What is a Cryptologic Linguist Analyst?

OVERVIEW A cryptologic linguist is primarily responsible for identifying foreign communications using signals equipment. Their role is crucial as the nation’s defense depends largely on information that comes from foreign languages. JOB DUTIES Identifying and analyzing foreign communications Recognize changes in transmission modes and tip the appropriate authority Provide translation expertise to analysts Provide transcriptions… Read More What is a Cryptologic Linguist Analyst?

Automatic Speech Recognition (ASR) Speech

Speech recognition (also referred to as voice recognition) is a process by which the elements of spoken language can be recognized and analyzed, and the linguistic message it contains transposed into a meaningful form so that a machine can respond correctly to spoken commands. Voice recognition is distinct from voice identification, which is the capability… Read More Automatic Speech Recognition (ASR) Speech

Military and Government Applications of Human-Machine Communication by Voice

* Clifford J. Weinstein SUMMARY This paper describes a range of opportunities for military and government applications of human-machine communication by voice, based on visits and contacts with numerous user organizations in the United States. The applications include some that appear to be feasible by careful integration of current state-of-the-art technology and others that will… Read More Military and Government Applications of Human-Machine Communication by Voice

Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”

News Monitors – He said today: “The newly public National Security Agency records about PRISM and similar operations demonstrate that metadata about electronic communication is actually more dangerous to democracy than intercepting conversations. That is because the NSA’s analysis of this information is based on mathematical formulas that use guilt by association to construct imaginary… Read More Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”

News Monitors Blog: Advertising value equivalence

a b s t r a c t The academic approach to measurement and evaluation has long favoured social science methodologies (Broom & Dozier, 1990; Michaelson & Stacks, 2011; Stacks, 2002), but there has been persistent, widespread practice use of advertising value equivalence (AVE) to express the economic and financial value of public relations activity.… Read More News Monitors Blog: Advertising value equivalence

Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet

News Monitors – Abstract The Darknet has become a hub for hacking communities, offering cyber criminals the ability to freely discuss and sell unknown and emerging exploits. This paper focuses its attention on studying the effectiveness of machine learning for providing cyber threat intelligence from Darknet hacking forums. Developing a functioning system for extracting information from… Read More Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet

News Monitors in collaboration with Rosette now includes More Languages, Higher Accuracy, and Deep Neural Nets

In collaboration with Rosette, we are now delivering a new language for name matching, translation, and deduplication: Thai. We’ve also added a new deep neural network model for sentiment analysis, entity extraction offsets, salience scores for topic extraction, and more. Name Matching The /name-similarity, /name-translation, and /name-deduplication endpoints all now support Thai names written in… Read More News Monitors in collaboration with Rosette now includes More Languages, Higher Accuracy, and Deep Neural Nets

Know Identity Conference panelists explore the future of identity verification and digital trustworthiness

March 26-28, five identity experts will discuss the state of identity technology in a panel moderated by Basis Technology at the Know Identity Conference in Washington, D.C.. This blog post is the third in a  series to preview that conversation. Missed our previous posts? Learn more about the panelists and the current state of identity technology, then come back to… Read More Know Identity Conference panelists explore the future of identity verification and digital trustworthiness

News Monitors Blog: Bits: Data storage; polymer supercapacitors; zero field switching.

Scientists from RMIT University and Wuhan Institute of Technology demonstrated a next-generation optical disk with up to 10TB capacity and a six-century lifespan using gold nanoparticles. The technology could radically improve the energy efficiency of data centers according to the researchers, using 1000 times less power than a hard disk center by requiring far less cooling and… Read More News Monitors Blog: Bits: Data storage; polymer supercapacitors; zero field switching.