Stephen E. Arnold: Search Still Sucks

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

BA Insight and Its Ideas for Enterprise Search Success

I read “Success Factors for Enterprise Search.” The write up spells out a checklist to make certain that an enterprise search system delivers what the users want—on point answers to their business information needs. The reason a checklist is necessary after more than 50 years of enterprise search adventures is a disconnect between what software can deliver and what the licensee and the users expect. Imagine figuring out how to get across the Grand Canyon only to encounter the Iguazu Falls.   . . .    The reality is that even the most sophisticated search and content processing systems end up in trouble. Search remains a very difficult problem. Today’s solutions do a few things better than STAIRS III did. But in the end, search software crashes and burns when it has to:

Continue reading “Stephen E. Arnold: Search Still Sucks”

Steve Aftergood: Defending Against (Swarm) Drones

Drones & UAVs, Military
Steven Aftergood
Steven Aftergood

DEFENDING U.S. FORCES AGAINST ENEMY DRONES

Enemy use of unmanned aerial systems (UAS) is a growing threat to U.S. forces because of their low cost, versatility, and ease of use, according to a recent U.S. Army doctrinal publication. “The UAS is the most challenging and prevalent threat platform to combined arms forces and therefore, a logical choice for enemy use.” See Techniques for Combined Arms for Air Defense, Army Techniques Publication (ATP) 3-01.8, July 29, 2016.

As is the case with U.S.-operated drones, enemy UAS can be used to perform a range of functions from battlefield surveillance and targeting to precision strike, the Army document said. “The enemy will use UAS to fulfill multiple attack roles.” The drone may deliver a weapon or be used as a weapon itself. “As an indirect attack platform, the UAS has the ability to carry the improvised explosive device or become the improvised explosive device.” “Perhaps the most dangerous COA [course of action]… is the Swarm” in which “clusters of UAS” are used by an adversary simultaneously for surveillance, indirect attack and direct attack. What to do about this? The answer is not fully articulated in the Army manual.

Continue reading “Steve Aftergood: Defending Against (Swarm) Drones”

James Tracy: Electoral Fraud in Texas

Corruption, Government, IO Impotency
James Tracy
James Tracy

Reports of Potential Voting Trickery in 2016 Presidential Election

The experience of voters in Texas and other states may be bearing out Trump’s warning as multiple reports are surfacing of electronic voting machines changing virtual ballots from Republican to Democratic presidential candidates.

As The Economic Collapse Blog observes,

[A] number of voters in Texas are reporting that the voting machines switched their votes from Donald Trump to Hillary Clinton.

Continue reading “James Tracy: Electoral Fraud in Texas”

David Maxwell: U.S. Special Operations Forces in the Philippines, 2001–2014 (Rand)

05 Civil War, 08 Wild Cards, 09 Terrorism, Ethics, IO Deeds of Peace, Military, Officers Call, Peace Intelligence
David S. Maxwell
David S. Maxwell

Robinson, Linda, Patrick B. Johnston and Gillian S. Oak. U.S. Special Operations Forces in the Philippines, 2001–2014. Santa Monica, CA: RAND Corporation, 2016.

This report examines the 14-year experience of U.S. special operations forces in the Philippines from 2001 through 2014. The objective of this case history is to document and evaluate the activities and effects of special operations capabilities employed to address terrorist threats in Operation Enduring Freedom — Philippines through (1) training and equipping Philippine security forces, (2) providing operational advice and assistance, and (3) conducting civil–military and information operations. The report evaluates the development, execution, and adaptation of the U.S. effort to enable the Philippine government to counter transnational terrorist groups.

Table of Contents Below the Fold

Continue reading “David Maxwell: U.S. Special Operations Forces in the Philippines, 2001–2014 (Rand)”

David Maxwell: Partnership, Respect Guide U.S. Military Role in Philippines

05 Civil War, 09 Terrorism, Ethics, IO Deeds of Peace, Military, Officers Call, Peace Intelligence
David S. Maxwell
David S. Maxwell

Maxwell, David. “PARTNERSHIP, RESPECT GUIDE U.S. MILITARY ROLE IN PHILIPPINES,” World Politics Review, Feature Report on Economy of Force: Training U.S. Partner Militaries, February 5, 2013, pp. 16-19.

Any successes Operation Enduring Freedom-Philippines (OEF-P) may have achieved rest on five pillars. First, a thorough strategic to tactical assessment that informed the strategy and campaign plan, as well as continued assessment throughout the duration of the mission. Second, a deep understanding of unconventional warfare, and the ability to counter it with what is known as “foreign internal defense.” Third, established, long-term relationships and a sustained commitment over time by the U.S. military and U.S. country team. Fourth, respect for host-nation sovereignty and effective interagency collaboration. And fifth, support from conventional forces in key areas such as intelligence, communications, logistics, engineering, medical, aviation and additional personnel for individual staffs.

Continue reading “David Maxwell: Partnership, Respect Guide U.S. Military Role in Philippines”

Antechinus: iSucker – Big Brother Herds Fools Into Censorship Sites

IO Impotency, IO Secrets
Antechinus
Antechinus

iSucker: Big Brother Internet Culture

.gov is herding web sites into its own little DNS animal farms so it can properly protect the public from that dangerous ‘information' stuff in time of emergency. CloudFlare is the biggest abattoir… er, animal farm. CloudFlare is kind of like a protection racket. If you pay their outrageous fees, you will be ‘protected' from DDoS attacks. Since CloudFlare is the preferred covert .gov tool of censorship and content control (when things go south), they are trying to drive as many sites as possible into their digital panopticons.  Source: post #33 in comments by PavewayIV

 

 

Owl: False Flag Red Alert – Hillary Clinton Panics – Potential for Murders Intended to Frame Donald Trump and Twist Narrative with CNN Complicity

07 Other Atrocities, 09 Terrorism, Commerce, Corruption, Cultural Intelligence, Government, IO Deeds of War, Media
Who? Who?
Who? Who?

FALSE FLAG RED ALERT: Media plotting with Clinton operatives to gun down democrats and blame it on Trump

My widely-shared article predicting leftists bombings of government buildings was published several days before the GOP headquarters in North Carolina was firebombed by violent leftists. In my original story entitled VOTERS WARNED: You've already lost America… this election is about taking it back in the last non-violent way possible, I wrote, “As all this is going down, you should fully expect violent, extremist leftist to be setting bombs all over the place, with funding for the bombs coming from George Soros, the key funding source of domestic terrorism in America.”

The media's radically one-sided promotion of Hillary Clinton coupled with extremely biased attacks on Donald Trump only confirm to tens of millions of Americans that the system is entirely rigged against them.

Continue reading “Owl: False Flag Red Alert – Hillary Clinton Panics – Potential for Murders Intended to Frame Donald Trump and Twist Narrative with CNN Complicity”

noble gold