-
StreetCred: Big Data Finds Fugitives
Traffic citations are critical for funding police departments, courts, and municipalities. Unpaid citations or missed court appearances result in warrants and additional fees, but finding or arresting fugitives and collecting unpaid fines is difficult as well as time and manpower intensive. As a result, the process often stops there. In Texas alone, there is almost […]
-
History of Cyber Intelligence Discussion
Following the Atlantic Council Cyber Statecraft Initiative’s excellent panel on “Lessons From Our Cyber Past,” the panelists and attendees engaged in an insightful discussion on history, technology, intelligence, and cyber. The discussion was moderated by CTOvision editor and Crucial Point LLC CTO Bob Gourley, who also has extensive cyber intelligence experience as the former Defense Intelligence Agency […]
-
Lessons From Our Cyber Past: History of Cyber Intelligence
On Thursday, September 27, the Atlantic Council hosted a stand-out panel discussion on the history of all-source cyber intelligence. The discussion was moderated by CTOvision editor and Crucial Point LLC founder and CTO Bob Gourley, who also has extensive cyber intelligence experience as the former Defense Intelligence Agency CTO and Director of Intelligence (J2) of Joint […]
-
Bob Gourley on the Ethics, Analytics and Future of Big Data
Bob Gourley, editor of CTOvision was recently interviewed by WashingtonExec, where he shared his views on emerging information technology, government needs, and Big Data. The original article can be found here, and the interview is reproduced below: How does Bob Gourley, Editor of the popular tech blog CTOVision.com define big data? WashingtonExec caught up with Gourley to talk about what […]
-
U.S. Drones Policy: Strategic Frameworks and Measuring Effects Conclusion
This post is the conclusion to my write-up on the American Security Project‘s U.S. Drones Policy: Strategic Frameworks and Measuring Effects, which I introduced and delved into yesterday. The event was moderated by Joshua Foust, Fellow for Asymmetric Operations at ASP and columnist for PBS and The Atlantic Monthly. The panel of speakers consisted of Aaron Zelin, Fellow at The Washington Institute […]
-
U.S. Drones Policy: Strategic Frameworks and Measuring Effects Introduction
On Monday, August 20, I had the pleasure of attending the American Security Project’s event on U.S. Drones Policy: Strategic Frameworks and Measuring Effects. I say that it was a pleasure because, unlike most discussions on drone policy, this one was based on facts and empirical data rather than politics and speculation. The event was moderated by […]
-
Big Money for Big Data
Big Data is the data too large, complex, and fast-moving for conventional information infrastructure to handle. There’s been a lot of buzz about investment in cutting edge Big Data solutions and start ups, and for good reason. Venture capital for Big Data is sizable and growing. In 2010, Big Data start ups already received $1.53 […]
-
NYPD and Microsoft Create a Next Generation Law Enforcement Big Data Solution
With an emphasis on surveillance, evidence, and reporting, law enforcement is an extremely data-intensive field and the New York City Police Department, as the largest agency which deals with the largest American city, has the most data to handle. Lately, with the NYPD’s greater focus on counterterrorism and projects like the Lower Manhattan Security Initiative to […]
-
Addressing Cyber Instability Executive Summary
After two years of intensive study and research, the Cyber Conflict Studies Association is preparing to release their book-length monograph on “Addressing Cyber Instability.” Last month, the CCSA released an executive summary previewing the work, which is available for download. The impetus for “Addressing Cyber Instability” is that, though cyberspace has become indispensable and irreplaceable for people, companies, and nations, it […]
-
Implicit Learning Passwords Are Like Riding a Bike
Cryptography recently joined forces with neuroscience to propose a groundbreaking innovation in authentication. Hristo Bojinov of Stanford University along with Daniel Sanchez and Paul Reber of Northwestern, Dan Boneh of Stanford, and Patrick Lincoln of SRI published a paper on “Designing Crypto Primitives Secure Against Rubber Hose Attacks.” Passwords, encryption keys, and other methods of verification are critical to […]