Journal: What to do with all this data?

Analysis, Commerce, Commercial Intelligence, Earth Intelligence, Government, InfoOps (IO), Intelligence (government), Methods & Process, Mobile, Real Time
Marjorie Hlava Taxodiary Home

October 15, 2010
Posted in Business strategy, News, indexing, metadata

October 15, 2010 – Large institutions have massive amounts of data in this modern age, the question is what to do with all of it. Extracting the right information can help avoid waste, delays, systems failures, even terrorist threats. A perfect example is Toyota’s customer support and repair data. If business intelligence had been applied and management had been looking, they would have noticed that something was going terribly wrong.

NewsBreak brought this to our attention in their article, “Search and Business Intelligence: The Humble Inverted Index Wins Again.” Business intelligence means mining through all that digital data—in legacy systems, databases, and even spreadsheets—and reporting what’s going on. Institutions with all that data know its value. When implemented well, business intelligence can be a huge success to all involved.

Melody K. Smith

Sponsored by Access Innovations, the world leader in thesaurus, ontology, and taxonomy creation and metadata application.

Phi Beta Iota: The two graphics below, one from the 1990's the other very recent, sum up all that governments and businesses simply do not get, do not practice, and do not leverage.  Dashboards, like Smart Phones, are fairly stupid.  Existing “data mining” systems do not adapt, scale, or make sense in relation to externalities.  It takes humans to do that, and not geek IT humans but rather all-source holistic analytics humans.  We have a ways to go.

Graphic: Four Quadrants J-2 High Cell SMS Low

Graphic: OSINT and Full-Spectrum HUMINT (Updated)

Journal: US Travel Alert–Political and Fraudulent?

08 Wild Cards, 09 Terrorism, 10 Security, 11 Society, Corruption, Government, Intelligence (government), Media, Methods & Process, Misinformation & Propaganda, Officers Call

History:

1)  9-11 known to have been at a minimum allowed to happen.

9-11 Truth Books & DVDs (29)

2)  CIA known to have sponsored terrorism in Philippines, Indonesia, Viet-Nam, and Italy as pretext.

Review: Edward Lansdale’s Cold War (Culture, Politics, and the Cold War) (Paperback)

Reference: US Responsibility for Atrocities in Indonesia

3)  Underpants Bomber very likely to have been a US-Israeli deception operation against the US public and Congress (never mind the Constitution, Bush-Cheney buried it, Obama-Biden have carried on in that tradition).

Journal: Underpants Bomber Saved Worthless NCTC [with other links]

Current Situation:

1)  This rumor has been around before; and the chatter sounds American in origin.

December 20, 2009 Police expect Mumbai-style terror attack on City of London

2)  This time, the “threat” is based on a single US-controlled captive being held in Afghanistan.

Thursday, 30 September 2010 Mumbai-style commando raid plan ‘uncovered in Pakistan'

3)  The threat appears to have been originally aimed at silencing critics of the widespread drone attacks inside Pakistan.

Wed Sep 29 Terror plot in Europe prompted drone strikes

4)  British reinforcement of the US claims suspect

Al Qaida's Mumbai-style attack plot could have been hatched in Rochdale

Our group bottom line: Not even close.  This is very likely a fraud, most certainly over-reaction hyped for political purposes, and the evidence has not been collected, processed, analyzed, and presented properly.    This is bogus.  What is really scary is that in order to “prove” it, a crime against humanity may be ordered, a bombing or shooting spree of sorts using either a false flag recruit set in motion by covert action operators, or a bombing by a contractor such as Xe/Blackwater.

Journal: Inspirational Personal Story

11 Society, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Methods & Process, Military, Officers Call

Full Story Online

Wounded in Iraq, double-amputee returns to war

ASHOQEH, Afghanistan – When a bomb exploded under Dan Luckett's Army Humvee in Iraq two years ago — blowing off one of his legs and part of his foot — the first thing he thought was: “That's it. You're done. No more Army for you.”

But two years later, the 27-year-old Norcross, Georgia, native is back on duty — a double-amputee fighting on the front lines of America's Afghan surge in one of the most dangerous parts of this volatile country.

Luckett's remarkable recovery can be attributed in part to dogged self-determination. But technological advances have been crucial: Artificial limbs today are so effective, some war-wounded like Luckett are not only able to do intensive sports like snow skiing, they can return to active duty as fully operational soldiers. The Pentagon says 41 American amputee veterans are now serving in combat zones worldwide.

Phi Beta Iota: This is inspirational, plain and simple.  Our objective, within the Earth Intelligence Network (EIN), is to eventually build the Open Source Center, the Multinational Decision Support Centre, and the global multinational information sharing and sense-making grid, around war veterans who have lost a limb or two.

See Also:

Journal: Underpants Bomber Saved Worthless NCTC

09 Terrorism, 10 Security, Government, Intelligence (government), Methods & Process, Misinformation & Propaganda
Marcus Aurelius Recommends

3 Ways the Underwear Bomber Changed Counterterrorism

December 25, 2009 was a pivotal day for U.S. counterterrorism. Although the airline bombing failed, the reverberations from the attempt are still being felt. Here’s how this incident changed U.S. counterterrorism policy, as told by Mike Leiter, the director of the National Counterterrorism Center.

Popular Mechanics By Joe Pappalardo   September 16, 2010 2:30 PM

Deaf Leading the Blind

1) The incident saved the  Counterterrorism Center's budget.

2) New teams were formed to  chase leads, not write reports.

3) The failed  attack focused the Obama administration on  counterterrorism.

Phi Beta Iota: Click on the photo for the full story at Popular Mechanics.  Above we just list the three “ways,” each of them a perfect outcome for a fraudulent staged “threat” that was almost certainly concocted with Israeli help.  Until the guy video-taping the whole thing from in front is produced, our professional judgment is that the Underpants Bomber was an agent of the US Government doing precisely what this worthless activity wanted: give it a reason, however absurd, to keep on being worthless.   [Covert Operations against a US audience are illegal, but who cares about the Constitution or laws, these days?] NCTC's leader, a decent well-intentioned politically-appointed lawyer who knows nothing relevant, is the poster child for what is wrong with the entire US national security domain.

See Also:

Journal: Underpants Bomber Shines Light on Naked USG–Without Four Reforms, USA Locked in Place

Journal: National Counterterrorism Center (NCTC) Goes from Dumb to Dumber

Journal: The Plot Thickens–Who Benefits?

Journal: Who Over-Rode State to Allow Xmas Bomber?

Journal: Who, Exactly, is Behind Burning Koran?

Journal: Director of National Intelligence Alleges….

Journal: CIA Leads the “Walking Dead” in USA

Journal: CIA’s Poor Tradecraft AND Poor Management

Review: Willful Neglect–The Dangerous Illusion of Homeland Security

Reference: The Open Source Century LINK FIXED

Articles & Chapters, InfoOps (IO), Intelligence (government), International Aid, IO Multinational, IO Sense-Making, Methods & Process
Free Full Access to Feature Article on The Open Source Century

LINK FIXED. Publisher version truncated halfway through, now links to a pdf of all five pages.  Certainly worth a read, including between the lines.  Our critical comments, and the history of opposition, remain extant.

Phi Beta Iota: We missed it but our network did not.  With thanks to one of the 800+ folks that stay in touch, and with thanks to the editors of the World Politics Review, we provide here, by special permission, free full access to the feature article byMICHAEL J. MAZAAR

The Open-Source Century: Information, Knowledge and Intelligence in the 21st Century

Free Full Access Trial Subscription

At the logo below anyone can sign up for a free 30-day trial with full access to a broad range of products and services from World Politics Review.  We thank them for their professional courtesy and recommend them to one and all.

See Also:

2010: Human Intelligence (HUMINT) Trilogy Updated

Search: The Future of OSINT [is M4IS2-Multinational]

2009 DoD OSINT Leadership and Staff Briefings

2008 IJIC 21/3 The Open Source Program: Missing in Action

2005 Steele to Hayden Asking for Naquin Cease & Desist

2004 Modern History of Public Intelligence and the Opposition

Journal: Chuck Spinney on Deadly Games of Deceit

09 Justice, 10 Security, 11 Society, Corruption, Cultural Intelligence, Government, Intelligence (government), Methods & Process, Military, Officers Call, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy
Chuck Spinney On the Record

The linked article by William Pfaff illustrates how the Pentagon set up Mr. Obama to do its bidding.

Full Story Online

Are Obama’s Hands Tied?

28 September 2010

By William Pfaff

A splendid and courageous new book, Washington Rules: America’s Path to Permanent War, by Andrew J. Bacevich of Boston University (and for many years previously, the U.S. Army), describes with lucidity the degree to which the power of the American presidency over war and peace has been weakened in our day, and, in important respects, superseded.

One might call this a silent coup against the presidency, but a coup implies intention: a responsible actor who sets the coup d’etat into action for a defined purpose. The argument Bacevich makes implies that a coup can be institutional or intellectual, and come from outside as well as inside government. Its characteristic is to create a situation in which a president is no longer free to act as he might wish, because all of the doors except one have been closed.

Read Rest of Original Article

Chuck Spinney's Original Comments Continued

The name of the bureaucratic game, of course, is to remove all realistic alternatives to the Pentagon's preferred decision before that decision is made. Pfaff's discussion is based on Andrew Bacevich's new book “Washington Rules.” I have not read Bacevich's book yet, and will not be able to until I return to the states in November, but I have read several reviews and from that perspective can say that the behaviour Pfaff describes comports well with behavior I witnessed in my years in the Pentagon.

The picture is more subtle and far more complicated than that portrayed by Pfaff, however.

Continue reading “Journal: Chuck Spinney on Deadly Games of Deceit”

Journal: Huffington Post Hot on Trail of Spy Money Allegedly Paid to Wikileaks

Blog Wisdom, Intelligence (government), Misinformation & Propaganda
Story Plus Emails Online

29 September 2010


The Huffington Post Spying Game

Cryptome was interviewed by telephone today by Keith Thomson, a reporter for The Huffington Post. After a bit of palaver Keith said a confidential source claimed a Chinese spy agency had given Wikileaks $20 million. What did Cryptome think about that?

We said that kind of money is usually given by spy agencies to publications like The Huffington Post rather than an offbeat like Wikileaks. Could be, though: according to reports Wikileaks has joined with major publications to provide the kind of information for which spies would pay $20 million.

Read full note, additional speculation, and see emails online.

Phi Beta Iota: We seriously doubt the Chinese are giving money to Wikileaks.  They are good enough to have penetrated it without permission, and realistically, there just is not much there.