Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”

News Monitors – He said today: “The newly public National Security Agency records about PRISM and similar operations demonstrate that metadata about electronic communication is actually more dangerous to democracy than intercepting conversations. That is because the NSA’s analysis of this information is based on mathematical formulas that use guilt by association to construct imaginary… Read More Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”

News Monitors Blog: Advertising value equivalence

a b s t r a c t The academic approach to measurement and evaluation has long favoured social science methodologies (Broom & Dozier, 1990; Michaelson & Stacks, 2011; Stacks, 2002), but there has been persistent, widespread practice use of advertising value equivalence (AVE) to express the economic and financial value of public relations activity.… Read More News Monitors Blog: Advertising value equivalence

News Monitors in collaboration with Rosette now includes More Languages, Higher Accuracy, and Deep Neural Nets

In collaboration with Rosette, we are now delivering a new language for name matching, translation, and deduplication: Thai. We’ve also added a new deep neural network model for sentiment analysis, entity extraction offsets, salience scores for topic extraction, and more. Name Matching The /name-similarity, /name-translation, and /name-deduplication endpoints all now support Thai names written in… Read More News Monitors in collaboration with Rosette now includes More Languages, Higher Accuracy, and Deep Neural Nets

Know Identity Conference panelists explore the future of identity verification and digital trustworthiness

March 26-28, five identity experts will discuss the state of identity technology in a panel moderated by Basis Technology at the Know Identity Conference in Washington, D.C.. This blog post is the third in a  series to preview that conversation. Missed our previous posts? Learn more about the panelists and the current state of identity technology, then come back to… Read More Know Identity Conference panelists explore the future of identity verification and digital trustworthiness

News Monitors blog: The Future of Space Exploration Technology

For almost 20 years, humans have maintained a continuous presence beyond Earth. The International Space Station has provided a habitat where humans can live and work for extended periods of time. Yet, despite having established a permanent base for life in space, terra firma is always in reach—within 254 miles, to be exact. If a… Read More News Monitors blog: The Future of Space Exploration Technology

Defending Data

We’ve got information coming out our ears — and our phones and social accounts — and ASU researchers are working to protect it In today’s fast-moving, high-tech world, we leave digital footprints nearly everywhere we go, our sensitive personal information is under attack from those who want to track our habits or steal our identities,… Read More Defending Data

OSINT What Do You Need to Know About Open Source Intelligence?

With social media users growing steadily, the worldwide quantity of digital data doubles every year. Skillful mining of Big Data is now an essential dimension of counterterrorism, cybersecurity, drug policy enforcement, border security, and intelligence gathering. Actionable analysis requires crossing traditional boundaries of geography, language, and culture. Law enforcement seeks predictive capabilities to protect civilians from… Read More OSINT What Do You Need to Know About Open Source Intelligence?