Answers on OSINT for India 39: How Are Open and Closed Sources Related?

Sir, Which of these three assumptions is closest to your decades of experience? A. Open sources are richer than the closed sources. B. Open sources are as rich as the closed ones? C. Open sources are the chiseled-out bits of closed sources which when put together can tell us about the closed sources they owe …

Answers on OSINT for India 35: Should OSINT Technical Be Separate from OSINT Analysis?

Sir, Do you think it wise to distribute OSINT into two components- analytical vs technical. Technical here means all those tools and wares that help in analysis. It doent mean any alleged omnipotent search engine that searches every thing. For example, while ACH (Analysis of Competing Hypotheses) is an analytical method while the software that was …

Berto Jongman: US “Sovereign Citizens” As Top US Domestic Extremist Threat — Paper from George Washington Program on Extremism

Without Prejudice: What Sovereign Citizens Believe J. M. Berger When surveyed, United States law enforcement consistently ranks sovereign citizens as the top domestic extremist threat, even greater than that presented by homegrown jihadists. Despite the considerable size of the movement, estimated to include hundreds of thousands of adherents, few Americans know what sovereigns believe and …

Stephen E. Arnold: Machine Learning Bullshit — Web 3.0 Not . . .

The Building Blocks of Smart Software: Combine Them to Meet Your Needs I have a file of listicles. One called “Top 10 Algorithms in Data Mining” appeared in 2007. I spotted another list which is, not surprisingly, quite like the Xindong Wu et al write up. The most recent listing is “All Machine Learning Algorithms …