No More Secrets:
National Security Strategies for a Transparent World
June 29, 2010
Selected References, Links and Background Reading
- Huffington Post link to an item posted by Suzanne Spaulding.
- Jeff Jonas' IBM commercial.
- IBM's Internet of Things video.
- Don Burke's comment on the following video: "I continue to find this video that explains accelerating change to be a powerful tool for conveying this hard-to-understand topic: 'Are Humans Smarter Than Yeast'"
- Blog post about the new Chevy Volt is illustrative of how everything is being connected:
- Biology and Silicon joining together:
- Machines increasingly taking on biological forms (we're learning from evolution) and doing things that are increasingly life-like.
- Sentient Machines
- Intelligent aggregators
- Siri "your personal assistant for the mobile web"
- an " innovative personalization technology, which can predict a user's interests through an automated semantic analysis of publicly available information. Our predictive content engine will generate a personalized news feed customized just for you. If you are a publisher, ad network or direct marketer and are interested in learning how our B2B content personalization and behavioral targeting solutions can help improve your business, please contact us."
- escience news is compiled by an artificial intelligence engine.
- Sensored Planet (and bodies)
- Reports and Recommended Readings
- CSI Report: "Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis" by Jeffrey R. Cooper, December 2005
- Report: "New Approaches to Cyber-Deterrence: Initial Thoughts on a New Framework" by Jeffrey R. Cooper, SAIC, December 29, 2009. This report, done under USD(I) auspices, built on three years of previous Highlands Forum work to appreciate the implications of identity and attribution on cyber-security as well as attempts to better understand the relationship of the evolving international security environment and cyber issues. It includes a lengthy discussion of the “cooperation, competition, conflict” (3Cs) framework that Richard O’Neill mentioned at the workshop as well as introducing the concept of “networked deterrence.”
- CISP Report: "Towards a National Information Strategy: Aligning Responsibility, Authority and Capability to Provide for the Common Defense" by Jeffrey R. Cooper, September 1, 2009
From the Introduction: "The Information Revolution, as with previous technological "disruptions," promises to bring another in a the series of fundamental transformations in how society functions, including how we plan and execute critical national security tasks. . ."
- IT Journal, Winter 2007-2008, "No More Secrets"
- Report by the Digital Connections Council of the Committee for Economic Development – April 2006 – “Open Standards, Open Source and Open Innovation: Harnessing the Benefits of Openness”
- Bob Brewin, No More Secrets, email@example.com, September 15, 2008
- Privacy and Security: Myths and Fallacies of “Personally Identifiable Information” By: Arvind Narayanan and Vitaly Shmatikov Introduction: Developing effective privacy protection technologies is a critical challenge forsecurity and privacy research as the amount and variety of data collected about individuals increase exponentially.
- A Practical Attack to DeAnonymize Social Network Users By: Wondracek, Holz, Kirda, and KruegelInt. Secure Systems LabVienna University of TechnologyBrief presentation on the attack results and methods used against social network sites such as Facebook, LinkedIn, and other widely utilized social networking sites.