background preloader

Canal Blog

Canal Blog
L’Europe, c’est la guerre ? Le concept d’union européenne peut-il encore faire illusion ? Bercés par les comptines eurobéates et les poncifs d’une propagande parfaitement orchestrée, les citoyens d’Europe n’ont que tardivement pris conscience de l’incroyable supercherie que constitue l’Union européenne. Une technocratie s’est ainsi construite durant trente ans, au nez et à la barbe des nations qui ne voyaient là qu’un « machin» inutile et inoffensif. Désormais impossible à arrêter, ce processus met en évidence une théorie analytique dite des "champs de force" et dont la cohérence stratégique ne peut être observée qu’une fois le fait accompli. Alors que les « eurosceptiques » (en termes de manipulation, on appelle cela un mot piégé), ont longtemps été déconsidérés, le storytelling eurobéat s’est finalement heurté à la sanction des urnes lors des différents référendums sur la consitution européenne.

http://cerad.canalblog.com/

Related:  Intelligence Analysis Blogs

Secrecy News (Federation of American Scientists) The number of chronically homeless persons in the U.S. dropped from more than 120,000 in 2008 to around 84,000 in 2014, a new report from the Congressional Research Service notes. The federal government has undertaken to end chronic homelessness by 2017. “One of the reasons that federal programs have devoted resources to ending chronic homelessness […] Read More The national census in 2020 will be the first to rely primarily on the Internet for collecting census data, thereby creating new avenues for fraud and disruption. A new report from the JASON scientific advisory panel describes the problem and outlines some solutions.

Veille et intelligence stratégique sur Internet Veille et intelligence stratégique sur Internet Fondé en 1995 par Joël de Rosnay et Carlo Revelli, Cybion est un cabinet de conseil en Veille et Intelligence stratégique. Nous mettons l’intelligence humaine au cœur du dispositif de Veille. Nous analysons des dizaines de milliers de sources formelles et informelles (sites, commentaires blogs, forums, réseaux sociaux) qui nous permettent d’appréhender précisément votre environnement et de répondre à vos attentes de façon adaptée : analyse concurrentielle, analyse du marché, observation des opinions, identification des leaders et traitement des risques de crise.

Global Guerrillas Tesla's autopilot went live a couple of weeks ago (it's one of the first car brands to do this). Unlike the autopilots and cruise controls of the past, it's an autonomous system. This means it isn't limited to the capabilities you get when you pop it out of the box. It gets better as you train it and provide it with experience. Tesla's AP Here's some first hand feedback from Tesla drivers on how fast the autopilot is learning:

INSA Cyber Intelligence Blog Contributors All blog contributors are members of the Cyber Intelligence Task Force, though some guest submissions may be solicited by task force members. If you would be interested in becoming a contributor or submitting a guest post, INSA encourages you to consider an individual INSA membership. An annual membership is only $20 for students, and $40 for professionals in government and academia. In addition to becoming a blog contributor, INSA membership includes benefits such as access to INSA events and members-only publications. INSA public relations and communications staff review all submissions for suitability and to ensure they align with the blog’s mission.

Ponemon We are pleased to let you know about our latest study on intelligence sharing. The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way reveals interesting trends in how organizations are participating in initiatives or programs for exchanging threat intelligence with peers, industry groups, IT vendors and government. According to the 692 IT and IT security practitioners surveyed, there is more recognition that the exchange of threat intelligence can improve an organization’s security posture and situational awareness. However, concerns about trust in the sources of intelligence and timeliness of the information continue to be a deterrent to participation in such initiatives.

Best Defense Click Here to Subscribe to FP Premium for 50% Off An Over $400 a Year Value for Just $4.99 per month! In addition to the benefits of FP All Access » (unlimited articles and newsletters, custom alerts and access to the digital edition of the magazine — $59.99 a year value), that have won worldwide acclaim and an audience of millions for Foreign Policy, FP Premium subscribers receive: The Director's Desk Those who know me, even in passing, generally realize that I'm interested in technology. Probably because this is so well known, I am often asked to serve on advisory groups, committees, and such when the issue at hand is technological. In reality, my reputation exceeds me, but nevertheless, it has stuck. This week, two meetings on matters technological caused me to think. The first was a rather informal get together at the Lancaster County Emergency Operations Center. This one was intended as a demonstration for those in attendance of some of the web-based applications we have, both public and internal, that assist in managing critical incidents.

War on the Rocks Sign in to War on the Rocks or create an account Sign in with Facebook Sign in with Google Sign in with Twitter Sign in with LinkedIn Sign in or sign up with email Login Software Engineering Institute: Carnegie Mellon Posted on by Troy Townsend in Cyber-physical Systems The majority of research in cyber security focuses on incident response or network defense, either trying to keep the bad guys out or facilitating the isolation and clean-up when a computer is compromised. It's hard to find a technology website that's not touting articles on fielding better firewalls, patching operating systems, updating anti-virus signatures, and a slew of other technologies to help detect or block malicious actors from getting on your network. What's missing from this picture is a proactive understanding of who the threats are and how they intend to use the cyber domain to get what they want. Earlier this year, representatives from the government approached the SEI Emerging Technology Centerabout conducting research to assess the state of the practice of cyber intelligence.

Platform for WKSH8533A: Geospatial Tools for Nonproliferation Analysis (1 Credit) Welcome! For the first day of class, please complete these tasks. Here is the syllabus for your review. You will find these recommended readings helpful as well. Frank V. Sources And Methods: New Wikipedia Articles Of Interest To Intelligence Professionals Despite its occasional weaknesses, I really like Wikipedia. Others (perhaps unnecessarily) worry about an encyclopedia that is editable by anyone. Whether you like it or not, however, it is undeniably the tertiary source of first resort for most of the planet. One of the things that has always bothered me about it, though, is the generally poor coverage of issues related to intelligence. From intelligence history to intelligence theory, Wikipedia, in my opinion, needs help.That is why, instead of traditional writing assignments in some of my classes, I like to task students to write Wikipedia articles about intelligence issues that have not already been covered.

Related: