Changes in the threat landscape are creating huge gaps between the actual attacks we face and the abilities of our current security products to defend against them. Its time to bridge the gap. Many information security events are predicated or followed by measurable changes in communication patterns, their frequency or lack thereof. Some of these data sources are individually useful in the early detection of security events. Few methods have been deployed for anticipating or detecting planned events by fusing publicly available data of multiple types from multiple sources.