я

yury_anikin


FutuRussia в Новосибирске

Конструирование будущего, создание креативного класса, вовлечение в инновации


Мощь сетей: Информация в эпоху бесконечной связности
я
yury_anikin
Manuel Lima - создатель visualcomplexity.com


Manuel Lima, senior UX design lead at Microsoft Bing, explores the power of network visualisation to help navigate our complex modern world.

Listen to the full audio: www.thersa.org/events/audio-and-past-events/2011/the-power-of-networks-knowledge­-in-an-age-of-infinite-interconnectedness

Сам факт, что специалиста по визуальному представлению больших объемов информации позвали участвовать в поисковике подтверждает мои прогнозы о том, что результаты поиска станут визуальными. По крайней мере, сами выдачи с ссылками. Похожие работы уже появляются.

Методика анализа социальной сети компании
я
yury_anikin

Методика «Азимут»

Разработка компании BSSL, основана на построении социальной сети компании. Позволяет выявить формальные и неформальные связи между сотрудниками, установить «бутылочные горлышки» и «тромбы» в обмене информацией и в рабочем процессе, увидеть «карту рабочих взаимодействий», установить неформальных лидеров в коллективе, померить степень доверия сотрудников друг к другу, а также получить рекомендации по оптимизации рабочего взаимодействия.

Информация собирается на основе ответов сотрудников о рабочем взаимодействии друг с другом его интенсивности, эффективности, доступности коллег и их взаимной востребованности.

«Азимут» — «быстрая методика». Небольшое количество вопросов позволяет сотрудникам пройти ее очень быстро, затратив минимум рабочего времени. Азимут спроектирован так, чтобы не задавать сотруднику лишних вопросов. За основу взяты технологии адаптивного тестирования, когда постановка следующего вопроса для участника оценки зависит от его ответов на предыдущие вопросы.

Надежность «Азимута» определяется симметрией в его вопросах. Если кто-то из сотрудников пропустил работу с методикой, «Азимут» все равно может сделать выводы о нем на основе ответов его коллег. В действительности приемлемой надежности результатов можно достичь, если «Азимут» пройдут хотя бы две трети сотрудников компании.

Подробнее познакомиться с методикой «Азимут» вы можете, скачав корпоративный демо-отчет или презентационный буклет.

Смотрите также нашу статью о решении проблем взаимодействия с помощью методики «Азимут»

Основные показатели оценки

Индекс востребованности
Чем выше этот показатель, тем «нужнее» сотрудник его коллегам. Причем вес оценки от более востребованных сотрудников выше, чем от менее востребованных. Слишком высокие значения индекса востребованности при низкой доступности сотрудника сигнализируют о перегруженности, или о неумении делегировать полномочия.

Индекс корпоративной интеграции
В любой компании есть сотрудники, «скрепляющие» обособленные коллективы в единую структуру. Именно они являются «мостами» во взаимодействии между группами людей. Чем выше индекс корпоративной интеграции сотрудника, тем в большей степени он играет роль «ключевого звена» в социальной сети компании. Люди с высоким индексом КИ часто в курсе многих процессов в компании. В сочетании с показавшими высокие значения по индексу Влияния они идеальные проводники нововведений и изменений.

Индекс Влияния
Складывается из профессионального авторитета и личных симпатий. Если лидеры рейтинга по этому индексу и «официальные» руководители — не одни и те же люди, это может быть сигналом о проблемах. Выяснение индекса Влияния — важный этап при изучении рабочих групп для целого ряда задач. Особенно ценно то, что этот показатель можно оценить удаленно.

Общая эффективность и доступность
Отвечая на вопросы «Азимута», сотрудники оценивают своих коллег по доступности (насколько трудно «дозвониться» человеку) и эффективности (насколько быстро и правильно коллега решает рабочие вопросы). Все эти оценки интегрируются в показатели «общей доступности» и «общей эффективности» для каждого сотрудника. Красный цвет в эгоцентрических сетях (низкая доступность или эффективность) признак проблемы во взаимодействии.

Инструменты Open Source Intelligence
я
yury_anikin

With the term Open-source intelligence (OSINT) we identify a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence, exactly the report provided by company like Stratfor.

A couple of interesting tools to gather information from social networks are: Kurrently and also Who is talking
Both are social media search tools very pewerful that are able to retrieve any action made by a specific subject from several social netoworks. Imagine you are interested to my activity on the web, you can simple use “securityaffairs” word in the serach engine and you will able to track all my activities. Amazing! Consider that for several tools are available public API to develope our own serach engine and to propose the results in the way we desire. Where is my privacy?

Those are just some simple examples, but by inference it is easy to understand how a search engine tool is available for each a social media. How many attacks have been announced in recent days posting the results on specialized sites such as Pastebin?
I believe that a security officer ought to be attentive to these media, if only because his company could see holes right on these platforms. At that point tools such as PasteLert are a must for the admin. PasteLert is a simple system to set up alerts and pastebin.com search (like Google Alerts) for pastebin.com entries. This means-you will automatically email recieve Whenever your term (s) is / are found in new wiki entries!

We haven’t forgotten Google alerts, the father of search engine tool which allow you to monitor the web for interesting new content. It is able to alert the user via email updates of the latest relevant Google results (web, news, etc.) based on your queries. Another interesting tool is the Reputation Management Search Engine called SamePoint.com, using it is possible to manage our on line reputation.

Up to now we discussed only the tools for research within the major social media, but obviously the main tools for information retrieval are the search engines.

Have you ever heard of Google Hacking Tools?

Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. LulzSec and Anonymous believed to use Google Hacking as a primary means of identifying vulnerable targets, it is complete and updated source where is possible to retrieve info regarding

  • Advisories and Vulnerabilities
  • Error Messages
  • Files containing juicy info
  • Files containing passwords
  • Files containing usernames
  • Footholds
  • Pages containing login portals

the world in your hands! Always from Google company, let me introduce “Google Insights for Search”, that can be used to compare search volume patterns across specific regions, categories, time frames and properties.

As you might imagine, and then through simple searches without using special tools foranalysis of information is relatively easy to trace the profile of a company or an individual and the relationships that the entity maintains. The techniques described are the order of the day for those who work are engaged in research and collection of useful informationpacked reports of various kinds.

After this brief review on the search tools available on internet we must take in care an important reflection. Although the Internet is in fact a limitless ocean, every drop is referenceable and we must be aware of it every time we expose our data on the network. Our exposure must be appropriately weighted, deciding what to make public and through which channels. Tools such as those described can be very useful for the analysis of actual media exposure and evaluation of the attack surface of a profile.

Pierluigi Paganini


    Инструменты противодействия OSINT
    я
    yury_anikin
    OSINT - Open Source Intelligence, разведка по открытым источникам.
    В этом посте буду складывать средства "сохранения конфиденциальности".

    The tool, called GoogleSharing, is a Firefox add-on that mixes the requests of many different users together, such that Google is not capable of telling what is coming from whom.

    GoogleSharing aims to do a few very specific things:

    1. Provide a system that will prevent Google from collecting information about you from services which don't require a login.
    2. Make this system completely transparent to the user. No special websites, no change to your work flow.
    3. Leave your non-Google traffic completely untouched, unredirected, and unaffected.

    On May I have defined the term “social network poisoning” writing before to Wikipedia EN and also to Italian Wiki.

    The term social network refers to the poisoning effect produced by the application of methods designed to make unreliable the knowledge related to a profile and its relationships. The application of this kind of attack on large-scale could lead to the collapse of Social Networking platforms affect its value for commercial purposes, as well as the utility in terms of knowledge and correlation of data provided by users, with a significant impact on its economic value.

    In the same way as the ”route poisoning” (affecting the telecommunications network), the “poisoning action” are conducted with the aim to pollute the contents of this social network profiles typically introducing artifacts and relationships exist between them and real ones thus making the information unreliable. The result is the consequent failure of the chain of trust which are based on all social networks, in order not to allow search engines specifically developed to retrieve information of any kind relating to a particular profile.

    Starting from the assumption that Internet and in particular the social network lacks a coherent and safe management of digital identity, it is possible to introduce the main tools currently poisoning hypothesize new and viable in a future scenario
    Current tools

    • Replacement of identity, or the ability to impersonate another user to the wide variety of purposes intelligence social engineering.
    • Simulation of identity, creating a false profile, which does not correspond to any existing person, for malicious purposes or simply to remain anonymous.
    • Fuzzing profile, the voluntary introduction of elements false and / or non-matching to your profile to deceive intelligence systems, to prevent OSINT activities or other forms of personal gain.
    • Fuzzing social graph, the association intended to groups and individuals that have nothing to do with their interests and relations with the intention of introducing ”noise” in their social graph.

    Future instruments:

    • personal /social bots , creating a large number of fake profiles (e.g. millions of fake profiles) managed by machines, able to interact with real users in a way likely, thus changing the ”sentiment” and ”conversation ”large-scale as well as altering all the social graph and to preclude meaningful correlations on the data.
    • black curation, the use of real users ”holes” or fictitious to speak on topics of which you want to change the meaning, or to create new one ad-hoc, in analogy to the black SEO (search engine optimization) already use on search engines.

    How easy to understand the interest in social networks are the stars. Complex systems analyze information, scan faces and places, building new relationships and providing new information. Government agencies and companies have realized the full potential of the medium, a real gold mine in which the imperative is the power, information, and control of a at the expense of a user too distracted and inattentive to the dangers ahead.

    What to suggest to a friend node, be social, but sparingly. Be human first!

    Pierluigi Paganini


      МАНИФЕСТ – НА ПОРОГЕ НОВЫХ «ТЕМНЫХ ВЕКОВ»: ПЯТЬ РЕШАЮЩИХ ЛЕТ
      я
      yury_anikin

      Максим КАЛАШНИКОВ

      Сергей ПЕРЕСЛЕГИН

      Мир переживает один из самых драматических моментов в своей истории. Он стоит на пороге падения в новые темные века, в пропасть нового варварства.

      Мы называем этот исторический период постиндустриальным фазовым кризисом. Такой кризис носит глобальный характер, он охватывает всю планету, все социальные, экономические, политические, культурные, когнитивные процессы, все стороны жизни людей.

      Человечество сталкивалось с фазовым кризисом дважды: при переходе от мезолита к неолиту, когда, по некоторым данным, население планеты уменьшилось на треть, и при преобразовании традиционной сельскохозяйственной цивилизации в промышленный капитализм. Последний переход хорошо документирован и описан. Он занял более тысячи лет, считая от начала упадка античного способа производства (кризис третьего века) до всеевропейской эпидемии чумы середины XIV столетия. Считается, что только эта эпидемия унесла около трети населения Европы.

      Наиболее тяжелым этапом индустриального перехода была, однако, не чума, а фазовая катастрофа, практически полностью разрушившая античную городскую цивилизацию с ее водопроводами (акведуками), театрами и школами и положившая начало Темным векам. Тьма полностью не развеялась никогда, а первые признаки рассвета появились только через четыреста лет.

      Полностью...Collapse )

      OSINT - Open-source intelligence, разведка по открытым источникам
      я
      yury_anikin

      OSINT: is the acronym for Open Source Intelligence and has been gaining steady purview in the internet age due to the ease of access to all kinds of information via the net.

      "Open-source intelligence (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence. ~ From Wikipedia"

      The use of OSINT has grown within the private sector as well as has been a mainstay of the military and the intelligence services for years. Earlier on, these sources of information that were being culled and combed through by the likes of Langley, now can be easily done by the likes of you and I with a few tools on the web or applications that you can install on your machines at home.

      The key though to the whole process of OSINT is that it is a subtle art that needs its other half to be of real value to anyone. That other half of the picture is “Analysis” which is key to making assessments of the data you get from the open sources you are looking at.

      Today it is common to see corporations using OSINT but perhaps calling it “Competitive Intelligence” Still though, the processes are OSINT much of the time. By researching various sources online and in the media, one can gain quite a bit of intelligence on a subject and be able to extrapolate a lot about what a company, individual, group, or country is up to and maybe where they are headed.

      Much of this type of data gathering (harvesting) is now going on as well tied to predictive analysis engines online (such as Silo.com or basistech etc) that ostensibly can “predict future actions” as they claim. However, the base idea of OSINT is to gather open source information to then analyse to generate reports on subjects…

      Such analysis can also lead to predictive behaviour analysis and forecasts. It all depends on your goals as the analyst really.


      Read more...Collapse )

      InfoWarCon 2010 Agenda
      я
      yury_anikin

      May 20, 2010: All briefing that are releasable are posted under the title for the session.

      Wednesday, 12 May
      TimeEventPresenter/Chair
      0800WelcomeRobert Giesler, IO Chair
      0830

      Keynote: National Security Issues in the Cyber World

      Unfortunately Air Commodore Graham Wright had to cancel at the last moment. The Keynote address was presented by Winn Schwartau. 4G Cyberwar

      Air Commodore Graham Wright, Deputy Director of the Office of Cyber Security (UK)
      0915Keynote: New Media in the "New" Information Battle SpacePrice Floyd, Principal Deputy Assistant Secretary of Defense for Public Affairs
      1000

      Session 1: The Power of Cyber and Social NetworkingWith the sudden rise of Social Networking Sites (SNS) to near virulent nature in both its use and popularity, SNS is used to form networks, create relationships and now, analyze the data behind the engines themselves. This fascinating session shows how information is exchanged, how relationships are developed and the data itself is exploited to show previously imperceptible trends..

      Chair: Jack Holt
      Panelists: Max Kelley, Facebook
      Tim Hwang, OP-X Specialists
      Matt Bigge, Strategic Social
      Mark Pfeifle, S4
      1200

      Brown Bag Lunch Session: 4G WarfareThe smart phone is highly mobile, prolific and a huge risk to military & government operations. Bad actors attack infrastructures using multiple vectors; the smart phone is the next target. By 2014, there will be an estimated 4.1 billion mobile endpoints, most will have varying degrees of intelligence. Smart phones are already 'chipped' with hostile hardware, Botnets are on iPhones, smart phone malware is widespread; and this is only the test phase. Denying access to social network sites is a small part of the solution , but that just gives a false sense of protection. Mobile computing security requires a new paradigm to affect proper levels of security, privacy and compliance, and must not decrease the usability of the device nor place the onus of protection on the end user. This presentation provides compelling evidence that both military and civilian government organizations need to “secure” the smart phone ”“ sooner than later. With luck, governments will listen this time..

      Opening Keynote Briefing

      Winn Schwartau, Founder
      1300

      Session 2: Deception Operations Deception has been a critical piece of all military operations since the dawn of time, this session examines how the United States has integrated deception operations into recent military operations, compares how the Chinese use deception, how the press is an integral and often unwilling partner and how deception may change in the future..

      Kuehl Briefing

      Chair: Dr. Daniel Kuehl
      Panelists: BG Thomas Draude
      Timothy Thomas
      Dr. Albert C. Pierce
      1300

      Session 3: The Internet and Future ConflictsMeet the leaders of companies forging the way ahead in the internet, how their engines are changing the face of how we do business, and how their analytical tools are going to guide us in the 21st Century..

      Stern Briefing

      Stowe Briefing

      Boback Briefing

      Chair: BG John Davis
      Panelists: Geoffrey Stowe, Engineer, Palantir Technologies
      Robert Boback, CEO, Tiversa

      Matt Stern, General Dynamics

      1500

      Session 4: An Iraqi Military Perspective on War with the United StatesFind out first-hand how the Iraqis viewed what the U.S. was doing and planning, how the Iraqis were responding and gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime. Based on an in-depth study conducted by the Institute for Defense Analysis.

      Kevin Woods, Institute for Defense Analysis

      1500

      Session 5: The Reality of Critical Infrastructure VulnerabilityThe City of Seattle invited top experts from all over the United States to wreak havoc in their fair city, killing as many people as possible, sewing seeds of discontent, rendering the city unusable and undermining the collective faith in their government. Learn what worked and why or why not.

      Schaffner Briefing

      Jake Schaffner, DISL, USD(I)

      1700

      Networking Social for Social Networking

      Thursday, 13 May

      0800

      Opening

      Robert Giesler

      0805

      Keynote: U.S. Navy Cyber Perspective

      RDML Leigher Keynote Briefing

      Rear Admiral William E. Leigher, Deputy Commander, U.S. Fleet Cyber Command/U.S. 10th Fleet

      0845

      Session 6: New Social Media In and Out of IranLearn how the tools like Facebook, LinkedIn, and Twitter are used to maintain a sense of openness in the authoritarian world of repressive regimes, focusing on Iran. Using tools and techniques specifically designed to keep the portals to Iran open, hear how the truth was funneled in and evidence of their oppressive actions were exfiltrated for worldwide witnessing.

      Chair: Rafal Rohozinski, Principal at The SecDev Group
      Panelists: Dr. John Kelly
      Austin Heap, Haystack developer
      Nart Villeneuve, Chief Technology Officer, Psiphon Inc

      0845

      Session 7: Exploiting Commercial Cyber IntelligenceHear how the tools and the techniques used by the commercial sector can augment and assist the Intelligence Community in supporting Cyberspace Operations. What is the private sector doing that is different and unique? What are the risks and tradeoffs?

      Chair: Matthew Pushkin

      Panelists: Jake Schaffner
      Richard Forno

      Alexander Cochran
      Chris Rouland
      Brian Varine

      1030

      Session 8: Cultural Aspects of Social Networking in the Middle EastThe culture of the Middle East is very different from that of the West. How can these differences be best taught to IO professionals and exploited? What is important to the leaders in the Middle East and how can we influence them? How does Social Networking in the Middle East differ from the West and what must we do to best take advantage?

      Jennifer Bryson, PhD, Director, Islam and Civil Society Project, The Witherspoon Institute

      Deven Desai, U.C. Berkeley BA, currently Princeton University Visiting Fellowk

      1030

      Session 9: Importance of EW to Cyberspace SuperiorityThe present and future of communication and conflict occurs within and is dependent on the electromagnetic environment. Using the common electron, we communicate, prevent others from communicating, alter, degrade or deceive our adversaries. In fact, the tactics, techniques and procedures used in electronic warfare are more similar to warfare in cyberspace than any other field, yet the two mission areas have been operationally separated. How are these two mission areas related and should they be more closely integrated from either a train and equip, or operational perspective?

      LtCol Hare Briefing

      Chair: Lt Col Forrest Hare
      Panelists:
      Lt Col Dean A. Clothier

      Mr. Steven McNamara
      COL Kevin Wright
      Mr. Timothy L. Thomas

      1200Brown Bag Lunch Session: H4ck3rs are People TooThis documentary is a portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes H4CK3RS ARE PEOPLE TOO lets hackers speak for themselves and introduce their community to the public.a flim by Ashley Schwartau
      1300IO Lifetime Achievement Award Presentation to Herb RomersteinMr. Robert Giesler, IO Chair

      1310

      Session 10: Israeli IOIsrael conducted a campaign against Hezbollah in Lebanon in 2006 but was widely perceived to have lost the concurrent information war, Hezbollah was perceived to be more agile, more supportive and creative in the war of ideas. In 2007, recognizing the need for a centralized coordination body while still enabling a faster information execution cycle, Israel formed a National Information Directorate and a national information strategy. Newly empowered, Israel conducted successful operations against Hamas in Gaza and was widely regarded as having won the accompanying information war.

      Cast Lead - Black and White Briefing

      Emergency Procedure Law Brief

      National Information Directorate

      Public Affairs Policy Process

      Yarden Vatikay, Director, National Information Directorate, Israel Prime Minister
      Dennis Murphy, Professor, US Army War College
      1600Session 11: Intentional RF Interference on Satellite Communication Systems. The growing demands for bandwidth are placing pressure on the available radio frequency spectrum, increasing the probability of unintentional interference. In the meantime, commercial satellite systems remain vulnerable to purposeful interference, to include jamming, unauthorized access, information, insertion, and signal probing. In this session, subject matter experts will discuss the changing satellite communications environment, traditional and non-traditional threats, and techniques for identification, geolocation, and support to jamming and interference response.

      Jeff Boushell, CEO, Interferometrics, Inc.

      Dr. Dan Oltrogge, AGI

      Kevin Davis, Transmitter Location Systems LLC

      Friday, 14 May

      0800

      Opening

      Robert Giesler

      0805

      Keynote: IO and the MediaMs. Dana Priest talks about the intricate relationship between the press and military information operations and how they each take advantage of the other and respect certain bounds. Ethical and legal problems have accumulated between these two notable professions that impact on the perception of professionalism and objectivity.

      Dana Priest, Investigative Reporter, The Washington Post

      0845

      Session 12: CENTCOM IO ProgramsIn the broader CENTCOM Area of Responsibility, Operation Earnest Voice (OEV) is the critical program of record that resources their efforts to synchronize their Information Operations activities, to counter extremist ideology and propaganda, and to ensure that credible voices in the region are heard. OEV provides CENTCOM with direct communication capabilities to reach regional audiences through traditional media as well as via websites and regional public affairs blogging. In each of these efforts, they follow the admonition the United States practiced in Iraq, that of trying to be “first with the truth.” Full and enduring funding of OEV and other DoD information operations efforts enables, in coordination with State Department initiatives, the United States to do just that and, in so doing, to communicate critical messages and to counter the propaganda of adversaries.

      COL Steve Mains, Division Chief for Information Operations, USCENTCOM

      0915

      Session 13: Afghanistan/Pakistan IO IntegrationThe tribal nature of the borders between Afghanistan and Pakistan do not align with the geographic nature of their borders, the two countries are fraught with problems unique to their respective areas and yet share a sort of commonality dating back thousands of years. Hear how Information Operations in this highly contentious and unique area is coordinated to maximize its effectiveness on the ground.

      Chair: Brig Gen Rowayne A. Schatz Jr., Deputy Director for Global Operations
      Panelists: Maj. Charlotte Carpenter, USMC
      COL Steve Mains, Division Chief for Information Operations, US CENTCOM

      1030

      Session 14: Future IO IntegrationInformation Operations are still relatively new to the military, their policy, doctrine and practices are evolving almost as fast as the technologies that supports them. This panel of futurists will discuss how IO should be changing in the future to integrate more seamlessly with future operations.

      Chair: CAPT(R) Stephanie Helm

      Panelists:
      COL Chuck Eassa
      T.X. Hammes
      Rosemary Wenchel

      1200

      End


      Будущее, согласно фильмам
      я
      yury_anikin
      2012 - вирус превратил всех людей в зомби (I am legend)
      2013 - Лос-Анжелес - место ссылки преступников, остров, тоталитарно управляемый монархией (Escape from LA)
                тоталитаризм, супернаркотик "Субстанция Д"(A scanner darkly)
      и далее - искусственные тела, хаос, тоталитаризм, мир после катастофы
      правильнее, конечно, добавить в анализ фильтр по годам издания/датирования событий
      и найти бы аналог по книгам.
      пишите, если какие-либо значимые фильмы пропущены )


      Мировой индекс конфликтов
      я
      yury_anikin
      Очень похожее приложение на то, что я собираюсь сделать на основе информации из соц.сетей.
      Авторы анализировали еженедельно 15000 статей из 164 значимых источников.


      Разброс по регионам у них получился небольшой, сравним с разбросом по времени в одном регионе.
      Islam and Israel                                                 - 5408 (желтый)
      Communist countries (Китай)                           - 4868 (красный)
      New market economies (formerly communist)  - 5014 (розовый)
      Highly industrialized countries                           - 5148 (голубой)
      Market economies                                             - 6225 (оранжевый)
      Developing countries                                         - 6051 (зеленый)



      В общем, задумка правильная, а реализация индекса слабоватая.

      Карта пищевой безопасности
      я
      yury_anikin
      странно, но у нас хуже, чем в америке.


      ?

      Log in