Intelligence: The Tech Revolution In Pattern Analysis of Photo or Video

Since the 1990s ancient espionage techniques have become obsolete and 21 st century spies have had to adapt. The old ways have largely been replaced with new methods that take advantage of the new tech; the Internet, cellphones and more powerful and numerous computers along with new software that can do pattern analysis and automatic analysis of… Read More Intelligence: The Tech Revolution In Pattern Analysis of Photo or Video

Intelligence Recap – News Monitors: Social Media Data Mining In The Combat Zone

The U.S. Armed force needs to furnish troops in battle zones with web based life examination instruments that would empower them to naturally assemble data from nearby Internet web-based social networking to perceive what’s going on in the zone they are working. This would be close constant investigation with results accessible in English. This kind… Read More Intelligence Recap – News Monitors: Social Media Data Mining In The Combat Zone

Information Warfare: North Korean Sith Incentives

News Monitors/Strategy Page – Yet another North Korean Cyber War attack on South Korea was recently discovered. This one involved a successful effort to hack an Android bus navigation app used in four South Korean cities. The malware, once on the phone, sent back all information found on the phone that included matching one of… Read More Information Warfare: North Korean Sith Incentives

Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight

   In terms of understanding and engaging customers, the video game industry has gone through a massive transformation in recent years. Before this transformation, video games were physical products that could be purchased over the counter, with little to no understanding of player retention or behavioral analysis for the people who sold them. That all… Read More Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight

News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets

Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunterChris Vickery during a routine scan of… Read More News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets

What is a Cryptologic Linguist Analyst?

OVERVIEW A cryptologic linguist is primarily responsible for identifying foreign communications using signals equipment. Their role is crucial as the nation’s defense depends largely on information that comes from foreign languages. JOB DUTIES Identifying and analyzing foreign communications Recognize changes in transmission modes and tip the appropriate authority Provide translation expertise to analysts Provide transcriptions… Read More What is a Cryptologic Linguist Analyst?

Automatic Speech Recognition (ASR) Speech

Speech recognition (also referred to as voice recognition) is a process by which the elements of spoken language can be recognized and analyzed, and the linguistic message it contains transposed into a meaningful form so that a machine can respond correctly to spoken commands. Voice recognition is distinct from voice identification, which is the capability… Read More Automatic Speech Recognition (ASR) Speech

Military and Government Applications of Human-Machine Communication by Voice

* Clifford J. Weinstein SUMMARY This paper describes a range of opportunities for military and government applications of human-machine communication by voice, based on visits and contacts with numerous user organizations in the United States. The applications include some that appear to be feasible by careful integration of current state-of-the-art technology and others that will… Read More Military and Government Applications of Human-Machine Communication by Voice

Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”

News Monitors – He said today: “The newly public National Security Agency records about PRISM and similar operations demonstrate that metadata about electronic communication is actually more dangerous to democracy than intercepting conversations. That is because the NSA’s analysis of this information is based on mathematical formulas that use guilt by association to construct imaginary… Read More Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”