Berto Jongman: Activity Based Intelligence — with NSA-NGA Merger Coming Along Nicely

Advanced Cyber/IO
Berto Jongman
Berto Jongman

Activity-Based Intelligence Uses Metadata to Map Adversary Networks

Gabriel Miller

Defense News, 8 July 2013

Few outside the intelligence community had heard of activity-based intelligence until December, when the National Geospatial Intelligence Agency awarded BAE Systems $60 million to develop products based on this newish methodology. But ABI, which focuses not on specific targets but on events, movements and transactions in a given area, is rapidly emerging as a powerful tool for understanding adversary networks and solving quandaries presented by asymmetrical warfare and big data.

Indeed, ABI is the type of intelligence tool that could be applied to the vast wash of metadata and internet transactions gathered by the NSA programs that were disclosed in June by a whistle-blower.

Full story below the line.

Continue reading “Berto Jongman: Activity Based Intelligence — with NSA-NGA Merger Coming Along Nicely”

Berto Jongman: MIT App Replicates NSA Handling of Your Meta-Data — Silver Lining

Advanced Cyber/IO
Berto Jongman
Berto Jongman

MIT tool connects the dots of your life through Gmail metadata

How much does the metadata gathered in your inbox reveal about you? Quite a lot, judging by what researchers at the MIT Media Lab have managed to accomplish with Immersion. They've built a web app that — once you grant it permission to do so — digs through your email history to piece together a “people-centric view of your email life.” What does Immersion look at, exactly? Only the senders, recipients (including those CC'd), and timestamps within your email archives. It steers clear of subject lines and the actual bodies of your messages.

Read full article.

Phi Beta Iota:  The silver lining in all this is that it illuminates what a World Brain will look like when every “thing” has its own URL and carries its true cost as well as its usage history with it.  Anything with a toxin in its history will glow red and buycotts will become as easy as pointing your phone at something and respecting the red dot that flashes at whatever level you have chosen.

See Also:

Graphic: True Cost of Sugar to Society

Stephen E. Arnold: Amazon Growth, Search, & Costs — the Google Killer?

Advanced Cyber/IO, Commerce
Stephen E. Arnold
Stephen E. Arnold

Amazon: Unrelenting Growth, Search, and Costs

I noted the Netcraft data which were presented in “Amazon Web Services’ Growth Unrelenting.” Amazon is a sprawling online services company. The firm hit on the idea of becoming a cloud provider years ago. The write up presents a diagram which uses a log scale (check with an attorney for what this means). The lines show growth in host names, active sites, and computers. What’s not to like?

Search vendors struggling to generate revenue have embraced the cloud as a way to reduce the on premises’ costs of deploying a content processing solution. Again: What’s not to like? Ease, convenience, and the perceived reliability of Amazon, the creation of a Wall Street wunderkind?

Amazon is in the search business. The system, as I understand it, requires that content be assembled to the Amazon specification. Once in the Amazon search system, all sorts of goodness is available to the person who wants to use the “native” Amazon search system. Other search vendors have embraced Amazon. Two examples are the still-in-start-up mode Digital Reasoning and X1 (search not the aircraft).

A couple of observations. Continue reading “Stephen E. Arnold: Amazon Growth, Search, & Costs — the Google Killer?”

Berto Jongman: Case Study of What NSA Sees About Your Complete Life

Advanced Cyber/IO, ICT-IT, Transparency
Berto Jongman
Berto Jongman

Tell-all telephone

Green party politician Malte Spitz sued to have German telecoms giant Deutsche Telekom hand over six months of his phone data that he then made available to ZEIT ONLINE. We combined this geolocation data with information relating to his life as a politician, such as Twitter feeds, blog entries and websites, all of which is all freely available on the internet.

By pushing the play button, you will set off on a trip through Malte Spitz's life. The speed controller allows you to adjust how fast you travel, the pause button will let you stop at interesting points. In addition, a calendar at the bottom shows when he was in a particular location and can be used to jump to a specific time period. Each column corresponds to one day.

Click on Image to Enlarge
Click on Image to Enlarge

Rest of article and live interactive streaming “one day in the life of” demonstration.

Continue reading “Berto Jongman: Case Study of What NSA Sees About Your Complete Life”

Berto Jongman: Map of the Social Web (As Of Today)

Advanced Cyber/IO, Collective Intelligence, Cultural Intelligence
Berto Jongman
Berto Jongman

Phi Beta Iota:  Well worth careful examination.  A useful categorization of many services, all of which have something to do with sharing, and none of which actually contribute to sense-making, decision-support, or true cost accountability.  Now imagine this same map, but this time every single element is part of a world brain and global game in which all data is inter-operable and geospatially as well as time tagged, and every datum is weighted and also linked to all true cost information, all in a whole systems context.  Cost and corruption anomalies will “light up” — achievable savings and individual needs that — if met — will generate surplus wealth for the community.  Yahoo overpaid for tumbl — and will probably overpay for a few other things — instead of actually thinking through how to entice best in class, one from each, while building the other half — the sense-making in context half — that does not exist.

Click on Image to Enlarge
Click on Image to Enlarge

Anthony Judge: Circumventing Invasive Internet Surveillance with Carrier Pigeons

Advanced Cyber/IO, Offbeat Fun
Anthony Judge
Anthony Judge

Circumventing Invasive Internet Surveillance with Carrier Pigeons

Rewilding the endangered world wide web of avian migration pathways

Introduction
Recognized competence of carrier pigeons
Demonstrated non-military messaging capacity of carrier pigeons
Demonstrated non-messaging capacity of carrier pigeons
Demonstrated military capacity of carrier pigeons
Assessment of viability of data transfer by carrier pigeons
Personal and social implications of use of carrier pigeons
Implications for intelligence agencies and security
Engagement of birds in advanced communication technologies of the future
Greening the world wide web using migratory birds
Carrier pigeons for security and peace vs. Drones for insecurity and war?
References

noble gold