Click here to load reader
Upload
sabrina-powell
View
214
Download
0
Embed Size (px)
Citation preview
Chapter Extension 16
Information Systems and Counterterrorism
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
CE16-2 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Study Questions
What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism
intelligence decision making? Hoe do information systems facilitate intelligence
collaboration? How do data connections synthesize? How is data-mining used for counterterrorism
intelligence? What are the social and legal implications of
counterterrorism intelligence?
CE16-3 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
What Is the Goal of Counterterrorism Intelligence?
Goals:– Produce information
Useful Obtainable
– Used to prevent terrorist attacks How will it be used?
Terrorism process Difficult to focus solely on operations stage Must focus on entire process
CE16-4 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Stages in Counterterrorism Process
Figure CE16-1
CE16-5 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
How Does Synthesis Produce Information?
Information:– Data presented in meaningful way– Difference that makes a difference– Usually produced by analysis
Broken down into constituent parts
– May be produced by synthesis Construct larger entity out of constituent parts
CE16-6 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Counterterrorism Intelligence Information
Synthesis– Most counterterrorism information produced this
way– Primary operation in construction of intelligence– Organize known facts into pattern to create
information
CE16-7 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Decision Processes
Structured– Follows known path– Readily documented– “Which shipper should we use for this order?”
Unstructured– Evolves as each step in process is taken– Process usually not known until after final
decision made– “How do we fix the gas turbine?”
CE16-8 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Decision Modes
Analysis or synthesis that creates information– Analysis:
Break problem into constituent parts Address each part separately
– Synthesis Build pattern from parts
Used to inform a decision
CE16-9 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Counterterrorism Intelligence
Unstructured– Depends on events and information
Synthetic– Requires formation of patterns– Relationships often more important than data
CE16-10 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
How Do Information Systems Facilitate Intelligence Collaboration?
Lack of collaboration harmful because intelligence built by synthesis– Unable to recognize patterns– Caused by political, historical, technological
factors
Need database to share information– Facilitates collaboration
CE16-11 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Counterterrorism Database Problems
Problems:– Intelligence process unstructured – Predefined relationships seldom adequate– Require more flexibility– Creating relationships unfeasible
Use data connections instead
CE16-12 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Data Connections
Match of data values Do not need to be predefined May or may not be meaningful Requires techniques other than relational
models– Connections usually not predefined
Contiguous connection model (CCM)– Data model built for processing connections
CE16-13 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Using Connections
Figure CE16-8
CE16-14 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
How Is Data-Mining Used in Counterterrorism Intelligence?
Data-mining techniques used:– Connection processing
No mathematical processing Form of reporting
– Text mining Documents are searched for keywords and patterns Analyst reads and extracts relevant data Stores data in intelligence database
CE16-15 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Legal Implications of Counterterrorism Intelligence
Uncertainty as to applicable laws– Fourth Amendment protection against unreasonable search
and seizure Telephone record examination
– Domain of criminal law and domain of national security– Intelligence agencies do not always know what event they
are investigating Uncertain as to which rules apply
– Violation of privacy
CE16-16 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Active Review
What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism
intelligence decision making? Hoe do information systems facilitate intelligence
collaboration? How do data connections synthesize? How is data mining used for counterterrorism
intelligence? What are the social and legal implications of
counterterrorism intelligence?