Transcript CE16

Chapter Extension 16
Information Systems
and Counterterrorism
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Study Questions







CE16-2
What is the goal of counterterrorism intelligence?
How does synthesis produce information?
What are the characteristics of counterterrorism
intelligence decision making?
Hoe do information systems facilitate intelligence
collaboration?
How do data connections synthesize?
How is data-mining used for counterterrorism
intelligence?
What are the social and legal implications of
counterterrorism intelligence?
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
What Is the Goal of
Counterterrorism Intelligence?

Goals:
–
Produce information


–
Used to prevent terrorist attacks


How will it be used?
Terrorism process


CE16-3
Useful
Obtainable
Difficult to focus solely on operations stage
Must focus on entire process
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Stages in Counterterrorism
Process
Figure CE16-1
CE16-4
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
How Does Synthesis Produce
Information?

Information:
–
–
–
Data presented in meaningful way
Difference that makes a difference
Usually produced by analysis

–
May be produced by synthesis

CE16-5
Broken down into constituent parts
Construct larger entity out of constituent parts
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Counterterrorism Intelligence
Information

Synthesis
–
–
–
CE16-6
Most counterterrorism information produced this
way
Primary operation in construction of intelligence
Organize known facts into pattern to create
information
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Decision Processes

Structured
–
–
–

Unstructured
–
–
–
CE16-7
Follows known path
Readily documented
“Which shipper should we use for this order?”
Evolves as each step in process is taken
Process usually not known until after final
decision made
“How do we fix the gas turbine?”
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Decision Modes

Analysis or synthesis that creates information
–
Analysis:


–
Synthesis


CE16-8
Break problem into constituent parts
Address each part separately
Build pattern from parts
Used to inform a decision
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Counterterrorism Intelligence

Unstructured
–

Synthetic
–
–
CE16-9
Depends on events and information
Requires formation of patterns
Relationships often more important than data
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
How Do Information Systems
Facilitate Intelligence Collaboration?

Lack of collaboration harmful because
intelligence built by synthesis
–
–

Need database to share information
–
CE16-10
Unable to recognize patterns
Caused by political, historical, technological
factors
Facilitates collaboration
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Counterterrorism Database
Problems

Problems:
–
–
–
–

CE16-11
Intelligence process unstructured
Predefined relationships seldom adequate
Require more flexibility
Creating relationships unfeasible
Use data connections instead
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Data Connections




Match of data values
Do not need to be predefined
May or may not be meaningful
Requires techniques other than relational
models
–

Contiguous connection model (CCM)
–
CE16-12
Connections usually not predefined
Data model built for processing connections
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Using Connections
Figure CE16-8
CE16-13
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
How Is Data-Mining Used in
Counterterrorism Intelligence?

Data-mining techniques used:
–
Connection processing


–
Text mining



CE16-14
No mathematical processing
Form of reporting
Documents are searched for keywords and patterns
Analyst reads and extracts relevant data
Stores data in intelligence database
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Legal Implications of
Counterterrorism Intelligence

Uncertainty as to applicable laws
–
Fourth Amendment protection against unreasonable search
and seizure

–
–
Domain of criminal law and domain of national security
Intelligence agencies do not always know what event they
are investigating

–
CE16-15
Telephone record examination
Uncertain as to which rules apply
Violation of privacy
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Active Review







CE16-16
What is the goal of counterterrorism intelligence?
How does synthesis produce information?
What are the characteristics of counterterrorism
intelligence decision making?
Hoe do information systems facilitate intelligence
collaboration?
How do data connections synthesize?
How is data mining used for counterterrorism
intelligence?
What are the social and legal implications of
counterterrorism intelligence?
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke