. Two weeks ago, attracted an
ARDA-sponsored research that the intelligence pointing to an interest, social
networks via data mining to analyze, stir in the press and weblogs.
The blogs also have a greater importance for military and intelligence
services, had already declared the CIA and the Open Source Center. This is confirmed by a new three-year
research program of the U.S. Air Force Office of Scientific Research
(AFOSR), entitled Automated Ontologically-Based Link
Analysis of International Web Logs for the Timely Discovery of Relevant
and Credible Information. .
Blogs (and social networks) are interesting for several reasons.
The accumulation of links and
reciprocal links in weblogs to events and information relating to
individuals, groups, political statements, which are also in the focus
of the services and the military can serve as an indicator of what could
become relevant for military and intelligence measures ("Situation
Awareness"). Already the FutureMap
program of the Terrorist
Information Awareness project was aimed at by the analysis of
information statements on future developments and likely take you to
heterogeneous. As
weblog authors have a different perspective on events, etc., can contain
Blogs perspectives, lacking the secret service and military analysts
characterized. As
weblogs, if you can serve them as a means of counter-public and
"grassroots" sees activism as a platform and medium for groups - from
peace activists and NGOs to terrorist organizations - who are on the
networks, the group identity is strengthened and joint objectives are
staked to provide Weblogs are a potential breeding ground for political
movements, which are undesirable from political and economic
Interessenskreisen and therefore deserve a monitoring by military and
intelligence agencies. . In this context, especially political
Webblogger are interesting to acquire a high degree of trust and
influence in the blogosphere, and thus may be undesirable or connecting
opinion leaders punk for the formation of informal networks.
And finally should weblogs
or "hot topics" that communicates to them in, bases for all civilian and
military intelligence departments be welcome, the MediaOps
- and misinformation
develop and launch campaigns. . If
in blogs such as the massacre at Haditha, or the torture in Abu Ghraib
program is treated extremely critical and massive, it makes sense to
respond to this with appropriate counter campaign, while one can give
issues like the Israeli offensive in the Gaza Strip a lower priority
where it is silent is the blogosphere. . The new
AFOSR research program is part of the broader Information
Forensics and Process Integration research project, at Syracuse
University in New York will be carried out, among other things. Programs and projects are supported by the AFOSR
Directorate of Mathematics and Information Sciences conducted. It
was triggered by a study of the U.S. National Research Council.
. The
research will initially focus on three areas: Detecting and Identifying
incomplete information, the development of interactive interfaces and
query interfaces for erkenntnisgesteuerte data processing. In a further step, research
projects follow from 2007 for information management. Under "actionable"
information AFOSR understands the information, the action consequences
for military and intelligence authorities being taken, for example, if
the information contains information about crime or attack plans,
although already communicated, but has not yet been executed (see
FutureMap) . The "network effect" is
used really only Effiziensteigerung of networks such as the global,
military and intelligence services Global
Information Grid (GIG) , the extension end is not and in which the
NSA key role is, and ensuring its scalability and the improvement of the
common information between all connected intelligence, law enforcement
and military authorities.
The
GIG is a network of networks – a complex system that links hundreds of
information system elements to enable the rapid exchange of information
among the US services, the Intelligence Community (IC), and
multinational allies. The GIG is a network of networks - a
complex system that links hundreds of information services system
elements to enable the rapid exchange of information among the U.S., the
Intelligence Community (IC), allies and multinational. The
GIG involves more than just technology. The technology involves
more than just GIG. Rather, it is a globally connected, end-to-end
set of information capabilities, associated processes, and personnel for
collecting, processing, storing, disseminating, and managing
information on demand. Rather, it is a globally connected,
end-to-end set of information capabilities, associated processes, and
personnel for collecting, processing, storing, disseminating, and
managing information on demand. It comprises most of the DOD's information
systems, software, and services, and supports the DOD and IC in peace
time and during conflicts. It comprises most of the DOD's
information systems, software, and services, and supports the DOD and IC
in peacetime and during conflicts.
The
GIG is a reality today. The GIG is a reality today.
The
Edge: How the Global Information Grid Is Transforming Communications for
the Warfighter. The Edge: How the Global Information Grid Is
Transforming Communications for the Warfighter. This individual
networks or the GIG as the "network of networks" are effective, "must
identify actionable" information in a timely and treffgenau and are
redistributed throughout the network. One of the sources from which "may
result actionable" information, just the weblog.
Information
Management and Process Integration Information Management and
Process Integration Military plans and operations benefit from
heightened situational awareness and the real-time projection of
expertise into and out of the battlefield. Military plans and
operations benefit from heightened situational awareness and the
real-time projection of expertise into and out of the battlefield.
In
future battle spaces, vast numbers of sensors and unmanned vehicles will
be in simultaneous use, each with different sensing capabilities
providing disparate views of the operations around, above, and below.
In future battle spaces, vast numbers of sensors and unmanned vehicles
will be in simultaneous use, each with different sensing capabilities
providing disparate views of the operations around, above, and below.
Networked
operations and extensive reach back capabilities will enable a paradigm
shift from passive data collections to active interrogation and
instantaneous, synchronized exploitation of actionable information.
Networked operations and extensive reach back capabilities will enable a
paradigm shift from passive to active interrogation data collections
and instantaneous, synchronized exploitation of actionable information.
Both
the recognition and authoritative communication of actionable
information requires tight integration of planning and collection
processes so what is relevant and what is knowable can be readily
negotiated. Both the recognition and authoritative communication
of actionable information requires tight integration of planning and
collection processes so what is relevant and what is knowable can be
readily negotiated. Potential topics include: Potential
topics include:
- Techniques that process/manage semi-structured
content for data modeling, querying, routing, execution, and
visualization; techniques that deconstruct the composition of discovered
information and discern the intent of the author and target audience
and the implied value of data as depicted in the composition;
Techniques that process / manage content for semi-structured data
modeling, querying, routing, execution, and visualization; techniques
that deconstruct the composition of discovered information and discern
the intent of the author and target audience and the implied value of
data as depicted in the composition;
- Mechanisms
for learning, tracking, and managing networked teams (including theier
relationships, behavior, community generation, group hierarchy,
membership, common practices and metrics, and roles and
responsibilities) through their use and customization of shared
information spaces; Mechanisms for learning, tracking, and
managing networked teams (including Théière relationships, behavior,
community generation, group hierarchy, membership, common practices and
metrics, and roles and responsibilities) through their use and
customization of shared information spaces;
- Fusion
and querying of new, incomplete, uncertain, and/or contradictory data;
metrics quantifying the value added by new information, processes, and
modalities; Fusion and querying of new, incomplete, uncertain,
and / or contradictory data; metrics quantifying the value added by new
information, processes, and modalities;
- Mechanisms
for determining the relevance and certainty of queries and assertions
and for determining the quality of the processes that produce them;
modeling of query sources and assertion sources with the information and
metrics each contribute and require; peer review strategies among
overlapping, multi-modal information management systems;
Mechanisms for Determining the relevance and certainty of queries and
assertions and for deterministic mining the quality of the processes
that produce them; modeling of query sources and assertion sources with
the information and metrics each contribute and require; peer review
strategies among overlapping, multi-modal information management
systems;
- Deep information extraction and information
forensics – respectively, assigning meaning and consequences to
information. Deep information extraction and information
forensics - respectively, assigning meaning and consequences to
information.
AFOSR Special Announcement AFOSR Special
Announcement BAA No. No BAA. AFOSR
2005-4 AFOSR 2005-4 AFOSR Opportunities in Information Science and
Technology AFOSR Opportunities in Information Science and
Technology
Unter
den Dutzenden von Universitäten, militärischen Forschungseinrichtungen
wie dem AFOSR und Unternehmen, die an dem Forschungsprojekt beteiligt
werden, befindet sich auch das Unternehmen Versatile
Information Systems , das für das aktuelle Forschungsprogramm eine
Förderung von 450000 US$ erhalten hat. Among the dozens of
universities, military research facilities like the AFOSR and companies
that are involved in the research project, it is also the company Versatile
Information Systems , the current research funding of U.S. $ 450
000 has received for. Neben dem AFOSR arbeitet Versatile auch für die DARPA
, das Army
Research Office oder das Office
of Naval Research (ONR) und war auch an der Web-Ontology
(WebOnt) Arbeitsgruppe des W3C beteiligt. In addition to the
AFOSR Versatile also works for the DARPA
, the Army
Research Office or the Office
of Naval Research (ONR) and was also on the Web
Ontology (WebOnt) Working Group of the W3C involved.
Die
Versatile Arbeitsbereiche und Produkte decken sich eigentlich mit den
Inhalten der Forschung, die der New Scientist aufgedeckt hatte, weshalb
man eigentlich nicht mehr viel dazu erzählen muss. The versatile
work areas and products are consistent with the real content of research
that had revealed the New Scientist, so you really have not much to
tell. Nur
so viel: Versatiles Aufgabe ist die "Entwicklung eines automatischen
Tools, das Analysten erzählt, was Blogger zu einem bestimmten Zeitpunkt
am meisten interessiert". Only this: Versatiles task is to
"develop an automated tool, the analyst told what bloggers interested at
some point the most. So Dr. Brian Ulicny, einer der Wissenschaftler
bei Versatile. Said Dr. Brian Ulicny, one of the scientists at
Versatile. "What we're doing is a sort of information
retrieval," Ulicny said. "What we're doing is a sort of
information retrieval," Ulicny said. "The
difference is that in order to find and analyze blog entries, you need
to more adequately model how the blogs work on a global scale."
"The difference is that in order to find and analyze blog entries, you
need to more adequately model how the blogs work on a global scale."
To
some degree blog interpretation, he said, involves understanding a
different form of communication. To some degree blog
interpretation, he said, involves understanding a different form of
communication.
"Blog entries have a different structure,"
Ulicny said. "Blog entries have a different structure," Ulicny
said. "They
are typically short and are about something external to the blog
posting itself , such as a news event. It's not uncommon for a blogger
to simply state, 'I can't believe this happened,' and then link to a
news story." "They are typically short and are about something
external to the blog posting itself, such as a news event. It's not
uncommon for a blogger to simply state, 'I can not believe this
happened,' and then link to a news story. " In
this example, Ulicny said, there might not be much of interest in the
blog posting, yet the fact that the blogger called attention to this
story can be significant to understanding what matters. In this
example, Ulicny said, there might not be much of interest in the blog
posting, yet the fact that the blogger called attention to this story
can be significant to understanding what matters. A good
example, he said, is the recent furor in the Muslim world over the
publication of cartoons of Mohammad in a Danish newspaper. A good
example, he said, is the recent furor in the Muslim world over the
publication of cartoons of Mohammad in a Danish newspaper. The
original publication wasn't much noticed in the West, but bloggers
discussed this event that possibly contributed to riots worldwide.
The original publication was not much noticed in the West, but bloggers
discussed this event that possibly contributed to riots worldwide.
Das
automatische Tool zur Überwachung von Weblogs analysiert dazu sowohl den
Inhalt eines Weblogs, als auch die Links und Trackbacks, sprich den
Kontext eines Blogbeitrags, um den Stellenwert eines Weblogs im globalen
Maßstab zu erkennen und die Informationsmuster, die für Geheimdienste
und Militärs interessant sind. The automatic tool for the
monitoring of blogs analyzed to both the contents of a weblog, as well
as the links and trackbacks, ie the context of a blog post you wish to
recognize the value of a weblog on a global scale and the information
patterns that are of interest to intelligence agencies and the military.
In
Abgrenzung zu herkömmlichen Suchmaschinen sprechen Ulincy und seine
Kollegen deshalb auch von "Informationsgewinnung", "Informationsradar"
und der "Interpretation von Weblogs". In contrast to conventional
search engines talk Ulincy and his colleagues therefore also of
"information gathering", "Information radar" and the "interpretation of
weblogs". Total
Information Awareness ist nicht tot – es war der Anfang. Total
Information Awareness is not dead - it was the beginning.
Siehe:
See: AFOSR: OSR
Launches New Studies in Information Forensics, Process Integration
AFOSR: OSR
Launches New Studies in Information Forensics, Process Integration
AFOSR:
Blogs
Study May Help Defense Planners Better Net Credible Information
AFOSR: Blogs
Study May Help Defense Planners Better Net Credible Information
Versatile
Information Systems: Clients
and Affiliates Versatile Information Systems: Clients
and Affiliates Versatile Information Systems: Ontologies
Versatile Information Systems: Ontologies
Versatile
Information Systems / Northeastern University / Western New England
College: An
Application of Semantic Web Technologies to Situation Awareness
Versatile Information Systems / Northeastern University / Western New
England College: An
Application of Semantic Web Technologies to Situation Awareness
MITRE
The Edge: How
the Global Information Grid Is Transforming Communications for the
Warfighter MITRE The Edge: How
the Global Information Grid Is Transforming Communications for the
Warfighter |
Die Times berichtet in Spies trawl Friends Reunited for terror whispers über OSINT und HUMINT Aktivitäten seitens der drei britischen Geheimdienste GCHQ, MI5 und MI6 sowie der NATO, die wie z. B. das Open Source Center (OSC) der CIA / DNI oder das US A The Times reported in Spies trawl Friends Reunited for terror whispers about OSINT and HUMINT activities on the part of the three British intelligence agency GCHQ, MI5 and MI6 and NATO, including the Open Source Center (OSC) of the CIA / DNI, or the U.S. A
Aufgenommen: Aug 10, 10:42 Date: Aug 10, 10:42
Die Federal Computer Week berichtet in Rutgers will lead DHS-financed info research über ein weiteres Data-Mining Projekt, das neben der Analyse von E-Mails, Agenturmeldungen, Chatlogs auch auf die Überwachung und Analyse von Weblogs zielt. The Federal Computer Week reported in Rutgers will lead DHS info-financed research on another data-mining project, in addition to the analysis of e-mails, dispatches, chat logs also aims at monitoring and analysis of weblogs. Das Projekt wi The project wi
Aufgenommen: Aug 22, 12:44 Date: Aug 22, 12:44 PM
Als Ergänzung zur Heise Meldung Software zur Entdeckung negativer Berichte über die USA gewünscht, die ich gerade auch an die infowar Mailingliste gepostet habe, weil im Zusammenhang mit der "Software" auch die Rede vom Total Information Awareness Program As a complement to Heise detection software to detect the negative reports about the U.S. want, I have just posted also on the mailing list information warfare, because in the context of "software" and the talk of the Total Information Awareness Program
Aufgenommen: Okt 05, 19:49 Date: Oct 05, 19:49