WASHINGTON: ‘ US MILITARY WANTS TO USE DATA MINING NOW THE ENEMY IS AT OUR CYBER-WARFARE DOOR ‘

#AceNewsServices – Editors Post: WASHINGTON: Feb.02: It isn’t the first time that SOCOM has looked into mining social media data for use in operations. Virtual image blogspot reported on this project that SOCOM: wanted to use for ‘ Data Mining’ called ‘ Quantum Leap ‘ in 2012. Though as Defense One News confirms that as cyber-hacking attacks have increased and cyber warfare is at the door they want to resurrect its use:

SOCOM: ‘ Project Quantum Leap ‘

Friday, August 9, 2013

The Federation of American Scientists Report: (cited below) provided the bulk of this particular blog post. It might disturb some. Others will feel, “what else is new?” Open source data mining has been in operation since Admiral Bobby Inman, USN (at the time, recently retired director of the National Security Agency) established the InterNIC in the late 1990’s to control the Internet in the US.

(FAS) The U.S. military has been investigating the use of sophisticated data mining tools to probe social media and other open sources in order to support military operations against money laundering, drug trafficking, terrorism and other threats. But the window for doing so may be closing as the social media landscape changes, according to an internal assessment.

U.S. Special Operations Command (SOCOM) National Capital Region (NCR) conducted a series of experiments over the past year under the rubric “QUANTUM LEAP ” that was intended to test “non-traditional” tools and techniques to advance the SOCOM mission.

Spy_vs_Spy_Computer.jpg

An after-action report on the first experiment said it “was successful in identifying strategies and techniques for exploiting open sources of information, particularly social media, in support of a counter threat finance mission.” Counter threat finance refers to efforts to disrupt an adversary’s finances. A copy of the SOCOM NCR report was obtained by Secrecy News. See “Project QUANTUM LEAP: After Action Report,” 12 September 2012:

The Special Operations Command project included the implementation of:

  • Social Bubble, a tool that searches Twitter-related content,
  • Recon, which reconstructs source document from a raw data stream
  • Semantica , which ingests structured and semi-structured data and forms relationship hierarchies that it displays both graphically and in text format.

A 2012 project called Quantum Leap sought to show that open source data, and particularly social media data, could be made useful to active military operations Defense One reported just recently.

The biggest technological outcome of the program was a plug-in piece of software called “Social Bubble,” designed by a Santa Rosa company called Creative Radicals. The Quantum Leap report authors describe Social Bubble as “a tool which summons data via the Twitter API to display Twitter users, their geographic location, posted Tweets and related metadata.”

According to the authors of the document, the experiment was a success not just in identifying individuals who were actively tweeting and posting but also—and far more importantly for the military—individuals who happened to be connected to them but who didn’t have a social media profile.

“Overall the experiment was successful in identifying strategies and techniques for exploiting open sources of information, particularly social media. Major lessons learned were the pronounced utility of social media in exploiting human networks, including networks in which individual members actively seek to limit their exposure to the Internet and social media.” [Emphasis added.] That’s key to developing an ability to deal with an enemy like the Islamic State, where every tweeting sympathizer could be connected to a target who would prefer to stay off the radar.

The end goal of much of this activity is something referred to as “human entity resolution.” In the most simple terms, that means figuring out not just the identity of the person visible in the sniper scope but the identities of the people connected to him or her.

Special operations fighters say that information could be critical during an operation. But how much of it can now be obtained quickly and legally? That’s become something of a murky issue. The 1982 document aside, not long ago, it was thought to be well settled that law enforcement and the military could use technology to collect information that would otherwise be public (such as your location in a car) and could use data that you gave to third parties like telephone companies. Huntley called those assumptions the basis for a lot of intelligence operations.

“Both of those assumptions have been called into doubt with recent Supreme Court revelations,” he said.

The Enemy Is Data Mining:

The ability to use social network data operationally is no longer unique to the U.S military. It also represents a growing vulnerability for people in uniform. Mathew Freedman, CEO of the firm Global Impact and a longtime Defense Department advisor, noted, “The digital exhaust issue becomes much more critical…when an airline knows everything you look at on Amazon…through data mining blogs and tweets that you are going to attend future NDIA events.” The bottom line for Freedman: “It will be harder for anyone to be clandestine.”

The military is currently testing a new encrypted communications devices that function like smart phone in Honduras (see also how the special forces pioneers of the so-called Blackphone). But encryption alone can’t solve every potential digital exhaust problem.

Consider the recent hack targeting the Central Command’s Twitter and YouTube accounts, which occurred because a Defense Department official did not enable two-factor authentication. The department on Wednesday put out a special instruction document urging employees to take common-sense security precautions. The sheer volume of data we create suggests the invisibility is impossible, both for our enemies and for us. The human race is expected to reach 40 zettabytes of a data a year by 2020, up from 4 zettabytes in 2013. “This is the technological context for every future special operations action,” said moderator Klone Kitchen, a special adviser for cyber-terrorism and social media at the National Counter-terrorism Center.

Because the work of special operations units is so valuable and so very dangerous, special ops fighters occupy a position of some privilege in the military. Republicans, Democrats and politicians every stripe love the idea of small teams of highly talented super warriors doing what it used to require a—very literal—army. And the American people love stories of extreme heroism hence a seemingly unquenchable appetite for Seal Team Six type media

But there’s a danger in relying on small teams to do too much, an intellectual trap to which two of the nation’s most controversial defense secretaries, Robert McNamara and Donald Rumsfeld fell victim. It may be a behavior that we are repeating.

As McLeary notes, the 2012 White House National Security Strategy “places a premium on the use of special operations forces to operate — quietly — with allies on train and assist missions while continuing their counter-terror mission wherever Washington deems fit.”

Washington will continue to see fit to send special operations fighters to do a lot more in the coming years. That could include training, equipping, or helping fighters in places like Iraq, Pakistan or Syria. At some point, those fighters may ask, more publicly, for the ability to use controversial intelligence tools to accomplish those missions.

We may not have an answer for them:

As we keep being told: If you want to keep your data private, don’t use the internet, don’t use ‘digital money’ and don’t use telecommunications. Otherwise, you are an open book.

Though social media companies try to convince us to use their ‘ Free Services ‘ more and more, and joining with ‘ Data Mining Companies ‘ to share YOUR data maybe the only option left open to protect our security in the end. We shall see …… Editor.

Quantum Project PDF Download:

#ANS2015

#data-mining, #socom

NSA gets win in court over bulk data collection

#AceSecurityNews says ” #NSA adds another notch to its very tight belt of security to allow greater data collection, as Judge rules data on phone calls in US is legal #freedomof data

#court, #data-mining

Your Web Data Fuels a Massive $156 Billion Invisible Industry.

#AceNewsServices says “Never a Truer Word Spoken This Is Short Concise And Gets Straight To The Point” #socialmedia

#acesecuritynews, #dark-web, #data-mining, #industry, #world-wide-web

” Who Really Owns Your Data Once Mined “

"Tracking Your Every Move"

“Tracking Your Every Move”

#AceSecurityNews says with all the recent news about Prism and as this video by “Info-Wars” confirms the data we though we once owned, our personal private data has now become the most prized possession ever!  Once called the “Word of God” prior to the fall of Adam and his mate ,then to be corrupted by man for generations, from lies to absolute corruption of our very lives! As with the advent of theWorldwide Web we could shared everything, and spread our corruption to the very corners of the globe, eventually becoming like “God’s Knowing Good and Evil” – though we were only at the “Beginning of the End” there was still a lot more to come.

Though little was known about how such a simple and harmless act of sharing would one day lead ,to the advent of “Social Media” and this was the next step of the downfall of mankind. As everyone never saw it coming but was sucked into the web of sharing not knowing or even caring where their data ended up.

"How We track Your Every Move"

“How We track Your Every Move”

Seeing an “Eye to a Main Chance” or an eventual way to make money, it was then “Social Media” hit our lives and everyone was led down the path of having a “Facebook Page” and sharing their very lives, from their most intimate secrets to their likes and dislikes. We were told the data could be protected just by adding the word private in our settings, our emails would not be shared with anyone and all our photographs were still ours. Others saw the benefit of Sharing but it was not the “Social Media” companies that were sharing anything ,it was us. Oh yes the

Judas Iscariot

Judas Iscariot (Photo credit: Wikipedia)

Facebook, Twitter and Google media site’s were indeed classed as “Free” but the meaning of “Free” was being distorted and altered. As upgrade, by upgrade until we were all sucked into the world of ” Thinking We Were Protected” but all the time “Data Mining Companies” such as “Prism and Palantir” waited in the wings, like a devil on horseback ready to ride in and claim our data as their “Right” all under the new name of “Protecting Our National Interest” and these companies with their massive mainframes bulging with all that data, we so easily shared ,archived and saved in our “Now” – Not So Personal Settings were being “Mined” for every tiny morsel of information about Who, we were and What we do and How we do it, passing these titbits for a few ” Silver Coins” like “Judas Iscariotselling-out “Jesus”for 30 pieces of silver, to the Romans for his eventually crucifixion.

Though this time it was not his crucifixion we had to witness but it would eventually be ours ,our want to have everything, to pay for everything through companies such as PayPal who would sell us out to the highest bidder or better still to watch the CIA provide the “Venture Capital” to fund these “Data Mining Companies” now with the latest reason being renamed ” National Security” and so an agency was formed called the #NSA to collate and log all our data and strip it clean. This agency would become able to use our “Data” to find our everything ,from our shopping habits, to our preferences at the next election. Of course “Social Media” companies had allowed this to happen as their pay off their 30 pieces of silver would be they could increase their coffers, with ad revenue and increased ad revenue would mean more sales ,meaning more income and more income would mean bigger and bigger sites, able to mine more information.

No longer was our “Private Data” as the companies paid had given it away to “Security Companies” and had sold their “Souls To The Devil” all in the name of “Looking After Number One” and increasing their revenue by selling us out to the highest bidder.

http://activistposter.wordpress.com/2013/12/15/a-cover-up-of-paypals-nsa-involvement/

 

#acesecuritynews, #business, #data-mining, #database, #facebook, #ibm, #judas-iscariot, #national-security-agency, #palantir, #paypal, #prism, #social-media, #twitter

GCHQ Can Tap your Fibre Optic Cables To Access Your Privacy

According to the Guardian – The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much on-line and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
One key innovation has been GCHQ’s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months. Read the whole sorry saga at: http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

#data-mining, #gchq, #guardian, #nsa, #privacy, #security

Can We Trust Facebook With Our Personal Details

Image representing Datalogix as depicted in Cr...

Image via CrunchBase

Facebook on Tuesday made a pointed pitch to Madison Avenue: We know how to get your messages to real people, nearly one billion of them, because we know exactly who they are and whom they trust.

Somini Sengupta of The New York Times, writes that Sheryl Sandberg, the company’s chief operating officersought to assure the industry that Facebook was single-mindedly focused on proving the promise of advertising on its platform.

Facebook’s bread and butter is advertising, and it needs to prove to Madison Avenue that money spent on Facebook will yield measurable results. Facebook, Ms. Sandberg said at a conference, can transform how marketers reach their audience because Facebook knows exactly who is in that audience.

These days, Facebook is pushing stronger than ever at targeted advertising. It is using not only the data it has from its roughly 955 million users worldwide, it is matching that with the trail of data consumers leave as they shop online and offline – and using it to analyze what kinds of advertisements work best on Facebook.

It is a gamble. Facebook also must persuade users to trust the social network with their personal information, writes Ms. Sengupta. Facebook’s new forays reveal the rich trail of data that consumers can leave, often unwittingly, every time they buy groceries with a loyalty card or when they longingly eye a pair of shoes online. All of that data can trickle back to Facebook: With nearly a billion users, the company can find those consumers when they log on to Facebook and direct tailored ads to them.

In an experiment that stirred some controversy, Facebook linked arms with Datalogix, a data-mining company, to glean what individual shoppers buy at offline stores. Datalogix says it gets this information from loyalty card data and other sources.

Facebook can find those shoppers on its own platform if they have a Facebook account. It can then serve them advertisements based on their purchase history. Facebook calls the results promising: Shoppers who are shown advertisements on their Facebook page are spending more at the cash register.

Facebook says it is not sharing its user data with third parties. It also says it makes personal information anonymous by hashing the data, though security researchers have questioned the effectiveness of such tactics.

#advertising, #data-mining, #datalogix, #httpwww-facebook-comacedebtnews, #loyalty-program, #madison-avenue, #new-york-times, #sengupta, #sheryl-sandberg

AP Exclusive: Romney Uses Secretive Data-Mining

English: Weka Data Mining Open Software in Java

English: Weka Data Mining Open Software in Java (Photo credit: Wikipedia)

For the data-mining project, the Republican candidate has quietly employed since at least June a little-known but successful analytics firm that previously performed marketing work for a colleague tied to Bain & Co., the management-consulting firm that Romney once led.

Read more: http://swampland.time.com/2012/08/24/ap-exclusive-romney-uses-secretive-data-mining/#ixzz24fHsvFoc

WASHINGTON Mitt Romney is heading into the last three months of the campaign with far more cash at his disposal than a sitting president known for his fund-raising prowess, a scenario that presents the Republican’s Boston-based campaign with a series of strategic and tactical opportunities that could offer a crucial difference as he enters the final stretch of a race expected to be razor-close.

The growing financial advantage, one that would have been hard to predict several months ago, comes after months of hoarding money as President Obama’s campaign spent heavily on television ads trying to brand Romney early in the minds of voters.

Background:

Romney was restless for a company of his own to run, and in 1983, Bill Bain offered him a new venture that would buy into companies and allow the venture’s partners to reap higher rewards than consulting fees.He initially refrained from accepting the offer, but Bain re-arranged the terms in a complicated partnership structure so that there was no financial or professional risk to Romney.In 1984, Romney left Bain & Company to co-found the spin-off private equity investment firm, Bain Capital.

private equity firm is an investment manager that makes investments in the private equity of operating companies through a variety of loosely affiliated investment strategies including leveraged buyoutventure capital, and growth capital. Often described as afinancial sponsor, each firm will raise funds that will be invested agree one or more specific investment strategies.

Data Mining:  

The real data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records (cluster analysis), unusual records (anomaly detection) and dependencies (association rule mining). This usually involves using database techniques such as spatial indexes. These patterns can then be seen as a kind of summary of the input data, and may be used in further analysis or, such as, in machine learning and predictive analytics. For example, the data mining step might identify multiple groups in the data, which can then be used to obtain more accurate prediction results by a decision support system. Neither the data collection, data preparation, nor result interpretation and reporting are part of the data mining step, but do belong to the overall KDD process as additional steps.

Michael Milken:  

The mission of the Institute, founded in 1991 by financier and philanthropist Michael Milken, is “to improve the lives and economic conditions of diverse populations in the United States and around the world by helping business and public policy leaders identify and implement innovative ideas for creating broad-based prosperity.”

Operations:

The Milken Institute has published studies relating to human capital, access to capital, financial structures and innovations, regional economics, healthcare economics and medical research. It hosts a series of conferences including two annual conferences, a variety of financial innovations labs, and a series of forums and private events. The Milken Institute Global Conference, first held in 1998, is an annual forum focused on economic and social issues. Among the speakers at the conference include figures from the areas of business, finance, government, education and sports. The institute also hosts an annual State of the State Conference, which examines major issues facing the state of California.

Connection: 

J.P. Morgan & Co. was founded in New York in 1871 as Drexel, Morgan & Co. by J. Pierpont Morgan and Philadelphia banker Anthony J. Drexel, founder of what is now Drexel University.[2] The new merchant banking partnership served initially as an agent for Europeans investing in the United States.

Drexel Burnham Lambert was a major Wall Street investment banking firm, which first rose to prominence and then was forced into bankruptcy in February 1990 by its involvement in illegal activities in the junk bond market, driven by Drexel employeeMichael Milken. At its height, it was the fifth-largest investment bank in the United States.

Milken was indicted on 98 counts of racketeering and securities fraud in 1989 as the result of an insider trading investigation. After a plea bargain, he pled guilty to six securities and reporting violations but was never convicted of racketeering or insider trading. Milken was sentenced to ten years in prison and permanently barred from the securities industry by the Securities and Exchange Commission. After the presiding judge reduced his sentence for cooperating with testimony against his former colleagues and good behavior, he was released after less than two years.

Milken’s compensation, while head of the high-yield bond department at Drexel Burnham Lambert in the late 1980s, exceeded $1 billion in a four-year period, a new record for US income at that time.Drexel went bankrupt in 1990. With an estimated net worth of around $2 billion as of 2010, he is ranked by Forbes magazine as the 488th richest person in the world.Much of that wealth comes from his success as a bond trader; he only had four losing months in 17 years of trading.

#bain-company, #data-mining, #drexel-burnham-lambert, #michael-milken, #milken-institute, #mitt-romney, #romney, #united-states