Berto Jongman: How Podesta Was Hacked

IO Impotency
Berto Jongman
Berto Jongman

This is the email that hacked Hillary Clinton’s campaign chief

A search on Wikileaks reveals the email that hackers sent to John Podesta, Hillary Clinton’s campaign chief.   . . .    The truth is that the breach of the Clinton campaign chief’s email did not require sophisticated hacking skills. It just depended on the right combination of human error and carelessness.

Read full article with image copies of emails and hacker code.

Stephen E. Arnold: Entity Extraction — HARD!

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Entity Extraction: No Slam Dunk

There are differences among these three use cases for entity extraction:

  1. Operatives reviewing content for information about watched entities prior to an operation
  2. Identifying people, places, and things for a marketing analysis by a PowerPoint ranger
  3. Indexing Web content to add concepts to keyword indexing.

Regardless of your experience with software which identifies “proper nouns,” events, meaningful digits like license plate numbers, organizations, people, and locations (accepted and colloquial)—you will find the information in “Performance Comparison of 10 Linguistic APIs for Entity Recognition” thought provoking. The write up identifies the systems which perform the best and the worst.

Read rest of post including links to five best and five worst.

Berto Jongman: Dan Harris on Eroding Human Intelligence Collection in the US Intelligence Community — Reflections on Intelligence Reform by Robert Steele

All Reflections & Story Boards, Government, Ineptitude, IO Impotency
Berto Jongman
Berto Jongman

The Consequences of Eroding Human Intelligence Collection

TheCIPHERBrief, November 2, 2016 | Dan Harris

The U.S. Intelligence Community’s (IC) clandestine human intelligence (HUMINT) services are experiencing an erosion of their core mission and values, with consequences to our current and future collection capability.   . . .   I believe the issue in the IC is not the need for a new service but the need for experienced mission-enablers, vice political loyalists, at the command level.  . . .   Former CIA Deputy Director Stephen Kappas spoke poignantly of this condition when he said he could find 100 Agency officers willing to risk their lives in a war zone, but could find not one willing to risk his/her career.

Continue reading “Berto Jongman: Dan Harris on Eroding Human Intelligence Collection in the US Intelligence Community — Reflections on Intelligence Reform by Robert Steele”

Antechinus: Lessons from Hillary Clinton’s Emails

Civil Society, Collective Intelligence, Commerce, Cultural Intelligence, Government, Ineptitude, IO Impotency
Antechinus
Antechinus

What I learned from visualizing Hillary Clinton’s emails

Political systems scale poorly. The most influential actors in them are spending a substantial fraction of their mental capacity thinking about how to communicate, and do not have the bandwidth needed to deal with many incoming messages. This is not surprising considering the large number of people they interact with. Our modern political world is one where a few need to interact with many, so they have no time for deep relationships — they physically cannot. So what we are left is with a world of first impressions and public opinion, where the choice of words matters enormously, and becomes central to the job. Yet, the chronic lack of time that comes from having a system where few people govern many.

Graphic, Comment, Links Below the Fold

Continue reading “Antechinus: Lessons from Hillary Clinton's Emails”

Berto Jongman: Cyber – James Bamford Questions Official Narrative — Russians Did Not Hack the Clinton Emails

IO Deeds of War, IO Impotency
Berto Jongman
Berto Jongman

Commentary: Don't be so sure Russia hacked the Clinton emails

By now, Obama should also be wise enough not to trust the advice of his spy chiefs when it comes to cyber conflict.  . . .   “I think the public believes that the U.S. government – Cyber Command, NSA, FBI, Homeland Security – has the capability to defend the electric power grid, pipelines, trains, banks that could be attacked by other nations through cyber,” Clarke told me. “The truth is the government doesn’t have the capability, doesn’t have the legal authority and doesn’t have a plan to do it.”   . . .   Starting with Vietnam, the list of wars the United States has entered with disastrous results continues to grow. Engaging Russia in a potentially endless cyberwar based on questionable evidence will only make it longer. It’s time to find better alternatives. 

Worth a Look: Black Box Voting — Ballot Tampering in the 21st Century

Corruption, Cultural Intelligence, Government, IO Impotency
Amazon Page
Amazon Page

Author Bev Harris is the 52-year old grandma who found 40,000 secret voting machine files on the Web, which have now been studied by computer scientists all over the world. “Black Box Voting” is the book that resulted from her investigations into the voting industry.

What she learned was that modern-day voting systems are run by private for-profit corporations, rely on a few cronies for oversight, using a certification system so fundamentally flawed that it allows machines to miscount and lose votes, with hidden back doors that enable “end runs” around the voting system. Find out why your vote might not count — and what to do about it!

Continue reading “Worth a Look: Black Box Voting — Ballot Tampering in the 21st Century”

Antechinus: Fraction Magic – the Mother of All Election Fraud Videos

Corruption, Cultural Intelligence, Government, IO Impotency
Antechinus
Antechinus

Fraction Magic Video

A real-time demo of the most devastating election theft mechanism yet found, with context and explanation. Demonstration uses a real voting system and real vote databases and takes place in seconds across multiple jurisdictions. Over 5000 subcontractors and middlemen have the access to perform this for any or all clients. It can give contract signing authority to whoever the user chooses. All political power can be converted to the hands of a few anonymous subcontractors.

“The motherload of election fraud”, Alex Jones.

See Also:

“Stolen Elections”: How “Easy-to-Hack Voting Machines” Endanger Democracy

 

noble gold