Stephen E. Arnold: Elastisearch Open Source Rules Search — Bulldozing Content Processing

Advanced Cyber/IO, Software
Stephen E. Arnold
Stephen E. Arnold

Elasticsearch: Bulldozing Content Processing

When I left the intelligence conference in Prague, there were a number of companies in my graphic about open source search. When I got off the airplane, I edited my slide. Looks to me as if Elasticsearch has just bulldozed the search and content sector, commercialized open source group. I would not want to be the CEO of LucidWorks, Ikanow, or any other open sourcey search and content processing company this weekend.

Continue reading “Stephen E. Arnold: Elastisearch Open Source Rules Search — Bulldozing Content Processing”

Jean Lievens: Information Literacy = Wealth

Advanced Cyber/IO
Jean Lievens
Jean Lievens

The Information Age to the Networked Age: Are You Network Literate?

By Reid Hoffman

PandaWhale to LinkedIn, 4 June 2014

Apprentice: Using network technology
Journeyman: Establishing a network identity
Master: Utilizing network intelligence

EXTRACT

There is a whole “dark net” of critical-edge information that hasn’t made it into newspapers and blogs, information that exists only in people’s heads. In the past, such information was difficult to access for all but the best-connected and most persistent individuals. Now, it’s often just a few keystrokes away.

… the ability to extract the right information at the right time is more crucial than ever. Search literacy is an important starting point, but in today’s high-velocity world, network literacy is increasingly crucial too.

Continue reading “Jean Lievens: Information Literacy = Wealth”

Patrick Meier: Learning from Conservation UAV Campaigns — with Comment on 21st Century Neighborhood Watch, Alternative ISR, Citizen Intelligence

Advanced Cyber/IO, Drones & UAVs
Patrick Meier
Patrick Meier

What Humanitarians Can Learn from Conservation UAVs

I recently joined my fellow National Geographic Emergency Explorer colleague Shah Selbe on his first expedition of SoarOcean, which seeks to leverage low-cost UAVs for Ocean protection. Why did I participate in an expedition that seemingly had nothing to do with humanitarian response? Because the conservation space is well ahead of the humanitarian sector when it comes to using UAVs. To this end, we have a lot to learn from colleagues like Shah and others outside our field. The video below explains this further & provides a great overview of SoarOcean.

Video, post, other links.

Continue reading “Patrick Meier: Learning from Conservation UAV Campaigns — with Comment on 21st Century Neighborhood Watch, Alternative ISR, Citizen Intelligence”

Owl: Alternative Media is Winning — on 9/11 and More…

Advanced Cyber/IO, IO Impotency, Media
Who?  Who?
Who? Who?

Alternative Media is Winning

Is the tide finally turning, is the public becoming better informed despite the 24 hour-a-day propaganda onslaught of mainstream media produced by the 1%? It seems so, as this article implies that for the scions of the Establishment and the 1% and their propaganda organs to turn their attention to alternative media and independent research, that is, media and information not under the control of the 1% and their designated dupes, could only mean their mainstream media and information outlets are losing the war against the public's ability to find the truth about the global, regional and local machinations of the Elite, hence the new initiative underway, chronicled in this article, to attack and discredit alternative media under the loaded-term guise of “conspiracy theory.”

Continue reading “Owl: Alternative Media is Winning — on 9/11 and More…”

Berto Jongman: DARPA’s Four Big CyberSecurity Initiatives

Advanced Cyber/IO
Berto Jongman
Berto Jongman

DARPA unveils four ‘big' cybersecurity projects

The Defense Advanced Research Projects Agency is working on what it calls the “four big things” to protect U.S. military technology from hackers.

Cybersecurity is the latest big deal in military affairs. It's one of the few growing areas of the nation's defense budget at a time when most line items are shrinking, because of concerns about hacking by foreign powers.

The Justice Department on May 19 unveiled indictments against five Chinese military officials for spying on U.S. companies.

Here is a rundown of DARPA's “four big things:”

Continue reading “Berto Jongman: DARPA's Four Big CyberSecurity Initiatives”

Berto Jongman: Cyber Counterintellingence – From Theory to Practice

Advanced Cyber/IO
Berto Jongman
Berto Jongman

Cyber Counterintelligence: From Theory to Practice

Tripwire.com, 5 May 2014

In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were discussed. At the end of the discussion I pointed out that analysts must be critical of the data they evaluate as at any time it could be compromised.

Specifically, adversary actors could employ counterintelligence or deception type techniques to push analysts to draw wrong conclusions or discount the data entirely. In this article we will cover this topic of Cyber Counterintelligence (CCI) and discuss its two main branches: Offensive CCI and Defensive CCI.

Continue reading “Berto Jongman: Cyber Counterintellingence – From Theory to Practice”

Hunter Newby: Infrastructure Peering — A Physical Layer Understanding of Net Neutrality

Advanced Cyber/IO
Hunter Newby
Hunter Newby

Hunter Newby is the CEO of Allied Fiber, a carrier neutral provider of dark fiber with a national footprint addressing the lack of accessible dark fiber in the market by making it available for long term lease. He is a twelve year veteran of the telecom networking industry and has built a depth of creative and management experience and expertise in multiple disciplines within the field ranging from sales, marketing and technical aspects to network engineering and raising capital.

ROBERT STEELE: I encountered Hunter Newby in NYC where he was the opening speaker at LIBTCH NYC (I was the closing speaker). In all the years I have been focusing on cyber as the flip side of intelligence, I cannot think of a more energizing and inspiring package of intelligence and integrity combined with a concept I did not properly understand: dark fiber. Understood in Hunter's terms, this also changes our understanding of net neutrality — communities can opt-in to direct access to this dark fibre, and by-pass all intermediaries with enormous cost savings and bandwidth amplification.

Click on Image to Enlarge
Click on Image to Enlarge

We are going to start following this. Dark fiber is the carrier-neutral physical layer that is in theory without limit, which Hunter has very brilliantly arranged to run within the railroad right of ways across America. This is “root” for a Smart Nation on the cyber side. This is also what does not exist as a public or universal service. Below is the briefing he presented, followed by a selection of particularly interesting columns he has published before. A complete list of his prior columns is here.

Allied Fiber LLC Dark Fibre Briefing to LIBTECH NYC

See Especially:

Continue reading “Hunter Newby: Infrastructure Peering — A Physical Layer Understanding of Net Neutrality”

noble gold