Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Intelligence

Navy Artificial Intelligence Aids Actionable Intelligence

December 1, 2013
By George I. Seffers

To ease the load on weary warfighters inundated with too much information, U.S. Navy scientists are turning to artificial intelligence and cognitive reasoning technologies. Solutions that incorporate these capabilities could fill a broad array of roles, such as sounding the alarm when warfighters are about to make mistakes.

Developmental UUVs Offer Offense, Defense From Anywhere

November 25, 2013
By Rita Boland

The U.S. Navy is expanding its autonomous subsurface fleet with the introduction of a platform designed for persistent intelligence, surveillance and reconnaissance as well as offensive capabilities.

VIDEO: Should the Intelligence Community Embrace Big Data?

November 7, 2013
By Robert K. Ackerman

Big Data increasingly is viewed as the future of knowledge management, aided and abetted by the cloud. And, it would seem to be a perfect fit in the field of intelligence. But two longtime experts in intelligence take opposing views on the utility of big data for intelligence.

Intelligence Leaders Seek Common Interests With China

November 1, 2013
By George I. Seffers

The U.S. Pacific Command intelligence community is fostering an increased dialogue between China and other nations with interests in the Pacific Rim. The expanded effort is designed to build trust, avoid misunderstandings and improve cooperation in areas where China’s national interests converge with the national interests of the United States and others.

Cyber and Intelligence Need Each Other

October 1, 2013
By Robert K. Ackerman

Intelligence needs cyber, and cyber needs intelligence. How they can function symbiotically is a less clear-cut issue, with challenges ranging from training to legal policy looming as government officials try to respond to a burgeoning cyber threat.

The cyber threat is growing, and the defense and homeland security communities must strive to keep up with new ways of inflicting damage to governments and businesses. Many experts believe the cyber threat has supplanted terrorism as the greatest national security issue, and new technologies are only one avenue for blunting the menace. Intelligence must expand its palette to identify and detect cyber threats before they realize their malicious goals.

Protecting the nation from cyber attacks entails deterring or preventing marauders from carrying out their malevolent plans. But, while government and the private sector endeavor to fight the menace jointly, evildoers constantly change their approaches and learn new ways of striking at vulnerable points. So many variables have entered the equation that even the likelihood of attacks—along with their effects—is uncertain.

These were among the many points discussed in the two-day AFCEA Global Intelligence Forum held July 30-31 at the National Press Club in Washington, D.C. Nearly all participants agreed that inaction in addressing cyberthreats would be catastrophic for the nation as a whole.

A New Emphasis on Intelligence Support to the Cyber Domain

October 1, 2013
By Kent R. Schneider

In the most recent U.S. defense guidance of January 2012, signed for emphasis by both the president and the secretary of defense, cyber was one of the few areas that received both emphasis and increased funding—no small feat in the current budget environment. Part of that emphasis and increased funding goes to the intelligence community to support the cyber domain. Such support requires an expansion of the intelligence mission set, new processes and tools, and new interfaces to the operational community now emerging to command and control the cyber domain.

Full support to the cyber domain requires an expansion of scope as well, as the federal lead for cybersecurity lies with the U.S. Department of Homeland Security, the Defense Department and the Department of Justice with involvement by others. Also, commercial interests heavily own the cyber infrastructure and other elements of the critical infrastructure of the United States. In some categories, more than 90 percent of the infrastructure resides in the private sector. Clearly, new processes and new relationships must be developed by the intelligence community to support this diverse and complex mission.

A Longtime Tool of the Community

October 1, 2013
By Lewis Shepherd

What do modern intelligence agencies run on? They are internal combustion engines burning pipelines of data, and the more fuel they burn the better their mileage. Analysts and decision makers are the drivers of these vast engines; but to keep them from hoofing it, we need big data.
 
The intelligence community necessarily has been a pioneer in big data since inception, as both were conceived during the decade after World War II. The intelligence community and big data science always have been intertwined because of their shared goal: producing and refining information describing the world around us, for important and utilitarian purposes.

Let’s stipulate that today’s big-data mantra is overhyped. Too many technology vendors are busily rebranding storage or analytics as “big data systems” under the gun from their marketing departments. That caricature rightly is derided by both information technology cognoscenti and non-techie analysts.

I personally understand the disdain for machines, as I had the archetypal humanities background and was once a leather-elbow-patched tweed-jacketed Kremlinologist, reading newspapers and human intelligence (HUMINT) for my data. I stared into space a lot, pondering the Chernenko-Gorbachev transition. Yet as Silicon Valley’s information revolution transformed modern business, media, and social behavior across the globe, I learned to keep up—and so has the intelligence community.

Twitter may be new, but the intelligence community is no Johnny-come-lately in big data. U.S. government funding of computing research in the 1940s and 1950s stretched from World War II’s radar/countermeasures battles to the elemental electronic intelligence (ELINT) and signals intelligence (SIGINT) research at Stanford and MIT, leading to the U-2 and OXCART (ELINT/image intelligence platforms) and the Sunnyvale roots of the National Reconnaissance Office.

Another Overhyped Fad

October 1, 2013
By Mark M. Lowenthal

Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), once observed that one of the peculiar behaviors of the intelligence community is to erect totem poles to the latest fad, dance around them until exhaustion sets in, and then congratulate oneself on a job well done.
 
One of our more recent totem poles is big data. Big data is a byproduct of the wired world we now inhabit. The ability to amass and manipulate large amounts of data on computers offers, to some, tantalizing possibilities for analysis and forecasting that did not exist before. A great deal of discussion about big data has taken place, which in essence means the possibility of gaining new insights and connections from the reams of new data created every day.

Or does it?

Some interesting assumptions about big data need to be probed before we dance some more around this totem pole. A major problem is the counting rules. Eric Schmidt, the chairman of Google, has said, “We create as much information in two days now as we did from the dawn of man through 2003.” He quantifies this as five exabytes of data (5 x 1018). Schmidt admittedly counts user-generated content such as photos and tweets, for example. All of this may be generated; but is it information, and more importantly, is it intelligence?

This data clearly is information—to someone—but very little of it would qualify as intelligence. It does qualify as a very large haystack in which there are likely to be very few needles that will be of use to anyone engaged in intelligence. To cite a more relevant example, the National Security Agency (NSA) programs lately in the news went through millions of telephone metadata records, which led to 300 further inquiries. The argument can be made that without the NSA metadata program, these leads might not have existed at all; but a means-and-ends argument remains over the larger big data claims.

Is Big Data the Way 
Ahead for Intelligence?

October 1, 2013

Another Overhyped Fad

By Mark M. Lowenthal

Director of National Intelligence Lt. Gen. James R. Clapper, USAF (Ret.), once observed that one of the peculiar behaviors of the intelligence community is to erect totem poles to the latest fad, dance around them until exhaustion sets in, and then congratulate oneself on a job well done.

One of our more recent totem poles is big data. Big data is a byproduct of the wired world we now inhabit. The ability to amass and manipulate large amounts of data on computers offers, to some, tantalizing possibilities for analysis and forecasting that did not exist before. A great deal of discussion about big data has taken place, which in essence means the possibility of gaining new insights and connections from the reams of new data created every day.

Or does it?

Read the complete perspective

A Longtime Tool of the Community

By Lewis Shepherd

What do modern intelligence agencies run on? They are internal combustion engines burning pipelines of data, and the more fuel they burn the better their mileage. Analysts and decision makers are the drivers of these vast engines; but to keep them from hoofing it, we need big data.

The intelligence community necessarily has been a pioneer in big data since inception, as both were conceived during the decade after World War II. The intelligence community and big data science always have been intertwined because of their shared goal: producing and refining information describing the world around us, for important and utilitarian purposes.

Read the complete perspective

Understanding 
the Written 
Foreign Language

October 1, 2013
By Robert K. Ackerman

A transliteration tool developed jointly by the intelligence community and a commercial firm is helping eliminate the problem of misidentified foreign names and places in databases. These types of errors can allow a potential terrorist or plot to slip though security if analysts cannot identify common proper nouns and establish valuable links.

The new system helps avoid this problem of misidentification arising from different interpretive spellings of names from a language that does not use Western-style Roman lettering. This problem has become an issue when terrorists’ names are not matched in different databases because their spelling is interpreted differently. Analysts are not able to put together the pieces in a puzzle to develop an accurate picture that shows a potential threat.
 

Pages

Subscribe to RSS - Intelligence