3
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

Embed Size (px)

DESCRIPTION

Section 3: Technologies, Information, and Knowledge for National Security 15. Exploiting Intelligence for National Security, Pg. 181 It is likely that the criminal organization sets up multiple cultivation facilities throughout a larger region, thus further increasing the amounts of relevant data. In addition, the associated human trafficking activities will result in large quantities of heterogeneous data obtained at different locations and points in time; the vehicles used for human trafficking will be captured by video surveillance systems along highways, various types of intelligence will be gathered by national and international law enforcement and intelligence agencies on persons associated with this activity, citizens might report on associated events/anomalies, communication logs will capture entries in social media, there will be useful records of bank transactions, and so forth. While such data traces can provide invaluable indications of criminal activities and tendencies, making sense of all that data is becoming increasingly challenging. Ironically, the proliferation of the sensing, communication, and computing infrastructure has resulted in the production of huge quantities of heterogeneous data that are becoming very difficult to handle with the traditional analysis methods and computing solutions.

Citation preview

Page 1: STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

STRATEGIC INTELLIGENCE MANAGEMENT

Chapter by Gregor Pavlin

Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

Page 2: STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

Section 3: Technologies, Information, and Knowledge for

National Security

• 15. Exploiting Intelligence for National Security, Pg. 181 • National security can undoubtedly benefit from advanced intelligence analysis solutions capable

of efficient and thorough exploitation of huge data volumes stemming from the omnipresent sensing, communication, and information processing systems. Accurate and timely intelligence is critical for the effective use of generally limited resources of law enforcement agencies combating terrorist and criminal organizations.

• Such organizations often operate on a global scale and, thanks to the proliferation of the sensing, communication, and computing technology, they leave useful traces in the vast digital landscape. For example, let's assume a criminal organization involved in illegal cultivation of narcotic plants (e.g., cannabis) coupled with human trafficking spanning multiple countries. As a consequence of the indoor cultivation of cannabis, the energy company will log higher than normal energy consumption in certain areas, medical services and the law enforcement staff in those areas will record higher than normal rates of certain types of crimes and violence, and so forth.

Page 3: STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

Section 3: Technologies, Information, and Knowledge for

National Security

• 15. Exploiting Intelligence for National Security, Pg. 181 • It is likely that the criminal organization sets up multiple cultivation facilities throughout a larger

region, thus further increasing the amounts of relevant data. In addition, the associated human trafficking activities will result in large quantities of heterogeneous data obtained at different locations and points in time; the vehicles used for human trafficking will be captured by video surveillance systems along highways, various types of intelligence will be gathered by national and international law enforcement and intelligence agencies on persons associated with this activity, citizens might report on associated events/anomalies, communication logs will capture entries in social media, there will be useful records of bank transactions, and so forth.

• While such data traces can provide invaluable indications of criminal activities and tendencies, making sense of all that data is becoming increasingly challenging. Ironically, the proliferation of the sensing, communication, and computing infrastructure has resulted in the production of huge quantities of heterogeneous data that are becoming very difficult to handle with the traditional analysis methods and computing solutions.