2015 Robert Steele – Foreword to Stephen E. Arnold’s CyberOSINT: Next Generation Information Access

Advanced Cyber/IO, IO Impotency, Software
Robert David Steele Vivas
Robert David Steele Vivas

Stephen E. Arnold, CyberOSINT: Next Generation Information Access (Harrods Creek, KY: Arnold Information Technology, 2015)

Memorable URL: http://tinyurl.com/Steele-CyberOSINT

Foreword

By Robert David Steele

In 1986, I was selected from the CIA’s clandestine service to help lead a pilot project to bring the CIA into the 21st Century. From that moment almost 30 years ago, I have been obsessed with open sources of information in all languages, mediums, and computer-aided tools for analysis—everything the
CIA does not utilize today. I took my cue in the mid-1980s from author Howard Rheingold,0 who explored how computers could be used to amplify human thought and communication, and the CIA Directorate of Intelligence team of Diane Webb and Dennis McCormick.1

Continue reading “2015 Robert Steele – Foreword to Stephen E. Arnold's CyberOSINT: Next Generation Information Access”

Sepp Hasslberger: Text When Grid Crashes

Access, Advanced Cyber/IO
Sepp Hasslberger
Sepp Hasslberger

This Handy Device Will Let You Send Text Messages Even After The Grid Crashes

Communicate without the need for any central connectivity — no Wi-Fi, cell towers or satellites needed. The gadget uses long-range radio waves — between 151-154 MHz — to send messages to other goTenna devices within its range. Depending on the surrounding terrain and elevation, the device can send messages up to 50 miles away. In the city, the range shrinks to roughly 1 mile.

Sepp Hasslberger: End of Servers II – Future of the Internet

Advanced Cyber/IO, Civil Society, Collective Intelligence, Cultural Intelligence, Ethics
Sepp Hasslberger
Sepp Hasslberger

They have been working on it for years and it seems ready to go now. I believe that the SAFE network could be our chance of re-making the internet from the bottom up, using our own resources instead of centralised servers for our data and our communications.

Project SAFE (Secure Access For Everyone) aims to create a decentralized and secure Internet 2.0 (here is a whitepaper). The SAFE Network is a secure and fully decentralized data management service. The network is made up from the unused computer resources provided by the network users.

Continue reading “Sepp Hasslberger: End of Servers II – Future of the Internet”

Stephen E. Arnold: Enterprise Search Does Not Work — Big Data? Useless to the Front Line Worker

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Enterprise Search: A Problem of Relevance to the Users

There is no fast, easy to use, stable, and helpful way to look for information on a couple of terabytes of local storage. The files are a mixed bag: Excels, PowerPoints, image and text embedded PDFs, proprietary file formats like Framemaker, images, music, etc.

See Also: Guide to Getting the Most Out of Your Unstructured Data

 

Nafeez Ahmed: CIA, Google, NSA, Goldman Sachs, the Highlands Forum, DoD, and More…

Advanced Cyber/IO, Commerce, Corruption, Government, IO Impotency, Military
Nafeez Ahmed
Nafeez Ahmed

How the CIA made Google

Inside the secret network behind mass surveillance, endless war, and Skynet—part 1

Why Google made the NSA

Inside the secret network behind mass surveillance, endless war, and Skynet—part 2

Continue reading “Nafeez Ahmed: CIA, Google, NSA, Goldman Sachs, the Highlands Forum, DoD, and More…”

Stephen E. Arnold: Enterprise Search — “Led” By Google — Is Severely Deficient

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Enterprise Search Lags Behind: Actionable Interfaces, Not Lists, Needed

EXTRACT

A Google results list with one ad, two Wikipedia item, pictures, and redundant dictionary links. Try this query “IBM Mainframe.” Not too helpful unless one is looking for information to use in a high school research paper.

Continue reading “Stephen E. Arnold: Enterprise Search — “Led” By Google — Is Severely Deficient”

Owl: For Military, Police, 1% – the Enemy is You

07 Other Atrocities, Corruption, Government, IO Impotency, Law Enforcement, Military
Who?  Who?
Who? Who?

The so-called “Internet of things” seems to mean a lot of things. But for the government, which executes the orders of the 1% of the 1%, it's primary value is to spy:

“As Daniel Taylor, of Old Thinker News, points out, the militarization and weaponization of the digital space has been a long time coming, and it might mutate into a conflict wide enough to involve you and your online activities. His article, “NSA Cyber War Will Use Internet of Things as Weapons Platform; Your Home is the Battlefield” argues:

Continue reading “Owl: For Military, Police, 1% – the Enemy is You”

noble gold