NameBase

Last updated

NameBase is a web-based cross-indexed database of names that focuses on individuals involved in the international intelligence community, U.S. foreign policy, crime, and business. The focus is on the post-World War II era and on left of center, conspiracy theory, and espionage activities up to 2008. [1]

Contents

Overview

Founder Daniel Brandt began collecting clippings and citations pertaining to influential people and intelligence agents in the 1960s [2] . He did so especially in the 1970s after becoming a member of Students for a Democratic Society, an organization that opposed US foreign policy. [1] With the advent of personal computing, he developed a database which allowed subscribers to access the names of US intelligence agents. [3]

In the 1980s, through his company Micro Associates, he sold subscriptions to this computerized database under its original name, Public Information Research Inc. (PIR). At PIR's onset, Brandt was President of the newly formed non-profit corporation, and investigative researcher Peggy Adler served as its Vice President. The material was described as "information on all sorts of spooks, military officials, political operators and other cloak-and-dagger types". [4] He told The New York Times at the time that "many of these sources are fairly obscure so it's a very effective way to retrieve information on U.S. intelligence that no one else indexes." [5] One research librarian calls it "a unique part of the 'Deep Web'", equally useful to investigative journalists and students. [6]

By 1992, private citizens, news organizations, and universities were all using NameBase. [7] With the advent of public access to the Internet and World Wide Web in the 1990s these efforts became the basis of the NameBase website starting in 1995.[ citation needed ]As of 2003, the database contained "over 100,000 names with over 260,000 citations drawn from books and serials with a few documents obtained under the Freedom of Information Act." [8] The website utilizes hyperlinks to allow users to both visualize relationships in a social network diagram and access diagrams and links of those who appear on it. These linkages, diagrams, and hyperlinked footnoted information allow users to uncover potential relationships or connections between individuals and groups. [6] NameBase was described by information scientist Paul B. Kantor as being the "only web-based tool readily available for visualizing social networks of terrorism researchers." [9]

Similar projects

In the 1980s Daniel Brandt taught former CIA employee Philip Agee how to use computers and computer databases for his research.[ citation needed ] Former CIA analyst Ralph McGehee developed a similar database he called CIABASE, a website containing information on events, people, and programs concerning the CIA or American intelligence, including links to other texts available to the public.

The Notable Names Database (NNDB) is an online database and self-described "intelligence aggregator" bringing together the biographical details of over 40,000 people. [10]

See also

Related Research Articles

<span class="mw-page-title-main">Semantic network</span> Knowledge base that represents semantic relations between concepts in a network

A semantic network, or frame network is a knowledge base that represents semantic relations between concepts in a network. This is often used as a form of knowledge representation. It is a directed or undirected graph consisting of vertices, which represent concepts, and edges, which represent semantic relations between concepts, mapping or connecting semantic fields. A semantic network may be instantiated as, for example, a graph database or a concept map. Typical standardized semantic networks are expressed as semantic triples.

Text mining, text data mining (TDM) or text analytics is the process of deriving high-quality information from text. It involves "the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources." Written resources may include websites, books, emails, reviews, and articles. High-quality information is typically obtained by devising patterns and trends by means such as statistical pattern learning. According to Hotho et al. (2005) we can distinguish between three different perspectives of text mining: information extraction, data mining, and a knowledge discovery in databases (KDD) process. Text mining usually involves the process of structuring the input text, deriving patterns within the structured data, and finally evaluation and interpretation of the output. 'High quality' in text mining usually refers to some combination of relevance, novelty, and interest. Typical text mining tasks include text categorization, text clustering, concept/entity extraction, production of granular taxonomies, sentiment analysis, document summarization, and entity relation modeling.

Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

<span class="mw-page-title-main">Microsoft Visio</span> Diagramming and vector graphics software application

Microsoft Visio is a diagramming and vector graphics application and is part of the Microsoft Office family. The product was first introduced in 1992, made by the Shapeware Corporation, later renamed Visio Corporation. It was acquired by Microsoft in 2000. A lightweight version of Visio is now included with all commercial SKU of Microsoft 365 and is known as Visio in Microsoft 365. It has two other subscription based SKUs. Visio Plan 1 includes the Visio web app whereas Visio Plan 2 provides access to both the web app as well as the Desktop application.

In-Q-Tel (IQT), formerly Peleus and In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies to keep the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability. The name "In-Q-Tel" is an intentional reference to Q, the fictional inventor who supplies technology to James Bond.

<span class="mw-page-title-main">Ben Shneiderman</span> American computer scientist

Ben Shneiderman is an American computer scientist, a Distinguished University Professor in the University of Maryland Department of Computer Science, which is part of the University of Maryland College of Computer, Mathematical, and Natural Sciences at the University of Maryland, College Park, and the founding director (1983-2000) of the University of Maryland Human-Computer Interaction Lab. He conducted fundamental research in the field of human–computer interaction, developing new ideas, methods, and tools such as the direct manipulation interface, and his eight rules of design.

A mashup, in web development, is a web page or web application that uses content from more than one source to create a single new service displayed in a single graphical interface. For example, a user could combine the addresses and photographs of their library branches with a Google map to create a map mashup. The term implies easy, fast integration, frequently using open application programming interfaces and data sources to produce enriched results that were not necessarily the original reason for producing the raw source data. The term mashup originally comes from creating something by combining elements from two or more sources.

<span class="mw-page-title-main">System Architect</span> Enterprise architecture tool

Unicom System Architect is an enterprise architecture tool that is used by the business and technology departments of corporations and government agencies to model their business operations and the systems, applications, and databases that support them. System Architect is used to build architectures using various frameworks including TOGAF, ArchiMate, DoDAF, MODAF, NAF and standard method notations such as sysML, UML, BPMN, and relational data modeling. System Architect is developed by UNICOM Systems, a division of UNICOM Global, a United States-based company.

The Great Britain Historical GIS is a spatially enabled database that documents and visualises the changing human geography of the British Isles, although is primarily focussed on the subdivisions of the United Kingdom mainly over the 200 years since the first census in 1801. The project is currently based at the University of Portsmouth, and is the provider of the website A Vision of Britain through Time.

<span class="mw-page-title-main">Web of Science</span> Online subscription index of citations

The Web of Science is a paid-access platform that provides access to multiple databases that provide reference and citation data from academic journals, conference proceedings, and other documents in various academic disciplines. Until 1997, it was originally produced by the Institute for Scientific Information. It is currently owned by Clarivate.

Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.

The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. A-Space is built on Jive Software's Clearspace application.

<span class="mw-page-title-main">Co-occurrence network</span>

Co-occurrence network, sometimes referred to as a semantic network, is a method to analyze text that includes a graphic visualization of potential relationships between people, organizations, concepts, biological organisms like bacteria or other entities represented within written material. The generation and visualization of co-occurrence networks has become practical with the advent of electronically stored text compliant to text mining.

InetSoft Technology Corporation is a privately owned multinational computer software company that develops free and commercial web-based business intelligence applications. The company was founded in 1996, and currently has over 120 employees between its corporate headquarters in Piscataway, New Jersey, and development offices in Beijing and Xi'an, China.

Martin M. Wattenberg is an American scientist and artist known for his work with data visualization. He is currently the Gordon McKay Professor of Computer Science at the Harvard University School of Engineering and Applied Sciences.

Recorded Future is a privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.

In network theory, link analysis is a data-analysis technique used to evaluate relationships between nodes. Relationships may be identified among various types of nodes (100k), including organizations, people and transactions. Link analysis has been used for investigation of criminal activity, computer security analysis, search engine optimization, market research, medical research, and art.

Computational Law is the branch of legal informatics concerned with the automation of legal reasoning. What distinguishes Computational Law systems from other instances of legal technology is their autonomy, i.e. the ability to answer legal questions without additional input from human legal experts.

<span class="mw-page-title-main">Clarivate</span> American analytics company

Clarivate Plc is a British-American publicly traded analytics company that operates a collection of subscription-based services, in the areas of bibliometrics and scientometrics; business / market intelligence, and competitive profiling for pharmacy and biotech, patents, and regulatory compliance; trademark protection, and domain and brand protection. In the academy and the scientific community, Clarivate is known for being the company which calculates the impact factor, using data from its Web of Science product family, that also includes services/applications such as Publons, EndNote, EndNote Click, and ScholarOne. Its other product families are Cortellis, DRG, CPA Global, Derwent, MarkMonitor, CompuMark, and Darts-ip, and also the various ProQuest products and services.

References

  1. 1 2 "NameBase tracks lesser-known political players". Online . Vol. 20, no. 5. Sep–Oct 1996. p. 74. Archived from the original on 2012-10-21.
  2. Farhad Manjoo (August 29, 2002). "Meet Mr. Anti-Google". Slate . Citing a review in College & Research Libraries News .
  3. Daniel Brandt (December 1992), "An Incorrect Political Memoir", Lobster-magazine.co.uk, no. 24
  4. Morley, Jefferson; Corn, David (November 7, 1988). "Beltway Bandits: Tinker, Tailor, Soldier, Spywatcher". The Nation . Archived from the original on May 16, 2011. Retrieved January 16, 2012.
  5. Gerth, Jeff (October 6, 1987). "Washington Talk: The Study of Intelligence; Only Spies Can Find These Sources". New York Times . Retrieved January 16, 2012.
  6. 1 2 O'Hanlon, Nancy (May 23, 2005). "The Right Stuff: Research Strategies for the Internet Age" (PDF). Ohio State University Libraries. Retrieved 2023-08-22.
  7. "Deadly Data". The Progressive . Madison, Wisconsin: Progressive, Inc. 56 (1): 14. January 1992. ISSN   0033-0736.
  8. Perrault, Anna H.; Ron Blazek (2003). United States History: A Multicultural, Interdisciplinary Guide to Information Sources . Westport, Connecticut; London: Libraries Unlimited. p.  35. ISBN   1-56308-874-6.
  9. Kantor, Paul B. (2005). Intelligence and security informatics. Springer. pp. 324–325. ISBN   9783540259992 . Retrieved January 16, 2011.
  10. "About." NNDB . Retrieved 29 November 2020.