Owl: Alternative Media is Winning — on 9/11 and More…

Advanced Cyber/IO, IO Impotency, Media
Who?  Who?
Who? Who?

Alternative Media is Winning

Is the tide finally turning, is the public becoming better informed despite the 24 hour-a-day propaganda onslaught of mainstream media produced by the 1%? It seems so, as this article implies that for the scions of the Establishment and the 1% and their propaganda organs to turn their attention to alternative media and independent research, that is, media and information not under the control of the 1% and their designated dupes, could only mean their mainstream media and information outlets are losing the war against the public's ability to find the truth about the global, regional and local machinations of the Elite, hence the new initiative underway, chronicled in this article, to attack and discredit alternative media under the loaded-term guise of “conspiracy theory.”

Continue reading “Owl: Alternative Media is Winning — on 9/11 and More…”

Patrick Meier: Humanitarian UAV Strategy

Drones & UAVs
Patrick Meier
Patrick Meier

Humanitarian UAV Network: Strategy for 2014-2015

The purpose of the Humanitarian UAV Network (UAViators) is to guide the responsible and safe use of small UAVs in humanitarian settings while promoting information sharing and enlightened policymaking. As I’ve noted in the past, UAVs are already being used to support a range of humanitarian efforts. So the question is not if, but rather how to facilitate the inevitable expanded use of UAVs in a responsible and safe manner. This is just one of many challenging questions that UAViators was created to manage.

UAViators has already drafted a number of documents, including a Code of Conduct and an Operational Check-List for the use of UAVs in humanitarian settings.

Read full post.

Hal Berghel: Comments on Intelligence Leadership, Moral Hazards, Manning, Snowden, & Wikileaks

Commerce, Ethics, Government, IO Impotency
Hal Berghel
Hal Berghel

Leadership Failures in the National Security Complex

Current NSA forecast: continued Snowden flurries with no end in sight. No one blames the hardworking NSA employees for the latest series of gaffes: it’s the feckless leadership and the politics that got them there that are responsible for our current difficulties

PDF (4 Pages): Hal on Leadership 6-14

Continue reading “Hal Berghel: Comments on Intelligence Leadership, Moral Hazards, Manning, Snowden, & Wikileaks”

Berto Jongman: DARPA’s Four Big CyberSecurity Initiatives

Advanced Cyber/IO
Berto Jongman
Berto Jongman

DARPA unveils four ‘big' cybersecurity projects

The Defense Advanced Research Projects Agency is working on what it calls the “four big things” to protect U.S. military technology from hackers.

Cybersecurity is the latest big deal in military affairs. It's one of the few growing areas of the nation's defense budget at a time when most line items are shrinking, because of concerns about hacking by foreign powers.

The Justice Department on May 19 unveiled indictments against five Chinese military officials for spying on U.S. companies.

Here is a rundown of DARPA's “four big things:”

Continue reading “Berto Jongman: DARPA's Four Big CyberSecurity Initiatives”

Mongoose: Snowden on US IC Security – Non-Existent – NSA Has No Idea What I Took and Zero Control Over Its Files

IO Impotency, IO Secrets
Mongoose
Mongoose

NBC News Exclusive with Brian Williams: Inside the Mind of Edward Snowden

In a wide-ranging and revealing interview, Brian Williams talks with former NSA contractor Edward Snowden about the global impact and debate sparked by his revelations.

EXTRACT:

“I will say the 1.7 million documents figure that the intelligence community has been bandying—about—the director of N.S.A. himself, Keith Alexander said just a week ago in the Australian Financial Times, or Australian Financial Review I believe—that they have no idea what documents were taken at all. Their auditing was so poor, so negligent, that any private contractor, not even — an employee of the government, could walk into the N.S.A. building, take whatever they wanted, and walk out with it and they would never know. Now, I think that’s a problem. And I think that’s something that needs to be resolved, and people need to be held to account for, has it happened before? Could it happen again?”

Read full article with many video clips.

See Also:

The Government-Corporate Complex: Surveillance for the Money

Yoda: Mary Meeker’s Internet Report 2014 — Explosion in Hand-Helds and Data — Less Than 1% of Data Analyzed

IO Impotency
Got Crowd? BE the Force!
Got Crowd? BE the Force!

Tools good, analysis not.

Mary Meeker’s 2014 internet trends report: all the slides plus highlights

PDF (164 Pages): Internet Trends Report 2014 (Mary Meeker)

Five slides below the fold.

Continue reading “Yoda: Mary Meeker's Internet Report 2014 — Explosion in Hand-Helds and Data — Less Than 1% of Data Analyzed”

Berto Jongman: Big Data – 20 Tutorials

IO Tools
Berto Jongman
Berto Jongman

20 short tutorials all data scientists should read (and practice)

Vincent Granville

DataScienceCentral, 15 February 2014

We are now at 20, up from 17. I hope I find the time to write a one-page survival guide for UNIX, Python and Perl. Here's one for R. The links to core data science concepts are below – I need to add links to web crawling, attribution modeling and API design. Relevancy engines are discussed in some of the tutorials listed below. And that will complete my 10-page cheat sheet for data science. 

Here's the list:

Continue reading “Berto Jongman: Big Data – 20 Tutorials”