — Tags: , , , , , — Matt @ 10:50 AM

    I wanted to post this to show how these technologies are being used for command and control of events like this.  The key elements to this, are using pre-paid cellphones that are basically disposable, and Twitter, all with the intent of directing a protest or riot for maximum effect.  I wonder when we will hear of the first terror cell usage of Twitter, to direct a Mumbai style complex assault?  I know for the Mumbai deal, they used text messaging for command and control.     With Twitter, a leader can send orders to massive groups, and in turn, that leader can track reports coming from the various sectors of the battlefield, all using quick little reports coming through Twitter.  And with the advent of cloud computing, the most active sectors will come front and center in everyone’s Twitter account, and everyone can see where the focus should be in the protest.  It is a way to make a group more connected and more responsive to whatever police forces are doing. Just as long as they all have a connection with their phones. Now couple that with Google Maps and the common GPS features in today’s smart phones, and now you have some super empowered hooligans. Interesting stuff. –Matt

——————————————————————

New York pair accused of directing protesters during G-20 in Pittsburgh

By Jeremy BorenTRIBUNE-REVIEWSunday, October 4, 2009

State police have accused two anarchists from New York of using cell phones and the Internet messaging service Twitter to direct the movements of protesters during the Group of 20 summit in Pittsburgh.

Police arrested Elliot M. Madison, 41, and Michael Wallschlaeger, 46, both of Jackson Heights, N.Y., after they found them Sept. 24 in a Kennedy Township hotel room full of computers, police scanners and Pittsburgh-area maps, according to a state police criminal complaint.

FBI agents spent 16 hours Friday raiding the home of Madison and his wife, Elena, according to a federal court motion filed in Brooklyn, N.Y., by Madison’s attorney Martin R. Stolar seeking the return of Madison’s possessions that were seized in the raid.

Stolar did not return a message seeking comment Saturday. No one answered the phone at a number listed for Madison.

Wallschlaeger and Madison wore headphones and microphones as they sat in front of computers they used to send Twitter messages to protesters in Pittsburgh to help them move about the city “and to inform the protesters and groups of the movements and actions of law enforcement,” the state police complaint states.

(more…)

Older Posts »

Powered by WordPress