Search: United Nations Intelligence Training

Communities of Practice, Mobile, Peace Intelligence, Policies, Real Time, Searches, Threats, Topics (All Other), True Cost, United Nations & NGOs, Worth A Look

INTELLIGENCE is DECISION-SUPPORT.  The process of intelligence is separate from whether the sources and methods are secret or not.  There is nothing secret, unethical, or illegal about the process of intelligence as decision-support.

Original “Class Before One” (2010 Class 001 in Planning)

2007 United Nations “Class Before One” Infomation-Sharing and Analytics Orientation

Other references:


Continue reading “Search: United Nations Intelligence Training”

Worth a Look: Deep Web Multilingual Federated Search

Analysis, Commercial Intelligence, Communities of Practice, InfoOps (IO), Key Players, Methods & Process, Mobile, Policies, Real Time, Technologies, Threats

Deep Web Home Page
Deep Web Home Page

Deep Web Implements the Multilingual Search that Google Imagines

Donald A. DePalma 17 December 2009
Filed under (Translation & Localization, Translation Technologies)

In an interview with the U.K. newspaper The Daily Telegraph, Google vice president for search products Marissa Mayer challenged the readership to “Imagine what it would be like if there was a tool built into the search engine which translated my search query into every language and then searched the entire world’s websites.” We spoke with Abe Lederman, CEO of Deep Web Technologies, a technology supplier that already offers this multilingual search.

. . . . . . .

The bottom line: Multilingual search is not just a figment of Google’s imagination. It’s already here — you just have to dig a bit deeper to find it.

SANTA FE, N.M., Sept. 3, 2009 — Deep Web Technologies is proud to announce development of a prototype of a multilingual translation capability for clients using its federated search applications. An early prototype of multilingual searching was demonstrated to the members of the WorldWideScience Alliance in June of 2009. This new feature, when fully developed and implemented, will translate a user’s search query into the native language of the collections being searched, will translate result titles and snippets back to the user’s original language and aggregate and rank these results according to relevance. The translation process will be seamless, making it simple to search collections in multiple languages from a single search box in the native language of the user.

. . . . . .

Deep Web Technologies (http://www.deepwebtech.com) creates custom, sophisticated federated search solutions for clients who demand precise, accurate results. The tool of choice when needing to access the deep web, federated search performs real-time, parallel searches of multiple information sources, merging the results into one page. Serving Fortune 500 companies, the Science.gov Alliance (http://www.science.gov), the U.S. Dept. of Energy, the Dept. of Defense, Scitopia.org (http://www.scitopia.org), Nutrition.gov, WorldWideScience Alliance (http://www.worldwidescience.org) and a variety of other customers and partners, Deep Web Technologies has built a reputation as the “researcher’s choice” for its advanced, agile information discovery tools

Continue reading “Worth a Look: Deep Web Multilingual Federated Search”

Journal: Insurgents Hack U.S. Drones

04 Inter-State Conflict, 05 Civil War, 08 Wild Cards, 10 Security, Commerce, Commercial Intelligence, Ethics, Military, Mobile, Peace Intelligence, Real Time

Full Story Online
Full Story Online

Insurgents Hack U.S. Drones

$26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected

WASHINGTON — Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber — available for as little as $25.95 on the Internet — to regularly capture drone video feeds, according to a person familiar with reports on the matter.

Today, the Air Force is buying hundreds of Reaper drones, a newer model, whose video feeds could be intercepted in much the same way as with the Predators, according to people familiar with the matter. A Reaper costs between $10 million and $12 million each and is faster and better armed than the Predator. General Atomics expects the Air Force to buy as many as 375 Reapers.

logo cbs news
Full Story Online

Additional Insights from CBS News Beyond Wall Street Journal

The implications of the Predator's unencrypted transmissions have been known in military circles for a long time. An October 1999 presentation given at the Air Force's School of Advanced Airpower Studies in Alabama noted “the Predator UAV is designed to operate with unencrypted data links.”

A 1996 briefing by Paul Kaminski, an undersecretary of defense for acquisition and technology, may offer a hint about how the Iraqi's interception was done. Kaminski said that the military had turned to commercial satellites – “Hughes is the primary provider of direct (satellite) TV that you can buy in the United States, and that's the technology we're leveraging off of” – to share feeds from Predator drones.

Continue reading “Journal: Insurgents Hack U.S. Drones”

Journal: NRO, KR to AF, Open IC?, Piracy vs Piracy

Ethics, Government, Key Players, Policies, Real Time, Threats

Full Story Online
Full Story Online

Struggling Spy Satellite Agency Tries to Right Itself

National Defense January 2010

SAN ANTONIO, Texas – The National Reconnaissance Office, the agency responsible for developing and launching the U.S. fleet of spy satellites, is embarking on an ambitious plan to right itself after years of cost overruns and program cancellations.

But two powerful senators have opposed the office’s plans to launch the next generation of classified spacecraft. Personnel issues, namely a shortage of qualified personnel, may also impede progress.

Up To 56,000 More Contractors Likely For Afghanistan, Congressional Agency Says

The surge of 30,000 U.S. troops into Afghanistan could be accompanied by a surge of up to 56,000 contractors, vastly expanding the presence of personnel from the U.S. private sector in a war zone, according to a study by the Congressional Research Service.

Consumer group blasts White House's digital piracy pow-wow

Led by Vice President Joe Biden, the meeting “is the first of its kind, and will bring together all of the stakeholders to discuss ways to combat piracy in this rapidly changing technological age,” according to the White House.

On Tuesday morning, a prominent consumer advocacy group took the White House to task for the lopsided guest list of the meeting, which did not include “consumer or public-interest groups, technology companies, technology associations or Internet Service Providers.”

Open government could present a challenge to intelligence agencies

The release of the open government directive could change intelligence agencies' policies that deny Internet access to nonclassified data that is currently available only in hard copy or only to government personnel, say some Washington transparency advocates.

Continue reading “Journal: NRO, KR to AF, Open IC?, Piracy vs Piracy”

Journal: Four-Dimensional Digital Maps

Analysis, Budgets & Funding, Collaboration Zones, Communities of Practice, Ethics, Geospatial, Key Players, Methods & Process, Mobile, Policies, Real Time, Threats
Four Dimensional Digital Maps
Four Dimensional Digital Maps

The graphic can be enlarged.  Two key points:

1.  We are finally getting to where geospatial and functional data can be merged in near-real-time.

2.  Intelligence Online remains our only “must read”

The question that is NOT being addressed is this one:  What will it take to create an infinitely scalable and drillable digital map of the Earth, using open source software and open to all, to which all manner of data in all languages can be appended, validated, and integrated?

Journal: Dumb Crowd Sourcing–Good Start

Collaboration Zones, Communities of Practice, Key Players, Methods & Process, Mobile, Policies, Real Time, Threats
Full Story and Video Online
Full Story and Video Online

Pyramid scheme lets audience vote for climate solutions

A worldwide audience will decide the planet's fate in game-show format during the Copenhagen climate summit by suggesting and voting on climate solutions and how they will be funded.

Phi Beta Iota: This is exactly the right idea in the wrong venue with the wrong frame of reference.   We love it, it is a good start.  What they should be doing is creating a Global Range of Need Table that spans all ten high level threats to humanity, across all twelve core policy areas, with preference given to the eight major humanities.  See  Strategic Analytic Model and also Earth Intelligence Network.  Below is the two-pager circulating in United Nations and BRIC circles.

UN World Brain Institute and Global Game Talking Points (2 pages)

Journal: HP After Real-Time Mix and Match

Methods & Process, Real Time

PRESS RELEASE:  New Breadth of Data Virtualization Middleware and Services Now Available to Global Enterprises Facing Complex Information Challenges

Organizations today need the flexibility to break down existing information silos with both virtual and physical access to more timely and accurate information. This collaboration combines Composite’s data virtualization middleware and services with HP Business Intelligence Solutions to accelerate delivery of real-time intelligence for complicated supply chain, risk and customer environments.

Composite Software, with its Composite Information Server™, will provide customers with a means to virtually integrate critical enterprise data that resides outside their HP Neoview Advantage enterprise data warehouses. In combination, the two approaches—virtual data integration and physical data consolidation—enable enterprises to achieve significant cost reductions across their entire information infrastructure.