Eric Kant: NGA Disparate Data Challenge Winning Solution within Stage 1 of the Competition

Advanced Cyber/IO, Geospatial
Eric Kant
Eric Kant

The National Geospatial-Intelligence Agency (NGA) Disparate Data Challenge encourages participants to offer solutions that can demonstrate effective capabilities that enable access to data that is wildly disparate in its formats, schemas, interfaces and locations, so that it may be available for search, business metrics and data and information analytics.

Here is our submittal to NGA that was selected within Stage 1 of the competition.

PDF of the demo screens.
YouTube Video.

Continue reading “Eric Kant: NGA Disparate Data Challenge Winning Solution within Stage 1 of the Competition”

Berto Jongman: How Podesta Was Hacked

IO Impotency
Berto Jongman
Berto Jongman

This is the email that hacked Hillary Clinton’s campaign chief

A search on Wikileaks reveals the email that hackers sent to John Podesta, Hillary Clinton’s campaign chief.   . . .    The truth is that the breach of the Clinton campaign chief’s email did not require sophisticated hacking skills. It just depended on the right combination of human error and carelessness.

Read full article with image copies of emails and hacker code.

Stephen E. Arnold: Entity Extraction — HARD!

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Entity Extraction: No Slam Dunk

There are differences among these three use cases for entity extraction:

  1. Operatives reviewing content for information about watched entities prior to an operation
  2. Identifying people, places, and things for a marketing analysis by a PowerPoint ranger
  3. Indexing Web content to add concepts to keyword indexing.

Regardless of your experience with software which identifies “proper nouns,” events, meaningful digits like license plate numbers, organizations, people, and locations (accepted and colloquial)—you will find the information in “Performance Comparison of 10 Linguistic APIs for Entity Recognition” thought provoking. The write up identifies the systems which perform the best and the worst.

Read rest of post including links to five best and five worst.

Berto Jongman: Dan Harris on Eroding Human Intelligence Collection in the US Intelligence Community — Reflections on Intelligence Reform by Robert Steele

All Reflections & Story Boards, Government, Ineptitude, IO Impotency
Berto Jongman
Berto Jongman

The Consequences of Eroding Human Intelligence Collection

TheCIPHERBrief, November 2, 2016 | Dan Harris

The U.S. Intelligence Community’s (IC) clandestine human intelligence (HUMINT) services are experiencing an erosion of their core mission and values, with consequences to our current and future collection capability.   . . .   I believe the issue in the IC is not the need for a new service but the need for experienced mission-enablers, vice political loyalists, at the command level.  . . .   Former CIA Deputy Director Stephen Kappas spoke poignantly of this condition when he said he could find 100 Agency officers willing to risk their lives in a war zone, but could find not one willing to risk his/her career.

Continue reading “Berto Jongman: Dan Harris on Eroding Human Intelligence Collection in the US Intelligence Community — Reflections on Intelligence Reform by Robert Steele”

Antechinus: Lessons from Hillary Clinton’s Emails

Civil Society, Collective Intelligence, Commerce, Cultural Intelligence, Government, Ineptitude, IO Impotency
Antechinus
Antechinus

What I learned from visualizing Hillary Clinton’s emails

Political systems scale poorly. The most influential actors in them are spending a substantial fraction of their mental capacity thinking about how to communicate, and do not have the bandwidth needed to deal with many incoming messages. This is not surprising considering the large number of people they interact with. Our modern political world is one where a few need to interact with many, so they have no time for deep relationships — they physically cannot. So what we are left is with a world of first impressions and public opinion, where the choice of words matters enormously, and becomes central to the job. Yet, the chronic lack of time that comes from having a system where few people govern many.

Graphic, Comment, Links Below the Fold

Continue reading “Antechinus: Lessons from Hillary Clinton's Emails”

Mongoose: Two False Flag Attacks — One in Iraq, One in USA

07 Other Atrocities, Corruption, Government, IO Deeds of War, Law Enforcement, Media, Officers Call
Mongoose
Mongoose

False flag: Baghdad car bomb attack faked

Middle East Monitor, 3 November 2016

If true, this would represent an example of a “false flag” operation designed to demonise a segment of Iraq's social fabric in order to continue a policy ..

Donald Trump Supporters Raise $124k+ for Burned Down Black Church

Regated, 2 November 2016

False flag arson. I'm sure it will turn out that … Democrats burn it down to create false flag event, and Trump supporters rebuild it. Making the Church …

Continue reading “Mongoose: Two False Flag Attacks — One in Iraq, One in USA”

noble gold