netwit 2.01

#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?



Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.



Advertisements

January 17, 2011 Posted by | "Collateral Murder" video, actor-network theory, Afghanistan documents, anonymity online, anonymous whistleblowing, Birgitta Jónsdóttir, Bradley Manning, Canberra cyber security centre, China, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, Daniel Domscheit-Berg, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Defence Signals Directorate (DSD, Department of Homeland Security, Der Spiegel, digital forensics, digital journalism, diplomatic cables, Echelon spy system, Electronic Frontier Foundation (EFF), encryption, Evgeny Morozov, FaceBook, FGI, free government information [FGI], Frontline Club, Government 2.0, hacker culture, Hrafnsson, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Iraq War 2003, Iraq war logs, Jaron Lanier, Jónsdóttir, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, on-line rights, ontology, Open data, open source, organisational network analysis, P2P, P2P Foundation, Peer-to-Peer, Phorm, Pretty Good Privacy (PGP), privacy, Protecting Cyberspace as a National Asset Act (PCNAA), rogue employee, Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, social silos, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Tor, trust, trust models, Twitter, Virtual Private Network (VPN), virtual tunnel, visualisation, Web 2.0, WikiLeaks | Leave a comment

OPEN DATA Initiatives and visualisation techniques



Data super-visualisation in Prof. Rosling’s BBC Programme, The Joy of Stats., shown on BBC TV in November 2010. He uses Trendalyzer software.

The full 60 min. prog. is now available worldwide on Rosling’s Gapminder site: The Joys of Stats

TED has a set of Rosling’s talks.

YouTube search on Hans Rosling has many more.

The BBC programme was aired was right in the middle of Wik/Ass. Didn’t immediately see the connection between WikiLeaks data and visualisation. Hadn’t yet seen the visualisations for the Iraq war logs.

Making data dance – Hans Rosling has become an online star by using data visualisations to make serious points about health policy and development

Economist 9 Dec 2010

His stats website is :
Gapminder

The bit that particularly fascinated me in the BBC Rosling documentary – though it was all fascinating – was about San Franscico’s open data policy, exemplified by the release of the Police Department’s crime reports, which has been tuurned into an interactive map by Michael Migurski andEric Rodenbeck of Stamen Design > Crimespotting

 

 

Stills from Joy of Stats showing real-time changes in crime patterns



Rosling talks of community statistics in action, with the public looking at the data and suggesting ideas to tackle crime or improve neighbourhoods.

Local government is adopting open data policies with alacrity.  A quick search shows the extent of developments.

DataSF –  datasets available from the City & County of San Fransisco

Innovative Open Data Legislation San Francisco

Page from Rotterdam Open Data with links to San Fransisco Open Data legislation  recently enacted

Open Data Links, a page from Visible Government, A Canadian initiative ‘promoting online tools for government transparency.’

E.g.  Fix My Street Canada

Other open data projects

Radical cartography – race maps for Chicago, New York, San Jose

Rotterdam Open Data –  lists projects from many coutries

e.g.  Trafford  Open Data Maps (Manchester, UK)

Another project from the UK:

Crime Mapping

e.g.  Cornwall Crime stopper produced using InstaAtlas which has 2 other examples

Other:

Chart Wars: The Political Power of Data Visualization

5 min video extolling the virtues of visualisation and graphic literacy.

From StreetsBlog.org :

Mapping your city with pictures taken by others

Radical Cartography and Urban Racial Maps



December 20, 2010 Posted by | graphic literacy, Iraq war logs, Open data, public statistics, visualisation | 1 Comment

NETWORK FORENSICS SOFTWARE NetWitness NextGen










” In many ways we can be described as data we send or receive in today’s network connected environment ”


Chief Technology Officer, NetWitness













“Accessing captured content for network investigations….”

“…A revolutionary new way to Visualize network traffic, NetWitness Visualize brings the data to you in a dynamic and interactive interface that anyone can interpret.”


Network forensics gets a ‘Minority Report’-style UI
– A network security traffic analysis tool, sporting a wicked UI, heralds a new era of easy cyber forensics



NetWitness NextGen

Know Your Network Like Never Before. Move into the Next Generation of Network Security Monitoring. NetWitness NextGen™.

NetWitness NextGen is the most comprehensive network security monitoring solution ever developed. It is the industry’s first security monitoring software that records everything on the network, re-using it multiple times to solve some of the most challenging problems facing organizations today: insider threats, data leakage, malware activity, asset misuse, network anomalies, compliance, and network e-discovery.

The Threat Landscape
We all can read the headlines – organizations are being hit every day and we are in the middle of an ongoing cyber war.

The external threats are clear and present:

* State-sponsored intrusions and data exfiltrations
* Non-state actors and terrorist groups
* Well-funded and highly-sophisticated organized crime and espionage rings

There are serious problems inside our organizations too:

* Disgruntled employees
* Criminals
* Misconfiguration of systems and networks
* User errors and lack of security awareness
* Volumes of regulatory challenges

The Historical Response
Typical security investments to date have focused on creating islands or layers of protection by installing point solutions that detect a specific problem, issue or threat. Your adversaries don’t think about security as a set of “issues” for which there are multiple answers – they think about how to use the network to get to your data. An effective approach requires organizations to stop deploying point solutions that create protection gaps and overlaps, and start thinking about security as a single requirement.


NetWitness Informer [You can play a bit with the software]


NetWitness Investigator

How do you resolve alerts from your IDS or SIM that you do not understand?
Can you quickly understand the scope and impact of malicious activity on your network?
How can you investigate who is leaking information to your competitors or the press?

Introducing NetWitness Visualize

A revolutionary new way to Visualize network traffic, NetWitness Visualize brings the data to you in a dynamic and interactive interface that anyone can interpret. Included in Informer 2.0, this new feature leverages the award-winning NetWitness NextGen network capture and analysis infrastructure to automatically retrieve and display images, documents, audio and VoIP conversations of interest. Speed up investigations, monitor sensitive documents, and uncover a view of your IT infrastructure that you’ve never seen before.


December 18, 2010 Posted by | asset misuse, compliance, data journalism, data leakage, digital journalism, insider threats, network anomalies, network e-discovery, Network security, network theory, visualisation, WikiLeaks | Leave a comment

WIKILEAKS GUARDIAN DIGITAL JOURNALISM US EMBASSY CABLES





WikiLeaks embassy cables: download the key data and see how it breaks down

The WikiLeaks embassy cables release has produced a lot of stories but does it produce any useful data? We explain what it includes and how it breaks down – plus you can download the key data for every cable
Get the data
Wikileaks cables: the interactive guide to what we’ve published

 

 

December 17, 2010 Posted by | digital journalism, Guardian, visualisation, WikiLeaks | , | Leave a comment

WIKILEAKS GUARDIAN DIGITAL JOURNALISM VISUALISATION IRAQ WAR LOGS






Wikileaks Iraq: how to visualise the text

Jonathan Stray shows how AP developed a revolutionary approach to text as data
Download a high-res version here
More of our Wikileaks data journalism


The author of the Guardian article Jonathan Stray, explains more about visualisation in his blog: A full-text visualization of the Iraq War Logs, in which he links to a page in Columbia Journalism review, which surveys visualisation projects: Visualizing the Iraq War Logs – How The New York Times and The Guardian did it



December 17, 2010 Posted by | data journalism, digital journalism, Guardian, Jonathan Stray, Julian Assange, visualisation, WikiLeaks | , , | Leave a comment