In Pakistani army and pro-military Islamic groups have been conducting an online Information War against government opponents as well as media outlets that are critical of the military. Now the military is particularly angry that the Dawn newspaper has been reporting on how the military and Islamic groups have been manipulating messaging apps like Twitter… Read More Pro-military Islamic groups conducting an online Information War against government opponents.
Internet security firms have noted an increase in Cyber War campaigns waged by Indian and Pakistani APTs (Advanced Persistent Threat) operations. APTs are well organized and very active hacker groups that are often created and sustained by governments or major criminal gangs. In this case, six Indian APTs (Lucky Elephant, Donot Team, Patchwork Group, Sidewinder… Read More Information Warfare: South Asian Cyber War
Since the 1990s ancient espionage techniques have become obsolete and 21 st century spies have had to adapt. The old ways have largely been replaced with new methods that take advantage of the new tech; the Internet, cellphones and more powerful and numerous computers along with new software that can do pattern analysis and automatic analysis of… Read More Intelligence: The Tech Revolution In Pattern Analysis of Photo or Video
The U.S. Armed force needs to furnish troops in battle zones with web based life examination instruments that would empower them to naturally assemble data from nearby Internet web-based social networking to perceive what’s going on in the zone they are working. This would be close constant investigation with results accessible in English. This kind… Read More Intelligence Recap – News Monitors: Social Media Data Mining In The Combat Zone
By: Lyvon T. We put a lot of trust in the United States military to protect us from harm. To do that, they must have access to the best technology, such as data mining. Our military has always been collecting and storing data but in recent decades, the amount of data as increased to an… Read More Data Mining in the Military
OVERVIEW A cryptologic linguist is primarily responsible for identifying foreign communications using signals equipment. Their role is crucial as the nation’s defense depends largely on information that comes from foreign languages. JOB DUTIES Identifying and analyzing foreign communications Recognize changes in transmission modes and tip the appropriate authority Provide translation expertise to analysts Provide transcriptions… Read More What is a Cryptologic Linguist Analyst?
Speech recognition (also referred to as voice recognition) is a process by which the elements of spoken language can be recognized and analyzed, and the linguistic message it contains transposed into a meaningful form so that a machine can respond correctly to spoken commands. Voice recognition is distinct from voice identification, which is the capability… Read More Automatic Speech Recognition (ASR) Speech
* Clifford J. Weinstein SUMMARY This paper describes a range of opportunities for military and government applications of human-machine communication by voice, based on visits and contacts with numerous user organizations in the United States. The applications include some that appear to be feasible by careful integration of current state-of-the-art technology and others that will… Read More Military and Government Applications of Human-Machine Communication by Voice
News Monitors – He said today: “The newly public National Security Agency records about PRISM and similar operations demonstrate that metadata about electronic communication is actually more dangerous to democracy than intercepting conversations. That is because the NSA’s analysis of this information is based on mathematical formulas that use guilt by association to construct imaginary… Read More Data Mining of Telecom Metadata is “More Dangerous than Intercepting Conversations”
The Dark Web Project Find out more about the Dark Web project: Read the book: Dark Web: Exploring and Data Mining the Dark Side of the Web, by Hsinchun Chen. Springer: 2012. Read about how Dark Web data has been used, in H. Chen and C. Yang, eds. Terrorism Informatics: Knowledge Management and Data Mining for Homeland… Read More Dark Web and GeoPolitical Web Research