Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Intelligence

Open Source Intelligence Offers Crystal Ball Capability

April 1, 2014
By George I. Seffers

Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.

The Weaknesses of Unclassified Intelligence

April 1, 2014
By Rita Boland

The open source domain has a set of vulnerabilities unique in the intelligence world in terms of both what enemies can misuse and critical pieces that might be absent. Because of the public nature of open source, some experts tend to discount its value, while that same feature means that patient malefactors can put together different sources of data leaking through various measures until they develop a comprehensive, damaging picture. Different technologies are helping to mitigate the dangers as the public and private sectors also work to educate their people on safer practices.

Weathering the Big Data Storm

March 11, 2014
By George I. Seffers

The National Weather Service is the granddaddy of open source data, according to Adrian Gardner, chief information officer, Federal Emergency Management Agency (FEMA). And, the National Oceanic and Atmospheric Administration (NOAA) was "into big data before big data was cool," added David McClure, a data asset portfolio analyst within the NOAA Office of the Chief Information Officer.

Recent Tragedies Illustrate Role of Information Fusion Centers

March 10, 2014
By George I. Seffers

Following the terrorist attacks on September 11, 2001, government agencies came under widespread criticism for failing to share information and "connect the dots." By contrast, law enforcement agencies were almost universally praised following the Boston Marathon bombing and the shooting at the Navy Yard in Washington, D.C., both of which took place last year.

Military Intelligence Data Must Be Applied More Strategically

February 12, 2014
By Robert K. Ackerman

Having vast amounts of intelligence data will not serve U.S. military needs if it is applied only tactically, according to a U.S. Navy information dominance leader. This data must be used to understand an adversary’s strategic intent, or leaders may not act effectively.

How will intelligence
 acquisition priorities change in
 a post-counterinsurgency world?

February 1, 2014
By Col. Herbert Kemp, USAF (RET.)

As the national security establishment emerges from more than a decade of counterinsurgency warfare in Iraq and Afghanistan and refocuses on other global priorities, the means by which intelligence, surveillance and reconnaissance (ISR) supports those priorities must change as well. ISR operations in Iraq and Afghanistan have been conducted in relatively permissive air environments that have allowed the use of long-dwell airborne platforms to provide sustained surveillance of targets of interest. This has led to an imagery-, and more specifically, full motion video (FMV)-intensive pattern of collection. While these conditions may be present in some future conflicts, they do not describe many of the scenarios envisioned for potential contested environments in the future.

Bin Laden Avatar Could Preach Fatwa

January 9, 2014
By George I. Seffers

The U.S. intelligence community has taken some flak lately for infiltrating online games, such as Second Life and World of Warcraft. A just-released report commissioned by the Office of the Director of National Intelligence, however, posits that the technology could be abused by extremists.

Australia Takes Nationwide Approach to Cybersecurity

December 4, 2013
By Robert K. Ackerman

Australia has implemented a cybersecurity policy that brings together government and industry to secure the domain nationally. The country recently elevated cybersecurity as a major priority for national security, and in 2009, it established a Cyber Security Operations Center (CSOC).

Risk Management Key to Future Coalition Networks

December 4, 2013
By Robert K. Ackerman

Now that allied forces have accepted coalitions as a requisite for future military operations, they must undergo a cultural sea change for cybersecurity. Accepting nontraditional partners demands a new way of viewing cybersecurity that entails greater flexibility at its most philosophical level.

Intelligence, Surveillance and Reconnaissance Capabilities Loom Large for Pacific Command

December 3, 2013
By Robert K. Ackerman

The U.S. Pacific Command needs effective intelligence, surveillance and reconnaissance (ISR) assets to address its increasing mission activities, according to the command’s deputy commander. Lt. Gen. Thomas L. Conant, USMC, was blunt in his assessment to the audience at the opening breakfast at TechNet Asia-Pacific 2013 in Honolulu, Hawaii.

Pages

Subscribe to RSS - Intelligence