Presentation is loading. Please wait.

Presentation is loading. Please wait.

STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181.

Similar presentations


Presentation on theme: "STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181."— Presentation transcript:

1 STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181

2 Section 3: Technologies, Information, and Knowledge for National Security 15. Exploiting Intelligence for National Security, Pg. 181 National security can undoubtedly benefit from advanced intelligence analysis solutions capable of efficient and thorough exploitation of huge data volumes stemming from the omnipresent sensing, communication, and information processing systems. Accurate and timely intelligence is critical for the effective use of generally limited resources of law enforcement agencies combating terrorist and criminal organizations. Such organizations often operate on a global scale and, thanks to the proliferation of the sensing, communication, and computing technology, they leave useful traces in the vast digital landscape. For example, let's assume a criminal organization involved in illegal cultivation of narcotic plants (e.g., cannabis) coupled with human trafficking spanning multiple countries. As a consequence of the indoor cultivation of cannabis, the energy company will log higher than normal energy consumption in certain areas, medical services and the law enforcement staff in those areas will record higher than normal rates of certain types of crimes and violence, and so forth.

3 Section 3: Technologies, Information, and Knowledge for National Security 15. Exploiting Intelligence for National Security, Pg. 181 It is likely that the criminal organization sets up multiple cultivation facilities throughout a larger region, thus further increasing the amounts of relevant data. In addition, the associated human trafficking activities will result in large quantities of heterogeneous data obtained at different locations and points in time; the vehicles used for human trafficking will be captured by video surveillance systems along highways, various types of intelligence will be gathered by national and international law enforcement and intelligence agencies on persons associated with this activity, citizens might report on associated events/anomalies, communication logs will capture entries in social media, there will be useful records of bank transactions, and so forth. While such data traces can provide invaluable indications of criminal activities and tendencies, making sense of all that data is becoming increasingly challenging. Ironically, the proliferation of the sensing, communication, and computing infrastructure has resulted in the production of huge quantities of heterogeneous data that are becoming very difficult to handle with the traditional analysis methods and computing solutions.


Download ppt "STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Gregor Pavlin Chapter 15 - Exploiting Intelligence for National Security, Pg. 181."

Similar presentations


Ads by Google