Stephen E. Arnold: A Fresh Look at Big Data & Big Data (-) Human Factor (+) Transformation (+) RECAP

A Fresh Look at Big Data May 8, 2013 Next week I am doing an invited talk in London. My subject is search and Big Data. I will be digging into this notion in this month’s Honk newsletter and adding some business intelligence related comments at an Information Today conference in New York later this …

Marcus Aurelius: The Cyber-Dam Break — “Blame It On China” Goes Into High Gear

The Cyber-Dam Breaks Sensitive Army database of U.S. dams compromised; Chinese hackers suspected BY: Bill Gertz The Washington Free Beacon, May 1, 2013 U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. The compromise of the U.S. Army Corps …

Berto Jongman: cyber pearl harbor panel discussion – 22 Years Late

Panel Talks About Detecting, Thwarting Cyber Attack Space Foundation, 04/08/2013 Can the U.S. detect, thwart and respond to a cyber offensive that would leave our nation vulnerable to other, possibly more conventional, offensive efforts? Visions of a “Cyber Pearl Harbor” are forcing decision makers to take steps to avoid such a calamity. Read more.

Review: Global Trends 2030 – Alternative Worlds [Paperback, Well Priced]

National Intelligence Council, Office of the Director of National Intelligence (DNI/NIC) 3.0 out of 5 stars $75 Billion a Year and This is the Poster Child for the Public, March 26, 2013 Certainly worth reading, along with other and generally better reports linked below, but a huge disappointment. There is nothing here actually useful to …

Berto Jongman: Defense Science Board Report on Baby Steps Toward Resilient Military C4I Systems

Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat EXTRACT After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent …

John Robb: Cyber-War with China — Wrong Answer (and Robert Steele with Better Answer)

Cyber Deterrence against China? The only route left is an Open Source Approach Is there a way to deter cyber attacks? Yes. Two ways. One takes a moral high ground. I won’t waste any time discussing that option. Why? After flame/stuxnet, and the unilateral escalation of the cyberweapons arms race by the US, that option …