Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Study Questions CE16-2 What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism intelligence decision making? Hoe do information systems facilitate intelligence collaboration? How do data connections synthesize? How is data-mining used for counterterrorism intelligence? What are the social and legal implications of counterterrorism intelligence? © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke What Is the Goal of Counterterrorism Intelligence? Goals: – Produce information – Used to prevent terrorist attacks How will it be used? Terrorism process CE16-3 Useful Obtainable Difficult to focus solely on operations stage Must focus on entire process © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Stages in Counterterrorism Process Figure CE16-1 CE16-4 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke How Does Synthesis Produce Information? Information: – – – Data presented in meaningful way Difference that makes a difference Usually produced by analysis – May be produced by synthesis CE16-5 Broken down into constituent parts Construct larger entity out of constituent parts © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Counterterrorism Intelligence Information Synthesis – – – CE16-6 Most counterterrorism information produced this way Primary operation in construction of intelligence Organize known facts into pattern to create information © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Decision Processes Structured – – – Unstructured – – – CE16-7 Follows known path Readily documented “Which shipper should we use for this order?” Evolves as each step in process is taken Process usually not known until after final decision made “How do we fix the gas turbine?” © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Decision Modes Analysis or synthesis that creates information – Analysis: – Synthesis CE16-8 Break problem into constituent parts Address each part separately Build pattern from parts Used to inform a decision © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Counterterrorism Intelligence Unstructured – Synthetic – – CE16-9 Depends on events and information Requires formation of patterns Relationships often more important than data © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke How Do Information Systems Facilitate Intelligence Collaboration? Lack of collaboration harmful because intelligence built by synthesis – – Need database to share information – CE16-10 Unable to recognize patterns Caused by political, historical, technological factors Facilitates collaboration © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Counterterrorism Database Problems Problems: – – – – CE16-11 Intelligence process unstructured Predefined relationships seldom adequate Require more flexibility Creating relationships unfeasible Use data connections instead © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Data Connections Match of data values Do not need to be predefined May or may not be meaningful Requires techniques other than relational models – Contiguous connection model (CCM) – CE16-12 Connections usually not predefined Data model built for processing connections © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Using Connections Figure CE16-8 CE16-13 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke How Is Data-Mining Used in Counterterrorism Intelligence? Data-mining techniques used: – Connection processing – Text mining CE16-14 No mathematical processing Form of reporting Documents are searched for keywords and patterns Analyst reads and extracts relevant data Stores data in intelligence database © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Legal Implications of Counterterrorism Intelligence Uncertainty as to applicable laws – Fourth Amendment protection against unreasonable search and seizure – – Domain of criminal law and domain of national security Intelligence agencies do not always know what event they are investigating – CE16-15 Telephone record examination Uncertain as to which rules apply Violation of privacy © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Active Review CE16-16 What is the goal of counterterrorism intelligence? How does synthesis produce information? What are the characteristics of counterterrorism intelligence decision making? Hoe do information systems facilitate intelligence collaboration? How do data connections synthesize? How is data mining used for counterterrorism intelligence? What are the social and legal implications of counterterrorism intelligence? © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke