2,930
Views
11
CrossRef citations to date
0
Altmetric
Articles

When everything becomes intelligence: machine learning and the connected world

Bibliography

  • “1st LD-Writethru-China Headlines: Sunway-TaihuLight Outperforms Tianhe-2 as World’s Fastest Supercomputer.” Xinhua News Agency, June 20, 2016. Infotrac Newsstand.
  • Agrell, Wilhelm. “When Everything Is Intelligence – Nothing Is Intelligence – Central Intelligence Agency.” Central Intelligence Agency, October 2002. https://www.cia.gov/library/kent-center-occasional-papers/vol1no4.htm.
  • Anderson, C. “The End of Theory: The Data Deluge Makes the Scientific Method Obsolete.” June 23, 2008. http://www.wired.com/2008/06/pb-theory/.
  • “Before Super-Computers: NSA and Computer Development.” National Security Agency, 2009. https://cryptome.org/0002/nsa-computers.pdf.
  • Betts, Richard K. “Analysis, War, and Decision: Why Intelligence Failures are Inevitable.” In Intelligence Theory: Key Questions and Debates, edited by Peter Gill, Stephen Marrin, and Mark Phythian, 93. New York: Routledge, 2009.
  • “Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights.” Executive Office of the President, 2016.
  • “Big Data: Seizing Opportunities, Preserving Values.” Executive Office of the President, 2014. https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf.
  • Blake, Linda, and Jim Lande. Trends in the U.S. International Telecommunications Industry. Washington, DC: Federal Communications Commission, 1998.
  • Brantly, Aaron. “Innovation and Adaptation in Jihadist Digital Security.” Survival 59, no. 1 (2017): 79–102.
  • Burke, Colin B. It Wasn’t All Magic: The Early Struggle to Automate Cryptanalysis 1930s – 1960s. Ft. Meade: Center for Cryptologic History at the National Security Agency, 2002.
  • Clapper, James R. “Luncheon Remarks, Association of Former Intelligence Officers.” In The Intelligence, AFIO newsletter, McLean, VA (October 3, 1995) cited in Loch K. Johnson The Oxford Handbook of National Security Intelligence. Oxford: Oxford University Press, 2012.
  • Clark, Robert M. Intelligence Analysis: A Target-Centric Approach. Washington, DC: CQ Press, 2004.
  • “computer, n.”. OED Online. Oxford University Press, December 2016. Accessed February 12, 2017. http://www.oed.com/view/Entry/37975?redirectedFrom=Computer
  • Coulthart, Stephen. “Why Do Analysts Use Structured Analytic Techniques? An in-Depth Study of an American Intelligence Agency.” Intelligence and National Security 33, no. 2 (2016): 942.
  • Dubhashi, Devdatt, and Shalom Lappin. “AI Dangers: Imagined and Real.” Communications of the ACM 60, no. 2 (2017): 43–45.
  • Dupont, Alan. “Intelligence for the Twenty-First Century.” Intelligence and National Security 18, no. 4 (2003): 15–39.
  • “Edward Snowden: Leaks That Exposed US Spy Programme – BBC News.” BBC.com, January 17, 2014. http://www.bbc.com/news/world-us-canada-23123964.
  • Evans, Dave. “The Internet of Things.” CISCO Internet Business Solutions Group, 2011. http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf.
  • Etzioni, Amitai, and Oren Etzioni. “Designing AI Systems that Obey Our Laws and Values.” Communications of the ACM 59 no (9) 2016: 29–31.
  • Gellman, Barton, and Laura Poitras. 2013. “U.S., British Intelligence Mining Data From Nine U.S. Internet Companies in Broad Secret Program.” The Washington Post, June 7.
  • Gill, Peter, Stephen Marrin, and Mark Phythian. Intelligence Theory: Key Questions and Debates. London: Routledge, 2009.
  • Grimmer, Justin. “We Are All Social Scientists Now: How Big Data, Machine Learning, and Causal Inference Work Together.” PS Political Science and Politics 48, no. 1 (2014): 80–83.
  • Hedley, Jason H. “Analysis for Strategic Intelligence.” In Handbook of Intelligence Studies, edited by Loch K. Johnson. London: Routledge, 2010.
  • Hinsley, F. H., and Alan Stripp. Codebreakers: The Inside Story of Bletchley Park, 144. New York: Oxford University Press, 2011.
  • Honig, Or Arthur. “A New Direction for Theory-Building in Intelligence Studies.” International Journal of Intelligence and Counter Intelligence 20, no. 4 (2007): 699–716.
  • Howe, George F. “The Early History of NSA.” Cryptologic Spectrum 4, no. 2 (1974): 17. https://www.nsa.gov/public_info/_files/cryptologic_spectrum/early_history_nsa.pdf
  • Ivakhnenko, A. G., and Valentin Grigor’evich Lapa. Cybernetic Predicting Devices. New York: CCM Information Corp, 1973.
  • Johnson, Loch. “Bricks and Mortar for a Theory of Intelligence.” Comparative Strategy 22, no. 1 (2013): 1–28.
  • Joint Publication 2-0 Joint Intelligence. Joint Chiefs of Staff. US Department of Defense, 2013. http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp2_0.pdf
  • Keele, Luke. “The Discipline of Identification.” PS Political Science and Politics 48, no. 1 (2014): 102–106.
  • Kitchin, R. The Data Revolution. Thousand Oaks, CA: SAGE, 2014.
  • Lazer, D., R. Kennedy, G. King, and A. Vespignani. “The Parable of Google Flu: Traps in Big Data Analysis.” Science 343, no. 6176 (2014): 1203–1205.
  • MacAskill, Ewen, and Gabriel Dance. “NSA Files Decoded: Edward Snowden’s Surveillance Revelations Explained.” The Guardian, November 1, 2013.
  • MacDonald, Margaret S., and Anthony G. Oettinger. “Information Overload: Managing Intelligence Technologies.” Harvard International Review 24, no. 3 (2002): 44–48. Harvard International Relations Council.
  • Marchio, Jim. 2014. “Analytic Tradecraft and the Intelligence Community: Enduring Value, Intermittent Emphasis.” Intelligence and National Security 29, no. 2 (2014): 159–183.
  • Markram, Henry. “The Human Brain Project.” Scientific American 306, no. 6 (2012): 50–55.
  • Marrin, Stephen. “Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities.” Intelligence and National Security 22, no. 6 (2008): 821–846.
  • McKay, Sinclair. The Secret Lives of Codebreakers: The Men and Women Who Cracked the Enigma Code at Bletchley Park, 6. New York: Plume, 2012.
  • Minsky, Marvin. “Steps Toward Artificial Intelligence.” Proceedings of the IRE, January 1961.
  • Monroe, Burt L., Jennifer Pan, Margaret E. Roberts, Maya Sen, and Betsy Sinclair. “No! Formal Theory, Causal Inference, and Big Data Are Not Contradictory Trends in Political Science.” PS Political Science and Politics 48, no. 1 (2014): 71–74.
  • Morell, Michael J., Richard A. Clarke, Geoffrey R. Stone, Peter P. Swire, and Cass R. Sunstein. The NSA Report: Liberty and Security in a Changing World. Princeton: Princeton University Press, 2014.
  • Mintz, Alex, and Carly Wayne. The Polythink Syndrome: U.S. Foreign Policy Decisions on 9/11, Afghanistan, Iraq, Iran, Syria, and ISIS. Stanford: Stanford University Press, 2016.
  • National Research Council. Bulk Collection of Signals Intelligence: Technical Options. Washington, DC: The National Academies Press, 2015.
  • Nordrum, Amy. “Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated.” IEEE Spectrum, August 2016.
  • Oneil, Cathy. Weapons of Math Destruction How Big Data Increases Inequality and Threatens Democracy. Oxford: Broadway Books, 2017.
  • Pannerselvam, John, Lu Liu, and Richard Hill. “An Introduction to Big Data.” In Application of Big Data for National Security, edited by Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Staniforth, and Petra Saskia Bayerl, 20. Oxford: Butterworth-Heinemann, 2015.
  • Puiu, Tibi. “Your Smartphone Is Millions of Times More Powerful That All of NASA’s Combined Computing in 1969.” Zmescience.com, October 12, 2015. http://www.zmescience.com/research/technology/smartphone-power-compared-to-apollo-432/.
  • Rhodes, Richard. The Making of the Atomic Bomb, 772. London: Simon & Schuster, 2012.
  • Scott, Len, and Peter Jackson. “The Study of Intelligence in Theory and Practice.” Intelligence and National Security 19, no. 2 (2004): 139–69.
  • Shalev-Shwartz, Shai, and Shai Ben-David. Understanding Machine Learning: From Theory to Algorithms. New York: Cambridge University Press, 2016, XV.
  • Tillman, Karen. “How Many Internet Connections Are in the World? Right. Now.” CISCO Blogs. Accessed July 29, 2013. http://blogs.cisco.com/news/cisco-connections-counter.
  • Van Evera, Stephen. Guide to Methods for Students of Political Science. Ithaca, NY: Cornell University Press, 1997.
  • Wall, Andru E. “Demystifying the Title 10-Title.” Harvard National Security Journal 3 (March 2014): 86.
  • Warner, Michael. “Wanted: A Definition of ‘Intelligence’.” Studies in Intelligence 46, no. 3 (2017): 18–22.
  • Whittaker, Zack. “NSA Is So Overwhelmed with Data, It’s No Longer Effective, Says Whistleblower | ZDNet.” ZDNet, April 27, 2016. http://www.zdnet.com/article/nsa-whistleblower-overwhelmed-with-data-ineffective/.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.