16

Click here to load reader

Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Embed Size (px)

Citation preview

Page 1: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Chapter Extension 16

Information Systems and Counterterrorism

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Page 2: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-2 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Study Questions

What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism

intelligence decision making? Hoe do information systems facilitate intelligence

collaboration? How do data connections synthesize? How is data-mining used for counterterrorism

intelligence? What are the social and legal implications of

counterterrorism intelligence?

Page 3: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-3 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

What Is the Goal of Counterterrorism Intelligence?

Goals:– Produce information

Useful Obtainable

– Used to prevent terrorist attacks How will it be used?

Terrorism process Difficult to focus solely on operations stage Must focus on entire process

Page 4: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-4 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Stages in Counterterrorism Process

Figure CE16-1

Page 5: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-5 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

How Does Synthesis Produce Information?

Information:– Data presented in meaningful way– Difference that makes a difference– Usually produced by analysis

Broken down into constituent parts

– May be produced by synthesis Construct larger entity out of constituent parts

Page 6: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-6 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Counterterrorism Intelligence Information

Synthesis– Most counterterrorism information produced this

way– Primary operation in construction of intelligence– Organize known facts into pattern to create

information

Page 7: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-7 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Decision Processes

Structured– Follows known path– Readily documented– “Which shipper should we use for this order?”

Unstructured– Evolves as each step in process is taken– Process usually not known until after final

decision made– “How do we fix the gas turbine?”

Page 8: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-8 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Decision Modes

Analysis or synthesis that creates information– Analysis:

Break problem into constituent parts Address each part separately

– Synthesis Build pattern from parts

Used to inform a decision

Page 9: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-9 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Counterterrorism Intelligence

Unstructured– Depends on events and information

Synthetic– Requires formation of patterns– Relationships often more important than data

Page 10: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-10 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

How Do Information Systems Facilitate Intelligence Collaboration?

Lack of collaboration harmful because intelligence built by synthesis– Unable to recognize patterns– Caused by political, historical, technological

factors

Need database to share information– Facilitates collaboration

Page 11: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-11 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Counterterrorism Database Problems

Problems:– Intelligence process unstructured – Predefined relationships seldom adequate– Require more flexibility– Creating relationships unfeasible

Use data connections instead

Page 12: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-12 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Data Connections

Match of data values Do not need to be predefined May or may not be meaningful Requires techniques other than relational

models– Connections usually not predefined

Contiguous connection model (CCM)– Data model built for processing connections

Page 13: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-13 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Using Connections

Figure CE16-8

Page 14: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-14 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

How Is Data-Mining Used in Counterterrorism Intelligence?

Data-mining techniques used:– Connection processing

No mathematical processing Form of reporting

– Text mining Documents are searched for keywords and patterns Analyst reads and extracts relevant data Stores data in intelligence database

Page 15: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-15 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Legal Implications of Counterterrorism Intelligence

Uncertainty as to applicable laws– Fourth Amendment protection against unreasonable search

and seizure Telephone record examination

– Domain of criminal law and domain of national security– Intelligence agencies do not always know what event they

are investigating Uncertain as to which rules apply

– Violation of privacy

Page 16: Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

CE16-16 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Active Review

What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism

intelligence decision making? Hoe do information systems facilitate intelligence

collaboration? How do data connections synthesize? How is data mining used for counterterrorism

intelligence? What are the social and legal implications of

counterterrorism intelligence?