Air Force Puts $450,000 Into Three-Year Study Of Blogs...

Moderators: Elvis, DrVolin, Jeff

Air Force Puts $450,000 Into Three-Year Study Of Blogs...

Postby bvonahsen » Sun Jul 02, 2006 12:49 pm

<!--EZCODE LINK START--><a href="http://www.defenselink.mil/transformation/articles/2006-06/ta062906b.html" target="top"><!--EZCODE BOLD START--><strong>Blogs Study May Provide Credible Information</strong><!--EZCODE BOLD END--></a><!--EZCODE LINK END--><br><br><!--EZCODE QUOTE START--><blockquote><strong><em>Quote:</em></strong><hr>ARLINGTON, Va., June 29, 2006 – The Air Force Office of Scientific Research recently began funding a new research area that includes a study of blogs. Blog research may provide information analysts and warfighters with invaluable help in fighting the war on terrorism. <br><br>Dr. Brian E. Ulicny, senior scientist, and Dr. Mieczyslaw M. Kokar, president, Versatile Information Systems Inc., Framingham, Mass., will receive approximately $450,000 in funding for the 3-year project entitled “Automated Ontologically-Based Link Analysis of International Web Logs for the Timely Discovery of Relevant and Credible Information.”<hr></blockquote><!--EZCODE QUOTE END--><br><br><!--EZCODE QUOTE START--><blockquote><strong><em>Quote:</em></strong><hr>"It can be challenging for information analysts to tell what’s important in blogs unless you analyze patterns."<br><br>Dr. Brian E. Ulicny, senior scientist<hr></blockquote><!--EZCODE QUOTE END--><br><br><br><br><!--EZCODE QUOTE START--><blockquote><strong><em>Quote:</em></strong><hr>Patterns include the content of the blogs as well as what hyperlinks are contained within the blog.<br><br>Within blogs, hyperlinks act like reference citations in research papers thereby allowing someone to discover the most important events bloggers are writing about in just the same way that one can discover the most important papers in a field by finding which ones are the most cited in research papers.<br><br>This type of analysis can help information analysts’ searches be as productive as possible.<br><br>The blog study is part of Air Force Office of Scientific Research’s new Information Forensics and Process Integration research program recently launched at Syracuse University, Syracuse, N.Y.<br><br>The new portfolio of projects consists of three areas of research emphasis – incomplete information and metrics; search, interactive design, and active querying; and cognitive processing. <br><br>One of the problems analysts may have with blog monitoring, Ulicny noted, is there is too much actionable information for the analyst to properly analyze.<br><br>“We are developing an automated tool to tell analysts what bloggers are most interested in at a point in time,” Ulicny said.<br><br>his analysis, Kokar said, is based on what Versatile Information Systems calls the RSTC approach to blog analysis – relevance, specificity, timeliness, and credibility. RSTC helps information analysts filter the most important information to study.<br><br>“Relevance involves developing a point of focus and information related to a particular focus,” Kokar said. Timeliness has to do with immediacy – how important is a topic now. “Credibility,” he continued, “is the amount of trust you have in an information source.”<br><br>Finally, specificity can provide value to information analysts depending on how general or specific they need the information to be.<br><br>In some ways, the team’s automated project works like a search engine but with a more focused approach. Traditional search engines present users with information based on, for example, the number of times a term appears in a document.<br><br>The information obtained via a search engine query tends to be similar among the documents returned. Blog postings, however, can be much more dissimilar from one to another.<br><br>“What we’re doing is a sort of information retrieval,” Ulicny said. “The difference is that in order to find and analyze blog entries, you need to more adequately model how the blogs work on a global scale.”<br><br>To some degree blog interpretation, he said, involves understanding a different form of communication.<br><br>“Blog entries have a different structure,” Ulicny said. “They are typically short and are about something external to the blog posting itself , such as a news event. It’s not uncommon for a blogger to simply state, ‘I can’t believe this happened,’ and then link to a news story.”<br><br>In this example, Ulicny said, there might not be much of interest in the blog posting, yet the fact that the blogger called attention to this story can be significant to understanding what matters.<br><br>A good example, he said, is the recent furor in the Muslim world over the publication of cartoons of Mohammad in a Danish newspaper. The original publication wasn’t much noticed in the West, but bloggers discussed this event that possibly contributed to riots worldwide.<br><br>“The fact that the web is a vast source of information is sometimes overlooked by military analysts,” Kokar said. “Our research goal is to provide the warfighter with a kind of information radar to better understand the information battlespace.”<hr></blockquote><!--EZCODE QUOTE END--> <p></p><i></i>
bvonahsen
 

Re: Air Force Puts $450,000 Into Three-Year Study Of Blogs

Postby bvonahsen » Sun Jul 02, 2006 12:53 pm

<!--EZCODE ITALIC START--><em>" ...the information battlespace"</em><!--EZCODE ITALIC END--><br><br>You gotta love that... in a sick, twisted Orwellian kinda way... <p></p><i></i>
bvonahsen
 

information battlespace

Postby blanc » Sun Jul 02, 2006 1:07 pm

just calling a spade a shovel <p></p><i></i>
blanc
 
Posts: 1946
Joined: Sun Feb 05, 2006 4:00 pm
Blog: View Blog (0)

Re: information battlespace

Postby anothershamus » Sun Jul 02, 2006 1:15 pm

it won't matter once they take away the internet. we will have to get togeather the old fashioned way, in person, oh, wait! There are laws against that as well......better just watch tv and drink beer. <p></p><i></i>
User avatar
anothershamus
 
Posts: 1913
Joined: Fri Jun 23, 2006 1:58 pm
Location: bi local
Blog: View Blog (0)

Re: information battlespace

Postby Seamus OBlimey » Sun Jul 02, 2006 2:45 pm

I can drink beer for England but watch tv? no thanks! If the military are spending money investigating blogs the maybe it's time to move on..? <p></p><i></i>
User avatar
Seamus OBlimey
 
Posts: 3154
Joined: Wed Jun 14, 2006 4:14 pm
Location: Gods own country
Blog: View Blog (0)

Re: information battlespace

Postby Seamus OBlimey » Sun Jul 02, 2006 2:48 pm

or how about we feed them a line? Anyone got a line? <p></p><i></i>
User avatar
Seamus OBlimey
 
Posts: 3154
Joined: Wed Jun 14, 2006 4:14 pm
Location: Gods own country
Blog: View Blog (0)

Re: information battlespace

Postby havanagilla » Mon Jul 03, 2006 2:15 am

I have posted this news bit on my blog, since usually these projects are jointly done in Israel as well, and more so, if there need be some "live training", israel will be the chosen field. I have had a suspicion for a while that security forces are beginning to mess with the blogosphere in israel (after all, how much FREEDOM can they really take ?), and this kind of proves it. <p></p><i>Edited by: <A HREF=http://p216.ezboard.com/brigorousintuition.showUserPublicProfile?gid=havanagilla>havanagilla</A> at: 7/3/06 12:30 am<br></i>
havanagilla
 
Posts: 769
Joined: Wed Mar 01, 2006 6:02 am
Blog: View Blog (0)

Re: Attacks on 'activist websites.' A case study here.

Postby Hugh Manatee Wins » Mon Jul 03, 2006 5:24 pm

Check out this hijack/hack report from what is now proparanoid.NET...used to be '.com' but not since a neutralizing attack.<br><br>(The rest of the site is quite good and one can see why it would be targeted.)<br><br><!--EZCODE AUTOLINK START--><a href="http://www.proparanoid.net/hijack.htm">www.proparanoid.net/hijack.htm</a><!--EZCODE AUTOLINK END--><br><br>This article will explain:<br><br> What happened to the original proparanoid.com Web site<br> How domain name hijacking (cybersquatting) works<br> How activists Web sites are suppressed by hijacking<br> How to see it coming if a deliberate attack strategy<br> What proxy domain name registry is and why it is a bad thing<br> Who is involved in Web piracy <br> Multiple indicators that military-intelligence community is involved<br> Why proparanoid.com was targeted by hijackers<br> How everyone is a victim<br> What to do about it <br> Note: Colored words are 'first use' key words or concepts<br><br>Navigational headings in this article:<br><br> 1. Introduction<br><br> 2. How as site is hijacked (background)<br><br> 3. The principle players (background)<br><br> 4. How activist site hijacking works<br><br> 5. Politically motivated or legitimate business?<br> Victims would rather fight than pay<br> Arbitration example #1: inept defense<br> Arbitration example #2: charges <br><br> 6. Is there evidence suggesting targeting?<br><br> 7. Is there evidence of conspiracy?<br><br> 8. Is there evidence of SPAM attacks?<br> The SPAM Russians is coming<br> Federal SPAM investigation<br><br> 9. Is there evidence of military-intelligence?<br> Front trait: Multiple firms same address<br> Front trait: Excessive security<br> Military connections?<br> Terrorist Web sites<br> Flock of proprietaries: Vulture's nest<br> Front trait: More bedfellows<br><br>10. Evidence of a pattern of deceit and fraud?<br> CIA porn?<br> Fraud in name only<br> Specific fraud charges<br> Fraud summary: Fight back <p></p><i></i>
User avatar
Hugh Manatee Wins
 
Posts: 9869
Joined: Wed Nov 23, 2005 6:51 pm
Location: in context
Blog: View Blog (0)


Return to Media and Information Technology

Who is online

Users browsing this forum: No registered users and 1 guest