THE PIIN – BUSINESS OF BUSINESS

This is part of the Abstract and Introduction I wrote for a paper for the DHS on PIINs, a concept of my own. I am writing a much lengthier essay/paper (perhaps even a small book) on the same subject which will include information on how to form PIINs of various kinds and in different industries using the same basic techniques and procedures and networks.

I use these same principles in the development of all of my PIINs regardless or industry or purpose. Although each PIIN is modified to service the particular requirements of how it is constructed and what exact purpose it serves.

Although this is a little out of order for my publishing schedule I offer this post up as my Business of Business post this week.

 

First of all, let me summarize the nature of the PIIN. The Personal (or Private) Intelligence and Investigative Network, like all networks is almost entirely dependent upon a series of established contact points. This is both the strength of the PIIN and the inherent weakness thereof. Therefore it is imperative that high-quality and functionally useful, as well as accurate and practical contact points be created, assessed and reassessed, and maintained over time. This is true whether the contact point is physical, biological, communicative, informational, electronic, technological, or computational. Every asset is a tool and the quality and functionality of those tools are the essential elements in the creation, maintenance, and performance of your PIIN. The Value of any Network is circumscribed by the acute and chronic qualities of those components, which within themselves compose the actual circumference, and separate elements of that real network. If the components of the network are of inferior grade, if the contacts are defectively impositional or of little practical use, or if the contact points are weak or insecure then the entire network is suspect and prone to failure at any and every point of transmission. The PIIN therefore should avoid both obvious and subtle deficits at all times by being practically and pragmatically useful, flexible, adaptable, in a state of constant positive growth and change, accessible, composed of superior components and contact points, secure, and most of all accurate and reliable.

Each and every network is therefore dependent upon the depth and breadth of the human contacts established interior to and exterior to that particular network and subject to the limitations of accuracy and the quality and quantity of valuable information that network can generate. The first real action needed to establish any PIIN and to make it fully functional is the recruitment, development, and maintenance of quality contacts. Contacts are always of the most absolute importance in the establishment of any PIIN. In addition the nature and quality of those contacts should be viewed as central and formative to the capabilities of every other contact point in the configuration and to the network as a whole. After an initial establishment of contacts those contacts should be immediately vetted and/or tested for accuracy and quality. This process of discrimination should be both an immediate tactical and testable undertaking and a long-term strategic process of recurring verification and reverification. Do not expect any particular source to be always accurate, but do not allow any particular source to function in an important role unless it has proven itself capable of both consistent reliability and trustworthiness.

After establishing a few reliable and trustworthy contact points the network must grow in order to gain new sources of information and intelligence as well as to develop and generate new capabilities. Therefore always view already established contacts and contact points as generators of new contacts, informants, intelligence and perhaps even secondary and tertiary networks, or sub-networks. Consider as well every potentially useful new contact or acquaintance as a possible future contact point in your greater network. Contact points should also be capable of redundancy and potential verification of information and intelligence gathered from other points along the nexus and for information gathered from sources outside the network. This is to say that contact points are more than simple sources of information; they will also function as multi-capable nodes along the operational structure of the entire network. I will expound upon the importance of and briefly discuss some of the details regarding contact points later in this paper. For now it is important to remember that contacts and sources provide information and possibly intelligence, but contact points can potentially serve many varied functions, such as; information retrieval, intelligence gathering, analysis, communications, coding, encryption, decoding/decryption, collation, research, as reliable and secure relay points, as information nodes, computational capabilities, disinformation and misinformation dissemination, and even serve as a sort of network disguise, and misdirectional cover or front.

Constantly look for, search out and develop new contacts, contact points, information and intelligence sources, and informants in order to successfully grow your network. Your network’s ultimate effectiveness will depend upon both the quality and quantity of your contacts, contact points, and your contact’s network. In the initial stages of building and developing your network concentrate on the quality of your contacts and contact points, but in the larger and long term concentrate upon both the quality and quantity of those contacts and contact points which comprise the elements of your network. Always develop and maintain quality to the greatest degree possible within all elements of your network, but also always grow and encourage quantity in the most consistent manner possible throughout all aspects of your network. This will assure that your network has both great depth and breadth and that it is capable of the widest and most valuable range of flexible and functional capacities possible.

It does not matter what the major focus of your network is, what it is most well designed to do, what it in actuality best does, or what the functional intent(s) or objective(s) may be, this introductory advice applies equally well to any possible network you might desire to establish in any field of activity or enterprise. The PIIN is a potentially invaluable tool for both the amateur and professional alike, for both citizen and official agent, and no matter the function or objective, the real capabilities of any established PIIN will be determined by the inventiveness, innovation, flexibility, enterprise, imagination and quality of the component parts of the network. And those component parts are composed and arranged by the originator of the network, that individual who is responsible for first establishing the nature and parameters of the own individual PIIN. The originator therefore will establish the genesis of the network and how well it grows and develops in the initial stages, but as the network grows it will develop capabilities never earlier imagined by the originator and will eventually become functional in an almost independent sense, as long as quality contacts and sources are developed and as long as those contacts and sources continue to grow and establish new capabilities and contacts of their own. A PIIN begins therefore as an idea and individual construct but over time develops into an almost biological organization of vast complexity and capacity. Drawing upon the collective skills and capabilities of the PIIN for whatever is desired or needed makes the PIIN a worthwhile and profitable venture for all individuals associated with that network, and because of the potential for continued and even exponential growth the PIIN is an extremely advantageous system of achieving complex objectives rapidly and of multiplying capabilities well beyond the individual level.

Because of the limitations of space regarding this essay I cannot describe all of the potential advantages that would possibly be gained by the formation of individual PIINs, either those advantages that would be enjoyed by agents or officers in the service of some official organization, or those advantages that would be enjoyed by citizens who have formed and are employing their own personal PIIN. But the potential advantages would be numerous, and such networks could beneficially overlap, inform, and service each other in times of national emergency or crisis. More importantly, if such networks were allowed to “cluster” and interact/interface in an efficient, secure, and positive manner then they would serve as invaluable intelligence gathering and investigative tools for the anticipation of disaster and the effective prevention and thwarting of many forms of malicious harm intended by the enemies of the United States.

As just one small example of how PIINs would make highly effective and useful tools for the benefit of both the citizenry and the government let me outline this scenario. A hostile entity decides upon a coordinated and simultaneous cyber-attack against both the American civil government and the Pentagon. These attacks overwhelm official servers who are the obvious targets of offensive action. During such periods of particular and isolated cyber attack against governmental and/or military networks, or even during periods of general and on-going netcentric engagement or warfare the PIIN can act as an emergency secondary or redundancy system of information and communications exchange, intelligence gathering, an investigative force as to who is attacking, why, from where, and how, and for coordinating a necessary and effective counteraction or response. While main systems are under attack, disabled, or malfunctioning PIINs can serve as ancillary and even secretive means of continuing vital operations or responding to attack. It is relatively easy to attack and at least temporarily paralyze large-scale and centralized networks efficiently given the proper time, coordination, planning, resources, incentives, and information on system vulnerabilities, but it would be nearly impossible to simultaneously disable all small-scale private and personal networks. PIINs are the private enterprise of innovative intelligence and investigative networks.

Other examples of the potential usefulness of the PIIN are easy enough to construct, such as creating and fostering “bridging links” between individual citizens, law enforcement agencies, governmental entities, and the military. PIINs can also be used as investigative networks and resources, as research hubs, as communication nodes, as a pool of expertise (both amateur and professional), as an emergency system of collective and clustered capability, as a functional and ever growing database of information, as an ancillary or auxiliary analytical network, and as an exchange for valuable contacts, sources, and useful informants. Perhaps just as important to the overall value-added aspect of the usefulness of the PIIN is the fact that most PIINs can be constructed at little to no cost using already available personal, technological, and organizational resources. It is simply a matter of redirecting already available resources to the construction and maintenance of the PIIN, or of simply reformatting the way in which contemporary networks are thought of and how they currently operate, or fail to operate, effectively.

The next administration would do very well to consider encouraging the development of Private and Personal Intelligence and Investigative Networks throughout our society, and to encouraging the exploitation of such networks for the benefit of all the citizens of the United States of America.

 

 

Advertisements

THE ADVENTURES OF END-OVER: THE BUTT-NAKED BUSINESSMAN

I thought about posting this to my literary blog, but… then I thought to myself, no, this story contains so many of the lessons I’ve learned in business and regarding corporate espionage that I’ll put it here, on Launch Port.

I’ll continue writing the story in sections and then serialize it here on Launch Port. Enjoy.

 

THE BUTT-NAKED BUSINESSMAN


Chapter One: The Breeched Bureau

(First Draft)

End-Over placed his luggage at the foot of the bureau. The important thing about a bureau in his mind, if you were going to have one at all, was that it be tightly arranged and well ordered. Most people didn’t understand this, even those who made much use of bureaus. Then again, most people started at the over, and not at the end. He had been born breeched. The end as the logical starting place was natural to him.

It also struck many people as either odd, or humorous, or both, that he would bring so much luggage to a Nudist Camp. But to him, if you were going to camp, the important thing was to always be prepared. Being naked in the face of being nude was to him a very different thing than being both naked and nude. The nude part he had worked himself up to without much trouble. Truth was he had always preferred being nude. The being naked though, that was another matter. They didn’t mesh well in his mind with the other parts of himself. Nude was just another form of camouflage, and another form of gregarious sociability. Naked was, well, it was being naked. You either got that, or you didn’t. End-Over got it, and because of that, he avoided naked.

Everyone at the colony, for he preferred to call it a Colony rather than a Camp, called him John. Or Tule. Because he told everyone his real name was John Tuli. It wasn’t of course, and it wasn’t the only alias he employed. After all real names left one naked, and considering that he was a businessman and considering his business, he was satisfied to let everyone else see him nude rather than naked. His name didn’t interfere with his time at the Colony, it didn’t interfere with his fun, it didn’t make him any less likely to be what he was or to do what he’d do, it was just a name. A corporate structure. He wasn’t attached to it. He wasn’t even attached to his real name. It implied certain things about him, helped clarified aspects of his past. Like all names though it was self-limiting, wasn’t really descriptive at all, other than the meaning others attached to it. Public names, real, or imagined, or created, were like terms to him. Something you could hang an idea on, not something you could develop a solid, working description from. He had a secret name for himself, something no-one else knew. Well, no-one else except maybe God. But it wasn’t a naked name, and it wasn’t a nude name, and it wasn’t a public name, and it wasn’t even a private name. It was a name he used when he talked to himself. Which was often enough that he was respectful of it. So he never used it otherwise, and never spoke it in vain.

He turned from the bureau and examined the room he stood in. It was part of the same cabin he always stayed at when he visited the colony. The floors were stained hardwood, dusty and warm, it seemed to him, no matter what time of year he visited. The furniture was typically resort issue. Standing floor lamps, warm yellow bulbs that shed very little light. That was perfectly fine by him.

The bed was low slung, with no headboard. The mattress was new, and the sheets clean and well tended. On his pillow lay a single wrapped chocolate and with a white rose topping a crisp, bright, white envelop with gold, calligraphic insignia cut to conceal a card rather than a letter. The card was no doubt the typical greeting he always received whenever he visited.

The small kitchen would be clean, swept, dry, and sterile. The floor tiles black and white, the polished faux granite counters would gleam dully. The sinks would shine, the faucets would be scrubbed. Dishes would be neatly stacked and put away in their proper places. The silverware would look as if just purchased. The white-frosted, spherical, enclosed light fixtures would hang halfway between the roof and the floor of the vaulted kitchen ceiling. The refrigerator and freezer would be completely empty of anything but ice, which would be plentiful, and the cabinets would be entirely bare. This didn’t matter to him though; he would stock his own larder. He preferred it that way.

The single bathroom of his cabin would be spotless, the toilet almost pristine, a large shaving mirror would hang above a sink free of all traces it had ever been previously used, and a full length door mirror would decorate the inside door of the bathroom. The bath would be part programmable Jacuzzi, part rounded tub, and would conceal a detachable, multi-pulse showerhead. He liked the set up and looked forward to a few long, relaxing soaks at night while he listened to opera and dozed in the warm water. Which he would salt and pour white wine in for the smell, and because it would relax him all the more…

 

GOING ALL THE WAY

Reasons to Land on a Comet: What the Rosetta Mission Can Learn

November 12, 2014

The Agilkia landing site is seen on this image of Comet 67P/Churyumov-Gerasimenko, taken with Rosetta’s navigation camera, just days before its lander, Philae, makes its historic descent to the surface

Courtesy European Space Agency

The Agilkia landing site is seen on this image of Comet 67P/Churyumov-Gerasimenko, taken with Rosetta’s navigation camera, just days before its lander, Philae, makes its historic descent to the surface

After a journey that took more than a decade, the world is scheduled to witness a first when the European Space Agency’s Rosetta mission attempts to land a small spacecraft on the surface of a comet. The attempt will take place on Wednesday, at speeds of about 34,000 miles per hour.

The mission is a potential breakthrough in the study of comets. These chunks of ice and dust are leftovers from the formation of planets, often considered space “icebergs” given their age and distance from the sun. The water that resides in comets is likely the key to sustaining future deep-space missions—a celestial gasoline station, in a sense. Beyond water, comets such as the now-famous 67P are thought to harbor complex organic molecules, some of the ingredients needed for the formation of intelligent life.

“I think that humans have to go into space more and take ownership of the solar system,” says Denton Ebel, chairman of the division of physical sciences at the American Museum of Natural History, calling efforts such as Rosetta “the logical next step” of human space exploration.

There is yet another reason underlying the space agency’s financial and engineering feat: to prove it’s possible. Before attempting to land on the comet, the spacecraft will have whipped around the earth three times, followed by Mars, to obtain the necessary gravitational acceleration to rendezvous with a comet. The Rosetta craft will discharge a 220-pound landing probe, called Philae, to settle in a relatively clear spot only about 1/3-mile square.

“It’s technically one of the most difficult missions ever,” Ebel says. “This mission is amazingly ambitious.”

Other reasons to visit a comet include getting a better understanding of how massive space rocks are constructed, which could prove crucial if future earthlings ever need to intercept and prevent a doomsday scenario. There is also the issue of manned deep-space exploration and using the abundant resources found in comets and asteroids, mainly water and noxious gases but also precious metals. “How is the water locked up in a comet? We don’t really understand that at all,” Ebel says.

Future space explorers will almost certainly need to stop for water en route. Bring water from earth into space costs about $23,000 per pound, according to Planetary Resources, which plans to mine asteroids. The hydrogen and oxygen in water is also the basis for rocket fuel that will be produced in space.

The Rosetta mission was launched in March 2004 and reached Comet 67P/Churyumov-Gerasimenko on Aug. 6, where it has been orbiting about 14 miles from the surface. The comet is about 2.5 miles across at its widest point.

Confirmation of the Philae lander’s fate is expected to arrive at about 10:36 a.m. EST at the mission control in Darmstadt, Germany, following a seven-hour descent to the comet. The agency has deployed a full array of social media to chronicle the landing, including collaborating with a futuristic film dramatization starring Game of Thrones actor Aidan Gillan and a soundtrack of the sub-audible magnetic emissions from the comet, sped up so they can be heard. Come Wednesday, there will be tweets.

THE MEANDERING MAN

Indeed. I practice this habit every day. I walk and/or run 2 to 5 miles per day.

Why You Should Make Time for a Long Walk This Week

Doctors insist sedentary workers should get up from their desks periodically, but long walks offer much more than improved health.

In recent years, walking has gone from a generally healthful mode of transport to a public health crusade. Why? Lately, science has shown sitting all day to be the newest public health menace, right behind Big Macs and cigarettes on the list of things that will shorten your life and damage your body. The silver lining to this evolving line of research is that fighting back seems to be as simple as getting up and wandering around for a few minutes every hour or so (standing desks are another option).

An occasional stroll, therefore, has become akin to a morning vitamin or regular cancer screening–something you know you really ought to do. There’s no denying the truth of the necessity of adding a bare minimum of movement to our days, but there’s another side to walking that may be getting lost in the rush to remind people of its salutary effects.

Walking might save your life, but that’s far from all a good wander has to offer.

Traveling by foot isn’t just medicinal. It’s also a meditative pursuit with a long and storied pedigree that can lift your mood, improve your creativity, and give you the space you need for life-changing self-reflection.

Less Anxious, More Creative

The first couple of items on this list are the simplest to prove. Again we can turn to recent studies that reveal being outside in natural settings is powerful anti-anxiety medicine. Blog Wise Bread summed up the new findings this way: “The sounds of birds chirping, rain falling, and bees buzzing are proven to lower stress and evoke a feeling of calm.”

Similarly, science attests that getting out for a walk can spur creative thinking. Stanford News, for example,  reports on studies out of the university showing that “the overwhelming majority of the participants in these three experiments were more creative while walking than sitting … creative output increased by an average of 60 percent when the person was walking.”

Walking to Find Yourself

It’s clear, then, that walking has short-term utilitarian uses–if you need an idea to finish that work project, a spin around your local park might help shake one loose. But there’s also lots of anecdotal evidence that longer walks can yield a deeper sort of creativity. The mental space created by long rambles offers the stressed and scattered the time and brain real estate needed not only to solve specific problems, but also to gain perspective on their own lives and rebalance out-of-whack lifestyles.

When blogger David Roberts decided to fight his profound burnout with a year-long digital detox, for example, he soon settled into a daily rhythm of long hikes. “Reliably, after about a half-hour of walking, ideas start bubbling up,” he reports in a fascinating writeup of the experience for Outdoor magazine. The wandering had other effects, too. “I spent hours at a time absorbed in a single activity. My mind felt quieter, less jumpy,” he says.

Roberts is far from the only thinker to notice these deeper effects of longer walks. On Medium recently, writer Craig Mod composed an ode to long walks, unearthing a treasure trove of historical figures and great thinkers who celebrated and dissected the benefits of walking. The common thread running through these accounts isn’t just that experiencing a place on foot offers a unique perspective and plenty of unexpected details to delight the walker, but also that “walking moves or settles the mind–allowing for self discovery.”

If you’ve lost touch with the art of the long ramble, it’s a must-read piece. And it begs the question:

Will you take time for a long walk this week?

THE WAY IT GOES

Lol. I don’t know the Truth of this, because I’m not familiar the particulars or the principals involved, but given my own personal experiences with both the federal government (FBI, Justice, DHS) and private security contractors it would in no way surprise me.

The Spy Who Scammed Us?

Jamie Smith says he was recruited into the CIA as an undergraduate at Ole Miss, cofounded Blackwater, and has done clandestine intelligence work all over the world, operating out of a counterterrorism boot camp in the woods of north Mississippi. Plenty of people believed him, including the Air Force (which paid him $7 million to train personnel) and William Morrow, which signed him up to write his memoir. There’s just one little question: How much of it is true?

By: Ace Atkins and Michael Fechter

Jamie Smith’s new book, indefinitely waiting for release, makes claims that old friends and foes say are exaggerated at best.

Some called it G.I. Joe Fantasy Camp, and for good reason. In the piney woods of north Mississippi, professionals and wannabes alike would come to the 60-acre compound of an outfit called SCG International to play war games, fire live weapons, conduct mock interrogations, and run around like kids, zinging paintball rounds across creeks and seeking cover in open fields.

But this was serious business, too. During SCG’s heyday, between 2008 and 2012, the U.S. government and local law-enforcement agencies paid a lot of money to get people trained so they could function capably in war zones, shoot-outs, and other dicey situations.

It was an exciting place to be, even for amateurs. If you displayed some talent, you might get a nod from one of SCG’s professional tough guys—lawmen and military veterans who could, if they wanted, find you a job with the company someday. If that happened, you were told, exciting work would follow: protecting a cargo shipment in the Middle East, say, or running special missions deep inside a war-torn African nation. The money was said to be very good…