Posted on 02/03/2013 1:11:49 PM PST by Lazamataz
I. Introduction Social media platforms are changing the way organizations are communicating to the public Conversations are happening all the time and everywhere. There is need for the Communications Group to be timely and proactively aware of the reactions and opinions expressed by the general public as it relates to the Federal Reserve and its actions on a variety of subjects.
II. Social Listening Platforms Social media listening platforms are solutions that gather data from various social media outlets and news sources. They monitor billions of conversations and generate text analytics based on predefined criteria. They can also determine the sentiment of a speaker or writer with respect to some topic or document. The information gathered can guide the organizations public relations group in assessing the effectiveness of communication strategies.
Here are some of the services it can offer: o Track reach and spread of your messages and press releases o Handle crisis situations o Continuously monitor conversations o Identify and reach out to key bloggers and influencers o Spot emerging trends, discussions themes and topics
A. Geographic scope of social media sites The solution must support content coming from different countries and geographical regions. It should also support multiple languages.
B. Content and Data Types The solution must be able to gather data from the primary social media platforms Facebook, Twitter, Blogs, Forums and YouTube. It should also be able to aggregate data from various media outlets such as: CNN, WSJ, Factiva etc.
C. Reports and Metrics The solution must provide real-time monitoring of relevant conversations. It should provide sentiment analysis (positive, negative or neutral) around key conversational topics. It must be able to provide summaries or high level overviews of a specific set of topics. It should have a configurable dashboard that can easily be accessed by internal analysts or management. The dashboard must support customization by user or group access. The solution should provide an alerting mechanism that automatically sends out reports or notifications based a predefined trigger.
D. FRBNY Technology Integration The solution must be able to integrate with existing FRBNY technologies such as: Google Search appliance, Lotus notes suite and web trends.It must have support for single sign on or windows integrated authentication.
E. Cost Structure The solution should offer a flexible pricing structure that can support multiple user licensing. It should also have the option to base pricing on content volume and usage. Supplier acknowledges an understanding of and agrees to comply with the above minimum solutions requirements.
Law Enforcement is crawling that network (and rightly so, abused to the hilt it is).
And it really doesn’t matter, in the major telco’s (the ones running the “backbones”) is “the closet”. The one little area secured where physical lines drop in and out of. And besides the physical lines, once it (communications) bounces up towards satellites, its just a matter of intercept and decrypt. You really think company “x” gets the okay to send something “up there” with out Uncle Sam’s approval?
Compounding the injuries are the chicoms with their access via compromised chipsets in some major network gear that was made via outsourcing. I would need to do some digging, but there are serious questions about our military networks and these “fake” chips/gear and who really has what access at any given time.
You don’t really believe that’s the primary intended use for this, do you?
Riiiight...the CIA is looking for "Islamic terrorists" - you know, the kind of people who go to church on Sunday, belong to the NRA, take the Constitution at face value, kvetch about the Federal Reserve, and grow their own food.
The Nazis took over the OSS when it became the CIA and have been in bed with their natural allies, the muzzies, ever since.
http://www.youtube.com/watch?v=fmrbee4Je6U
>>All of our identities are known or at least filed somewhere.<<
No one but JR knows my RL identity — and that is offline (on check memo lines).
There is no file linking “Freedumb2003” with me.
Not perfect but it's something for Mozilla maybe IE. And it's free.
And soon the government will know more accurately about your beliefs and leanings and tendencies to "evil" than you will know about yourself.
Before that the government will need to invent "NEWSPEAK and imbue you with NEWTHINK to straighten you out while you are held in the camp.
Obama is only paving the way.
The NSA Is Building the Countrys Biggest Spy Center (Watch What You Say)
The former NSA official held his thumb and forefinger close together:
We are that far from a turnkey totalitarian state.
For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: Its a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nations cybersecurity. While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how its collected, and what is done with the material are far more important issues. Battling hackers makes for a nice coverits easy to explain, and who could be against it? Then the reporters turned to Hatch, who proudly described the center as a great tribute to Utah, then added, I cant tell you a lot about what theyre going to be doing, because its highly classified.
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/3/
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
security through obscurity. Its the only way these days. Don’t leave a discernible pattern to identify yourself.
If FR wants to get into the fray, force 2048 bit https traffic only; might not do much overall to “stop” the eves dropping, but wouldn’t make it easy either.
Really doesn’t matter however, so many of us and our habits are easily tracked simply by the cell phones in our pockets anyway. As others have pointed out, the Internet does not forget. And as you point out, information is gladly given up by companies. The correlation was already “made” and was done so a while ago. Our locations are easy at this point by cell tower alone.
You’ve been around long enough, sure you know of echelon. Its only gotten bigger and badder.
Security through obscurity is pretty much the best chance at this point. That or just unplug.
Bookmarked for later read..
And you go by Diana in Wisconsin?
Echelon, carnivore, omnivore...
bfl
Thanks, was afraid of that; appreciate getting back to me.
Um, Laz, we’ve known this for many, many years. There isn’t a byte transmitted on the Internet, microwave stations, land lines, laser links, phone cables, etc. that isn’t snooped on. The NSA/CIA have maintained listening posts worldwide and in the US for decades, law notwithstanding. The NSA hasn’t even been shy lately about their building of petabyte installations and the hiring untold numbers of “analysts” and engineers. Their press releases don’t seem to make the news but they even declassified the existence of the downlink and controls stations over 15 years ago.
Anyone in the intel community admitting anything but this subject might as well admit water is wet.
Lead the way... ;)
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.