<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2635230562876854684</atom:id><lastBuildDate>Sat, 24 Jan 2026 12:06:54 +0000</lastBuildDate><category>terrorism</category><category>SURVEILLANCE</category><category>9/11</category><category>ABI Research</category><category>ADVICE</category><category>ARCHITECTURE</category><category>ASSET PROTECTION</category><category>BARRIERS</category><category>CHEATERS</category><category>CYBER THREATS</category><category>DEFENSES</category><category>DILIGENCE</category><category>HUMINT</category><category>Jihad</category><category>LAYERED DEFENSE</category><category>OLYMPICS</category><category>PRIVACY</category><category>Robert Gates</category><category>SECURITY</category><category>SECURITY MALPRACTICE</category><category>SYMBOLIC SECURITY</category><category>Secretary of Defense</category><category>South Africa</category><category>Stan Schatt</category><category>TARGET HARDENING</category><category>TECHNOLOGY</category><category>TRAITORS</category><category>WHY THIS BLOG</category><category>Water boarding</category><category>digital video</category><category>intelligence</category><category>interrogation</category><category>torture</category><title>All Secure</title><description>Issues of the day through the prism of security.</description><link>http://all-secure.blogspot.com/</link><managingEditor>noreply@blogger.com (All Secure)</managingEditor><generator>Blogger</generator><openSearch:totalResults>172</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-5419119784317421478</guid><pubDate>Thu, 08 Jan 2026 14:21:00 +0000</pubDate><atom:updated>2026-01-08T06:21:38.069-08:00</atom:updated><title>Caution on Anonymous Sources</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhygbVyVAh_L5rS2TH3pwP07xQ-yNBp6JTrggWtZo9BLWJir4AkKB8UAOB0wv5ctLhEK9SSYlhBC94OM2Erkj8ySsFAPqpWVungEwimCFzcaAbLJTw-n9Dku_9yDrWn-rnLshHVRTtczXhu3xuNzJ8jUUTUvMkJfC6OEWUcsODzpFAawBNtoAfUF3EWoos/s1351/anonymous%20source%20clipart.JPG&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1351&quot; height=&quot;256&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhygbVyVAh_L5rS2TH3pwP07xQ-yNBp6JTrggWtZo9BLWJir4AkKB8UAOB0wv5ctLhEK9SSYlhBC94OM2Erkj8ySsFAPqpWVungEwimCFzcaAbLJTw-n9Dku_9yDrWn-rnLshHVRTtczXhu3xuNzJ8jUUTUvMkJfC6OEWUcsODzpFAawBNtoAfUF3EWoos/s320/anonymous%20source%20clipart.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote style=&quot;border: medium; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;div class=&quot;separator&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Having long suspected this, I now firmly assert a new rule when it comes to consuming so-called news reports, regardless of which political camp may be issuing them. Ready? Here it is:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Anonymous sources don’t exist. Period.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;How so? I just finished reading an editorial piece by a conservative-leaning author I thought I liked, only to find that her entire article hinged on a batch of smears against a political figure by unnamed sources. Not a single one of those sources displayed enough courage of conviction to go on the record and self-identify. Conclusion? Balderdash!&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;By Contrast&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In the days of yore, when Abe Rosenthal kept the N. Y. Times on an even keel by balancing mostly left-leaning reporters with a right-leaning editorial policy, Rosenthal would kill articles basing themselves solely on anonymous sources. In his view, citing an anonymous source was something to do only under rare, almost life-threatening circumstances, as when identifying a source would mean marking that source for impending assassination. Even then, he would insist on additional corroboration before backing any hit piece launched from the kind of anonymous source ambush that has become not a bug but a feature these days.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Current Situation&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Oh, how the mighty have fallen. Does the present inundation of anonymously sourced smears come even close to passing the smell test these days? For context, remember we dwell in the selfie generation where every modern mortal shows no hesitation in promulgating individual menu preferences or quality of bowel movements. Just how credible is it to find any opinion of a necessarily egotistical interviewee to uncork itself without attribution, unless the interviewee is spewing more subjective bile than supportable fact?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The Stacking Tactic&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Give me verifiable sources and facts, or spare me the attention-seeking defamation. The new trend to witness is a half-hearted effort to bolster credibility by stacking up one anonymous source after another. In other words, if a single anonymous may seem sketchy, the author behind a hit piece now elects to say that multiple other, equally unidentified sources said the same thing. Trouble is, none of these so-called “sources” ever emerges from the shadows. This kind of anonymous sourcing, once an invitation to hyperbole, has now become a hallmark of fabrication. No thanks, say I, even if I am inclined to agree with the sentiment being expressed by the author in question. If this kind of writing is not downright duplicitous, it is certainly sloppy. Balderdash, in other words.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Conclusion&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;It’s much easier to arrive at the foregoing determination expeditiously if embracing the simple rule that anonymous sources are not just convenient, lazy, partisan, or suspect; anonymous sources don’t exist.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;And with that, my work here is done.&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;

</description><link>http://all-secure.blogspot.com/2026/01/caution-on-anonymous-sources.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhygbVyVAh_L5rS2TH3pwP07xQ-yNBp6JTrggWtZo9BLWJir4AkKB8UAOB0wv5ctLhEK9SSYlhBC94OM2Erkj8ySsFAPqpWVungEwimCFzcaAbLJTw-n9Dku_9yDrWn-rnLshHVRTtczXhu3xuNzJ8jUUTUvMkJfC6OEWUcsODzpFAawBNtoAfUF3EWoos/s72-c/anonymous%20source%20clipart.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-8254362097025249645</guid><pubDate>Mon, 01 Jan 2024 09:05:00 +0000</pubDate><atom:updated>2024-01-01T01:05:34.049-08:00</atom:updated><title>Affordable Yet Priceless</title><description>&lt;p&gt;&lt;/p&gt;&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTPpj0Z3JY6pwUDM1pOGaG74dwAKs9fKTXbOCPcrH3wc4VaY15MLhTynOtS3rtY7kXRKPGpW25y_nnR19JvAjtTQnKLJkqsQtju5kJE4cgZ3pPzBSY5grdyoT5H2-6hikW4RnT8aYMYFw5cnCBc2z9WtE9GKpu_Z1NOa_4-A6unhKlp47k6F14muOs8tg/s1007/58367BD6-4A42-48A4-A3A8-F65564E2BC3E.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;743&quot; data-original-width=&quot;1007&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTPpj0Z3JY6pwUDM1pOGaG74dwAKs9fKTXbOCPcrH3wc4VaY15MLhTynOtS3rtY7kXRKPGpW25y_nnR19JvAjtTQnKLJkqsQtju5kJE4cgZ3pPzBSY5grdyoT5H2-6hikW4RnT8aYMYFw5cnCBc2z9WtE9GKpu_Z1NOa_4-A6unhKlp47k6F14muOs8tg/s320/58367BD6-4A42-48A4-A3A8-F65564E2BC3E.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2024/01/affordable-yet-priceless.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTPpj0Z3JY6pwUDM1pOGaG74dwAKs9fKTXbOCPcrH3wc4VaY15MLhTynOtS3rtY7kXRKPGpW25y_nnR19JvAjtTQnKLJkqsQtju5kJE4cgZ3pPzBSY5grdyoT5H2-6hikW4RnT8aYMYFw5cnCBc2z9WtE9GKpu_Z1NOa_4-A6unhKlp47k6F14muOs8tg/s72-c/58367BD6-4A42-48A4-A3A8-F65564E2BC3E.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-7529765874396396814</guid><pubDate>Thu, 07 Dec 2023 13:24:00 +0000</pubDate><atom:updated>2023-12-07T05:24:24.788-08:00</atom:updated><title>The Essence of Deterrence</title><description>&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;... is consequence that is immediate, intense, and inescapable.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh816iT9AEsLwUXOXilUWEgEIKZvQV3k72YJzNe2QUWwqixvXLomgIJOamggbJFTH8hiXyHkzn8_-fb0-2Q5kY_glbLkyz94H8h79bWvDUKvEH1Huws12lKmEonZ6YMFwHLm0v9qw_5E40EH-G-q2V2fHmdj2wLy0Gmn81PfRR3mKjf0f_yq0A1DZbzh_s/s729/150BEE57-0211-470C-91D1-9D4AFEBF55E8.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;505&quot; data-original-width=&quot;729&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh816iT9AEsLwUXOXilUWEgEIKZvQV3k72YJzNe2QUWwqixvXLomgIJOamggbJFTH8hiXyHkzn8_-fb0-2Q5kY_glbLkyz94H8h79bWvDUKvEH1Huws12lKmEonZ6YMFwHLm0v9qw_5E40EH-G-q2V2fHmdj2wLy0Gmn81PfRR3mKjf0f_yq0A1DZbzh_s/s320/150BEE57-0211-470C-91D1-9D4AFEBF55E8.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;i&gt;The secret to deterrence is not persuasion but menace.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;It is why garden variety thugs stay clear of the rough galute who is battle-scarred, twice their size, and armed to the teeth. They know intuitively that casual confrontation with this type is a bad bet, certain not to leave them feeling better than they started.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Nature teaches predator and prey to recognize each other and to make snap decisions about when to chance confrontation and when to slither away. These snap decisions happen instantly not because the decider is adept at evaluating comparative risk and reward but because he or she senses that a wrong call is fatal, hence not worth a gamble.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;This is a visceral judgment rooted in the most basic instinct of all life: survival.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Academic literature reviews and arguments about deterrence tend to zero in on aspects of theoretical interest to armchair investigators. Some, like this (Tomlinson, below) do a creditable job of presenting theories to say why deterrence works under some circumstances but falls short on other occasions. What do they lack?&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;They lack that element of field truth that comes from being in harm’s way and directly witnessing what deters thug and crazy with equal consistency.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Such studies also miss what H. L. Mencken long ago recognized as the value of certain measures that extend beyond mere deterrence (Nordquist, below).&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;A lifelong cynic, Mencken harbored few illusions about human rascality and the need for keeping it in check through punitive action.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM9hahI1erH7FkWTO8tfHPm1kQ0-W_bfRBbNyXeOhQgdKM85vWIqCOmmFEfaKscusB1NxBdY_halvHN75mdSaC-ZvYHXsPWyuLzLuDwleyfVnLNE3lwEowEowhyphenhyphen02UAfkVMmkgrwN0KTLEuQIUDekR57dDeiYScbm-XMF6sMQ3F4PpkySN9o0lhh3e-Sg/s1137/26362AB0-C8BF-4EBF-81A3-0F5A62387210.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;994&quot; data-original-width=&quot;1137&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM9hahI1erH7FkWTO8tfHPm1kQ0-W_bfRBbNyXeOhQgdKM85vWIqCOmmFEfaKscusB1NxBdY_halvHN75mdSaC-ZvYHXsPWyuLzLuDwleyfVnLNE3lwEowEowhyphenhyphen02UAfkVMmkgrwN0KTLEuQIUDekR57dDeiYScbm-XMF6sMQ3F4PpkySN9o0lhh3e-Sg/w412-h280/26362AB0-C8BF-4EBF-81A3-0F5A62387210.jpeg&quot; width=&quot;412&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;However, Mencken had the perspicacity to discern that the harshest punishments society reserves for its worst villains have more than deterrent value. He speculated that their higher value is in delivering a social catharsis that restores public confidence in a world operating as it should, with some trace of justice or fairness still intact to reassure us that we have not descended into irreversible decline.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Perhaps, then, effective deterrence requires not only consequences but also a cathartic element which functions as an emetic to purge our society of its most lethal toxins.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Finally, for a tongue-in-cheek, four-panel distillation of deterrence in action, give a cartoonist a nod. Try this online search string: &quot;Gary Larson + how nature says do not touch.&quot;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;References:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Nordquist, Richard. &quot;&quot;The Penalty of Death&quot; by H.L. Mencken.&quot; ThoughtCo, Aug. 27, 2020, &lt;a href=&quot;http://thoughtco.com/the-penalty-of-death-by-mencken-1690267&quot;&gt;thoughtco.com/the-penalty-of-death-by-mencken-1690267&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Tomlinson, Kelli D. &quot;An Examination of Deterrence Theory,&quot; Federal Probation, Vol. 80, No. 3, December 2016.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;a href=&quot;https://www.uscourts.gov/sites/default/files/80_3_4_0.pdf&quot;&gt;https://www.uscourts.gov/sites/default/files/80_3_4_0.pdf&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/12/the-essence-of-deterrence.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh816iT9AEsLwUXOXilUWEgEIKZvQV3k72YJzNe2QUWwqixvXLomgIJOamggbJFTH8hiXyHkzn8_-fb0-2Q5kY_glbLkyz94H8h79bWvDUKvEH1Huws12lKmEonZ6YMFwHLm0v9qw_5E40EH-G-q2V2fHmdj2wLy0Gmn81PfRR3mKjf0f_yq0A1DZbzh_s/s72-c/150BEE57-0211-470C-91D1-9D4AFEBF55E8.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-919651793487480610</guid><pubDate>Tue, 21 Nov 2023 14:01:00 +0000</pubDate><atom:updated>2023-11-21T06:01:43.746-08:00</atom:updated><title>Thanksgiving as Loyalty Marker</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWQuY24JNupxNI-Lnr3UGjYB0K22OceCgsv8I3vNtozVQwV7MyO5L_7i2RbAk00ReS8eyViCRh7MQvemL_PUT6NXpp5MstqO4IznSB8sIGI2cimwbEhwa_x_FsvEQBA41DItT23_Gw9-2bgcZa8pAo3SXwAdQwa1VJDBmfisJgOEPUdg1hdZMW9LmfLE/s1280/CC897FA5-0ED4-4ABA-A34F-65469938BFC5.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;1280&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWQuY24JNupxNI-Lnr3UGjYB0K22OceCgsv8I3vNtozVQwV7MyO5L_7i2RbAk00ReS8eyViCRh7MQvemL_PUT6NXpp5MstqO4IznSB8sIGI2cimwbEhwa_x_FsvEQBA41DItT23_Gw9-2bgcZa8pAo3SXwAdQwa1VJDBmfisJgOEPUdg1hdZMW9LmfLE/w400-h250/CC897FA5-0ED4-4ABA-A34F-65469938BFC5.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;A study of loyalty markers positions Thanksgiving under the category of Cohesive Rituals.&lt;/span&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Who created this category, and what makes it significant in gauging loyalty? The first answer is easy: Victor Davis Hanson. The second is more involved. It has to do with social cohesion that helps gauge whether we feel more of a tie to a traditional loyalty, Loyalty A, or to a newer, competing loyalty, Loyalty X.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Think of Loyalty A as a default loyalty to such historically uncontested pillars of social support as family, country, church, and employer. By contrast, think of Loyalty X as something fresh that offers the allure of being different, exciting, perhaps radical. Loyalty X emits a siren call to lure away from Loyalty A, often with an ultimate goal of undermining A altogether.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;In this context, celebrating Thanksgiving is definitely an A game. It reinforces bonds to previous generations that share values and rekindle gratitude.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;For Loyalty X, however, maybe Thanksgiving looks objectionable, if someone tries hard enough to make it so. What is Thanksgiving&#39;s unforgivable sin to Loyalty X adherents?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Not invented here.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;They cannot own it or exact tribute from it. What, then, do they offer in place of cohesive rituals?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Most often, it is credibility-enhancing displays. Think of the rationale behind a cult&#39;s or gang&#39;s insistence on a candidate performing some crime or ritual self-abasement as a precondition for acceptance -- a Loyalty X mainstay.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Both loyalty indicators (5 and 6) represent loyalty markers (whose origins appear in citations provided in the book, below):&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqMIe5FWsY4fo5nTnI8LdF2aMC7S8prAgMMLinoKkHPnFTzHLflAPMasku8T9FGhQDASAYY5wo9T-UM_eP55XRQ6f7pdoYn_uIWsZdd9zTMza9Tfa3KMgbk6xpsBrxddhEVp9IH7xTehNW6z5XK22Bu1eS4CHq431okWila4auqLaa3DeJIZGiqjJwPIA/s1086/5D621C1C-9937-454B-B2B7-62CDF2C3A42F.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;708&quot; data-original-width=&quot;1086&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqMIe5FWsY4fo5nTnI8LdF2aMC7S8prAgMMLinoKkHPnFTzHLflAPMasku8T9FGhQDASAYY5wo9T-UM_eP55XRQ6f7pdoYn_uIWsZdd9zTMza9Tfa3KMgbk6xpsBrxddhEVp9IH7xTehNW6z5XK22Bu1eS4CHq431okWila4auqLaa3DeJIZGiqjJwPIA/w400-h261/5D621C1C-9937-454B-B2B7-62CDF2C3A42F.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Making It Count&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;So what? Whether comparing a society against an opposing movement or an employer against an internal, would-be saboteur, it pays to track the influence of loyalty markers that play to the advantage of one side over another. One way to do this is by assigning numerical values to capture how much each marker means to an employee.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;All it takes to start comparing is to array the loyalty markers into a table, with columns on each side for capturing respective ratings for Loyalty A and Loyalty X. Borrowing a risk assessment methodology, a high rating shows as 0.9, medium as 0.5, and low as 0.1. Assigning numbers to qualitative ratings thus permits summing up totals to show which loyalty is scoring higher, overall, for a given individual exposed to both in the same milieu. This is how the table now looks as a loyalty ledger:&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgevnO1w9Ahl1KgNzg2YBuAPdhTFqRDZ2v0JxJAEfbtppduoOb4JnhJpQ2zGU6IqBneSHqsQg5u1cOms5Chqr6cNi4nclACAG3U6novAu2fvt_SklacokBiFQH-jzKWlSye0Ze3kQ5dFVY2297mGZklBjc2_s48tCsRR2AGBw-TsHkVxHplORIvxEed1uo/s1606/8B59F66B-D068-4AE4-9452-A27A38E2A389.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1337&quot; data-original-width=&quot;1606&quot; height=&quot;333&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgevnO1w9Ahl1KgNzg2YBuAPdhTFqRDZ2v0JxJAEfbtppduoOb4JnhJpQ2zGU6IqBneSHqsQg5u1cOms5Chqr6cNi4nclACAG3U6novAu2fvt_SklacokBiFQH-jzKWlSye0Ze3kQ5dFVY2297mGZklBjc2_s48tCsRR2AGBw-TsHkVxHplORIvxEed1uo/w400-h333/8B59F66B-D068-4AE4-9452-A27A38E2A389.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;For a deeper understanding of loyalty markers and the role they play in first gauging and then countering slow-onset insider threats, I invite you to read Chapter 10 of this book:&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyv_Q6_qFJHDQQvExXmHKaayIetqQKn5zY5VD9EatnElXiHMgLczmJhfFEaTXIyI0x3N9k0BRBnwPPjsD4ZHNcbiRm0GWgbzUCC2iL_Do_ZGIOxcpAjF3YHLCbwjAxQG7AdLo2vnA2zDRTYfVHZxhbB1Wz-uQHFUv4fl_V-eqIcL554vP2sP_D_CrZlU/s500/C91BC1D8-762B-4999-A347-29DFABB991B9.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;332&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcyv_Q6_qFJHDQQvExXmHKaayIetqQKn5zY5VD9EatnElXiHMgLczmJhfFEaTXIyI0x3N9k0BRBnwPPjsD4ZHNcbiRm0GWgbzUCC2iL_Do_ZGIOxcpAjF3YHLCbwjAxQG7AdLo2vnA2zDRTYfVHZxhbB1Wz-uQHFUv4fl_V-eqIcL554vP2sP_D_CrZlU/w265-h400/C91BC1D8-762B-4999-A347-29DFABB991B9.jpeg&quot; width=&quot;265&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Fun Fact: This book broadly distinguishes between sudden impact and rising tide (aka slow-onset) insider threats. The rising tide image inspired the subtitle and the cover image of a wave.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Bottom Line&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Loyalty counts. So do cohesive rituals and all the markers that either reinforce desired loyalties or open the door to competing loyalties undermining the status quo.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p3&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Happy Thanksgiving. It matters.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/11/thanksgiving-as-loyalty-marker.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWQuY24JNupxNI-Lnr3UGjYB0K22OceCgsv8I3vNtozVQwV7MyO5L_7i2RbAk00ReS8eyViCRh7MQvemL_PUT6NXpp5MstqO4IznSB8sIGI2cimwbEhwa_x_FsvEQBA41DItT23_Gw9-2bgcZa8pAo3SXwAdQwa1VJDBmfisJgOEPUdg1hdZMW9LmfLE/s72-w400-h250-c/CC897FA5-0ED4-4ABA-A34F-65469938BFC5.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-169437813955888460</guid><pubDate>Sun, 29 Oct 2023 08:51:00 +0000</pubDate><atom:updated>2023-10-29T01:52:24.578-07:00</atom:updated><title>Your Immediate Threat</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPRhSPXqh4U0rmWi7J-0qwOg0R3lcY-iY5aWr-RR_1q4M4EftIvghCyhW2MuAFshbV1i8iw2dP7wWaMeJU74rNSAttcDYrSoT_zKHwJ8YCSqTpCeHNvQ6uuNWf5ZRzaRjuOq3aSrssMRwcTmGrIAomGx7xCGjsHPLkGLDLKul7CSV7K9JBKM2b3pWvbHk/s1156/EC3323B7-C35D-4933-A0A1-0ADD11957761.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1156&quot; height=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPRhSPXqh4U0rmWi7J-0qwOg0R3lcY-iY5aWr-RR_1q4M4EftIvghCyhW2MuAFshbV1i8iw2dP7wWaMeJU74rNSAttcDYrSoT_zKHwJ8YCSqTpCeHNvQ6uuNWf5ZRzaRjuOq3aSrssMRwcTmGrIAomGx7xCGjsHPLkGLDLKul7CSV7K9JBKM2b3pWvbHk/s320/EC3323B7-C35D-4933-A0A1-0ADD11957761.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Your immediate threat is not some vaguely drawn demon or cascading evil that remains years away from doing its worst -- eventually. Your immediate threat is what kills you first. The closer it gets, the more indisputable its intentions.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What prevents otherwise sentient beings from identifying such approaching threats? Some friends and colleagues marinated in the same brine of graduate work in homeland security through the Naval Postgraduate School recently traded observations on such matters while discussing at length the evils of the times. In the process of our iterative discourse, certain themes surfaced, including these:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;1. &amp;nbsp;Popular fixation on distant, intractable dilemmas (at times reflexively characterized as &quot;wicked problems&quot; so frequently that the most blatant sign of wickedness has become wearing out this cliché). By concentrating on problems which may indeed be real but remain years or decades away from producing their apocalyptic impact, we fall into a trap that yields near term gain at a price.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The gain is bureaucratic insulation from accountability. In other words, the end of the world may eventually arrive according to whatever model projects its ETA, but as long as it does not get here on our watch, no one will hold us accountable for what we do about it. This liberation from consequences frees us to pursue prudent and wrongheaded strategies with equal gusto. And if we cloak our actions with popular, emotive resonance, there is seldom a penalty to face for wasting resources or getting it wrong. Such is the cost of doing business when one calls one&#39;s business saving the world.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The price for succumbing to such fixations extends beyond waste of resources. A big price is intentional narrowing of defensive focus to the point of losing the capacity to detect more deadly threats approaching obliquely, in flanking maneuvers. After all, an adversary bent on your destruction seldom neglects the value of surprise if he can catch you unawares and lower his risk by dealing a death blow while you are directing your attention elsewhere.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;2. &amp;nbsp;Diminished capacity to distinguish imminent threats to life from confected, outrage du jour that people styling themselves as victims rail against, whether their cause of the moment is some perceived social injustice or no longer having free meals at the company cafeteria.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;3. &amp;nbsp;Loss of predator-resistant defenses. People now accustomed to having their stated preferences accommodated and their self-definitions validated see the world differently than their recent predecessors did. The latter had to fight. They grew up without expecting the world to go their way. The requirement to struggle, to compete, and to be ready to engage in combat for both advancement and survival imparted certain programming beneficial to defense. That programming included constant horizon scanning for predators and a premium on early threat detection, effective threat avoidance, and vigorous self-defense. When you have to fight for what you have, you optimize for keeping it and for thwarting attackers who contrive to take it away.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;So What?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;A distant threat becomes a disembodied abstraction, a topic more suited to debate than action. People obsessed exclusively with eventual and apocalyptic threats spend more energy talking about them and exploiting them for personal advantage than preparing to grapple with them on their own. Making this society&#39;s problem takes it off the My Problems list.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The net result is vulnerability that invites ruthless adversaries to strike such self-neutered targets. This situation favors those willing to slit throats over those programmed to see no fast-moving evil. And so, your greatest threat becomes whatever is willing and able to kill you first, because that threat will deny you the luxury of being around when the eventual threat comes to pass.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Perhaps Hilaire Belloc best captured the image of this kind of threat when observing,&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&quot;We sit by and watch the barbarian, we &amp;nbsp;tolerate him; in the long &amp;nbsp;stretches of peace &amp;nbsp;we are not afraid. &amp;nbsp;We are tickled by his &amp;nbsp;irreverence; his comic &amp;nbsp;inversion of our &amp;nbsp;old certitudes &amp;nbsp;and our fixed creeds &amp;nbsp;refreshes us; we &amp;nbsp;laugh. But as we laugh &amp;nbsp;we are watched by large and awful faces &amp;nbsp;from &amp;nbsp;beyond; and on these faces there is no smile.&quot;&lt;/span&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/10/your-immediate-threat.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPRhSPXqh4U0rmWi7J-0qwOg0R3lcY-iY5aWr-RR_1q4M4EftIvghCyhW2MuAFshbV1i8iw2dP7wWaMeJU74rNSAttcDYrSoT_zKHwJ8YCSqTpCeHNvQ6uuNWf5ZRzaRjuOq3aSrssMRwcTmGrIAomGx7xCGjsHPLkGLDLKul7CSV7K9JBKM2b3pWvbHk/s72-c/EC3323B7-C35D-4933-A0A1-0ADD11957761.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-2523938748532937656</guid><pubDate>Tue, 10 Oct 2023 15:50:00 +0000</pubDate><atom:updated>2023-10-10T08:50:39.556-07:00</atom:updated><title>Another Possible Aim of Barbaric Attack</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFJnePGfkO3sJHS09Djb8ZhGaZsq0Wt3AUx_vCzm9BbZCs29t-hGbtLVjgfi8VPmrJykZGrrDLsH-Wf5wbOTfvtybQ9nc5MIAaQOV9dsDsAc0Wt_NGOQ0hZHrU7iAMt9cAdRB1tDaTF1-hKk_Zoo9APjpLMB_GVEy1zn6tbt1dHrfWnxdB8NVSl2qz5Z0/s715/17357693-9FC1-4355-99EA-C808F7DA2DB7.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;518&quot; data-original-width=&quot;715&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFJnePGfkO3sJHS09Djb8ZhGaZsq0Wt3AUx_vCzm9BbZCs29t-hGbtLVjgfi8VPmrJykZGrrDLsH-Wf5wbOTfvtybQ9nc5MIAaQOV9dsDsAc0Wt_NGOQ0hZHrU7iAMt9cAdRB1tDaTF1-hKk_Zoo9APjpLMB_GVEy1zn6tbt1dHrfWnxdB8NVSl2qz5Z0/s320/17357693-9FC1-4355-99EA-C808F7DA2DB7.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;It is already fresh in murmur that one likely aim of the mass slaughter of defenseless Israeli citizens last weekend was to undermine Saudi Arabia’s impending rapprochement with Israel. The news that the Saudis put their planned deal on hold appears to bear testimony to some instrumental value the attackers realized from the carnage.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What else? Is there a long game in which Hamas contrived to accumulate points? Consider: The terrorist playbook may accommodate a good deal of improvisation, but its individual plays tend to be limited to asymmetric options and geared to maximizing publicity through shock. There is one more factor to consider.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In the Atrocity Olympics, points go on the scorecard for luring one’s opponent to sink to the same level by instigating reciprocal savagery.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;- - - - - - - - -&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;As Dev Sol* showed the world when murdering unsuspecting police and other authorities in Turkey during the 1990s, terrorists perceive value in such actions because they (a) undermine public confidence in government’s ability to protect citizens, and (b) bait responding forces into brutal over reaction that ultimately costs the responder popular support and an erstwhile reputation as the good guy in a given conflict. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The net result, and a strategic aim, is to heap reputational attack on top of a barbaric body count. And in the case of Hamas, that objective may appear worth the cost in loss of life and livelihood for Gaza-based Palestinians whose lot is already miserable and showing no signs of improving under an authoritarian Palestinian regime. In 15 years of autonomous rule sanctioned by Israel, that regime has delivered 70% unemployment amid unbridled railing against Israel and Israelis. In the calculation of Hamas leaders, what do they have to lose by sacrificing this abject population of unfortunates to a greater aim of striking a political and reputational blow against Israel, while basking in the publicized infamy attending the historic carnage they carried out?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;This is by no means a rationalization or even a remotely justifiable objective for any civilized leadership to champion. But does it align with the agenda of barbarians? One has to wonder.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;* For an overview of Dev Sol&#39;s evolution over time, see https://www.globalsecurity.org/military/world/para/dev_sol.htm&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/10/another-possible-aim-of-barbaric-attack.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFJnePGfkO3sJHS09Djb8ZhGaZsq0Wt3AUx_vCzm9BbZCs29t-hGbtLVjgfi8VPmrJykZGrrDLsH-Wf5wbOTfvtybQ9nc5MIAaQOV9dsDsAc0Wt_NGOQ0hZHrU7iAMt9cAdRB1tDaTF1-hKk_Zoo9APjpLMB_GVEy1zn6tbt1dHrfWnxdB8NVSl2qz5Z0/s72-c/17357693-9FC1-4355-99EA-C808F7DA2DB7.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-9061241714322226166</guid><pubDate>Fri, 06 Oct 2023 13:03:00 +0000</pubDate><atom:updated>2026-01-24T04:06:54.820-08:00</atom:updated><title>Why Insight Matters</title><description>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;Bottom Line Up Front: &lt;i&gt;It&#39;s not so much that people don&#39;t know what they want; it&#39;s that people can&#39;t tell you what they want.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRKQhvGbT0T5it3pLA0rm06wK6hnzm4Yb2XcBi4XyWG8VEceJQmD220vvlFOQT6uaQu8HlMRcK7TPzt52pygmB4RHSVBxR7yrXJMvNFC7C9zWRh-vV491qtrdDlBIrglHUOUuIyjrGpKZIUIVMfZy_teiPqdg1nWzCXegKQItiAY5WatuJcECPP3RUX10/s2030/78B159E5-FA06-4384-9908-7B6A100C6A10.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1302&quot; data-original-width=&quot;2030&quot; height=&quot;205&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRKQhvGbT0T5it3pLA0rm06wK6hnzm4Yb2XcBi4XyWG8VEceJQmD220vvlFOQT6uaQu8HlMRcK7TPzt52pygmB4RHSVBxR7yrXJMvNFC7C9zWRh-vV491qtrdDlBIrglHUOUuIyjrGpKZIUIVMfZy_teiPqdg1nWzCXegKQItiAY5WatuJcECPP3RUX10/s320/78B159E5-FA06-4384-9908-7B6A100C6A10.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; font-family: UICTFontTextStyleBody; font-size: 23px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;This was the epiphany that data scientist Howard Moskowitz realized after exhaustive surveys and focus groups and taste tests when he was trying to understand the secret behind how consumers choose spaghetti sauce. Malcolm Gladwell, in turn, immortalized this epiphany by showcasing it in a TED Talk that became so popular, it sometimes steals his own thunder when he attempts to promote his new projects.&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; font-width: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; font-width: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;An enduring lesson to harvest from this epiphany is that social science research, which has never approached the precision of mathematics, must remain ever humble once recognizing its inherent limitations, no matter how impressive its methodology or presentation. Hence the need for continuing to question, to explore, and to examine alternative hypotheses -- rather than to succumb to the social sciences researcher&#39;s fatal flaw of presumptive omniscience.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; font-width: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; font-width: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Not only are there times when we don&#39;t know what we want. There are also times when we just cannot explain it.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;p2&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; font-width: normal; line-height: normal; margin: 0px; min-height: 29px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;-webkit-text-size-adjust: auto; font-size: 23px; font-stretch: normal; font-width: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;s1&quot; style=&quot;font-family: UICTFontTextStyleBody;&quot;&gt;Look here for Gladwell&#39;s talk, which has aged better than many:&amp;nbsp;&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.ted.com/talks/malcolm_gladwell_on_spaghetti_sauce&quot;&gt;https://www.ted.com/talks/malcolm_gladwell_on_spaghetti_sauce&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/10/why-insight-matters.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRKQhvGbT0T5it3pLA0rm06wK6hnzm4Yb2XcBi4XyWG8VEceJQmD220vvlFOQT6uaQu8HlMRcK7TPzt52pygmB4RHSVBxR7yrXJMvNFC7C9zWRh-vV491qtrdDlBIrglHUOUuIyjrGpKZIUIVMfZy_teiPqdg1nWzCXegKQItiAY5WatuJcECPP3RUX10/s72-c/78B159E5-FA06-4384-9908-7B6A100C6A10.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-6842903165009553930</guid><pubDate>Fri, 29 Sep 2023 11:33:00 +0000</pubDate><atom:updated>2023-09-30T20:11:14.689-07:00</atom:updated><title>The Untoward Event Matrix</title><description>&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw1fZQBEX_Dk57Ib-skbK0n2mMJdO3ZFja4pIxuQu6yLVa6tESfdadcLCJgV45WxSf8ERXqCnHEmQWGf61RHUI0ONyQvG1b-8-wcsYa7jM6agsDVAlQL8NQKma2LXofm9m7k0AKi63xgHxzkOFmgeQjFeo-Wh-XVwXmjwveS6nqFQqg-0DKDZKIY0T_NU/s1080/947EDABC-7475-4FCC-9CF5-6C72661BCAEB.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1080&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw1fZQBEX_Dk57Ib-skbK0n2mMJdO3ZFja4pIxuQu6yLVa6tESfdadcLCJgV45WxSf8ERXqCnHEmQWGf61RHUI0ONyQvG1b-8-wcsYa7jM6agsDVAlQL8NQKma2LXofm9m7k0AKi63xgHxzkOFmgeQjFeo-Wh-XVwXmjwveS6nqFQqg-0DKDZKIY0T_NU/s320/947EDABC-7475-4FCC-9CF5-6C72661BCAEB.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In organizational life, bad things don&#39;t just happen. They tend to follow a pattern, especially over time. In seeking a means of categorizing these events on the path to doing something meaningful about managing them, it may avail to look at them through the prism of what I call the Untoward Event Matrix.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What It Is&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;This matrix represents a rough ordering of undesired events according to their impact and frequency of occurrence. Using this tool is akin to plotting things on a piece of graph paper to show their relative position. The exercise necessarily involves artificiality; yet it may prove illuminating in showing how the items plotted relate to each other. It may even offer visibility into where to invest energy and resources to reduce loss.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;As a starting point, divide the matrix into quadrants, like this:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiro04ItLwEocozx_dD2O_BlJiUgRUT8CLDs10rFNGbT8uajP5jL4RWCGDFRWfdEGiwdI3htuHwv0m4XS2nl-aM47fFeOT1mieRTlCu_TyS1O6dmUVkvV9HN6aAVIzRQaiqZ26Grlr5Evcn0f7axHo0F8M_0oRierZlD4ovbkzZXhsGt7FV5h9yD6zWoIw/s1080/350DD38F-9DA3-479B-AC89-38DB99DFAEAC.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1080&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiro04ItLwEocozx_dD2O_BlJiUgRUT8CLDs10rFNGbT8uajP5jL4RWCGDFRWfdEGiwdI3htuHwv0m4XS2nl-aM47fFeOT1mieRTlCu_TyS1O6dmUVkvV9HN6aAVIzRQaiqZ26Grlr5Evcn0f7axHo0F8M_0oRierZlD4ovbkzZXhsGt7FV5h9yD6zWoIw/s320/350DD38F-9DA3-479B-AC89-38DB99DFAEAC.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Now there are only four boxes to fill, going from the bottom up and then to the right:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;LOW FREQUENCY/LOW IMPACT&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;These are undesired events which seldom occur but hardly matter in terms of hurting the organization. A brief, occasional power outage or random, minor accident could fall into this category.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;HIGH FREQUENCY/LOW IMPACT&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;These are undesired events which occur more often, to the point of becoming predictable. While their impact is also relatively low, such untoward events tend to raise eyebrows if they cause cumulative losses or disruptions whose impact could cross over from low to something more severe. Think of recurring graffiti, vandalism, and accidents or mugging that, over time, flag a given site as unsafe.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;LOW FREQUENCY/HIGH IMPACT&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;These are game-changers that are focusing events because, although statistically rare, their severe impact makes a devastating mark on the organization. Think in terms of a 9/11 attack or massacre at the workplace.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;HIGH FREQUENCY/HIGH IMPACT&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Such events represent a theoretical worst case scenario, because they combine the severity of the previous category with a high incidence of occurrence. If, instead of being rare, such events become commonplace, they create an unsurvivable situation. Consequently, in the real world of corporate life, such conditions are more abstract than realistic. Why? The people in charge realize that they face a simple dilemma: fix or die. In other words, if they cannot drive down the frequency of high impact events to being rare, hence low frequency, they cease to remain in business.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Depiction&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;This is how the situation looks in practice, after consulting the organization&#39;s own incident reports to see how untoward events tend to array across this matrix over time:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguo7WK2DjGKDWEsnuQoDj_cRuCyhBuP0QvqIhoAZDyJo-N-yGL6K6-n1opzwUfYAMsXoAVLPf5J7y_9xhN8Ceyq5bBakp9eOl6Q-u6LkjKDC84AVcz6r4dMCyy93bsPqdUehL0zi8RLmgUwQExW20nBf6N6nsfjtawLZpcKGfCeFNP30Zc0VyEbz6JhaQ/s1080/04C994C8-E11B-4A8C-B78B-9F176E9FFE76.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1080&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguo7WK2DjGKDWEsnuQoDj_cRuCyhBuP0QvqIhoAZDyJo-N-yGL6K6-n1opzwUfYAMsXoAVLPf5J7y_9xhN8Ceyq5bBakp9eOl6Q-u6LkjKDC84AVcz6r4dMCyy93bsPqdUehL0zi8RLmgUwQExW20nBf6N6nsfjtawLZpcKGfCeFNP30Zc0VyEbz6JhaQ/s320/04C994C8-E11B-4A8C-B78B-9F176E9FFE76.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;Whence the Data?&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In the corporate world, as in large public sector and nonprofit organizations, it behooves management to monitor untoward events, the better to limit losses and to gauge what insurance to seek out as a means of transferring risk. Accordingly, some office in the organization takes on the responsibility of tracking incidents, typically with the aid of an incident reporting system. Data from such incident reports, in turn, inform the distribution of events (aka incidents) captured broadly in the foregoing matrix.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What Happens Next?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Once management discerns the emerging pattern showing the frequency and impact of untoward events, competent managers begin to do what they do best: prioritize.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;First, they attack the biggest, most immediate challenge, the big X representing the high impact/low frequency event that just befell the organization or threatens to surface in the near future. Certain possibilities soon confront them:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(A) This event has reached catastrophic proportions and is requiring a no-holds-barred, all-hands-on-deck response;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(B) The worst impact of the event is over, leaving management to clean up, restore operations, and learn lessons to apply in reducing future impacts of a similar event; or&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;(C) The likelihood or severity of the event taking place has diminished to the point of making it a non-issue, leaving no budget or executive support for pursuing it further.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Shifting Focus&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Under the circumstances, once the most urgent priority, the big X, goes away, lesser priorities get a promotion. Accordingly, those resources once tasked with resolving the big X now shift, as shown here:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgkDDdxEKn-Ro_nb_oIg4GSKHlGM8a3ZkGfp2BUjxhxB0dq2tOdeHqbtAXAQ9b0x71ucRnqtyBx-So2CaxGmVCLePTW17C5os_T3IgQJvG4CzZTiz7Cs6bqMp7CUNr3CZqmKtvBr0fIroTpsh1Ls-hao-kKnVQoOTwgBd77b3a2kT6B8HjtEjrQHWnPA/s1080/1ECFD3B6-08F2-4B1A-A3A3-C83801776A1C.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1080&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTgkDDdxEKn-Ro_nb_oIg4GSKHlGM8a3ZkGfp2BUjxhxB0dq2tOdeHqbtAXAQ9b0x71ucRnqtyBx-So2CaxGmVCLePTW17C5os_T3IgQJvG4CzZTiz7Cs6bqMp7CUNr3CZqmKtvBr0fIroTpsh1Ls-hao-kKnVQoOTwgBd77b3a2kT6B8HjtEjrQHWnPA/s320/1ECFD3B6-08F2-4B1A-A3A3-C83801776A1C.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Why?&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;It is the nature of humans and their organizations to harness their capabilities to those challenges deemed important, or perhaps &lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;urgent. Failing that, they default to tackling the challenges at hand. Consequently, organizational focus now turns to untoward events that may be of lesser impact yet remain of sufficiently high frequency to open the door to the possibility that, if neglected, they could eventually cross over into one of the two high impact quadrants of the matrix.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Defender Predicament&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;It now becomes the defender&#39;s dilemma to at once address the high frequency/low impact events while keeping in reserve some capacity to handle potential high impact events that will most likely be rare. Why? The unchecked arrival of those high impact events, especially if allowed to also become high frequency, might be fatal to the organization.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Conclusion&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;This is only one way of using the untoward event matrix to apprehend ambient risk and contrive plans for where to focus resources available for mitigation and prevention. A seasoned manager with corporate experience will no doubt find more. Why? Because bad things don&#39;t just happen, and good managers don&#39;t wait to be surprised by them.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/09/the-untoward-event-matrix.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw1fZQBEX_Dk57Ib-skbK0n2mMJdO3ZFja4pIxuQu6yLVa6tESfdadcLCJgV45WxSf8ERXqCnHEmQWGf61RHUI0ONyQvG1b-8-wcsYa7jM6agsDVAlQL8NQKma2LXofm9m7k0AKi63xgHxzkOFmgeQjFeo-Wh-XVwXmjwveS6nqFQqg-0DKDZKIY0T_NU/s72-c/947EDABC-7475-4FCC-9CF5-6C72661BCAEB.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-7515016541286222614</guid><pubDate>Sun, 24 Sep 2023 20:52:00 +0000</pubDate><atom:updated>2023-09-24T13:52:57.441-07:00</atom:updated><title>Beware the Reformatted Expert</title><description>&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnnzZG4NFUTKVEg98nNbIxMLXhfXdFuB6xLr3lBJ7gNKAEKnt5VweGhtoq1yOTV93zEbYHDeJGNxG7B5QOf82-kSziF1eXEr0H-EOsKMFn5NzHPULrNuTjzoejyI4qRUqXsiQ_OrJLJkqEs-NYvgs2bGwI-gzBPxWXmrxmlfXOVZ-UGUrlDUifvbnwPY/s1678/B6EC727C-D21B-48BA-A1CE-54EB7A2D9604.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;813&quot; data-original-width=&quot;1678&quot; height=&quot;155&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnnzZG4NFUTKVEg98nNbIxMLXhfXdFuB6xLr3lBJ7gNKAEKnt5VweGhtoq1yOTV93zEbYHDeJGNxG7B5QOf82-kSziF1eXEr0H-EOsKMFn5NzHPULrNuTjzoejyI4qRUqXsiQ_OrJLJkqEs-NYvgs2bGwI-gzBPxWXmrxmlfXOVZ-UGUrlDUifvbnwPY/s320/B6EC727C-D21B-48BA-A1CE-54EB7A2D9604.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;Reformatted experts are mediocre at best, otherwise inept.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Two forces conspire to saturate any given field with drive-thru pretenders who hasten to recast their past experience and dubious credentials as just the particular expertise your dilemma demands. Those forces are commoditization and desperation. Like most fields, security is as vulnerable to these reformatted experts as any other endeavor that pays.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Case in Point&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Take nuclear surety, for example. Before the sudden end of the Cold War, the nuclear surety field provided steady employment for specialists at Sandia National Laboratories and wherever else there was a robust market for such expertise. How did these experts react to the prospect of being made redundant as the early 1990s ushered in a so-called peace dividend? They reformatted. Many shifted gears and reformatted as experts in critical infrastructure protection.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;As critical infrastructure protection lost traction and the promise of indefinite funding, what other reformatting oppportunities arose? One of them was Y2K, which offered the failed promise of years of employment in unraveling knots in anticipated computing catastrophes that never quite came to pass. Other, more promising reformatting targets, however, eventually surfaced.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Cyber security became a safe landing zone for reformatters in need of a cachet and a paycheck. Business continuity also availed for those who needed to transfer their erstwhile employment in business resumption or continuity of government into a province that showed better potential as a salary continuation plan.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Where Else&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;School and workplace violence proved equally popular reformatting targets for run-of-the-mill generalists, particularly for those whose trumpeted expertise extended no further than repackaging conventional wisdom. After all, this field regenerates popular interest with every school shooting or rampage killing. Practitioners eking out a modest living dispensing security platitudes can hardly pass up the chance to garner free publicity and new clients if they reformat as experts who know just how to address such threats. Never mind that their nostrums tend to be borrowed, unoriginal, and unburdened by success. If they reformat as experts and surface at an hour of need, someone, somewhere will be willing to engage them.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Insider Arena&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Another field to now experience saturation by reformatted experts is insider threat defense. The cyber security crowd, in particular, finds this arena particularly attractive as a platform for selling its wares. So do vendors of security products and services who can manage to recast whatever they have to sell as uniquely tailored to addressing insider threats. Whether it is an invasive technology or a training program, reformatted, drive-thru insider threat experts lose no time promoting their wares and assuring the market that it cannot survive without them. Yesterday, they were auditors, guard force services, or computer security specialists. Today they reformat as insider threat experts.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Emerging Pattern&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The pattern evident from these foregoing examples is clear. An old market fades or fails to sustain the mouths it was expected to feed indefinitely, hence desperation beginning to surface. Meanwhile, genuine experts in an emerging field begin to attract notice and to command an innovator&#39;s profit. Soon, the desperate onlookers notice. Consequently, they rush into this new, promising field, reformatting themselves as experts in an area they barely acknowledged yesterday. Now the commoditization effect takes place.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What was once unique and responsive to an under served market now becomes a commodity. Any field absorbing a great influx of entrants begins to lose its cachet. With a horde of reformatted, if dubious, &quot;experts&quot; crowding the market, the emerging field eventually begins to look over saturated with mediocrities. Conventional wisdom becomes the only wisdom on tap, and unoriginal reformatters soon suffocate the remaining innovators, crowding them out and shouting them down, with little regard for results attained. The market itself changes. Prices drop, as does quality. Reformatters reshape it, dumbing it down and lowering expectations.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;The net result? Reformatted experts may still offer some value, to the extent that platitude and truism are often rooted in common sense. And common sense beats unbridled folly. But when the ultimate test comes and their offerings disappoint, the superficiality of their reformatting comes to the surface -- at somebody else&#39;s expense, hence this warning against instant experts of the reformatted variety.&lt;/span&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/09/beware-reformatted-expert.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnnzZG4NFUTKVEg98nNbIxMLXhfXdFuB6xLr3lBJ7gNKAEKnt5VweGhtoq1yOTV93zEbYHDeJGNxG7B5QOf82-kSziF1eXEr0H-EOsKMFn5NzHPULrNuTjzoejyI4qRUqXsiQ_OrJLJkqEs-NYvgs2bGwI-gzBPxWXmrxmlfXOVZ-UGUrlDUifvbnwPY/s72-c/B6EC727C-D21B-48BA-A1CE-54EB7A2D9604.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-8203037210187956553</guid><pubDate>Mon, 18 Sep 2023 14:36:00 +0000</pubDate><atom:updated>2023-09-18T11:41:30.353-07:00</atom:updated><title>Name Selection and Self-Sabotage</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhScqc_Bp2OuQQJMCBf21hEIeBwCXCrzfkOs3jcV3vyvkFOT_xqXUJkjSiDF4Vadtrr0uUxgmVGUuoNY-bJdqFvuVtIs3VpJ82_QLz6Ld3jlDZNUsNoOAIhYpi9uA_vaQJQvM0G2UmjTPBAonsa6XnO5B3WdgQ4asUe0Rar56EfWX1965JI6pJeTKG8Y_w/s1600/52367535-5949-4128-9CC8-36FA27350775.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1600&quot; data-original-width=&quot;1600&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhScqc_Bp2OuQQJMCBf21hEIeBwCXCrzfkOs3jcV3vyvkFOT_xqXUJkjSiDF4Vadtrr0uUxgmVGUuoNY-bJdqFvuVtIs3VpJ82_QLz6Ld3jlDZNUsNoOAIhYpi9uA_vaQJQvM0G2UmjTPBAonsa6XnO5B3WdgQ4asUe0Rar56EfWX1965JI6pJeTKG8Y_w/s320/52367535-5949-4128-9CC8-36FA27350775.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;People may call themselves anything they please, although they cannot guarantee that the rest of the world will honor, tolerate, or even temper the snickering that outlandish name selections inspire. The aspirational world and the real world seldom align to suit every taste.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What happens when name selection verges into self-sabotage? Nothing good.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Witness the smug ignorance of subliterate parents who sentence their heirs to a lifetime of derision by christening them with first names and spelling them atrociously to boot. The resulting atrocities are not so much first names for innocent offspring as banners for their parents to wave as their expression of parental personality. Culturally, the net result is to proclaim to the world that the parent is a self-absorbed underachiever so starved of merit as to have to resort to branding a newborn with something atrocious enough to gain attention for the parent.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Examples abound, but why draw unnecessary attention to them to further torment the poor souls who had no say in their own mislabeling?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;A Different Story&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Team names take on a different character. Ostensibly, much thought goes into naming them to either honor a role model or evoke the winning spirit that the team aspires to emulate. Take the historical selection of “Redskins” as emblematic of the most celebrated warrior and leadership virtues that found an early admirer in George Washington.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;André Billeaudeaux, himself a veteran and mature social scientist, has made this case for the Native American Guardians Association, time and time again. Witness such deep dives into the genesis and perpetuation of that name, not as the pejorative some low-resolution thinkers suggest in activist screeds, but as a source of pride:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://personalliberty.com/native-american-thoughts-of-unity-brotherhood-redmenism-during-martin-luther-king-week/&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;https://personalliberty.com/native-american-thoughts-of-unity-brotherhood-redmenism-during-martin-luther-king-week/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://personalliberty.com/the-d-day-inspired-fight-goes-on-americas-soul-depends-on-modern-redskins-redmen-and-patriots-to-stand-up-like-the-greatest-generation/&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;https://personalliberty.com/the-d-day-inspired-fight-goes-on-americas-soul-depends-on-modern-redskins-redmen-and-patriots-to-stand-up-like-the-greatest-generation/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.americanthinker.com/articles/2019/05/creating_americas_soul_e_pluribus_unum_and_native_identity_.html&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;https://www.americanthinker.com/articles/2019/05/creating_americas_soul_e_pluribus_unum_and_native_identity_.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://personalliberty.com/native-american-thoughts-of-unity-brotherhood-redmenism-during-martin-luther-king-week/&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;https://personalliberty.com/native-american-thoughts-of-unity-brotherhood-redmenism-during-martin-luther-king-week/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Add, finally, two clips of André&#39;s interviews on this theme:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://youtu.be/FS339W2P-kY?si=6OvuGXg1DELoJ2jh&quot;&gt;https://youtu.be/FS339W2P-kY?si=6OvuGXg1DELoJ2jh&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;and&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://youtu.be/st2wGk141Bc?feature=shared&quot;&gt;https://youtu.be/st2wGk141Bc?feature=shared&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What&#39;s In a Name?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;From the standpoints of self-preservation and self-sabotage, Commander Billeaudeaux supplies us this compelling answer: everything.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/09/name-selection-and-self-sabotage.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhScqc_Bp2OuQQJMCBf21hEIeBwCXCrzfkOs3jcV3vyvkFOT_xqXUJkjSiDF4Vadtrr0uUxgmVGUuoNY-bJdqFvuVtIs3VpJ82_QLz6Ld3jlDZNUsNoOAIhYpi9uA_vaQJQvM0G2UmjTPBAonsa6XnO5B3WdgQ4asUe0Rar56EfWX1965JI6pJeTKG8Y_w/s72-c/52367535-5949-4128-9CC8-36FA27350775.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-869874152064361332</guid><pubDate>Fri, 01 Sep 2023 16:06:00 +0000</pubDate><atom:updated>2023-09-01T12:59:43.418-07:00</atom:updated><title>Terrorism, Extremism, and Crime</title><description>&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In the modern lexicon of societal atrocities, overlapping definitions may avail for some agencies while only confusing the citizens who pay taxes and find themselves just as dead whether felled by terrorist, extremist, or criminal. What are the distinctions anyway, especially if one seeks a basic grasp of where these terms get applied to villains and villainies that are the hallmark of equal-opportunity cutthroats?&amp;nbsp;&lt;/p&gt;&lt;p&gt;Consider this diagram that draws out distinctions while drawing an oval over areas of overlap:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLTEKX_Hx6FRC0l9FZ7R386stSGAdnLacqsdY_Y98xnJCrFco0qHgkXEdvpFr2kJ-Rfp00QdA5Xr4DnfEj7KbqO-aFzqQGKu8h9C2_hHL_yND9Rxyp1CC9zgozkNiemaqrqKUi5hxXi5_YMiI4Vija-035GCyC4mjGKlPqN56xL7MRRKO3MpwsmKUQI5c/s1456/754DB1B7-EF58-413E-909C-AC683E14150D.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;865&quot; data-original-width=&quot;1456&quot; height=&quot;381&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLTEKX_Hx6FRC0l9FZ7R386stSGAdnLacqsdY_Y98xnJCrFco0qHgkXEdvpFr2kJ-Rfp00QdA5Xr4DnfEj7KbqO-aFzqQGKu8h9C2_hHL_yND9Rxyp1CC9zgozkNiemaqrqKUi5hxXi5_YMiI4Vija-035GCyC4mjGKlPqN56xL7MRRKO3MpwsmKUQI5c/w640-h381/754DB1B7-EF58-413E-909C-AC683E14150D.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;Crime and fear of crime are the most familiar. As Steven Lab has told us [1], they have bedeviled society to the point of becoming an irremovable thread of the social fabric (my formulation, not Lab&#39;s).&amp;nbsp;&lt;/p&gt;&lt;p&gt;Terrorism, although a more modern term in its circulation, nevertheless traces to a long pedigree that, in its essence, differs from crime in what Boaz Ganor highlights as its political objective &amp;nbsp;[2].&amp;nbsp;&lt;/p&gt;&lt;p&gt;What of extremism, a barbarism of bureaucratic utility to those seeking to affix a pejorative label on transgressions that may not qualify as terrorism, yet command insufficient notice (and funding) if allowed to languish as a sapling made invisible in a forest of crime?&amp;nbsp;&lt;/p&gt;&lt;p&gt;It helps to wrestle these cranky definitions to a mat of logical distinctions if one sees them in a certain light. In this framing, crime becomes a prohibited act, or even the neglect of a necessary act. Crime&#39;s manifestations may well approach infinity, which means sometimes they will no doubt share features with less pervasive horrors like terrorism and extremism.&lt;/p&gt;&lt;p&gt;As for distinguishing the isms, it may avail to regard terrorism as an act, which typically targets noncombatants and always furthers a political objective. By contrast, think of extremism as a measure of intensity. How so? Definitions of extremism, murky at best and often an affront to tautology, characterize this as a state of being &quot;extreme,&quot; hence presumptively imbalanced or radically succumbing to some polarized position that would defy reason and invite danger. Invariably, the label is subjective. [3] &quot;Extremism&quot; as such is a term easier to brandish against opponents than to define with objective precision. But if one absorbs it into one&#39;s lexicon in the interest of remaining au courant, one may grudgingly do so under the foregoing characterization.&lt;/p&gt;&lt;p&gt;Overlap&lt;/p&gt;&lt;p&gt;Terrorism, extremism, and crime overlap when terrorists, extremists, and criminals use violence. Do the perpetrators define themselves by one of these labels? Maybe. Maybe not. More likely, government agencies reacting to their attacks apply whichever label yields the greatest advantage in thwarting the attackers. Experience suggests that violence is the sine qua non for terrorists; otherwise, their actions would raise no eyebrows and attract few adherents.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Criminals have more diversity in their ranks. Since their aim is more geared to realizing a personal benefit than to advancing a cause, criminals retain the flexibility to play to their strengths. Thus, a world-class embezzler is unlikely to resort to violent crime. As a rule, fraud and nonviolent crime pay better and pose less of a penalty if caught and sentenced.&lt;/p&gt;&lt;p&gt;Who are extremists? People who are passionate or zealous to a fault? If this is their only failing, then it is difficult to brand them as dangerous -- unless they begin to pose a danger to society that translates to a threat of violence. An extreme lover of puns is a bore and a nuisance. An extreme lover of puns who insists on reciting his favorites to an audience held hostage at gunpoint is quite another creature. Perhaps he now qualifies as the &quot;extremist&quot; for which the term was intended. Add to his hostage-taking a political objective interspersed between his puns, and does he now qualify for promotion to &quot;terrorist&quot;?&lt;/p&gt;&lt;p&gt;The answer, a default for any seasoned consultant: It depends.&lt;/p&gt;&lt;p&gt;Notes:&lt;/p&gt;&lt;p&gt;[1] S. Lab, Crime Prevention: Approaches, Practices, and Evaluations, 3rd Edition (Cincinnati: Anderson Publishing, 1997) pp. 1-14.&lt;/p&gt;&lt;p&gt;[2] B. Ganor, The Counter-Terrorism Puzzle: A Guide for Decision Makers,&lt;/p&gt;&lt;p&gt;(London: Transaction Publishers, 2005) p. 9.&lt;/p&gt;&lt;p&gt;[3] P. T. Coleman &amp;amp; A. Bartoli (2003). Addressing Extremism, The International Center for Cooperation and Conflict Resolution, Colombia University (2003), p. 2. https://www.tc.columbia.edu/i/a/document/9386_WhitePaper_2_Extremism_030809.pdf&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://all-secure.blogspot.com/2023/09/terrorism-extremism-and-crime.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLTEKX_Hx6FRC0l9FZ7R386stSGAdnLacqsdY_Y98xnJCrFco0qHgkXEdvpFr2kJ-Rfp00QdA5Xr4DnfEj7KbqO-aFzqQGKu8h9C2_hHL_yND9Rxyp1CC9zgozkNiemaqrqKUi5hxXi5_YMiI4Vija-035GCyC4mjGKlPqN56xL7MRRKO3MpwsmKUQI5c/s72-w640-h381-c/754DB1B7-EF58-413E-909C-AC683E14150D.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-1706535726914297331</guid><pubDate>Wed, 23 Aug 2023 17:18:00 +0000</pubDate><atom:updated>2023-08-23T10:18:41.328-07:00</atom:updated><title>No, Terrorists Are Not Freedom Fighters: Isolating Definitional Flaw in a False Equivalence Argument</title><description>
For many years within the homeland security enterprise, it has been a regular exercise in banality to intone that one person’s terrorist is merely another’s freedom fighter.[1] To a reflective practitioner taking the time to define terrorism with precision, however, this formulation collapses on contact with a key distinction of a feature that is de rigueur for terrorists as a default yet antithetical to freedom fighters as a rule. What is this distinguishing feature?&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Targeting of Noncombatants&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Terrorists do not hesitate to slaughter innocents. Indeed, this is often their primary tactic and stock in trade. There is a logic to this tactic, no matter how morally reprehensible it may be judged by a society intent on passing as civilized. The logic is in the terrorist attacker’s calculation that, in the face of material disadvantages in force, finance, and weaponry, the only apparently remaining options are those that confound defenders while supplying a disproportionately high yield and posing minimal risk. In essence, this is the cold logic of resorting to asymmetric attack vectors to even the odds in the eyes of the attacker, as illustrated here:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&amp;nbsp;

 &lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpZmnhsAGMErkdnFxxSa1gyytiICTD-D45C4CE3du9qTfoE4M5PHYy0SWJJKMI8E08WVC7TpOpjSADqIr4lMCrAGafzbHZwTuf0hQQdR0dv6c3cifZxv4JuqMRMxGcqLefNBLHNCnxgBrXXNQx1slvv2qK40cnujPSqEQyGD4VscdGg-CCJdAxv4W6yX4/s2225/terrorist%20view%20of%20asymmetric%20attack.JPG&quot; style=&quot;display: block; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;967&quot; data-original-width=&quot;2225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpZmnhsAGMErkdnFxxSa1gyytiICTD-D45C4CE3du9qTfoE4M5PHYy0SWJJKMI8E08WVC7TpOpjSADqIr4lMCrAGafzbHZwTuf0hQQdR0dv6c3cifZxv4JuqMRMxGcqLefNBLHNCnxgBrXXNQx1slvv2qK40cnujPSqEQyGD4VscdGg-CCJdAxv4W6yX4/s320/terrorist%20view%20of%20asymmetric%20attack.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;


In practice, the greatest asymmetric value derives not from direct confrontation against a superior military or police force that is trained and equipped to fight back and kill or capture terrorist attackers. It is from attacking non-combatants who lack training and weapons and, even better, are caught unawares, hence unlikely to return fire. In this calculation, the slaughter of innocents begins to figure prominently in the terrorist playbook as not only an attractive but a default tactic to embrace to further the attackers’ ends. 

By contrast, freedom fighters do not target non-combatants or, if they do harm innocents, do so inadvertently or as a last resort – not as a first resort. After all, slaughtering one’s own offers no inducement for recruiting future freedom fighters. This, then, is a key distinction that undermines the terrorist as freedom fighter equivalency argument.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The moral distinction recalls an illustration by William F. Buckley, a writer and magazine publisher who served in the military and, briefly, in the Central Intelligence Agency. Buckley highlighted the absurdity of morally equating the Soviet Union to the United States by noting that if one man pushes an old lady into an oncoming bus and another pushes an old lady out of the way of a bus, one should not denounce both as men who push old ladies around.[2]&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Definitional Morass Fueling the Equivalency Argument&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Whether by inadvertence or calculation, government agencies do no favors for the public by defining terrorism in terms that omit this targeting of non-combatants. Indeed, terrorism definitions skew in line with a given agency’s predilections and likely concentrations in dealing with terrorist threats.[3] Thus, when government organizations converge on definitions that forget about this centrality of targeting non-combatants to the definition of terrorism and terrorists, they invite an otherwise specious airbrushing of terrorists as freedom fighters, especially by focusing that definition thus:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;“Terrorism is a non-state actor’s threatened or actual use of illegal force and violence to attain a political, religious, or social goal through fear, coercion, or intimidation.” [4]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A better definition, as supported by other official sources [5], might take on this representation:

&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgObqkr8sHIY892E-vIcegSQRaVIV4TuMt70tkIIUXIdnh48qPgsvk_XUb0tu9Wd3wjX4pxZP9TJ_d29HcSQCbhUjjC3l2g90iCej0mffrPaoccILw99qmvwidoQj6dW7eeNRl1AWXQchUHpisxNsEEFwR3ZLSYjADChtwcCWpxjKX40MnJZkSGeEmeZhs/s1070/terrorism%20def.jpg&quot; style=&quot;display: block; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;1070&quot; data-original-width=&quot;1048&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgObqkr8sHIY892E-vIcegSQRaVIV4TuMt70tkIIUXIdnh48qPgsvk_XUb0tu9Wd3wjX4pxZP9TJ_d29HcSQCbhUjjC3l2g90iCej0mffrPaoccILw99qmvwidoQj6dW7eeNRl1AWXQchUHpisxNsEEFwR3ZLSYjADChtwcCWpxjKX40MnJZkSGeEmeZhs/s320/terrorism%20def.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt; 

Another Flaw&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Closer examination of the foregoing, official definition, however, uncovers yet another unforced limitation. Specifically, this definition draws emphasis to terrorists as being necessarily non-state actors, when characterizing terrorism as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.” [6] What of state-sponsored terrorists? This definition would appear to place such actors out of the purview of actions which have at their heart the disproportionate impact making their mark through the slaughter of innocents rather than through direct, force-on-force battle.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Why the Omissions&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Omitting mention of the targeting of noncombatants allows any military to brand as terrorists what might otherwise be considered irregular troops or guerilla fighters. There is a public relations value to such branding. The irregulars, when defending against an invading force, may indeed qualify as freedom fighters if they are combating armed soldiers but not carrying out campaigns of slaughter targeting noncombatants. The price they pay may still be execution and denial of any of the international protections reserved by the Geneva Conventions for regular, uniformed combatants. Commandos take similar risks and pay the same price.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Yet Another Definitional Flaw&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A final flaw deserving remark attends the predisposition of law enforcement agencies to define terrorism first and a foremost as a crime, with terrorists branded primarily as criminals, in consequence. This predilection creates another vulnerability for attackers to exploit. The administrative advantage of such a definition for police-oriented agencies is that branding a thing as a crime necessarily places that thing within law enforcement purview, which may justify a given agency’s claim of primacy in managing the response to all criminal matters. What could possibly backfire with such an approach?

In practice, the law enforcement mindset puts a premium on apprehension and punishment of offenders, actions which arguably provide a necessary and valuable public service. However, if terrorism is instead defined as something categorically distinct from crime, then this opens the door to addressing terrorism and terrorists with an altogether different mindset. Under these circumstances, the policy door opens to according prime value to anticipating and preventing terrorist attack rather than avenging it.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If a deep dive into the foregoing definitions teaches anything, it is that these details matter. Easy or partial definitions of terrorism and terrorists deserve to be scrubbed for institutional bias which may inhibit rather than advance defeating the terrorist threat.
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Nick Catrantzos&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;NOTES:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;&lt;span style=&quot;mso-special-character: footnote;&quot;&gt;&lt;!--[if !supportFootnotes]--&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Arial; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; text-transform: none;&quot;&gt;[1]&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;sup&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt; B. M. Jenkins, (1990). The study
of terrorism: Definitional problems. RAND.
https://www.rand.org/pubs/papers/P6563.html&lt;/span&gt;&lt;span style=&quot;text-transform: none;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/p&gt;

&lt;p class=&quot;MsoEndnoteText&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;&lt;span style=&quot;mso-special-character: footnote;&quot;&gt;&lt;!--[if !supportFootnotes]--&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Arial; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; text-transform: none;&quot;&gt;[2]&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;/span&gt; J. Goldberg,
&quot;When Push Comes to Torture,&quot;&lt;/span&gt; &lt;/span&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;Sept.
27, 2006,National Review.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoEndnoteText&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;https://www.nationalreview.com/2006/09/when-push-comes-torture-jonah-goldberg/&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoEndnoteText&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;&lt;span style=&quot;mso-special-character: footnote;&quot;&gt;&lt;!--[if !supportFootnotes]--&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Arial; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; text-transform: none;&quot;&gt;[3]&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;/span&gt; N. Catrantzos,
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace (Boca Raton:
CRC Press, 2023) pp. 178-179. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoEndnoteText&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;&lt;span style=&quot;mso-special-character: footnote;&quot;&gt;&lt;!--[if !supportFootnotes]--&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Arial; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; text-transform: none;&quot;&gt;[4]&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;/span&gt; National Consortium
for the Study and Response to Terrorism, 2021.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoEndnoteText&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;&lt;span style=&quot;mso-special-character: footnote;&quot;&gt;&lt;!--[if !supportFootnotes]--&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Arial; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; text-transform: none;&quot;&gt;[5]&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;/span&gt; U. S. Code:
Title&amp;nbsp;22&amp;nbsp;of&amp;nbsp;the&amp;nbsp;U.S.&amp;nbsp;Code,&amp;nbsp;Section&amp;nbsp;
2656&amp;nbsp;f&amp;nbsp;(d)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoEndnoteText&quot;&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-size: 14.0pt; text-transform: none;&quot;&gt;&lt;span style=&quot;mso-special-character: footnote;&quot;&gt;&lt;!--[if !supportFootnotes]--&gt;&lt;span class=&quot;MsoEndnoteReference&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Arial; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; text-transform: none;&quot;&gt;[6]&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;/span&gt; Ibid.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://all-secure.blogspot.com/2023/08/no-terrorists-are-not-freedom-fighters.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpZmnhsAGMErkdnFxxSa1gyytiICTD-D45C4CE3du9qTfoE4M5PHYy0SWJJKMI8E08WVC7TpOpjSADqIr4lMCrAGafzbHZwTuf0hQQdR0dv6c3cifZxv4JuqMRMxGcqLefNBLHNCnxgBrXXNQx1slvv2qK40cnujPSqEQyGD4VscdGg-CCJdAxv4W6yX4/s72-c/terrorist%20view%20of%20asymmetric%20attack.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-1137977519667137779</guid><pubDate>Fri, 25 Jun 2021 12:37:00 +0000</pubDate><atom:updated>2021-06-25T05:37:00.813-07:00</atom:updated><title>A Tech Alternative to Ineffective Restraining Orders</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
  &lt;a
    href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP1AMhkF-gOycD1DeITk-SI-JoyjAtiRk08bK7WfRs4Tz9AZTOkJFXYYR5p-ulHbzMkRkC-WVPdkk0jL1gbcEu-8QttE6KO_9UiOkHBLKushtiPc7aFJxXkcTXyKIG2eBBszEyCt_xwMs/s1000/26678776-DBAD-4D51-8C93-58167BB5B1A6.jpeg&quot;
    style=&quot;display: block; padding: 1em 0; text-align: center; clear: left; float: left;&quot;
    &gt;&lt;img
      alt=&quot;&quot;
      border=&quot;0&quot;
      height=&quot;320&quot;
      data-original-height=&quot;1000&quot;
      data-original-width=&quot;627&quot;
      src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP1AMhkF-gOycD1DeITk-SI-JoyjAtiRk08bK7WfRs4Tz9AZTOkJFXYYR5p-ulHbzMkRkC-WVPdkk0jL1gbcEu-8QttE6KO_9UiOkHBLKushtiPc7aFJxXkcTXyKIG2eBBszEyCt_xwMs/s320/26678776-DBAD-4D51-8C93-58167BB5B1A6.jpeg&quot;
  /&gt;&lt;/a&gt;
&lt;/div&gt;

A homicide at a local wine bar sent patrons stampeding and tongues clacking the
other day. As details were slow to surface, I theorized that this was the
product of a domestic dispute involving a specific target, rather than a random
shooting. Subsequent news reports validated my speculation. &lt;br /&gt; &lt;br /&gt;What made me think
it a targeted dispute? The only victim was a server and the time of attack was
around 3:30 p.m., when the lunch crowd was gone and the dinner crowd had yet to
arrive. Someone asked me why the villains always come after their prey at work.&lt;br /&gt;&lt;br /&gt;
My answer: Work doesn’t relocate the way estranged partners do. Particularly if
being stalked or abused, a targeted partner seeking escape from a toxic
relationship will often move to digs that are either more secure or harder to
find. Sadly, though, if that person still has to earn a living, chances are that
the place of business hasn’t moved and remains known to the would-be predator.
&lt;br /&gt;&lt;br /&gt;According to the latest news, the attacker was indeed a former fiancé and
domestic partner. The victim had been living with him till recently but had a
restraining order against him. &lt;br /&gt;&lt;br /&gt;A Better Way &lt;br /&gt;&lt;br /&gt;As a thought experiment, suppose
future restraining orders came with a special accessory? From what I recall of
my workplace violence practice, restraining orders tend to be the least
effective against former domestic partners. Partners’ pre-existing notions of
what kind of access they deserve are so ingrained as to be nearly impossible to
disrupt with mere words on paper. (By contrast, a restraining order against
someone who has taken an unhealthy interest in his victim but has not yet gone
too far in establishing even what he is capable of imagining as a relationship —
that kind of restraining order can do some good.) &lt;br /&gt;&lt;br /&gt;Back to the accessory. Think
of an ankle monitor with a proximity-activated explosive and a built-in audio
warning. Maybe the stalker and stalkee have to wear matching ankle monitors, so
as to get a GPS fix on both to enable the explosive device to do its job. Only
the stalkee’s is a GPS-only model without the extra features. When the stalker
violates the restraining order by getting within the upper limit of the
prohibited range, say 1,000 feet of the individual protected by that restraining
order, an audio warning annunciates. It warns the stalker to go away immediately
and advises that it has summoned police to this location. And it keeps emitting
a loud, audible tone. Assuming most people can’t hit anything they are shooting
at that is beyond 25 feet, suppose we make 75 feet the point of auto activation
of the self-destruct sequence? As the range closes from 100 to 75, a louder
warning tone goes off along with a command for everyone in range to clear the
area because a protective explosive is about to go off. At 75 feet, boom. &lt;br /&gt;&lt;br /&gt;The
explosive may not kill the stalker violating the restraining order and fast
approaching his intended target, but he, won’t have a leg to stand on. And his
prey’s chances of safe escape will be better than ever. &lt;br /&gt;&lt;br /&gt;As a bonus, offenders
will become very easy to spot and easier, still, to chase down. Repeat offenders
may no longer qualify for ankle monitors. (Absence of ankles will do that.)
However, their scooters and wheelchairs could be remotely disabled with the
right device. Or a bracelet accessory could take the place of the punitive ankle
monitor. Another boom would await the repeat attacker. &lt;br /&gt;&lt;br /&gt;Lite Version&lt;br /&gt;&lt;br /&gt; For those
too squeamish to go all the way with this useful innovation, how about a stun
gun version instead? It includes audible warnings and loud tones as the villain
closes in and then zaps the devil out of him at a certain range. Then it just
cycles and keeps re-zapping until authorities arrive with a giant pooper scooper
to haul away the puddle of mush that was once the predator. &lt;br /&gt;&lt;br /&gt;Should I file for
trademark protection ASAP? What could go possibly go wrong? &lt;br /&gt;&lt;br /&gt;-- Nick Catrantzos
</description><link>http://all-secure.blogspot.com/2021/06/a-tech-alternative-to-ineffective.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP1AMhkF-gOycD1DeITk-SI-JoyjAtiRk08bK7WfRs4Tz9AZTOkJFXYYR5p-ulHbzMkRkC-WVPdkk0jL1gbcEu-8QttE6KO_9UiOkHBLKushtiPc7aFJxXkcTXyKIG2eBBszEyCt_xwMs/s72-c/26678776-DBAD-4D51-8C93-58167BB5B1A6.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-5166192395434477724</guid><pubDate>Sun, 06 Dec 2020 12:38:00 +0000</pubDate><atom:updated>2020-12-06T04:38:13.033-08:00</atom:updated><title>Thinking and Deception</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJywQcHOwO3Vmu60t3nW43vBfEchgkjWLLDcoqX4JSLGgKsE1vJRx03hGIW42huo-H1bUBXGJhr7auMqn5vIQaIk-l_3iNbYKmP6E22r1vXBkmzNZCA6X-fqRO-zQlAS3aykJWrTH37-4/s2048/71D662DC-4BD9-49A4-8307-16FB8E8DF35F.jpeg&quot; style=&quot;display: block; padding: 1em 0; text-align: center; clear: left; float: left;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;200&quot; data-original-height=&quot;1536&quot; data-original-width=&quot;2048&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJywQcHOwO3Vmu60t3nW43vBfEchgkjWLLDcoqX4JSLGgKsE1vJRx03hGIW42huo-H1bUBXGJhr7auMqn5vIQaIk-l_3iNbYKmP6E22r1vXBkmzNZCA6X-fqRO-zQlAS3aykJWrTH37-4/s200/71D662DC-4BD9-49A4-8307-16FB8E8DF35F.jpeg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;
[Image of reflecting pool, Naval Postgraduate School, Monterey, CA]


Critical thinking seems a heavy lift these days, when emotions run high and hyper partisan exchanges of opinion settle debates based more on intensity and duration of salvo than on strength of argument. Under the cirumstances, one way to crawl a little closer to critical thinking may well be to assign a little energy to uncovering deception. 


To this end, here follows a link to the last presentation I gave before the pandemic lockdown. It was an invited talk at the Naval Postgraduate School, and they filmed it, eventually releasing it here:

&lt;a href=&quot;https://youtu.be/zSWos678ohk&quot; target=&quot;_blank&quot;&gt;https://youtu.be/zSWos678ohk&lt;/a&gt;


The idea was to go with the general format of TED Talks. Thus, I was asked to speak for 15 minutes and to then allow another 10-15 minutes for questions. This particular talk was on ways to find out when people are lying and otherwise to learn more than most people intend to reveal. Some people in the audience seemed to enjoy it. No heavy lifting required.

- Nick Catrantzos
</description><link>http://all-secure.blogspot.com/2020/12/thinking-and-deception.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJywQcHOwO3Vmu60t3nW43vBfEchgkjWLLDcoqX4JSLGgKsE1vJRx03hGIW42huo-H1bUBXGJhr7auMqn5vIQaIk-l_3iNbYKmP6E22r1vXBkmzNZCA6X-fqRO-zQlAS3aykJWrTH37-4/s72-c/71D662DC-4BD9-49A4-8307-16FB8E8DF35F.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-6398220024591895002</guid><pubDate>Sat, 09 Jul 2016 14:14:00 +0000</pubDate><atom:updated>2016-07-09T07:14:37.127-07:00</atom:updated><title>Exculpatory Contortions and Protecting Classified Data</title><description>There is a truism captured by novelist John D. MacDonald that goes like this: &quot;The thing you find the hardest to do is the thing you should do.&quot; By that yardstick, FBI Director James Comey fell short in delivering his official findings in the investigation of former Secretary of State Hillary Clinton&#39;s cavalier, inveterate mishandling of classified information. Despite his cultivated reputation for brains, nuance, and integrity, coupled with apologist theorizing to the effect that Mr. Comey was animated by noble aims to defend the reputation of the FBI while preventing his agency and himself from inviting scrutiny as the first ever to upend an entire presidential campaign by advocating an indictment, the FBI Director took the easy way out.&lt;br /&gt;
&lt;br /&gt;
To do the hardest thing would have been to do what Comey had all along professed to hold paramount: objective reliance on facts and comprehensive investigation. Instead, after cataloguing security violation after serial security violation perpetrated brazenly by Mrs. Clinton and her minions from the outset of her taking the helm of the State Department, Mr. Comey launched into paralogisms and exculpatory contortions to opine that all the evidence his myrmidons had uncovered would somehow not rise to the level of supporting a recommendation to prosecute. In doing so, he abandoned the role of objective investigator to assume the mantle of prosecutor and grand jury. &lt;br /&gt;
&lt;br /&gt;
On the one hand, Comey professed inability to see intent which he and he alone felt would be a necessary prerequisite to pursue a prosecution on the basis of gross negligence. Never mind that gross negligence exists as a prosecutable category precisely in order to punish serious misconduct where not meaning to do any harm to the victim is no excuse for the inevitable harm that follows. Just as the driver playing video games instead of watching the road did not &quot;mean&quot; to plow into a family out for a Sunday drive in an opposing lane of traffic, this does not absolve him of blame when he is the one crossing into the wrong lane and causing their demise. So should it be that an official, however imperious, pampered, and highly placed, should not be let off the hook for starting from the outset to do all her official government business with the most sensitive of classified material via a means expressly prohibited for no discernible reason other than to hide records from public disclosure and bypass the inconvenience of having to follow security rules that come as a condition of gaining access to the most sensitive national security information. As Comey&#39;s initial proclamation of investigative findings demonstrated, Mrs. Clinton and her enabling minions repeatedly violated basic security rules -- i.e. the law -- from the outset of her tenure as a cabinet secretary. Then they lied about it.&lt;br /&gt;
&lt;br /&gt;
At the same time as Comey threw aside his own findings to reach an unsupported conclusion of carelessness vs. criminality, he acknowledged that anyone else taking such cavalier liberties with national security would face serious consequences. Indeed they would and have.  Ask David Petraeus, John Deutsch, and any number of others whose cases have recently surfaced in media reports highlighting this double standard: one set of security rules and sanctions for elites occupying a Clintonian perch, and another see for mere mortals.&lt;br /&gt;
&lt;br /&gt;
For those of us whose formative years involved using, generating, and protecting classified information at the special access or codeword-protected level akin to what Mrs. Clinton alleged never to have mishandled, the excuses just don&#39;t wash. Mrs. Clinton did what she did without authorization and without suffering any consequence. She exposed the nation&#39;s secrets to hostile intelligence for nothing more than a combination of personal convenience and a desire to spare herself future scrutiny by fellow citizens exercising their rights to Freedom of Information Act requests or to archivists probing official records for future historical studies of American government in action.  To let her off the hook the way Comey did was, in a single stroke, to vaporize his much touted reputation as a straight shooter and man of integrity.&lt;br /&gt;
&lt;br /&gt;
Integrity means doing what isn&#39;t easy and accepting the consequences.  Sadly, this is a lesson Mr. Comey chooses to spare himself. &lt;br /&gt;
&lt;br /&gt;
Perhaps, then, another John D. MacDonald passage would be instructive for him:&lt;br /&gt;
&lt;br /&gt;
&quot;INTEGRITY ... is not a conditional word.  It doesn&#39;t blow in the wind or change with the  weather.  It is your inner image of yourself, and if you look in there and see a man who won&#39;t cheat, then you know he never will.&lt;br /&gt;
&lt;br /&gt;
&quot;Integrity is not a search for the rewards of integrity.  Maybe all you ever get  for it is the largest kick in the ass the world can provide.  It is not supposed  to be a productive asset.  Crime pays a lot better.&lt;br /&gt;
&lt;br /&gt;
&quot;I can bend my rules way, way over, but there is a place where I finally stop bending them.&quot;&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos</description><link>http://all-secure.blogspot.com/2016/07/exculpatory-contortions-and-protecting.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-5922599247897834685</guid><pubDate>Mon, 13 Jun 2016 12:25:00 +0000</pubDate><atom:updated>2016-06-13T05:25:25.901-07:00</atom:updated><title>Sniper Searches Misguided in Wake of Scattergun Terror</title><description>&lt;br /&gt;
The body count at the worst mass shooting in American history that happened in Orlando last weekend has given rise to the usual, knee-jerk speculation about the extent to which the shooter was (a) a lone wolf vs. a terrorist trained and directed by the likes of ISIS, (b) a demon bent on carrying out a hate crime made possible by inadequate restrictions on the weapons he used.  Both musings miss the point from a defender&#39;s perspective.&lt;br /&gt;
&lt;br /&gt;
To begin with the point about weapons, Omar Mateen was a licensed security guard who had already come under FBI scrutiny in the past. Such scrutiny surely went beyond the standard background check that presently constitutes a precondition for the legitimate purchase of firearms. Absent anything but routine attention to the results of his background investigation, Mateen or anyone else in his position typically encounters no substantive barriers to gearing up for a terrorist attack. Why? He has no prior convictions or run-ins with the law, hence enjoying the freedom of maneuver and civil rights of any citizen in good standing. &lt;br /&gt;
&lt;br /&gt;
Thus far, no one has produced evidence that Mateen used automatic weapons to inflict his carnage on the defenseless victims he murdered in Orlando. He didn&#39;t have to. They were sitting ducks. As a security guard, he no doubt worked among people who either had guns themselves or who knew other counterparts who worked as armed guards. Thus, if he had been too cheap to buy his own firearms, he probably would have known where to go to steal them. It is doubtful to the point of implausibility that imposing a new layer of gun controls into Mateen&#39;s world would have presented any more than a minor hurdle for him to clear on the path to carrying out the Orlando slaughter.&lt;br /&gt;
&lt;br /&gt;
The Lone Wolf Canard&lt;br /&gt;
&lt;br /&gt;
As for the Monday morning quarterbacking rush to categorize the shooter as a self-motivated hater rather than some agent of ISIS who plotted this attack in some terror cell, it offers no comfort to the bereaved to opine that their loss was not a matter of specific targeting. Whether a defenseless victim falls to the sniper fire of an assassin who planned specifically to take him down or whether that same individual dies as a result of having been mowed down by the indiscriminate, scatter shot of a bullet addressed &quot;To Whom It May Concern&quot; rather than one with his name on it, the shooter remains the enemy.  And so does the ideology that led him to think it acceptable or, in his culture, commendable to slaughter people who are in no position to shoot back.&lt;br /&gt;
&lt;br /&gt;
Two Enemies&lt;br /&gt;
&lt;br /&gt;
The enemies here are not gun laws which, in a free society, tend to restrict the law-abiding citizen while offering little more than a nuisance to the assassin. After all, a murderer bent on slaughtering innocents and indifferent to surviving his own attack is hardly going to balk at the prospect of risking a lesser felony by buying, possessing, carrying, or stealing whatever weapon suits his purpose, whether that is a gun, a truckload of fertilizer, or a weaponized pressure cooker.  Nor is the enemy some sort of hate speech or intolerance that blames the victims.&lt;br /&gt;
&lt;br /&gt;
The enemies are the murderers and their enabling ideology.  Someone has to pull the trigger and someone, some system of inculcation, ideology, and belief, has to legitimize barbaric slaughter of innocents by condoning and even encouraging such action. Whether that ideology expresses the worst of its barbaric maleficence through an ISIS terrorist cell that acts as a sniper assassinating carefully selected victims or whether that ideology infects willing adherents with the kind of programming that convinces them it is okay to kill indiscriminately as long as one is slaughtering the infidel, it behooves defenders to keep their focus on defeating the two enemies. &lt;br /&gt;
&lt;br /&gt;
Waste no time splitting hairs over the relative dangers of terror cells vs. lone wolves. When the house is on fire, we don&#39;t put down the extinguisher to launch into a debate over whether the cause of the fire was a wayward cigarette ash or an unattended frying pan on the stove. First put out the fire. Leave the armchair debate about causes for a time when it won&#39;t interfere with defensive action.&lt;br /&gt;
&lt;br /&gt;
- Nick Catrantzos</description><link>http://all-secure.blogspot.com/2016/06/sniper-searches-misguided-in-wake-of.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-3869159379727541681</guid><pubDate>Wed, 23 Mar 2016 18:15:00 +0000</pubDate><atom:updated>2016-03-23T11:15:31.129-07:00</atom:updated><title>You&#39;ve Been Shot</title><description>You were going about your normal business when suddenly you got shot.  Here&#39;s what you find at hand as you hit the ground and take cover:  a gun, a bullhorn, a radio, a first-aid kit, and a bottle of whiskey.  What do you do?&lt;br /&gt;
&lt;br /&gt;
If a Politically Correct Progressive or Millennial&lt;br /&gt;
&lt;br /&gt;
... you use the bullhorn to communicate to your attackers that you pose them no threat and are on their side.  You throw out the gun to show you mean it.  You fumble with the first-aid kit but, not having used one before and not being responsible for this anyway, you forget that and try to radio for help.  Since you haven&#39;t used a radio before either, can&#39;t figure it out, and aren&#39;t responsible for this anyway, you give up on this, too.  So, you crack open the bottle of whiskey, content that you have done your best and sure that everyone will see this was a mistake and take care of you before you finish the bottle.&lt;br /&gt;
&lt;br /&gt;
If a Member of the News Media&lt;br /&gt;
&lt;br /&gt;
... you use the bullhorn to announce that you are a member of the free press and, as such, have a right to be there and should not have been shot in the first place.  Then you offer to trade the remaining items for better treatment and access to the attackers&#39; side of the story, throwing out the gun first to demonstrate your good faith, with the radio coming right after.  You think about the first-aid kit but reason that you may need it for trading value, too.  Besides, either attackers or defenders will surely have a medic, and your superior interpersonal skills will win them over.  And you sneak a shot of whiskey before adding that to your stock of items to trade for preferred treatment by your attackers.  You&#39;re special.  Once they realize that, it will all work out.  What a story this will make!&lt;br /&gt;
&lt;br /&gt;
If an Old School, Self-Reliant American&lt;br /&gt;
&lt;br /&gt;
... you patch yourself up with the first-aid kit, saving the whiskey to disinfect any wound you can&#39;t easily reach with a bandage.  You radio for help and then turn down the volume to avoid giving away your position.  You leave the bullhorn alone.  You figure you&#39;re on your own, at least for awhile.  And you do one more thing.  You pick up that gun and shoot back.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Nick Catrantzos&lt;br /&gt;
&lt;br /&gt;
Erstwhile security director, intelligence officer, and homeland security instructor.  Author of No Dark Corners approach to insider threat defense.</description><link>http://all-secure.blogspot.com/2016/03/youve-been-shot.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-1557118416022155292</guid><pubDate>Thu, 03 Dec 2015 18:29:00 +0000</pubDate><atom:updated>2015-12-03T10:31:50.853-08:00</atom:updated><title>Learning to Thwart, Not Just Watch Barbarians</title><description>Yesterday&#39;s carnage in San Bernardino makes one wonder whether in the battle between civilization and barbarism the latter is not getting the upper hand.  Historian Will Durant once observed that civilization begins where chaos and insecurity end (&lt;a href=&quot;http://http://www.willdurant.com/civilization.htm&quot;&gt;http://www.willdurant.com/civilization.htm&lt;/a&gt;).  Yet for Seyd Farook, the shooter identified as principal antagonist, the blandishments of a good-paying public sector job and an environment where co-workers had recently given him a baby shower and were apparently enjoying his company in a Christmas party moments before he started shooting them -- this was not enough.&lt;br /&gt;
&lt;br /&gt;
A focused enemy amplifies his lethality when his targeting, unambiguous to him, remains to his targets a question of doubt, debate, denial, and convoluted navel-gazing about grievances  and moral equivalences.  Expect the discussion in the aftermath to highlight all these things as the inevitable search for root causes takes a winding path to blaming American society for this tragedy.  To the rest of the world, however, the contest between shooters and victims showcases certain contrasts.  The adversary wants you dead.  The target wants to talk about it.   If you&#39;re impressionable, young enough to want more but frustrated with a world that refuses to serve it up to you -- right now -- which group would you rather join:  focused attacker or dithering target?&lt;br /&gt;
&lt;br /&gt;
Fusion of Grudge and Jihad&lt;br /&gt;
&lt;br /&gt;
Welcome to Barbarian Outreach 101.  The best recruiting tool is the prospect of spoils, success, and palpable payoff in, at the very least, notoriety, hence the GoPro cameras packed by the shooters to document their slaughter of the undefended.  And in the absence of civilizing constraints to keep savage behaviors in check, then few things can compete with the siren call of jihad.  The allure is as powerful as it is timeless:  instant gratification combined with settling of scores.  &lt;br /&gt;
&lt;br /&gt;
The San Bernardino attacks differed markedly from workplace violence cases and, at the same time, from the kind of terrorist attacks that recently consumed  Paris.  The odd thing about affixing a workplace violence label on this is that eruptions don&#39;t come this way, with a planned assault and a team vs. one lone individual who feels beleaguered, isolated, and at a breaking point.  Early accounts that the main shooter was affiliated with the targeted group and somehow dropped his daughter off on the way to the shooting but brought his wife and brother to join into the fray are inconsistent with the way workplace violence incidents tend to unfold.  Indeed anyone worried about the potential for such violence to erupt at the hands of one volatile individual usually takes comfort on learning that that person is married and even has a young child.  Those circumstances point to a reason for living rather than for going out guns blazing.  This is why most shooters in workplace violence cases tend to raise more concern; they have no one to go home to, no one to offer perspective and balance in circumstances where they may be overreacting to perceived or actual insults to personal dignity.  Nor does the typical workplace violence case involve high-powered rifles and body armor.  Nor, an escape, either.  More than half of such shootings end on the spot with the shooter taking his own life.  Otherwise, the shooter succumbs to police gunfire or gets captured.  Rarely do they elude capture or even have an escape plan, unlike yesterday&#39;s shooters.&lt;br /&gt;
&lt;br /&gt;
Age is also a factor.  People of the shooter&#39;s age, 28, typically don&#39;t develop the same kind of work-related resentments as someone 20 years older.  At that age, they just move on to another job.  Only later in a career, when they feel trapped and at the same time incapable of finding comparable employment elsewhere, do they develop more obsessive and alarming tendencies that surface on the job.&lt;br /&gt;
&lt;br /&gt;
If it is an act of terror instead, questions arise about target selection and object sought.  The curious will always ask why, seeking answers that may be impossible to produce to anyone&#39;s total satisfaction.   Defenders want to understand the pattern, the rationale -- however illogical or convoluted -- behind target selection and perceived value of attacking one particular group versus another, and at this particular venue.  The venue certainly offered an abundance of escape routes, being near an unusually high number of major freeways.  The site itself and the group were hardly iconic, however.  This suggests attacker favoring of ready access over symbolism.   If you&#39;re just looking for a high body count, hitting a Disneyland or a Las Vegas casino would  seem better choices, particularly if also seeking to magnify public terror.  Otherwise, the act loses some of its impact if target selection is based on a personal grudge instead of something that has a more random, it-could-happen-to-you character.&lt;br /&gt;
&lt;br /&gt;
No witness statements have yet surfaced about whether there where were any chants of &quot;Allahu akbar&quot; as the bullets were flying.  That is another data point to ponder.&lt;br /&gt;
&lt;br /&gt;
Defensive Strategies&lt;br /&gt;
&lt;br /&gt;
From the point of view of one looking to enhance security of targeted people and affected assets, one focuses more on countering the threat than on theorizing about what societal antipathies may have let to it.  Certain immediate concerns constitute the defender&#39;s challenge:&lt;br /&gt;
&lt;br /&gt;
1.  Forget traditional vetting.&lt;br /&gt;
&lt;br /&gt;
It neither applies nor avails.  Farook was a five-year public employee without a criminal record.  The traditional background investigation would not have uncovered antisocial tendencies which were likely absent at his initial hire.  Most people still come in through the door smiling, happy to be starting a new job.  Only later do resentments and frustrations arise, and in the shooter&#39;s case there were probably no detectable signs of radicalization because the radicalization had not yet taken place, because background checks do not screen for such things, or both.  So if vetting offers limited or only illusory value in denying access to threats, what is one to do?&lt;br /&gt;
&lt;br /&gt;
2.  Lengthen the odds in your favor.&lt;br /&gt;
&lt;br /&gt;
This means either denying opportunity for attack or denying access, which can sometimes be the same thing.   One method of opportunity denial is through instituting protocols for knowledgeable escort and timely intervention, about which more, below.  Another method is to reconsider the kind of restrictions to many work spaces that once barred entry to Communists or identifiable members of a belief system that was avowedly not only resistant to but opposed to American traditions and laws.  Yesterday&#39;s Communist fifth columnist has become today&#39;s radical Islamist.&lt;br /&gt;
&lt;br /&gt;
3. Recognize and act on the indelicate obvious.&lt;br /&gt;
&lt;br /&gt;
In line with the foregoing proposition, one must look at objective data and draw reasonable inferences.  Existential attacks against innocents and, by extension, Western institutions and way of life are not coming at the hands of Jews, Buddhists, Catholics, Quakers, Amish, Mormons, or Native Americans -- all of whom at various times and to different extents have organized into affinity groups with some level of self-governance.  What, instead, do today&#39;s antagonists have in common?  By any objective measure, it is an adherence to an ideology inimical to America and Americans.  Other faiths seem better able to arrive at an accommodation between their system of belief and the laws and culture of the land in which they find themselves practicing it.  This is only obvious if one looks at the Tsarnaevs and Farooks who, despite enjoying the benefits of a generous American society, repay their benefactors by respectively bombing a marathon and shooting up a Christmas party.  But what if an organization cannot close its doors to people with anti-American sympathies because, among other things, the organization lacks the means to detect them?&lt;br /&gt;
&lt;br /&gt;
4.  Rethink openness as a default setting.&lt;br /&gt;
&lt;br /&gt;
If one cannot stop an attacker from infiltrating the organization because of any number of operating constraints or deficits in detecting threats, one can at least change one&#39;s own default settings when it comes to protection.  Instead of being automatically open and instinctively unguarded, we must learn to be more circumspect.  Just as the days of leaving doors unlocked are   anachronistic in modern society, so, too, is the notion that everyone should be given unfettered access unless deemed to be a threat.  The new normal is to reserve such openness only to people you trust and only for those who have earned that trust over time.  And that trust will not only have to be earned once but refreshed from time to time.  Thus, just because an individual appears to be one of the guys and a decent co-worker, this doesn&#39;t entitle him or her to perpetual free access to any and all parts of the organization.  Does this mean that even Christmas parties will one day require advance clearance?  No.  But it may mean rethinking -- at least temporarily -- the merits of hosting optional group events if such events present would-be killers with a shooting gallery of victims in waiting.&lt;br /&gt;
&lt;br /&gt;
5.  Give thought to thwarting.&lt;br /&gt;
&lt;br /&gt;
If you cannot vet to the point of trusting someone with your life, don&#39;t toss your life into his hands.  This means instituting intelligent protocols for knowledgeable escort and timely intervention (topics covered at some length in Managing the Insider Threat: No Dark Corners, Boca Raton:  CRC Press, 2012, available at Amazon.com).  We must learn anew hot to not just observe and report but to actively thwart those who would do us harm.  &lt;br /&gt;
&lt;br /&gt;
6.  Abandon the fantasy of total reliance on experts.&lt;br /&gt;
&lt;br /&gt;
In line with the need to actively intervene when attacks are imminent, defenders must at once acknowledge and overcome the responder&#39;s curse of L.I.T.E. &lt;br /&gt;
&lt;br /&gt;
Ours is a society with a current penchant for assuming the lowest common denominator in the judging of capacities of the general public.  Thus we advise LITE at every turn, namely, &quot;Leave it to the experts.&quot;  And this strategy works well enough -- until it doesn&#39;t.  Under normal circumstances, when emergencies are rare and there may well be an over abundance of trained professionals on tap to respond to a single event, LITE seems perfectly reasonable.  Moreover, given today&#39;s litigious world, it may even seem wise.  But what happens when events overwhelm response resources?  The chant &quot;Leave it to the experts&quot; rings on, in falsetto, long after it becomes clear that there just aren&#39;t enough experts to go around.&lt;br /&gt;
&lt;br /&gt;
Finding Actionable Middle Ground&lt;br /&gt;
&lt;br /&gt;
There is a reasonable compromise between a shoot-first, wild-West approach to robust personal defense and a hand-wringing, sitting-duck approach to outsourcing all personal security to experts.  Rethinking draconian restrictions on law abiding citizens to carry defensive weapons is one approach.  It need not extend to the point of passing out guns like candy.  Nor will many responsible citizens necessarily feel qualified nor inclined to develop the proficiency it takes to use such weapons without endangering themselves and others out of all proportion to the defensive benefit sought.&lt;br /&gt;
&lt;br /&gt;
This need not be an all-or-nothing defensive posture.  Too often, we forget that there are many things that people can do under the banner of lawful disruption that can have the effect of disrupting attacks and complicating targeting efforts of would-be assassins.  (The theme of lawful disruption as something within the grasp of average non-specialists takes up an entire chapter of Managing the Insider Threat: No Dark Corners, which readers may consult at their leisure for more ideas along these lines.)&lt;br /&gt;
&lt;br /&gt;
There are resources to help people and organizations start taking a more active hand in their own protection.  One consultant with real-world experience of such situations tracing to Israel offers such an example as in teaching people a last resort for dealing with active shooters, at&lt;br /&gt;
&lt;a href=&quot;http://http://youtu.be/r2tIeRUbRHw&quot;&gt;http://youtu.be/r2tIeRUbRHw&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The bottom line, once again, is that we must learn anew how to not just observe but to thwart.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
</description><link>http://all-secure.blogspot.com/2015/12/learning-to-thwart-not-just-watch.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-6175411944612988172</guid><pubDate>Sat, 14 Nov 2015 19:51:00 +0000</pubDate><atom:updated>2015-11-14T11:51:15.585-08:00</atom:updated><title>Paris Attacks Prove Jihadis Adept at Exploiting Refugee Crisis</title><description>No sooner had I written the article below this morning than breaking news revealed that the first terrorist to be identified from yesterday&#39;s Paris attacks was a Syrian &quot;refugee&quot; who only came to France via Greece last month in a wave of people fleeing the war-torn Middle East.  Coincidence?  You decide.  First, however, consider the argument behind item Number 1 below and the assertion that it would have represented jihadi malpractice for terrorists NOT to exploit the refugee crisis this way.&lt;br /&gt;
&lt;br /&gt;
Immigrant Terror Threats:  Imported Time Bombs in an Age of Poses&lt;br /&gt;
&lt;br /&gt;
The threats Paris just encountered trace to vulnerabilities that extend along at least three dimensions we also experience a continent away, namely, &lt;br /&gt;
&lt;br /&gt;
1.  IMMEDIATE:  Inability to vet hence screen assassins mixed among incoming refugees.  A universal precept in safeguarding the people and assets of any organization is to begin by denying access to known or likely enemies.  Thus the bank shies away from hiring convicted embezzlers, the liquor store from alcoholics, and the daycare center from child molesters.    Before an organization can vet such people to make some intelligent decision about who gets in, it must begin with the most rudimentary of first steps:  establish the person&#39;s identity.  This, sadly, is not possible when incoming droves hail from war-torn, hostile countries that are not about to do anything but impede attempts to trace a given individual&#39;s pedigree and criminal record.  Thus we have no way of vetting people like this, and our adversaries know it.  The temptation to infiltrate adversaries agents into such migrant waves must be irresistible.  It is such a windfall for those who would destroy us, that to not exploit such an opportunity would be jihadi malpractice.&lt;br /&gt;
&lt;br /&gt;
2.  EVENTUAL:  The tendency of a succeeding generation to succumb to radicalization.   A Western country can do everything right in extending humanitarian relief across its borders to welcome oppressed refugees, supplying them opportunities and civil liberties never before available, only to find the gratitude of the first wave of immigrant families turn into a tsunami of resentment for succeeding generations.  Perhaps nowhere is this phenomenon better portrayed than in The Islamist, Ed Husain&#39;s 2009 story of how he grew up in a diaspora community in Britain only to be radicalized in a process that began with a longing for a mother country he first saw through the rosy, airbrushed accounts of disgruntled relatives other than his parents.  His parents, after all, having emigrated to find a better life, wanted to assimilate, to regard themselves British citizens.  But as a youngster, Husain felt estranged, neither fish nor fowl, as he didn&#39;t look or feel British on the one hand and didn&#39;t have a strong Muslim identity on the other.  Into this vacuum came recruiters capitalizing on alienation and holding out the allure of a welcoming cultural identity, a sense of purpose, a call to battle for a radical vision of an imagined greatness ideally experienced in snapshots and trickle charges of brief visits to an exotic mother land and to secret meetings of radicals at home.  The pattern is revealing:  it isn&#39;t the first or true refugees who turn on their host;  they are grateful.  It&#39;s the succeeding generations, the ones born in relative safety and comfort, the ones who have the luxury of growing up resentful, wanting more and, hence, malleable in the hands of radicals who dangle before them dreams of greatness attained via the express route of jihad rather than the long road of hard work and gradual ascendancy.&lt;br /&gt;
&lt;br /&gt;
3.  SYSTEMIC:  The unchecked erosion of cohesive elements of the host society under the banner of tolerance to the point of enabling the rise of saboteurs from within.  It begins with the demonization of the melting pot.  There was a time, remembered more vividly perhaps by first generation children of immigrants whose parents fled countries in tatters in the wake of occupation and civil war, when assimilation wasn&#39;t a dirty word.  It was an objective to be pursued with pride and a sense of achievement.  The émigrés landing successfully in the New World had to earn their keep and were only too happy to do so.  They learned the language and conformed to the laws and customs of the new land providing them opportunities denied them back home.  Only now, they were in a new and better home, and they knew it.  Thus they thought themselves Americans or Canadians, and they insisted that their children take on the traditions and culture of their new home, sometimes even if this meant diluting the ties to the Old World.  When law or custom of the new country conflicted with those of the old country, then the default choice was to go with the new land.  After all, this was the source of opportunity, the current home, the place which gave the immigrants the chance they most desired and thus, by extension, the place that deserved their allegiance in return.  Sure, it was fine to respect old ways, language, and tradition, but the old folks weren&#39;t kidding themselves.  &quot;I enjoy the music and the food and the occasional festivals,&quot; my mother&#39;s kid brother once told me, &quot;but I see myself as an American more than a Greek.  This is my country and I put it first.&quot;  This was from a man who, like my parents, was in Greece during the Second World War, when the population starved in record numbers as the Nazis and their Italian allies plundered it.  He didn&#39;t remember that part; he was in a Nazi concentration camp at the time, having been rounded up as a low-level courier as a kid working for the resistance.&lt;br /&gt;
&lt;br /&gt;
Today, the melting pot of yesteryear is regarded an insult, an offense to sustaining cultural identity. Instead, to the extent any kind of nod to assimilation is even considered, the preferred metaphor is the salad bowl.  This allows theoretical mixing without loss of identity.  Instead of blending in a melting pot, people are supposed to remain distinct &quot;chunks&quot; that tumble in the bowl, coated by some light but not too sticky vinaigrette, such as the shared watching of situation comedies  and reality TV shows, instead of shared traditions or, heaven forbid, open profession of allegiance to country or national traditions.  Mix together minimally but remain distinct.  That&#39;s the mantra.  It preserves whatever one wants held inviolate in one&#39;s particular &quot;chunk.&quot;  And this distinctness also proves handy in clutching resentments.  &lt;br /&gt;
&lt;br /&gt;
We make it worse.  By bending over backwards today to open borders unconditionally to people without demanding of them both assimilation and self sufficiency, we load a pistol of cultural castration, cock it, aim it at our own national body parts, and then, perhaps, in a fleeting moment  of hesitant misgiving cry out, &quot;Don&#39;t move!&quot;  &lt;br /&gt;
&lt;br /&gt;
No Easy Answers&lt;br /&gt;
&lt;br /&gt;
Diagnosing a malady does not necessarily mean offering a cure in the same breath.  Doesn&#39;t  proper diagnosis at least uncover enough about root causes to suggest that there are things the patient should stop doing in order to prevent the situation from getting worse?  If so, then some remedies based on the foregoing analysis would begin with a tenet traceable to both the Hippocratic Oath and emergency management circles:  Don&#39;t make it worse.  &lt;br /&gt;
&lt;br /&gt;
Places to Start&lt;br /&gt;
&lt;br /&gt;
To counter the immediate problem of vetting incoming hordes, prudence would suggest taking a more cautious view to opening floodgates to people whose only qualification is a hard luck story.  People value what they earn, and this applies to immigrants as much as to students or workers of any kind.  If citizenship and its rights are to be valued, the country conferring them must treat them as valuable, not as candy to be tossed to win smiles and demonstrate humanitarian impulses in front of cameras.  It would make sense to demand  of immigrants that they meet some conditions as a ticket for admission.  These include fluency in a national language, conversance with the laws and history of their new home country, and a pledge to both abide by the host country&#39;s laws and traditions even when those are in conflict with those of the emigre&#39;s country of origin.  Otherwise, why import any avowed malcontent?&lt;br /&gt;
&lt;br /&gt;
To counter the eventual and systemic problems, there needs to be serious recalibrating of institutions to promote and transmit some unifying vision of what it means to be a good citizen without demonizing patriotism.  It is fine to maintain a fondness for and recognition of ancestral traditions and culture, but if one is leaving a place for greener pastures, there must be a recognition that the laws of the host country take precedence and deserve respect.  For Muslims, this means no, you can&#39;t run your community by Sharia law in defiance of the laws of the land.  For others, you can&#39;t insist on having government forms in your native language or fly any flag other than that of your host.  Nor can you have your own schools or distinct enclaves designed to self-segregate.   If you want to be here, blend.  If you don&#39;t, then rethink coming over in the first place.&lt;br /&gt;
&lt;br /&gt;
Too often an otherwise advanced society, losing sight of its cohesive elements, can embark on self-defeating measures, such as a misguided, unchecked immigration policy under the banner of humanitarian relief.  It takes level thinking and a weighing of consequences to realize that a nation&#39;s first duty is to protecting its citizens and that impetuous opening of floodgates to near term or nascent saboteurs is no way to perform this duty.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos</description><link>http://all-secure.blogspot.com/2015/11/paris-attacks-prove-jihadis-adept-at.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-2287906839848972008</guid><pubDate>Fri, 20 Dec 2013 21:16:00 +0000</pubDate><atom:updated>2013-12-20T13:19:48.951-08:00</atom:updated><title>Why Yenta&#39;s Background Checks Better than Governments&#39;</title><description>The discussion that follows just came in from the annual No Dark Corners Roundtable Forum and Christmas Luncheon held at a Claim Jumper restaurant this year.&lt;br /&gt;
&lt;br /&gt;
It isn&#39;t just a question of gathering up more data.  Bureaucratic functionaries would have us believe that if they only knew just a little more about betrayers like NSA leaker Edward Snowden or phonies like Mandela memorial sign language imposter Thamsanqa Jantjie, they could have prevented such ne&#39;er-do-wells from turning into national humiliations.  This is balderdash.  A thriving matchmaker, or yenta, can do better with even more limited data and budget.  How so?  The matchmaker blends available vetting data with direct observation and progressive testing before taking risks with important clients.  This is hardly a matter left to chance.  Nothing ends a matchmaking business faster than serial failures and mismatches.  &lt;br /&gt;
&lt;br /&gt;
What do matchmakers know and do that governments fail to apply in their background checks?&lt;br /&gt;
&lt;br /&gt;
1.  They check out prospects and clients with available data, but don&#39;t stop there.  The way to do this is for the matchmaker not only to gather basic information via a standard questionnaire, but also to use that questionnaire as a starting point rather than an end point.  The questionnaire informs a personal interview where the matchmaker gauges motives, manipulations, and determines what inevitable deceptions are acceptable white lies vs. dangerous fabrications.  A savvy matchmaker also checks independently into reputations to determine whether it is worth doing business with a given candidate or client.  After all, the matchmaker&#39;s own reputation is at stake if the match turns catastrophic.&lt;br /&gt;
&lt;br /&gt;
2.  They chaperone.  The best matchmaker does not risk important clients by setting up liaisons with question marks.  Instead, a low-risk experiment comes first.  Thus, one sends a new, unknown prospect on a low-key lunch date to see how well it goes before presuming to pitch a weekend getaway in Monte Carlo with a shy billionaire client.  A cautious matchmaker also knows how to be a chaperone without being a killjoy.  The finesse is that of serving as a seasoned co-pilot who stays far enough in the background to let the aspiring pilot handle the take-off but remains close enough to take the controls if there a malfunction or problem with a safe landing.  (For details on how this co-pilot model applies to insider threat defense, see &lt;i&gt;Managing the Insider Threat: No Dark Corners&lt;/i&gt;, Boca Raton:  CRC Press, 2012.)&lt;br /&gt;
&lt;br /&gt;
3.  They have enough of a stake in the deal to cut it off at the first sign of trouble, before a problem becomes a catastrophe.  Unlike government background checkers with a hit-and-run mentality, matchmakers have a vested interest in follow-up and follow-through.   Matchmakers have to own their results, taking credit for the sunshine as well as the rain.  Government background checkers don&#39;t function with the same accountability.  When was the last time a government employee lost a payday or a job from clearing a Snowden for classified access or a Jantjie for standing a dagger-thrust away from heads of state?  We don&#39;t hear about it because this seldom happens.  By contrast, a matchmaker whose deficient vetting produced such fiascoes would face no alternative but to embark on a change of careers.&lt;br /&gt;
&lt;br /&gt;
Without necessarily realizing it, competent matchmakers exemplify some of the signature No Dark Corners (&lt;i&gt;op cit&lt;/i&gt;) approaches to defending against insider threats.  Their vetting process is akin to an enlightened new hire probation system, where penetrating scrutiny prevails over perfunctory checking.  Their chaperoning and phased exposure to risk parallels the co-pilot model of limiting chances of undetected mischief.  Finally, their ownership of their results keeps matchmakers vitally engaged in becoming and remaining a part of a team which is accountable for failure as much as for success.  Until something like this happens in government-related background checks, look for more debacles to come.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos &lt;br /&gt;
</description><link>http://all-secure.blogspot.com/2013/12/why-yentas-background-checks-better.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-1575325506684958268</guid><pubDate>Tue, 17 Dec 2013 01:32:00 +0000</pubDate><atom:updated>2013-12-16T17:32:18.983-08:00</atom:updated><title>Security Lessons from Somali Piracy</title><description>The motion picture &lt;i&gt;Captain Phillips&lt;/i&gt; may indirectly give us pause to note a decline in Somali piracy.  What can this decline tell us more broadly?&lt;br /&gt;
&lt;br /&gt;
It seemed only a few years ago when the rise of piracy on the high seas sent the cargo freighter world and its insurers into frenzy and despair.  Somali pirates were regularly boarding oil tankers and undefended commercial vessels at gunpoint, holding hostage their cargos and crews, and extorting million-dollar ransoms as a matter of routine.  From about 2008 to 2011, piracy grew to over 40 successful attacks a year.  Then the numbers began to tell a different story.  There were 47 such hijackings in 2009, 46 in 2010, but only 14 by 2012.  (For details, see &lt;a href=&quot;http://http://www.independent.co.uk/news/world/africa/huge-decline-in-hijackings-by-somali-pirates-8602901.html ) &quot;&gt;http://www.independent.co.uk/news/world/africa/huge-decline-in-hijackings-by-somali-pirates-8602901.html )&lt;br /&gt;
&lt;/a&gt;&lt;br /&gt;
One study offers a multitude of explanations for what led to the growth and more recent decline of Somali piracy.  (Details are at &lt;br /&gt;
&lt;a href=&quot;http://http://piracy-studies.org/2013/the-decline-of-somali-piracy-towards-long-term-solutions/&quot;&gt;http://piracy-studies.org/2013/the-decline-of-somali-piracy-towards-long-term-solutions/&lt;/a&gt; )&lt;br /&gt;
&lt;br /&gt;
Stripping the study of its plumes and spangles, the essential reason behind the boom in piracy was this:  It paid well.  This payoff came in the form of relatively low risk for relatively high reward.  &lt;br /&gt;
&lt;br /&gt;
With automation being what it is today, cargo vessels on the high seas began to operate with relatively small crews, and those crews were, by international maritime policy, intentionally unarmed.  This was well known.  Moreover, no armed naval forces were paying attention or allocating resources to escorting, defending, or rescuing the potential targets until their frequency of victimization became alarming.  Additionally, the legal shambles that passed for the government of countries most likely to serve as home base for pirates were such that the pirates had little to fear in terms of capture or prosecution at home.  These foregoing developments meant that the risk facing would-be pirates was minimal.  &lt;br /&gt;
&lt;br /&gt;
At the same time, realizing a return in millions paid to ransom ship and crew was the kind of payoff unmatched by a lifetime of honest work in the same countries where few jobs were to be had.  The prevailing euphemism, economic dislocation, is one way of sugar-coating the relative attraction of piracy to communities when their members have no productive work prospects and have ceased to collect handouts once the flow of United Nations&#39; subsidies has declined to a trickle.  Add these factors all together, and piracy became an attractive career choice.  So, what changed?&lt;br /&gt;
&lt;br /&gt;
For one thing, despite much international angst over the liability and unseemliness of so unsophisticated a throwback option, the targets  started to arm themselves.  For another, aggressive naval patrols by nations with a stake in hijacked crews and cargo, started changing the risk calculations for pirates.  Getting caught or shot will do that to a predator.  Another raising of the stakes for hijackers came with aggressive prosecutions and sentencing for their crimes.  (According to the first article cited above, over 1,100 Somali pirates have been jailed in 21 countries since prosecutions started in earnest.  Considering that the estimated number of active pirates was 3,000, these incarcerations made a discernible impact.)  Thus there came to be consequences for villainy, a price to pay.  The net result of all these measures was to change the situation enough to the point where piracy was no longer such a good deal for the aspiring pirate.&lt;br /&gt;
&lt;br /&gt;
There are useful security lessons to harvest here and to apply more broadly.  Among them are:&lt;br /&gt;
&lt;br /&gt;
1.  No matter how unsophisticated and agonizingly debated it may be to do so, you make yourself less of a target if you take visible steps to defend yourself.  Most attackers perform risk assessment at some level, even if not through any complicated, analytical process.  Even if they operate with nothing more than low animal cunning, they realize that their odds improve when attacking undefended targets and those odds get worse if going up against targets equipped and willing to defend themselves.&lt;br /&gt;
&lt;br /&gt;
2.  Few adversaries are invincible, and most will back down if they face a broad array of defenses (such as armed vessels and crews, naval patrols, and a legal system that imposes consequences).  At first encounter, an enemy may seem formidable when attacks are unexpected and defenses are inadequate.  With the steady addition of well conceived defenses, however, it is not only possible but likely for defenders to prevail.&lt;br /&gt;
&lt;br /&gt;
3.  Once a major security problem appears to be solved, watch for the possibility of a new but related one to occur.  In security theory, this is the phenomenon of displacement.  For example, when car alarms became effective and widespread, some car thieves had to change their tactics; they became car hijackers instead.  A car difficult to steal when secured but unattended became easier to acquire by forcing its keys out of the hands of the driver while the engine was already running.  In the case of the present decline of Somali piracy, the speculation now is that thwarted pirates may similarly resort to different targets and tactics.  One possibility is kidnapping high-value executives and holding them in exchange for ransom without having to encounter the new security measures at sea.  Another possibility is that if defenders start diluting or abandoning their countermeasures because they prematurely declare the problem as being solved, it will resurface once conditions tilt back the risk-reward calculation in the pirates&#39; favor.&lt;br /&gt;
&lt;br /&gt;
In addition to this situation offering lessons to learn, it also offers lessons not to forget.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos&lt;br /&gt;
&lt;br /&gt;
 </description><link>http://all-secure.blogspot.com/2013/12/security-lessons-from-somali-piracy.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-2787492053638557560</guid><pubDate>Fri, 13 Dec 2013 15:57:00 +0000</pubDate><atom:updated>2013-12-13T07:59:32.616-08:00</atom:updated><title>Fairy Tales and Ex-FBI Spy in Iran</title><description>Whatever Robert Levinson was doing that resulted in his disappearance in Iran over six years ago, the latest explanation of a rogue intelligence operation defies logic, coming across as yet another fairy tale du jour that does no good for an American in captivity who is suffering or gone.  The latest explanation is that this retired FBI agent with a knack for cultivating snitches throughout a 28-year career in law enforcement somehow materialized in Iran to recruit a suspected murderer at the behest of a CIA analyst.  (For details, see &lt;a href=&quot;http://http://www.washingtonpost.com/world/national-security/ex-fbi-agent-who-went-missing-in-iran-was-on-rogue-mission-for-cia/2013/12/12/f5de6084-637b-11e3-a373-0f9f2d1c2b61_story.html&quot;&gt;http://www.washingtonpost.com/world/national-security/ex-fbi-agent-who-went-missing-in-iran-was-on-rogue-mission-for-cia/2013/12/12/f5de6084-637b-11e3-a373-0f9f2d1c2b61_story.html&lt;/a&gt; )&lt;br /&gt;
&lt;br /&gt;
The picture painted in the foregoing narrative is that a CIA analyst who had forged a professional relationship with Levinson over the years hired him as a contractor and tasked him to gather intelligence on Iran in a rogue operation.  This rogue operation, as the story goes, bypassed all the CIA&#39;s mature clandestine collectors and support mechanisms (including basic tradecraft, it would seem) and, significantly, channeled Levinson&#39;s reports to the CIA analyst at her home instead of her office.&lt;br /&gt;
&lt;br /&gt;
This narrative has enough holes to rival a minefield, but consider only one neglected so far:  How could an intelligence analyst actually benefit from the unvetted yield of an unsanctioned collection effort?  It may take a passing conversance with human intelligence collection, reporting, and analyst involvement to spot this discrepancy.  &lt;br /&gt;
&lt;br /&gt;
There is a basic pas de deux between collectors and analysts that roughly follows this sequence.  Collectors focus their efforts to address intelligence requirements, which are questions that analysts have about foreign intentions and capabilities. When the collectors obtain something responsive to a given requirement, they cite it on the report they write.  Meanwhile, the collector&#39;s boss and unit check out the report for accuracy and completeness before sending it into the system.  This process, in turn, distributes the report to the interested analyst for review and comment prior to dissemination throughout the intelligence community.  If the report is particularly good and highly responsive to analyst needs, the analyst ends up using it for a more important analytical product, such as a National Intelligence Estimate.  When this happens, the analyst supplies good feedback and positive ratings back to the collector through the system.  The collector&#39;s report benefits from a high rating or grade, the collector and analyst are both pleased, and the collector is thereby incentivized to produce more reporting along similar lines because (a) there is an audience for it, and (b) that audience is officially rewarding the collector and collection effort.&lt;br /&gt;
&lt;br /&gt;
Now, what is wrong with the picture painted in the latest story?  The answer is that there is no way for the analyst in question to actually use the reports Levinson allegedly sent to her home.  How can she cite them in any official intelligence study or estimate?  Rogue reports are not in the system, have undergone none of the basic vetting that a boss and unit perform for quality control, and do not exist in a way that anyone else in the intelligence community can legitimately use or cite.  For this reason alone, the &quot;rogue&quot; collection effort run by an analyst in the way characterized above just does not wash.&lt;br /&gt;
&lt;br /&gt;
The protocols of clandestine collection exist for a reason.  That reason is effectiveness, as measured not only by the quality of the yield that they produce but also by due concern for the personal safety of all persons involved in the hazardous task of obtaining useful information from human sources in risky corners of the globe.  Iran is a hostile or denied area, and it would be more than malpractice to send any American there on an intelligence mission without extreme caution and preparation.  This is why there are overseas stations, station chiefs, tradecraft, and legitimate processes in place to govern the interactions of collectors and analysts alike.  Rogue operations are certainly possible in theory, but something is missing in this latest fairy tale.  Even if an analyst can bypass the system by using contractors to collect data, that still leaves the analyst professionally unsatisfied unless the resulting yield can enter the intelligence community legitimately.  Otherwise, why risk a career and the life of a contractor to gather something you cannot use?&lt;br /&gt;
&lt;br /&gt;
There has to be more to this story.  The fairy tale of a rogue operation orchestrated by an analyst just does not hold up to scrutiny.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos</description><link>http://all-secure.blogspot.com/2013/12/fairy-tales-and-ex-fbi-spy-in-iran.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-4769190413980261851</guid><pubDate>Mon, 09 Dec 2013 17:16:00 +0000</pubDate><atom:updated>2013-12-09T09:20:22.131-08:00</atom:updated><title>Making Prevention Contagious for the Holidays</title><description>Security in its broadest application is all about preventing adverse consequences, but the details of prevention can seldom compete against loss-inducing fads ranging from knockout game attacks, flash mob robberies, spree killing, and even to teen suicide.   In the case of the latter, the magnitude of the challenge becomes apparent in a statistic:  Since 1950, the suicide rate today is three times what it was then.  However, the source of this statistic also offers new hope in trumpeting otherwise unheralded successes in curbing suicidal tendencies of today&#39;s teens.  (For details on both data points, see &lt;a href=&quot;http://http://www.csmonitor.com/USA/Society/2013/1208/Teen-suicide-Prevention-is-contagious-too&quot;&gt;http://www.csmonitor.com/USA/Society/2013/1208/Teen-suicide-Prevention-is-contagious-too&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
What can we learn from such suicide prevention programs to inform other protection via prevention?  First, there is a question of attitude.  In the suicide prevention world, this comes down to noting and continually reminding oneself of reasons for living, as the linked article highlights.  Perhaps no one said it better than concentration camp survivor and psychiatrist Viktor Frankl in his book, &lt;i&gt;Man&#39;s Search for Meaning&lt;/i&gt;, where he pointed out that what kept some concentration camp prisoners going while other, more or less identical prisoners lost hope and perished was that the survivors chose their attitude and set themselves tasks to perform every day.  These are what the foregoing article today calls things to live for.  Speaking in the voice of Sherlock Holmes,  Conan Doyle put it another way  a century ago when he said that work remains the best antidote to sorrow.  What, then, is the attitude to adopt to any protective challenge?  It is that the challenge is attainable, a job to do, and one that is worth doing.&lt;br /&gt;
&lt;br /&gt;
Second, what else can we learn?  As in suicide prevention, protective action in general delivers its best yield when focused upstream of a crisis point.  In other words, waiting until just before disaster is waiting until it is too late.  One must anticipate adverse events and act in advance in order to channel them away from the worst of consequences.  Prevention is best and most affordable when performed early, before a crisis has become apparent.&lt;br /&gt;
&lt;br /&gt;
Third is a focus on relative costs and benefits.  As a colleague in the protection business used to point out, suicide is a permanent solution to a temporary problem.  The application to preventive action for situations less dire, such as protecting one&#39;s retail business, or trade secrets, or even for defending against some sophisticated form of reputational risk calls for similar taking of stock.  What is the cost of neglecting security contrasted against a catastrophic loss?  If we don&#39;t know or haven&#39;t thought this through, then we are most likely contributing to an unwitting acceptance of such risk.  This is akin to the myopic perspective of a self-absorbed, callow teen obsessed with eluding temporary, often exaggerated torments through immolation without regard for the pain that suicide causes to others or the variety of alternatives which could not only have solved the ephemeral problem but ultimately led to the sweet self-satisfaction that maturity finds in another aphorism: Living well is the best revenge.&lt;br /&gt;
&lt;br /&gt;
Here, in a nutshell, is the derived prescription for recharging the protective batteries of one&#39;s security prevention program for the holidays:&lt;br /&gt;
&lt;br /&gt;
1.  Adopt a can-do attitude based not on wishful thinking but on a candid appraisal of alternatives.&lt;br /&gt;
&lt;br /&gt;
2.  Focus prevention efforts upstream of the crisis point.  Do the little things in advance so as to face less of a herculean obstacle just before all hell breaks loose.&lt;br /&gt;
&lt;br /&gt;
3.  Weigh relative costs against benefits, with an eye to long-term benefits.  Remember that the cost of not taking prudent, preventive action is likely to outweigh the expense if the net result of inaction proves to be a catastrophic consequence.&lt;br /&gt;
&lt;br /&gt;
Happy holidays.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos</description><link>http://all-secure.blogspot.com/2013/12/making-prevention-contagious-for.html</link><author>noreply@blogger.com (All Secure)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-5729065644699322156</guid><pubDate>Fri, 06 Dec 2013 16:59:00 +0000</pubDate><atom:updated>2013-12-06T18:55:42.106-08:00</atom:updated><title>Sopko Seeing Cash Cow in $34M White Elephant?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Hj_xsHsv5MUObQ0zd7YiP4ZYNvYhBWU41qs-zd5btuleJ9ZsIG99YTz0H1I0y6fGbM0ASG1ijd9b2yLAAAffupaY9k5feQVVdTSRByXboFiKiOYjs-fv5jhsORpgtzxNlDKYH1vdd4k/s1600/Afghan+conf+rm+34m+bldg.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Hj_xsHsv5MUObQ0zd7YiP4ZYNvYhBWU41qs-zd5btuleJ9ZsIG99YTz0H1I0y6fGbM0ASG1ijd9b2yLAAAffupaY9k5feQVVdTSRByXboFiKiOYjs-fv5jhsORpgtzxNlDKYH1vdd4k/s200/Afghan+conf+rm+34m+bldg.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Why would Pentagon brass soldier on with construction of a multimillion dollar building in Afghanistan for a U.S. military that did not want it or had no reasonable expectation of taking up beneficial occupancy as America was announcing plans to withdraw from Afghanistan?  John Sopko, Special Investigator for Afghanistan, raised this question before and, after being stonewalled with a perfunctorily report of the military&#39;s own inquiry into this matter, Sopko is back.  (For details, see &lt;a href=&quot;http://http://www.foxnews.com/politics/2013/12/05/miltary-watchdog-to-re-open-investigation-into-millions-wasted-afghanistan-hq/?intcmp=trending&quot;&gt;http://www.foxnews.com/politics/2013/12/05/miltary-watchdog-to-re-open-investigation-into-millions-wasted-afghanistan-hq/?intcmp=trending&lt;/a&gt;)  Sopko&#39;s probe is no small task, and the answers and support that have eluded his efforts to date may signal a greater deception than mere bureaucratic stonewalling.  &lt;br /&gt;
&lt;br /&gt;
A look at the built-out but unoccupied facility cannot help raise eyebrows.  If pictures shown in an unintelligible mangling of the original news story are better than the story&#39;s atrocious English (at &lt;a href=&quot;http://http://www.daytodaynews.com/topstories/34m-white-elephant-watchdog-to-re-open-probe-of-unused-military-facility.html &quot;&gt;http://www.daytodaynews.com/topstories/34m-white-elephant-watchdog-to-re-open-probe-of-unused-military-facility.html &lt;/a&gt;), then the building looks like an ordinary administrative facility, rather than some exotic laboratory or production plant whose price tag traces more to the contents than to the structure of the complex.  &lt;br /&gt;
&lt;br /&gt;
Let us thread together some logical premises and conclusions to infer what dark current may be running beneath the glittering surface of what looks like a $34M waste of construction funds.&lt;br /&gt;
&lt;br /&gt;
First, if the story Sopko unearthed so far is true, one military general has already gone on the record to rate this facility unneeded and undesired.  That it also remains unoccupied only adds to this general&#39;s credibility.&lt;br /&gt;
&lt;br /&gt;
Counterbalancing this general officer&#39;s doubts over the operational value of the facility, the Pentagon&#39;s internal probe of this expenditure apparently concluded that the construction was warranted and the expense justified.  Now, assuming that generals do not reach flag rank by being stupid or demonstrably disingenuous in the face of legitimate audits, what legitimate reason could there be for one general&#39;s studied and fully staffed report to contradict a field general&#39;s unvarnished assessment of operational value?&lt;br /&gt;
&lt;br /&gt;
The only category of answer that makes sense is this:  There must be a higher, prevailing national interest at stake.  And what might the face of that overriding national interest look like?  It could very easily look like what may be variously called, on a scale of euphemistic intensity, offsets, facilitation payments, bribes, payoffs, kickbacks, or extortion payments.&lt;br /&gt;
&lt;br /&gt;
In the United States and for U.S. companies, the Foreign Corrupt Practices Act exists to curb the predatory impulse that leads some businesses to win contracts by lining the pockets of the entity awarding the contract and some customers to deny business to any entity that refuses to supply some kind of requested kickback.  At its most benign, this process results in U.S. sales to foreign clients on condition of offering certain offsets to the high cost of items sold.  Such offsets could take the form of assembling some components of a U.S. product in the buyer&#39;s country or accepting as partial payment some natural resource or manufactured goods that the buying country has in abundance.  Thus, the buyer&#39;s sticker shock is offset with local benefits, like jobs for its citizens or an artificial market for goods that are not selling well on their own.  Such arrangements could, at least theoretically, explain why a struggling Latin American country bought its jet engines from France instead of Britain or the U.S. because the French were willing to buy more bananas and set up an assembly facility in-country, whereas their competitors were slow to warm to such an arrangement.  So much for the benign approach to offset, which may well be structured in legitimate and transparent terms.&lt;br /&gt;
&lt;br /&gt;
Where does the ethically challenged version creep in?  Countries run by plundering oligarchs are notorious for giving bidders to understand that it is impossible to do business in their country without having a local office run by a local national.  Unsurprisingly, the best if not only such local office invariably ends up being operated by a government official&#39;s family member or tribesman.  A commission, or facilitation payment, is expected to go to such an office, and woe to the international business that tries to compete only on the basis of product quality and competitive pricing.  It soon becomes clear to serious business people from the outside that the only way to obtain business in such an arena is to pay.  Such payment may take the palatable form of facilitation fees charged by a local office acting as middleman and perhaps even providing actual value.  However, it may equally transpire that the business finds itself compelled to pay the same fees for no service at all.  This becomes the cost of doing business in that particular market, no matter how unpalatable it may be.  And some of the recipients of such payments are less subtle and more demanding than others.&lt;br /&gt;
&lt;br /&gt;
Look to the contract and to where the bulk of the $34 million has gone since this white elephant of a building was commissioned.  Was this a glorified cash-for-poppies program crafted to supply Afghani villagers with an alternative means of making a living in exchange for backing down from their opium trade?  Was it a payoff to regional panjandrums to buy their cooperation or at least reduce their targeting of American combat troops?  Or was it part of a quieter, national leadership arrangement to &quot;facilitate&quot; arriving at a desired level of cooperation with Afghani officials in positions of influence?&lt;br /&gt;
&lt;br /&gt;
The Sopko probe may have been stalled, but it appears as unyielding as the Chinese water torture and, as long as it is not completely halted or undermined, it will eventually bring to light some instructive findings.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos</description><link>http://all-secure.blogspot.com/2013/12/sopko-seeing-cash-cow-in-34m-white.html</link><author>noreply@blogger.com (All Secure)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Hj_xsHsv5MUObQ0zd7YiP4ZYNvYhBWU41qs-zd5btuleJ9ZsIG99YTz0H1I0y6fGbM0ASG1ijd9b2yLAAAffupaY9k5feQVVdTSRByXboFiKiOYjs-fv5jhsORpgtzxNlDKYH1vdd4k/s72-c/Afghan+conf+rm+34m+bldg.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2635230562876854684.post-7431130974670681362</guid><pubDate>Mon, 25 Nov 2013 21:18:00 +0000</pubDate><atom:updated>2013-11-25T13:18:02.691-08:00</atom:updated><title>When Domestic Spying No Longer Intelligence</title><description>An Argument Not about Civil Rights but Competence&lt;br /&gt;
&lt;br /&gt;
When NSA, DITU (more, below), and other technical collectors of electronic data engage in gathering up every e-mail and telephone communication they come across, then they are engaged in data vacuuming, not intelligence.  Why?  By definition, intelligence is analytical, selective, and differentiated from mere accumulation of data.  What distinguishes intelligence is the infusion of analysis with a focus on satisfying collection requirements that serve the national interest.  In other words, intelligence is akin to asking a relevant question, taking down the answer, and corroborating and weighing that answer before weaving it into a report on (usually) foreign activities in order to inform the decisions of our own national leaders.  (For a distinction between intelligence and information, consult a brief, accessible monograph by the U.S. Coast Guard, Coast Guard Publication 2-0, &lt;i&gt;Intelligence&lt;/i&gt;, May 2010, available at &lt;a href=&quot;http://http://www.uscg.mil/doctrine/CGPub/CG_Pub_2_0.pdf&quot;&gt;http://www.uscg.mil/doctrine/CGPub/CG_Pub_2_0.pdf&lt;/a&gt; )&lt;br /&gt;
&lt;br /&gt;
When the National Security Administration, a domestic signals interception arm of the FBI called the Data Intercept Technology Unit, or any other government service sets itself to collecting every available signal first, in hope of sifting through it later for potential intelligence value, this process turns into routine fishing in a boundless sea.  (See this November 21 article in &lt;i&gt;Foreign Policy&lt;/i&gt; for fresh details: &lt;a href=&quot;http://http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work&quot;&gt;http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work&lt;/a&gt; )  The process takes on the appearance of a horde of minions too unsophisticated to ask questions and work with the answers who instead resort to copying and scanning every book in sight on the theory that someone, somewhere will find some important answers in all this -- eventually.  After all, if there is enough horse manure, there must be a pony here, somewhere.&lt;br /&gt;
&lt;br /&gt;
What perpetuates this rote collection is that data vacuuming like this is not entirely without value.  It may indeed supply some intelligence yield once sifted, analyzed, and, where possible, woven into an overall fabric that forms the larger tapestry of a meaningful intelligence estimate.  Absent this weaving process, a step easily bypassed in the zeal to vacuum all data in sight, this data collection threatens to turn into a perpetual pulling of loose threads to stuff into a room which takes on the character of a hoarder&#39;s clutter rather than an executive&#39;s reference library.  This recalls the kind of problem that may have led management authority Peter Drucker, in his final years, to observe that in modern information technology (or IT), there is a tendency to find more T than I (&lt;i&gt;Management Challenges for the 21st Century&lt;/i&gt;, NY:  HarperCollins, 1999, pp. 97-99).&lt;br /&gt;
&lt;br /&gt;
The problem is that just because technology enables doing something on a massive scale this does not mean that the doing will necessarily result in a worthwhile yield.  Indeed, one must ask whether the modest or unassessed yield is in proportion to its cost, whether that cost be measured in dollars, staffing, civil rights, public confidence, or all of these.  When it comes to thwarting terrorist attacks like that of the Boston Marathon bombings, a dispassionate observer could argue that all the signs were there and yet all the capacity to intercept communications of or about the bombers failed to deliver a protective or preemptive yield.  To say that these attackers got lucky, fell through the cracks, or otherwise eluded preemption because no system is perfect is to nevertheless highlight how massive post-9/11 data vacuuming appears to leave us with the same vulnerability that existed before we had this capacity.  Maybe we have lost our focus.  Perhaps we are diverting too many resources to solving the wrong problem.  Making intelligence serve preemption may be a higher value than data vacuuming for its own sake.&lt;br /&gt;
&lt;br /&gt;
Just because someone gives you a crutch, you don&#39;t have to break your leg.  In a sense, data vacuuming on a massive scale is to NSA what behavioral detection has become to TSA (about which more earlier this month in this blog under Blame Detector, Not Behavioral Detection):  a potentially useful tool being misapplied.  What remains to be seen is whether this tool is an instrument of intelligence or an unfocused, unaccountable exercise in wielding technology just because it is there.  Intelligence is more than raw data; it presupposes interjection of mind into the swirl of events, and not just the promise of eventual synthesis and analysis.  Mere  data vacuuming on a massive scale hardly measures up well in passing for intelligence.&lt;br /&gt;
&lt;br /&gt;
-- Nick Catrantzos&lt;br /&gt;
</description><link>http://all-secure.blogspot.com/2013/11/when-domestic-spying-no-longer.html</link><author>noreply@blogger.com (All Secure)</author></item></channel></rss>