An interesting round-up of how open-source methodology is being applied by terrorist groups. And before you mentally damn FLOSS by that association, recall that there is nothing that is not at root good and no'thing' save God alone that cannot be co-opted to woe from weal. Note too:
"The irony in all of this is that these six elements would likely also apply to innovative, emergent efforts to counter guerilla/terrorist activity. This is what David Stephenson is talking about when he writes of 'smart mobs for homeland security' -- iterative, collaborative, tactics that remain open to novel uses of technology and systems. "
WorldChanging: Another World Is Here: Open Source Warfare:[:terrerism:]
Nous like scouse or French -oui? We wee whee all the way ... to mind us a bunch of thunks. Too much information? How could that be?
Subscribe to:
Post Comments (Atom)
Formation for participraying
As I've been thinking about the difference between group processes for intercessory (rather than 'merely' petitionary) prayer me...
-
I'm not sure people have believed me when I've said that there have been discovered uncaffeinated coffee beans. Well, here's one...
-
"'Do not think that I have come to abolish the law or the prophets; I have come not to abolish but to fulfill. For truly I tell yo...
-
from: http://static.guim.co.uk/sys-images/Guardian/Pix/online/2012/5/22/1337672561216/Annular-solar-eclipse--008.jpg
No comments:
Post a Comment