Novità su www.intuslegere.it.

Intus Legere presenta il “Forum sulla Legge di riforma dei Servizi”.
Si apre oggi su Intus Legere il “Forum sulla Legge di riforma dei
Servizi”. Autorevolissimi commentatori ed esperti del settore
confronteranno idee, opinioni e proposte inerenti la nuova Legge
124/2007 sulla “Struttura del sistema di informazione per la sicurezza
della Repubblica e nuova discipina del segreto” che entrerà in vigore il
prossimo 12 ottobre.
Già disponibile on line il primo contributo del Prof. Marco Giaconi. A
breve il contributo del Prof. Mario Caligiuri.

Buona lettura.

Intus Legere Staff

questa la legge che andrà in vigore dal 12 Ottobre. su intuslegere.it il forum per la discussione sulle tematiche.

legge124-2007.pdf

Quite rightly there is increasing amounts of talk about ‘social media’ online. The jury is still out on the real value of some areas of social media and networks, but one area where the value is currently most apparent is using network analysis to help optimise your natural search engine rankings (SEO), largely by identifying suitable sites to get inbound links from.

But what with the internet being so big, and growing so fast, it has been hard to make any practical sense of all the network data available. Recently I came across a tool which showed me the potential power of visualising these relationships…The tool in question is provided by TouchGraph – for example here’s a visualisation map of sites related to E-consultancy.com based on Google data.

Of course, we can question the credibility and reliability of the actual data source (in this case Google’s related sites data) but I think the visualisation alone is very powerful. Particularly for mere marketing/commercial types like me, rather than data analysts.

It reminds me a little of the (site) web analytics tools and how they progressed and advanced in terms of data visualisation. I remember Site Intelligence’s  VBIS tool being amongst the first to do a good job of visualising traffic flows across an entire website; or Speed-trap’s video replays of user sessions and “heat” clickmaps. People like Visual Sciences are now doing some pretty cool visualisation stuff in the world of web/data analytics.

The point is that visualization itself is an extremely poweful and important part of making data intelligible, useful and actionable. (For further examples, do read Avinash Kaushik’s excellent blog piece “The Awesome Power of Data Visualization“).

It still seems quite early days (outside of web/data analytics as mentioned above) for seeing mature data and visualisation services and products for things like online competitive intelligence and benchmarking, or even link / social network analysis for search engine optimisation. Though we are beginning to see some search agencies develop and even productise such technology e.g. Spannerworks’ Network Sense.

With increasing use of standardised data sets (or, at least, better marked up data) and APIs, I’d be very surprised if there weren’t a rash a new services coming which took interesting data and made it commercially valuable by visualising it in a way which makes it meaningful and actionable.

Indeed, I’m sure they already exist and TouchGraph is just the one I happened to come across.

So I’m interested in hearing from you about other such tools and services that you’ve come across where interesting data and visualization is being brought together to provide you with something useful for your online marketing?

Ashley Friedlein
CEO
E-consultancy.com

Related Blog Article:
Blog and User Generated Content monitoring services

Following the success of the first edition of this book published two years ago, this New Edition, now in paperback format, has been updated and includes new data on the main market players (28 companies are described) to reflect the latest changes and developments within the text mining sector.Text Mining is an interdisciplinary field bringing together techniques from data mining, linguistics, information retrieval, and visualization to address the issue of quickly extracting information from large databases with different applicative objectives. This book is directed towards graduate students in business, and undergraduate students in computer science, and to practitioners in law enforcement, security, intelligence, marketing and IT departments; it assumes readers have little or no previous knowledge about mathematics or linguistics. It has been structured as a self-teaching guide and has been written as a result of the authors’ experiences in participating in several large-scale text mining projects. It can be used as a guide for system integrators, and designers of text mining systems, but especially for business analysts and consultants who wish to apply the powerful tools of this technology to real situations.CONTENTS:THEORETICAL OVERVIEW: Text Processing and Information Retrieval; Information Extraction; Text Clustering; Text Categorization; Summarization and Visualization; Application Integration; ROI in Text Mining Projects.APPLICATIONS: Open Sources Analysis for Corporate and Government Intelligence; A Critical Appraisal of Text Mining in an Intelligence Environment; How to Forecast Telecommunications Competitive Landscape; Competitive Intelligence for SMEs: An Application to the Italian Building Sector; Virtual Communities: Human Capital and other Personal Characteristics Extraction; Customer Feedbacks and Opinion Surveys Analysis in the Automotive industry; Email Management System; TV Channel Provider: Mining the User Feedback; Text Mining in Banking; Text Mining in Life Sciences; Information Search and Classification to Foster Innovation in SMEs; Media Industry: How to Improve Documentalists Efficiency; Link Analysisin Crime Pattern Detection; SOFTWARE AND SERVICES: Text Mining Resources. ABOUT THE EDITOR:Alessandro Zanasi is a security research advisor and professor at Bologna University, Italy. Before he served asCarabinieri officer in Rome Scientific Investigations Center; IBM executive in Italy, Paris and San Jose (USA); METAGroup analyst; cofounder of Temis SA.As an intelligence specialist, he has been advising governments and corporations in security, intelligence and detectiontechnologies for more than twenty years. Among the others: European Commission through his membership, since 2005,to ESRAB-European Security Research Advisory Board and, since 2007, to ESRIF-European Security Research andInnovation Forum. AMONG THE 28 AUTHORS:Milic (Microsoft, UK), Pazienza (Univ.Roma,IT), Tiberio (Univ.Modena,IT), Sebastiani (Univ.Padova,IT),Mladenic, Grobelnik (Stefan Institute, SL), Sullivan (Ballston, USA), Politi (Analyst, IT), de’ Rossi (Telecom Italia,IT), Grivel (CNRS, F), Wives, Loh (Univ.Rio Grande, BR), Lebeth (Dresdner Bank, D), Fluck, Gieger (FraunhoferInstitute, D), Peters (Gruner+Jahr, D), Ananyan (Megaputer, USA).Abstract Previex and other info: 1313textminingv207.pdf

After September 11th 2001 there has been a growing awareness in the West that counterterrorist efforts  will not be successful  against global jihadism without   a long-term strategy of soft power designed to conquer the hearts and minds of Islamic communities around the world. Although the struggle against Al-Qaeda must  necessarily  employ the instruments of hard power  (military and police force), the latter will not be effective in the long-run if the West does not  develop and implement  a  strategy of soft power  (the power of ideas,  of culture,  of information, of mass communication, of education) to undermine jihadism.   The arrest or physical elimination of one or more members of a jihadist organization will only be a short-term success if jihadism continues to recruit, indoctrinate and train new members. Al Qaeda is implementing its own soft power strategy including  propaganda, disinformation and psychological warfare activities. This strategy, which reflects an advanced adaptation to  the new environment  of  globalization and the information revolution pursues two basic objectives: (1) In the Islamic world (including Islamic communities in the West)  jihadist strategy aims  to radicalize Islamic populations, widen popular support for global jihadism and spread  feelings of  hatred  for the  West, the US, Israel and  Judaism.   One of the methods used is to spread paranoid conspiracy  theories of a “Zionist-Christian alliance”  against the Islamic world. (2) In the West, jihadist strategy aims to intimidate and demoralize public opinion,  undermine popular consensus and support to governments, weaken the public’s faith in the capacity of governments to protect them from terrorist attacks, spread confusion and guilt feelings in countries that have been attacked by jihadism

During the Cold War the West, led by the United States,  successfully employed soft power and strategic influence to contain the expansion of communism in Western Europe and in other regions of the world. This eventually led to the breakdown of the Soviet system.  One of the key challenges of the 21st century is   developing a  long-term Western strategy  to  undermine  jihadism using the instruments of soft power,  including the media,  education, cultural influence,   support of reformist and modernizing movements within Islam and  currents of Islamic thought that are critical of jihadism.  Such a strategy should aim at creating a more positive and attractive image of  Western societies and progressively diminishing the attractiveness of the jihadist world-view.       

softpowerejihad.pdf

For further information please contact me at the e-mail address below or prof. Sergio Germani, academic director of the conference(l.germani@unilink.it) . To register please contact Mr. Francesco D’Arrigo (f.darrigo@ceasonline.eu).

The Federal Bureau of Investigation, which has increasingly supplemented its traditional law enforcement role with new intelligence and counterterrorism functions, now says its paramount objective is to “prevent, disrupt, and defeat terrorist operations before they occur.”

New domestic intelligence collection activities that have been adopted in pursuit of this goal are described in unusual detail in the Bureau’s 2008 budget request.

http://fas.org/irp/agency/doj/fbi/2008just.pdf

Special attention is given to cultivating human intelligence sources.

“The FBI recruits new CHSs [confidential human sources] every day,” the budget request notes. But without increased budget support, the FBI says it will not be possible to validate these sources and to determine the credibility of the information they provide.

“With current resources, the FBI is unable to reach a point where all CHSs are successfully subjected to the CHSV [confidential human source validation] process.”

The budget request refers in passing to “more than 15,000” confidential human sources requiring validation (page 4-24).

The FBI also seeks new funds for intelligence collection training and operations.

“Without this training, the FBI would lack the full capacity to provide SAs [special agents] the comprehensive tradecraft, procedural, legal and policy direction needed to execute the significant and constitutionally sensitive domestic intelligence collection mission with confidence,” the budget document states (page 4-27).

The FBI’s budgetary focus on expanding its human intelligence capability was first reported by Justin Rood of ABC News. See “FBI Proposes Building Network of U.S. Informants,” July 25:

http://blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html

The same FBI budget document provides significant new detail on other FBI intelligence and counterterrorism activities, the FBI open source program, the National Virtual Translation Center, and other initiatives.

The Washington Post reported that there were nearly 20,000 positive matches of individuals seeking to enter the United States who were flagged by the Terrorist Screening Center, according to the FBI budget request. Despite the surprisingly large figure, only a small number of arrests resulted.

See “Terror Suspect List Yields Few Arrests” by Ellen Nakashima, Washington Post, August 25:

http://www.washingtonpost.com/wp-dyn/content/article/2007/08/24/AR2007082402256.html

By Mary O. Foley Most businesses have made sure to protect computer systems and networks from hackers. But the majority of data leaks or breaches of sensitive company information or intellectual property are often inside jobs.You’ve installed protective software, adjusted your hardware, and developed a range of new office policies, all in the name of protecting your computer networks and systems from hackers, phishers, and scammers. Externally, your system seems protected.But what are you doing to prevent an inside job? Do outgoing or disgruntled employees, or on-site contractors, have too much access to your company’s top-secret data?The answer could well be yes. According to a March 2006 Enterprise Strategy Group survey of 227 IT professionals, “employees and on-site contractors were cited as the most likely threat to confidential data security.” They even outranked concerns over off-shore outsourcers and random hackers. A separate 2005 study by PriceWaterhouseCoopers found that 33 percent of all security breaches involved current employees, and another 28 percent involved former employees or former partners.And the stakes are high: According to those surveyed, up to 50 percent of the data used in their offices could be considered confidential.The survey warned that while many companies use gateway filtering technologies to protect their network perimeter, they are much less likely to have adopted access controls and other policies to protect their systems from within.What can your company do to protect itself inside and out? For answers, IncTechnology.com looked up Kevin Mitnick, the former hacker-turned-IT security consultant. Mitnick, who served jail time in the 1990s for illegally gaining access to computer networks, now runs his own small business, Mitnick Security LLC, in Las Vegas, Nev., and helps firms address IT security problems.Have a planThe first step is to create a company-wide policy. Ideally, this policy should include “physical, technical, and human factor elements,” says Mitnick. For example, terminated employees should immediately lose access to not only the physical office, but to the computer network as well.Develop access controlsIn smaller businesses in particular, almost anyone in the company can access any data they choose. Eliminate this risk by setting up internal firewalls, Mitnick says, “so that sales people can’t access the payroll.” Through the operating system, set restrictive missions on files and directories or certain information, and allow only select employees access to it.Keep your OS up to dateMitnick notes that a lot of companies, especially smaller ones on a budget, don’t update their computer operating systems often enough. “I’ve seen businesses still using Windows 2000,” he says. The newer systems, especially Vista, have better access-control options.New password policiesDon’t let employees share passwords, Mitnick warns. “And don’t post passwords on Post-it notes in your office,” he adds. In fact, for very small offices with less than 20 employees, Mitnick recommends that all employees change their passwords every time a person leaves the company.  Larger companies might consider changing out passwords periodically, or developing additional passwords for sensitive information. Whether passwords get changed or not, however, terminated employees should lose their access to the network immediately.Monitor employee computer useIf an employee has put in notice to leave the company — on pleasant terms or not — your IT staff should start watching their computer habits. “Most employees take work product,” says Mitnick. IT staff should watch for e-mails the employee might be sending him or herself, e-mails that the employee’s friends within the company might be sending to them, or downloads to CDs, DVDs, or iPods. In addition, companies should block employee access to free storage sites, such as Yahoo’s Briefcase, notes securityinfowatch.com.Seek out helpIf your business, or simply your IT department, is too small to handle this type of project, consider hiring a consultant or VAR to help put a system in place, says Mitnick. With luck, taking these steps will help you to protect your computer networks inside and out.