Stephen E. Arnold: Time as Analytic Factor — Recorded Future, Google, and CyberOSINT

Advanced Cyber/IO, IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Recorded Future: Google and Cyber OSINT

EXTRACT: CyberOSINT relies on automated collection, analysis, and report generation. In order to make sense of data and information crunched by an NGIA system, time is a really key metatag item. To figure out time, a system has to understand: 1) The date and time stamp; 2) Versioning (previous, current, and future document, data items, and fact iterations); 3) Times and dates contained in a structured data table; 4) Times and dates embedded in content objects themselves; for example, a reference to “last week” or in some cases, optical character recognition of the data on a surveillance tape image. Learn more.

See Also: Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele

Stephen E. Arnold: Autonomy – Leader of a Sorry Pack

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Autonomy: Leading the Push Beyond Enterprise Search

In “CyberOSINT: Next Generation Information Access,” I describe Autonomy’s math-first approach to content processing. The reason is that after the veil of secrecy was lifted with regard to the signal processing`methods used for British intelligence tasks, Cambridge University became one of the hot beds for the use of Bayesian, LaPlacian, and Markov methods.

Continue reading “Stephen E. Arnold: Autonomy – Leader of a Sorry Pack”

Owl: John Robb on ISIS as Violence Entrepreneur, Russia Using ISIS to Take Down Saudi Arabia and Lift Oil Prices

06 Russia, 08 Wild Cards, IO Deeds of War
Who?  Who?
Who? Who?

John Robb examines how a Wahabi state such as Saudi Arabia can be taken down by super-Wahabi violence entrepreneur ISIS, with a little help from their friends in Russia, or more specifically, the Russian mafia's hacker legions.  What is unique about his most recent analysis is insisting that the amount of money to be gained by ISIS from conquest of Saudi Arabia would be utterly astronomical, due to their oil resources. Expertise implemented by Russian hackers, with the blessing of the Russian government, who both would be wildly enriched in taking down Saudi communications, would be indispensable in insuring this war would succeed against Saudi Arabia.The hacker's fees would be gigantic and Russia's oil revenue would rebound if ISIS took over the Saudi oil industry.

Continue reading “Owl: John Robb on ISIS as Violence Entrepreneur, Russia Using ISIS to Take Down Saudi Arabia and Lift Oil Prices”

Yoda: End of Servers III – BitTorrent Maelstrom — Open Power Beginning to Rock!

Advanced Cyber/IO, Civil Society, Ethics
Got Crowd? BE the Force!
Got Crowd? BE the Force!

BitTorrent Tests Websites Hosted in the Crowd, Not the Cloud

An experimental browser shows how peer-to-peer technology can serve up entire websites, not just individual files.

An experimental new Web browser makes it possible for sites to be hosted not on a company’s servers but, instead, by a shifting crowd of individuals on their personal computers. That turns the usual approach to serving up websites on its head and could provide a more effective and reliable way to disseminate bulky media files or distribute vital information in the event of natural disaster.

Continue reading “Yoda: End of Servers III – BitTorrent Maelstrom — Open Power Beginning to Rock!”

Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy

Advanced Cyber/IO, Cultural Intelligence, Ethics, Government, IO Impotency
Martin Petersen
Martin Petersen

What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers

Martin Petersen, Studies in Intelligence, 2011

PDF (8 Pages): Petersen-What I Learned-20Apr2011

Policymakers do not always see how we can help them.

Continue reading “Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy”

Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele

Advanced Cyber/IO, IO Impotency
Click on Image to Enlarge
Click on Image to Enlarge

An Arnold IT CORE Report for Law Enforcement, Security and Intelligence Professionals and Organizations

This monograph has a single goal: Provide a Contracting Officer (CO) or Contracting Officer's Technical Representative (COTR) — or the end-user engaged in investigatory work, military operations, and intelligence activities — with a collection of technology capability summaries about companies building next-generation tools…critical insights that could save millions in mis-placed capitalization.

“CyberOSINT is the first discussion of the innovative software that makes sense of the flood of open source digital information. Law enforcement, security, and intelligence professionals will find this an invaluable resource to identify automated ways to deal with Big Data.”

– Dr. Jerry Lucas, President, Telestrategies ISS

Table of Contents with topics covered and companies profiled below the line along with full-text of the Foreword by Robert Steele and Preface by Stephen Arnold.

Continue reading “Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele”

noble gold