When I left the intelligence conference in Prague, there were a number of companies in my graphic about open source search. When I got off the airplane, I edited my slide. Looks to me as if Elasticsearch has just bulldozed the search and content sector, commercialized open source group. I would not want to be the CEO of LucidWorks, Ikanow, or any other open sourcey search and content processing company this weekend.
Apprentice: Using network technology
Journeyman: Establishing a network identity
Master: Utilizing network intelligence
EXTRACT
There is a whole “dark net” of critical-edge information that hasn’t made it into newspapers and blogs, information that exists only in people’s heads. In the past, such information was difficult to access for all but the best-connected and most persistent individuals. Now, it’s often just a few keystrokes away.
… the ability to extract the right information at the right time is more crucial than ever. Search literacy is an important starting point, but in today’s high-velocity world, network literacy is increasingly crucial too.
I recently joined my fellow National Geographic Emergency Explorer colleague Shah Selbe on his first expedition of SoarOcean, which seeks to leverage low-cost UAVs for Ocean protection. Why did I participate in an expedition that seemingly had nothing to do with humanitarian response? Because the conservation space is well ahead of the humanitarian sector when it comes to using UAVs. To this end, we have a lot to learn from colleagues like Shah and others outside our field. The video below explains this further & provides a great overview of SoarOcean.
Is the tide finally turning, is the public becoming better informed despite the 24 hour-a-day propaganda onslaught of mainstream media produced by the 1%? It seems so, as this article implies that for the scions of the Establishment and the 1% and their propaganda organs to turn their attention to alternative media and independent research, that is, media and information not under the control of the 1% and their designated dupes, could only mean their mainstream media and information outlets are losing the war against the public's ability to find the truth about the global, regional and local machinations of the Elite, hence the new initiative underway, chronicled in this article, to attack and discredit alternative media under the loaded-term guise of “conspiracy theory.”
The Defense Advanced Research Projects Agency is working on what it calls the “four big things” to protect U.S. military technology from hackers.
Cybersecurity is the latest big deal in military affairs. It's one of the few growing areas of the nation's defense budget at a time when most line items are shrinking, because of concerns about hacking by foreign powers.
In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were discussed. At the end of the discussion I pointed out that analysts must be critical of the data they evaluate as at any time it could be compromised.
Specifically, adversary actors could employ counterintelligence or deception type techniques to push analysts to draw wrong conclusions or discount the data entirely. In this article we will cover this topic of Cyber Counterintelligence (CCI) and discuss its two main branches: Offensive CCI and Defensive CCI.
Hunter Newby is the CEO of Allied Fiber, a carrier neutral provider of dark fiber with a national footprint addressing the lack of accessible dark fiber in the market by making it available for long term lease. He is a twelve year veteran of the telecom networking industry and has built a depth of creative and management experience and expertise in multiple disciplines within the field ranging from sales, marketing and technical aspects to network engineering and raising capital.
ROBERT STEELE: I encountered Hunter Newby in NYC where he was the opening speaker at LIBTCH NYC (I was the closing speaker). In all the years I have been focusing on cyber as the flip side of intelligence, I cannot think of a more energizing and inspiring package of intelligence and integrity combined with a concept I did not properly understand: dark fiber. Understood in Hunter's terms, this also changes our understanding of net neutrality — communities can opt-in to direct access to this dark fibre, and by-pass all intermediaries with enormous cost savings and bandwidth amplification.
Click on Image to Enlarge
We are going to start following this. Dark fiber is the carrier-neutralphysical layer that is in theory without limit, which Hunter has very brilliantly arranged to run within the railroad right of ways across America. This is “root” for a Smart Nation on the cyber side. This is also what does not exist as a public or universal service. Below is the briefing he presented, followed by a selection of particularly interesting columns he has published before. A complete list of his prior columns is here.