1 / 44

Open Source Intelligence for the 21 st Century Electric Shock in Four Parts

Open Source Intelligence for the 21 st Century Electric Shock in Four Parts. May 2008 alfred.rolington@OA.com. “Jim Woolsey and Bill Clinton’s relationships exposes the problems of analysis and information in a global world where research, intelligence and authority arguably have new owners”.

gaetane
Download Presentation

Open Source Intelligence for the 21 st Century Electric Shock in Four Parts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Open Source Intelligence for the 21st Century Electric Shockin Four Parts May 2008 alfred.rolington@OA.com

  2. “Jim Woolsey and Bill Clinton’s relationships exposes the problems of analysis and information in a global world where research, intelligence and authority arguably have new owners”. “Woolsey was Old Testament and Clinton was Post Modern” Al Gore

  3. Theory and different types of analysis is one of the major growth areas in the last few decades. We are now going to add to that trend.

  4. Part One Unreliable Evidence

  5. Information Agenda • I want to discuss what it means to do analysis and intelligence in a world where few respect information’s authority. • Where the client often believes that they have as much to contribute as the specialist. • Where electronic distribution technology has overwhelmed most government organisation’s ability. • And where a clear understanding of delivering information/intelligence for an individual user and their particular needs is often missing. • Let us begin with a brief history and some important information events…..

  6. Open SourceInformation Transition 1455 to 2008 1994 to 2008 1898 to 1994 1455 to 1898 Intranets Online/Web E-open source intelligence Information/intelligence is now about linking actionable knowledge for immediate use of a particular user... Printer/ Publisher (Reformation) Multimedia Radio/Cinema TV/Databases (Mass one way Communications)

  7. Part Two Suicide Terror and Hidden Agenda

  8. Issues surrounding 9/11 • Open sources were seen as secondary. • Most intelligence clients subscribed to open sources in paper and electronically. • Many had marked relevant articles for reading. • Problems of overload, classified traffic and lack of strategic focus on asymmetric threat. • Fundamentally the terrorists were seen as a minor not major threat at that time.

  9. What Else Did We know? Threats against US assets Threats against US assets Articles in the hundreds

  10. Part Three Different Methodologies

  11. Objective Deliver information that is conditioned and designed to support the intelligence collection and analysis process: • Quicker and easier to find • More usable / ‘ready for analysis’ • Analysis and report building tools

  12. Customer Problem • Not finding the precise data because of info- overload. The cost, the time and resources. • Not knowing what is and isn’t validated. • Problem of not knowing what you know. • 75% of operational information requests are for information that is already known. • Problem of not knowing what you don’t know and missing critical information.

  13. Google experience • 1,000s of results • that may or may not • be relevant to users • actual needs • Important info is • easily missed or not • even found Results List Xxxxxxxxx Xxxxxxxxx Xxxxxxxxx Xxxxxxxxx Xxxxxxxxx Xxxxxxxxx Xxxxxxxxx Information Sources Search Knowledge-enabled experience Highly Focused Results That meet User Needs Domain Knowledge Metadata Layer Guided search/nav Information Sources Profiling & alerting Analytical tools Info discovery Data visualisation Report building Intelligent Search & Discovery

  14. Chat Rooms Online News Research Reports Online Journals Reference Databases Blogs Unstructured Some structure Massive volume Moderate volume Real time After the event Emerging technology Established technology Automated processes Manually intensive Alerts / Profiling Data Visualisation Content Management Entity Extraction Search / Retrieval Content/Technology Landscape Content Technology

  15. Evolution of Taxonomy Technologies Search and Retrieval Software ( “and”, “or” and “not” ) Boolean Logic ( search results return too many possible documents ) Meta-data ( “data” about “data” : Relevancy and consistency were questionable) Link Ranking ( importance determined by popularity and use ) Taxonomy

  16. Hard Copy Offline Data Services Online Applications • Alerting • Search/browse • Guided nav • Visualisation • Report building Tailored Information Services • Taxonomies • Entities/relships • Key facts/data Domain Knowledge / Exploitation Reusable Information Objects Content Management • XML • Databases Reference News Images • Editorial ops Future Information Architecture

  17. Linking of data to produce immediate trend analysis Taxonomies, Data Conditioning, Visualisation and Deeper Analysis.

  18. Intelligence Centres Providing knowledge workers with work tools to quickly access highly focused information from multiple sources CONTENT SOURCES WORK TOOLS News ANALYST Searching Analysis Alerting Reference Taxonomies Images Visualisation world news Exporting Web Resources Reporting Web Monitoring Other Analytical Tools Company Press Releases Contextual Advertising Other sources

  19. Data Visualisation

  20. Data Visualisation

  21. Creating Open Source Intelligence • The Intelligence process uses Rationalism : collect the data, make an assessment, write the analysis and deliver/publish the intelligence. • This is only one method of producing intelligence and we should continue to use a rationalistic approach. • Also another process that we are now exploring is non-linear. It is more of a dialogue between specialists and generalists and is more interactive. • This has ramification: everything from office layout, meetings to editorial systems/practice. And the connectivity of content and improved service.

  22. Part Four Post Modern Mirrors Variable Future - New Past

  23. Information and Intelligence Methodologies • Linear Intelligence. • Scenario Planning. • Mosaic Method. • These are not meant as final answers.

  24. Traditional Linear Intelligence • Task, collect the facts, rank and validate facts, make assessment, Independent review, complete the analysis and present the results. • This process is very robust as a method. • However it is not enough as a process in uncertain threat environments.

  25. Alneda – the call • Site hosted in Malaysia. • Appeared before 911. • Al Qaeda named by US Intelligence. • Shut down in 2002 by Al Qaeda as they opened new sites with their new name.

  26. Things known about Al Qaeda • Once they have targeted a person or place they continue until they believe the task to be completed. • They use Western technology but despise its creators. • They seriously believe women are lower in the social and intellectual order. • Their revolution had failed in every country they tried. • Use Toyota vehicles. • They have been given prominence by the West. • They have been branded by America.

  27. Scenario Planning – Creative Options • These methods suggest thinking out of the box. • They mean teams of both specialists and generalists working rather than the focus of a few specialist individuals. • These methods are very useful for bringing ideas to the surface • They are not a replacement for Linear techniques but should work as a complementary methodology. • We are using technology and scenario techniques to clarify our thought processes.

  28. Factual Contextual Analytical Opinion Covert Operational Unintended Consequences– future training and targeting – historical parallels and practices Publicity Historical Inaccurate Propaganda Spin Bias Twelve Categories of Information

  29. B Bias, Spin, Propaganda History Validation Opinion Analysis Analysis Scenario Current focus A Scenario Analysis Model Finally lets look at a Mosaic Method

  30. Mosaic Method • Created by Information thinkers like Marshall McLuhan and writers like Robert D. Kaplan. • Building the world you wish to investigate from its history, imagery, graffiti, popular culture, humour through to its boundaries, prejudices, cultural conventions, social economics and local politics. • Useful as a means towards new perspectives on a problem but a method that works along side others.

  31. Mosaic • Research methods that link different cultural understandings such that usable new knowledge is created. • Using technology to condition information’s context so the links are relevant and actionable. • Bringing clients, researchers and generalists together in an equal and collaborative focus.

  32. The Global Stress Point Matrix (GSPM) 15 Lebanon – Hezbollah

  33. Mosaic Method Open Sources

  34. Al Qaeda • Copies other terrorist organisations. • Uses technology it despises. • Encourages suicide attacks and pays martyrs’ families for sacrifices. • 9/11 originally included an attack on LAX - Los Angeles airport. • Trained pilots one of whom said he did not need training in landing. • Had studied Kamikaze pilot techniques.

  35. Hezbollah • Has carried out more suicide attacks than Al Qaeda. • Designated as a terrorist group by some Western governments and not by others. The IRA was similarly designated by some and not others. • Has had significant disagreements with al Qaeda. • What is considered acceptable by one culture is not allowed in another. • Sophisticated Web sites continue to move location to stop interference and censorship. • They consider they won the recent 2006 conflict with Israel.

  36. Summary • In a global electronic environment pattern recognition has become as important as linear analysis. • As analysis and consultants we have to be aware of the new client requirements for actionable Intelligence that will measurably save them people, time and money. • We must understand where our cultural bias lies and what effect this has on our final analysis. • We have to take account of the cultural shock that the Web is causing and the effect it has on understanding, authority and power. • Intelligence must be designed for the action and the understanding of the final user.

  37. Final Conclusion • Digital Publishing is altering the cultural landscape. • Re-writing the past and the future will be common place. • Expect massive technology and social shifts - and a backlash as government e-surveillance increases. • Continually re-educate yourself to ensure that someone in another country who you will never meet, cannot take your job.

  38. Intelligence for the 21st CenturyElectric Shock–The EndThank you for Listening May 2008 alfred.rolington@OA.com

More Related