The role of visual complexity in POLINT

Reading about visual complexity I have just found this picture:

The New Yorker

and now we can realize the importance of technology in political intelligence!

The Afghanistan Stability diagram is an intricate network chart that claims to comprehensively outline the situation of the war on Afghanistan. The nodes on the map are rouglhly divided into general clusters by color, and describe everything from domestic support for the operation, ro the dynamics of the insurgent factions, to popular support and various economic infrastrcutures at play. Famously, General McCrystal declared that “When we understand that slide, we’ll have won the war” at a briefing in Kabul.

Read more at Visual Complexity 

How ‘doxing’ can destroy your reputation and bring company stocks to their knees

Grey hat hackers are using open-source data to manipulate the stock price of successful companies.

In February this year, a previously unknown research body named Zatarra published a report on one of Europe’s fastest-growing fintech companies, Wirecard. That report claimed Wirecard, or individual senior staff, were guilty of money laundering, defrauding Visa and Mastercard, hosting porn on company websites and more.

Source: Wired

Russia possibly mapping underwater internet cables in Mediterranean

Approximately one year ago, the Russian navy caused quite a stir by hanging around internet cables in the Atlantic for some period of time. The accusation was the Russians were mapping the cables in o

Source: Russia possibly mapping underwater internet cables in Mediterranean

Intelligence agency wants computer scientists to develop brain-like computers

IARPA, the radical research arm of the of the Office of the Director of National Intelligence this week said it was looking at two groups to help develop this new generation of computers: computer scientists with experience in designing or building…

Sourced through Scoop.it from: www.networkworld.com

How it looks a network plan …?

See on Scoop.itOSINT

Cellphone Surveillance: The Secret Arsenal – In…

StingRay and the cellphone surveillance In a previous post, I detailed the technologies used to track mobile devices, with a specific reference to the Stin | Advanced Threats,Intelligence Technology,CyberSecurity…

Sourced through Scoop.it from: www.scoop.it

what a mess …

See on Scoop.itOSINT

Desperate MH17 “Intelligence” Spin. Ukraine Secret Service Contends that “Pro-Russian Rebels had Targeted a Russian Passenger Plane”. “But Shot Down Flight MH17 by Mistake”

According to Ukraine’s Secret Service, the alleged design of the pro-Russian rebels was to shoot down a Russian passenger plane, with a view to blaming the Ukrainian government and justifying a Rus…

Sourced through Scoop.it from: www.globalresearch.ca

See on Scoop.itOSINT

Identification and monitoring of possible disru…

Understanding current technological changes is the basis for better forecasting of technological changes.

Sourced through Scoop.it from: www.scoop.it

See on Scoop.itOSINT

Search Engines for OSINT and Recon

There’s an amazing number of awesome search facilities that can be useful when doing OSINT and recon work for pen testing. I’ll list a lot of different sites that I have discovered and use regularly for both

Sourced through Scoop.it from: daveshackleford.com

OSINT collection…

See on Scoop.itOSINT

An easy checkoff for global competitiveness: the case for a US innovation box

This paper describes an Internet based structured method for data collection and analysis in relation to a certain individual. It includes a classification of open information sources and a brief overview of the Internet resources that can be used to obtain indirect information about specific people. A seven-proce ss cyclic  model is suggested for data collection and analysis. A detailed discussion of the main data collection and analysis processes as well as methodologies and algorithms is provided. Special consideration is given to the hypothesis generation and testing method

Sourced through Scoop.it from: www2.itif.org

Evolution of intelligence cycle…

See on Scoop.itOSINT

The End Of Whac-A-Mole: From Incident Response To Strategic Intelligence

In the face of mounting cybercrime, hacktivism, and espionage, network defenders need to transform their tactical IR groups into full-scale cyber intelligence teams.

Sourced through Scoop.it from: www.darkreading.com

Interestingly enough: "I believe that if you don’t have an intelligence team in your organization – even if it is just a team of one person – you cannot hope to keep up with the advanced adversary."

See on Scoop.itOSINT

Artificial intelligence: ‘Homo sapiens will be split into a handful of gods and the rest of us’

A new report suggests that the marriage of AI and robotics could replace so many jobs that the era of mass employment could come to an end

Sourced through Scoop.it from: www.theguardian.com

… May you live in interesting times ! Or … (寧為太平犬,不做亂世人)  is usually translated as “It’s better to be a dog in a peaceful time than be a man in a chaotic period.” (Source: http://www.grammarphobia.com/blog/2012/07/interesting-times.html)

See on Scoop.itOSINT

How collective intelligence helps organizations move past hierarchical leadership structures

Learning business from bees – what the remarkable decision-making abilities of honeybees can teach us about leadership.

Sourced through Scoop.it from: thenextweb.com

How could be applied to classical hierarchical enterprise? It is a long way …

See on Scoop.itOSINT

ON DEMAND TRAINING: Open Source Intelligence Archive

Readex Product Director Brett Kolcun opens the world of open source intelligence to researchers with instruction on two important resources: Foreign Broadcas…

Sourced through Scoop.it from: www.youtube.com

Intelligence Education and Training.

See on Scoop.itOSINT

International Legal Issues Of Cyber Attacks And Cyber Security, Cyber Terrorism And Cyber Warfare: Open Source Intelligence (OSINT) By Intelligence Agencies Through Social Media Websites

International Legal Issues Of Cyber,-Attacks, -Security, -Terrorism and Warfare: Open Source Intelligence (OSINT) https://t.co/hsrc1qSmnG

Sourced through Scoop.it from: cybersecuritylegalissues.blogspot.fr

Is CyberINT an element of OSINT? …

See on Scoop.itOSINT

Collect It All: Open Source Intelligence (OSINT) for Everyone [32c3]

Collect It All: Open Source Intelligence (OSINT) for Everyone Governments post reports and data about their operations. Journalists publish documents from wh…

Sourced through Scoop.it from: www.youtube.com

A double-edged sword…

See on Scoop.itOSINT

Saudi Arabia ‘destabilising Arab world’, German intelligence warns

It is unusual for the BND spy agency to publicly release such a blunt
assessment on a country that is considered an ally of the West.

Sourced through Scoop.it from: www.telegraph.co.uk

Could be a connection with this event: "Saudi Arabia’s Ministry of Interior announced Saturday the execution of 47 people, including a prominent Shia cleric, over terrorism charges, according to Saudi Press Agency (SPA)Saturday citing a statement."

 

https://www.middleeastmonitor.com/news/middle-east/23143-saudi-arabia-executes-47-over-terrorism-charges?

See on Scoop.itOSINT

Military Smartphones Are a Hacker’s Dream

You would think the nation’s military would move with lightning speed to patch cell phones vulnerable to hackers, particularly after recent data breaches. 
You would be wrong.

Sourced through Scoop.it from: www.thedailybeast.com

See on Scoop.itOSINT

Competitive Intelligence and the Importance of Benchmarking

Competitive Intelligence and the Importance of Benchmarking

Sourced through Scoop.it from: blog.rivalfox.com

benchmarking as an analysis tool in any organization…

See on Scoop.itCompetitive Intelligence

Data Collection Methods to Boost Your Marketing Intelligence – Business 2 Community

Business 2 Community Data Collection Methods to Boost Your Marketing Intelligence Business 2 Community Business intelligence is enhanced while marketing strategies are optimized with the help of the data collection process.

Source: www.business2community.com

See on Scoop.itCompetitive Intelligence

Competitive Intelligence: Preparing For Disrupt…

See on Scoop.itCompetitive Intelligence

All industries face disruption, laws change, technology evolves, and the behavior of consumers revolutionizes the way business is done. And this fact of change is especially true in the legal industry.

Intellinomics‘s insight:

Disruption…Or Distruction and Création!

See on www.scoop.it