8
1 ©2016 IBM Corporation Belgium Defence, Police and State Security and IBM Confidential ©2016 IBM Corporation Belgium Defence, Police and State Security and IBM Confidential IBM OISNT Demonstration Collection and Analysis of Open Source and Social Media for Actionable Insight Date: 23 Nov 2016 Contact persons: Alan Jenkinson Email: ajenkin5@uk.ibm.com | Mobile: +44 7771 800710 Date: 23 Nov 2016 Contact persons: Alan Jenkinson Email: ajenkin5@uk.ibm.com | Mobile: +44 7771 800710

Date: 23 Nov 2016 Collection and Analysis of Open Source ...€¦ · Collection and Analysis of Open Source and Social ... • Aligned to your trade craft • Optimized for common

Embed Size (px)

Citation preview

1©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

IBM OISNT Demonstration

Collection and Analysis of Open Source and Social Media for Actionable Insight

� Date: 23 Nov 2016

� Contact persons: Alan Jenkinson

� Email: [email protected] | Mobile: +44 7771 800710

� Date: 23 Nov 2016

� Contact persons: Alan Jenkinson

� Email: [email protected] | Mobile: +44 7771 800710

2©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

Challenge: Despite Volume, Variety and Velocity, Analysts need to maximise the TIME to THINK

The problem faced with Open Source IntelligenceThe problem faced with Open Source IntelligenceThe problem faced with Open Source IntelligenceThe problem faced with Open Source Intelligence

ENABLE

THINK

CREATE

Information/ Intelligence Analyst DECISION SupportTIMELINESS

RELEVANCE

ACCURACY

COMPLETE

SECURITY

Optimise Create Functions

MoE

Minimise Enable Activities

3©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

Problem: Four main pain points with Open Source and Social Media analysis must be addressed

How do I exploit Open Source and Social

Media for prevention?

How do I find aneedle in a stack of

needles?

137 Deaths137 Deaths137 Deaths137 Deaths2015 Paris Attacks2015 Paris Attacks2015 Paris Attacks2015 Paris Attacks

1,400 People1,400 People1,400 People1,400 PeopleISIS Hit list on Dark WebISIS Hit list on Dark WebISIS Hit list on Dark WebISIS Hit list on Dark Web

IMPACT

CAPABILITY GAPS

Find the threats before the attack

occurs

Tip your analysts to inspect the critical issues

PAIN POINTS

Threats Using Non-Traditional

Comms

Where Should Analysts Look

How do I trust and make decisions on this information?

300 hooligans 300 hooligans 300 hooligans 300 hooligans DDDDiiiissssrrrruuuupppptttt BBBBrrrruuuusssssssseeeellllssss mmmmeeeemmmmoooorrrriiiiaaaallll

Synthesize data into trusted actionable

insight

Lack of Actionable Intelligence

How do I put the pieces together for a complete picture?

17 Sources17 Sources17 Sources17 SourcesAvgAvgAvgAvg # of places to # of places to # of places to # of places to

searchsearchsearchsearch

Provide context and standardization around

data

Too Much Data, Too Many Sources

4©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

IBM Solution Approach: Our solution is based on over 26 years and 4000+ deployments of our intelligence platform across public safety and defense agencies

Deployed in 24 NATO defense

forces

60% averageanalysis

improvement

Input from 80% of national security agencies globally

300+ partner integrations and plugins

KEY FACTS

BENEFITS

• Quick standup and deployment

• Predictable, fixed pricing• Configured to your process

• On premise deployment

• Enhanced functionality from partners

• Quickly add new data sources and plugins

• Integrate with existing analysis tools

• Continuous improvement based on global best practices and your tradecraft

• Ongoing functionality

enhancement

• Easy to master for new analysts

• Aligned to your trade craft• Optimized for common

functional roles

Complete Solution Mission Focused

• Quarterly Releases based on direct mission feedback

• Roadmap based on stakeholder needs

Designed for Analyst

• Purpose-built for intelligence analysis

• Intuitive to use and learn• Innovative analytical

algorithms and visualizations

Open Architecture

• API based integration• Modular add-on capability• Extensibility to add 3rd party

capability and content

• Out-of-box features• Configuration over

customization• License-based pricing

5©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

IBM Solution Value: Our solution addresses the main pain points with Open Source and Social Media collection and analysis

Fast Deployment and Immediate Value

Continuous ToolImprovement

Proven Battle-Tested Solution

Find Threats Better and Faster

90 daydeployment

750,000+ curated data sources

made for Intel analysts for 26+ yrs

300,000+ users w/feedback

KEY FACTS

BENEFITS

Purpose-built for intelligence analysts and used in some of the most challenging environments in the

world

Constant value from mature user base and modular additions such as

deeper insight with IBM Watson

Requires no customization or

custom development allowing analysts to collect and analyze critical intelligence

Reduces time to verifiable insight

with curated, structured data,

and accurate entity extraction

6©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

Human-Enabled

Open Source & Social MediaIntelligence

Analysis

CollectionCollection ExtractionExtraction

AnalysisAnalysis

Our Modular Solution: Our demonstration solution provides a proven tool in 90 days with industry best components a clear roadmap for future enhanced capabilities

Data Collection / Data Staging

Taxonomy Translation

Alerts Feed Detection

Personality Insights

Natural Language

Classifier

Data Analysis & Visualization

Sentiment Analysis

Concept Insights

Network Analysis Social Analysis

Image AnalysisSearch and Discovery

Data Extraction

Concept Tagging Text Extraction

Relationship Extraction

Property Extraction

Analysis Results/Reports

Target Identification

Force Protection

Threat DiscoveryRisk

Management

1 2

4

3

Social

Media

Open

WebDark/Deep

Web

Jane’s

IHS DB

Data Sources: Structured/Unstructured

Raw Processed

DBs &

Files

7©2016 IBM Corporation

Belgium Defence, Police and State Security and IBM Confidential

Live Demonstration

Thank you