Interesting Examples - Competitive Intelligence2024-03-29T07:44:41Zhttps://competitiveintelligence.ning.com/forum/topics/interesting-examples?commentId=2036441%3AComment%3A70248&x=1&feed=yes&xn_auth=noIf the client is the Governme…tag:competitiveintelligence.ning.com,2011-12-23:2036441:Comment:702482011-12-23T01:49:18.955ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<p>If the client is the Government, then I guess in Intelligence and not CI, everything is legal and ethical, especially when WMD are concerned.</p>
<p></p>
<p>Typical of little boys playing the game "Mine is bigger than yours". (WMD).</p>
<p></p>
<p>Since <strong>Nick Yarosh and Dustin Walker have been compromised,</strong> these boys need to be careful, as such is the world of Intelligence.</p>
<p>If the client is the Government, then I guess in Intelligence and not CI, everything is legal and ethical, especially when WMD are concerned.</p>
<p></p>
<p>Typical of little boys playing the game "Mine is bigger than yours". (WMD).</p>
<p></p>
<p>Since <strong>Nick Yarosh and Dustin Walker have been compromised,</strong> these boys need to be careful, as such is the world of Intelligence.</p> Good point Vivek regarding th…tag:competitiveintelligence.ning.com,2011-12-23:2036441:Comment:703442011-12-23T00:28:12.937ZBabette Bensoussanhttps://competitiveintelligence.ning.com/profile/BabetteBensoussan
<p>Good point Vivek regarding the "restricted Chinese military documents" however I wonder were the documents really restricted or it served the purpose of the article to say so. Just like Tom Clancy who had to defend his charge of espionage. Yes, the KGB and western military intelligence claimed he stole the submarine and weapons blueprints......and Wikileaks did not exist then.</p>
<p></p>
<p>Good point Vivek regarding the "restricted Chinese military documents" however I wonder were the documents really restricted or it served the purpose of the article to say so. Just like Tom Clancy who had to defend his charge of espionage. Yes, the KGB and western military intelligence claimed he stole the submarine and weapons blueprints......and Wikileaks did not exist then.</p>
<p></p> Digging into China’s nuclear…tag:competitiveintelligence.ning.com,2011-12-21:2036441:Comment:702442011-12-21T13:54:54.558ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<div><p><strong>Digging into China’s nuclear tunnels</strong><br></br>By William Wan | The Washington Post – Wed, Nov 30, 2011</p>
<p><a href="http://news.yahoo.com/digging-china-nuclear-tunnels-013008319.html" rel="nofollow">http://news.yahoo.com/digging-china-nuclear-tunnels-013008319.html</a></p>
<p></p>
<p></p>
<p></p>
<p>@Babette,</p>
<p></p>
<p>I had certain observations regarding this article:</p>
<p></p>
<p>......Led by their hard-charging professor, a former top …</p>
</div>
<div><p><strong>Digging into China’s nuclear tunnels</strong><br/>By William Wan | The Washington Post – Wed, Nov 30, 2011</p>
<p><a rel="nofollow" href="http://news.yahoo.com/digging-china-nuclear-tunnels-013008319.html">http://news.yahoo.com/digging-china-nuclear-tunnels-013008319.html</a></p>
<p></p>
<p></p>
<p></p>
<p>@Babette,</p>
<p></p>
<p>I had certain observations regarding this article:</p>
<p></p>
<p>......Led by their hard-charging professor, a former top <span id="lw_1322669566_6">Pentagon</span> official, they have translated hundreds of documents, combed through satellite imagery, <strong>obtained restricted <span id="lw_1322669566_8">Chinese military</span> documents</strong> and waded through hundreds of gigabytes of online data...............</p>
<p></p>
<p>1. <strong>obtained restricted <span id="lw_1322669566_8">Chinese military</span> documents</strong></p>
<p><strong><br/></strong></p>
<p>Surely these <strong> restricted <span id="lw_1322669566_8">Chinese military</span> documents </strong> were not on Public Domain.</p>
<p></p>
<p>I wonder what do chinese spooks think about it.</p>
<p>How did <strong>obtained restricted <span id="lw_1322669566_8">Chinese military</span> documents </strong>land up in the hands of students and their wise Professor.</p>
<p></p>
<p>2. By talking about "<strong>obtained restricted <span id="lw_1322669566_8">Chinese military</span> documents", </strong>on Public Domain, I am sure Chinese spooks would be pissed and if so, they will like to identify the vulnerability which was exploited. Surely HUMINT was used and if so, I feel <strong>Nick Yarosh and Dustin Walker </strong>have been compromised as their names are on Public Domain ie By <span class="fn" id="yui_3_3_0_18_1324474666737595">William Wan</span> | <span class="provider org" id="yui_3_3_0_18_1324474666737592">The Washington Post</span></p>
<p><span class="provider org"><br/></span></p>
<p><span class="provider org">Think about it. </span></p>
<p><span class="provider org"><br/></span></p>
<p><span class="provider org">If <strong>Nick Yarosh and Dustin Walker </strong>are not protected by the American Govt, Can we rule out a snatch operation by Chinese spooks on foreign soil?</span></p>
<p><span class="provider org"><br/></span></p>
<p><span class="provider org">3. Surely <strong>Nick Yarosh and Dustin Walker </strong>will know the weasels in the Chinese Army through whom they had access to </span></p>
<p><span class="provider org"><strong>restricted <span id="lw_1322669566_8">Chinese military</span> documents.</strong></span></p>
<p><span class="provider org"><strong><br/></strong></span></p>
<p><span class="provider org"><strong>What extent will Chinese spooks go to identify who in the Chinese army compromised "</strong>restricted <span id="lw_1322669566_8">Chinese military</span> documents"</span></p>
<p><span class="provider org"><strong><strong><br/></strong></strong></span></p>
<p><span class="provider org">4. The old fox <strong>Phillip A. Karber </strong>is smart but <strong>Nick Yarosh and Dustin Walker, </strong>if they step out of US,<strong> are easy prey to a snatch ops by Chinese spooks, unless </strong>Nick Yarosh and Dustin Walker </span>are employed by the<strong><strong> Agency.</strong></strong></p>
<p><span class="provider org"><br/></span></p>
<p><span class="provider org">This is just my humble observation.</span></p>
</div> Babette,
Irrespective what ha…tag:competitiveintelligence.ning.com,2011-12-04:2036441:Comment:692192011-12-04T07:25:42.571ZVivek Raghuvanshihttps://competitiveintelligence.ning.com/profile/VivekRaghuvanshi
<p>Babette,</p>
<p>Irrespective what happens to <em>Julian</em> Paul <em>Assange, the WikiLeaks data is on Public Domain for all to harvest.</em></p>
<p><em><br/></em></p>
<p><em>So maybe </em>Julian Paul <em>Assange may be considered unethical by the community BUT now </em> WikiLeaks data is on Public Domain and therefore ETHICAL?</p>
<p>Babette,</p>
<p>Irrespective what happens to <em>Julian</em> Paul <em>Assange, the WikiLeaks data is on Public Domain for all to harvest.</em></p>
<p><em><br/></em></p>
<p><em>So maybe </em>Julian Paul <em>Assange may be considered unethical by the community BUT now </em> WikiLeaks data is on Public Domain and therefore ETHICAL?</p>