December 10, 2006

Bloggers as Spies: Open Source Spying to Fight Terrorism

I've argued for organizing hackers as a response to cyber jihadis ("cyber privateering"), so why not bloggers? Clive Thomas argues this very thing in the New York Times Magazine.

Of course, most (but not all) of what Thomas is arguing about is actual government employees working in intel. But the principal is the same and based on the same assumption about the nature of information: it is something no one person can have a monopoly on and is decentralized.

In other words, it is very difficult for a single individual to know enough about our enemies and what they plan, but it may be possible for decentralized networks of individuals to know enough. Enough to say, catch the bad guys or stop them before they do something bad. We've actually seen this over and over agains in recent years with individuals making contacts with would-be terrorists and then bringing in the FBI and other authorities only after the initial investigation phase was completed.

We know quite a few people who are sleuthing behind the scenes . Some have even helped take out some very bad guys. Some are even bloggers. (In fact, a little birdie tells me Fox News may have someting on Cat Stevens/Yusuf Islam tomorrow or the next day from one of these sources--keep your eyes peeled!)

And some of what is recommended in the article is stuff we do here at The Jawa Report. Daily. So, keep reading. You didn't know it, but you are a spy. How cool is that?

NY Times Magazine:(Hat tip: Professor Chaos for the e-mail)

Fingar says yes, for an interesting reason: top-secret information is becoming less useful than it used to be. “The intelligence business was initially, if not inherently, about secrets — running risks and expending a lot of money to acquire secrets,” he said, with the idea that “if you limit how many people see it, it will be more secure, and you will be able to get more of it. But that’s now appropriate for a small and shrinking percentage of information.” The time is past for analysts to act like “monastic scholars in a cave someplace,” he added, laboring for weeks or months in isolation to produce a report.

Fingar says that more value can be generated by analysts sharing bits of “open source” information — the nonclassified material in the broad world, like foreign newspapers, newsletters and blogs. It used to be that on-the-ground spies were the only ones who knew what was going on in a foreign country. But now the average citizen sitting in her living room can peer into the debates, news and lives of people in Iran. “If you want to know what the terrorists’ long-term plans are, the best thing is to read their propaganda — the stuff out there on the Internet,” the W.M.D. analyst told me. “I mean, it’s not secret. They’re telling us.”

Allow me to introduce myself. Shackleford. Rusty Shackleford.

Posted by: Rusty at 08:29 PM | Comments (5) | Add Comment
Post contains 501 words, total size 3 kb.

1 I would highly recommend the book Terrorist Hunter. This was written by a woman that was born in Iraq, saw her father hanged in the public square after the 67" war, escaped to Israel with her family through Iran (yes Iran who, at the time, was an ally of Israel) via the Mossad, ended up growing up in Israel and finally moved after marraige to NYC!
She got a job in a think tank in NYC translating open source material and would go home and wash the kitchen floor and tend to her family after a days work. Being able to speak Hebrew, Arabic, Farsi and something else, she was able to translate magazines and newspaper articles from the Middle East. In 1997 she knew more about what was going on in the Middle East than the Clinton administration...
The book reads like a thriller but, it's true. Read it and weap for the nievete of your elected government. BTW, this woman had NO SECURITY STATUS, just in case I didn't make myself clear. She gathered all data from open sources.

Posted by: Babs at December 10, 2006 11:55 PM (iZZlp)

2 Ya mean I'm really a double naught spy!?  Gee uncle Rusty does this mean I can use the truck for my new double naught spy mobile?  It already has a smokescreen.

Posted by: Darth Odie at December 11, 2006 09:22 AM (YdcZ0)

3

peer reviewed "insanity"


Posted by: Professor von Nostrand at December 11, 2006 09:39 PM (Bwpq7)

4 Terrorist Hunter:

http://www.amazon.com/Terrorist-Hunter-Extraordinary-Undercover-Infiltrate/dp/0060528192/sr=8-1/qid=1165939675/ref=pd_bbs_sr_1/102-0792450-0593747?ie=UTF8&s=books

Posted by: Digital Crusader at December 12, 2006 10:10 AM (OHu4y)

5 I think your "volunteers" should learn LOTS about network cutouts and such before mounting up and heading out to hunt jihadis. Intentional interference with network resources can be branded terrorism itself, and get them in lots of trouble if it's traced.

Posted by: mojo at December 12, 2006 01:38 PM (g1cNf)

Hide Comments | Add Comment

Comments are disabled. Post is locked.
33kb generated in CPU 0.0172, elapsed 0.0448 seconds.
34 queries taking 0.0364 seconds, 160 records returned.
Powered by Minx 1.1.6c-pink.