Transcript Slide 1
Open Source Intelligence for the 21st
Century
Electric Shock in Four Parts
May 2008
[email protected]
“Jim Woolsey and Bill Clinton’s
relationships exposes the problems of
analysis and information in a global
world where research, intelligence and
authority arguably have new owners”.
“Woolsey was Old Testament and
Clinton was Post Modern”
Al Gore
Theory and different types of
analysis is one of the major
growth areas in the last few
decades.
We are now going to add
to that trend.
Part One
Unreliable Evidence
Information Agenda
• I want to discuss what it means to do analysis and intelligence
in a world where few respect information’s authority.
• Where the client often believes that they have as much to
contribute as the specialist.
• Where electronic distribution technology has overwhelmed
most government organisation’s ability.
• And where a clear understanding of delivering
information/intelligence for an individual user and their
particular needs is often missing.
• Let us begin with a brief history and some important information
events…..
Open Source Information Transition 1455 to 2008
1994 to 2008
1898 to 1994
1455 to 1898
Printer/
Publisher
(Reformation)
Intranets
Online/Web
E-open source
intelligence
Multimedia
Radio/Cinema
TV/Databases
(Mass one way
Communications)
Information/intelligence
is now about linking
actionable knowledge for
immediate use of a
particular user...
Part Two
Suicide Terror and Hidden Agenda
Issues surrounding 9/11
• Open sources were seen as secondary.
• Most intelligence clients subscribed to open
sources in paper and electronically.
• Many had marked relevant articles for reading.
• Problems of overload, classified traffic and lack
of strategic focus on asymmetric threat.
• Fundamentally the terrorists were seen as a
minor not major threat at that time.
What Else Did We know?
100s of Al-Qaeda Articles
50
USS Cole - Yemen
45
40
US embassy
bombings - Nairobi /
Dar es Salaam
35
Threats
against US
assets
30
25
20
15
Articles in the hundreds
Threats
against US
assets
10
5
Ja
n9
Ap 5
r-9
5
Ju
l-9
O 5
ct
-9
Ja 5
n9
Ap 6
r-9
6
Ju
l-9
O 6
ct
-9
Ja 6
n9
Ap 7
r-9
7
Ju
l-9
O 7
ct
-9
Ja 7
n9
Ap 8
r-9
8
Ju
l-9
O 8
ct
-9
Ja 8
n9
Ap 9
r-9
9
Ju
l-9
O 9
ct
-9
Ja 9
n0
Ap 0
r-0
0
Ju
l-0
O 0
ct
-0
Ja 0
n0
Ap 1
r-0
1
Ju
l-0
1
0
Part Three
Different Methodologies
Objective
Deliver information that is conditioned
and designed to support the
intelligence collection and analysis
process:
• Quicker and easier to find
• More usable / ‘ready for analysis’
• Analysis and report building tools
Customer Problem
• Not finding the precise data because of infooverload. The cost, the time and resources.
• Not knowing what is and isn’t validated.
• Problem of not knowing what you know.
• 75% of operational information requests are for
information that is already known.
• Problem of not knowing what you don’t know
and missing critical information.
Intelligent Search & Discovery
Google experience
Information
Sources
Search
Results List
Xxxxxxxxx
Xxxxxxxxx
Xxxxxxxxx
Xxxxxxxxx
Xxxxxxxxx
Xxxxxxxxx
Xxxxxxxxx
•1,000s of results
that may or may not
be relevant to users
actual needs
•Important info is
easily missed or not
even found
Knowledge-enabled experience
Guided search/nav Highly
Information
Sources
Domain
Knowledge
Metadata
Layer
Focused
Profiling & alerting
Results
Analytical tools
That
meet
Info discovery
User
Data visualisation
Needs
Report building
Content/Technology Landscape
Chat
Rooms
Content
Online
News
Research
Reports
Online
Journals
Blogs
Reference
Databases
Unstructured
Some structure
Massive volume
Moderate volume
Real time
After the event
Emerging technology
Established technology
Automated processes
Manually intensive
Alerts /
Profiling
Data
Visualisation
Technology
Entity
Extraction
Content
Management
Search /
Retrieval
Evolution of Taxonomy Technologies
Search and Retrieval Software ( “and”, “or” and “not” )
Boolean Logic ( search results return too
many possible documents )
Meta-data ( “data” about “data” :
Relevancy and consistency were questionable)
Link Ranking ( importance determined
by popularity and use )
Taxonomy
Future Information Architecture
Tailored
Information
Services
Hard
Copy
Offline Data
Services
Online
Applications
Domain Knowledge / Exploitation
Reusable
Information
Objects
Content Management
Reference
News
Images
• Alerting
• Search/browse
• Guided nav
• Visualisation
• Report building
• Taxonomies
• Entities/relships
• Key facts/data
• XML
• Databases
• Editorial ops
Linking of data to produce
immediate trend analysis
Taxonomies, Data Conditioning,
Visualisation and Deeper
Analysis.
Intelligence Centres
Providing knowledge workers with work tools to quickly access
highly focused information from multiple sources
WORK TOOLS
ANALYST
Searching
Alerting
Taxonomies
Visualisation
Exporting
Reporting
Other
Analytical
Tools
CONTENT SOURCES
News
Analysis
Reference
Images
world news
Web Resources
Web Monitoring
Company Press Releases
Contextual Advertising
Other sources
Data Visualisation
Data Visualisation
Creating Open Source Intelligence
• The Intelligence process uses Rationalism : collect the
data, make an assessment, write the analysis and
deliver/publish the intelligence.
• This is only one method of producing intelligence and we
should continue to use a rationalistic approach.
• Also another process that we are now exploring is
non-linear. It is more of a dialogue between specialists
and generalists and is more interactive.
• This has ramification: everything from office layout,
meetings to editorial systems/practice. And the
connectivity of content and improved service.
Part Four
Post Modern Mirrors
Variable Future - New Past
Information and Intelligence
Methodologies
•Linear Intelligence.
•Scenario Planning.
•Mosaic Method.
• These are not meant as final answers.
Traditional Linear Intelligence
• Task, collect the facts, rank and validate facts,
make assessment, Independent review,
complete the analysis and present the results.
• This process is very robust as a method.
• However it is not enough as a process in
uncertain threat environments.
Alneda – the call
• Site hosted in Malaysia.
• Appeared before 911.
• Al Qaeda named by US Intelligence.
• Shut down in 2002 by Al Qaeda as
they opened new sites with their new
name.
Things known about Al Qaeda
• Once they have targeted a person or place they
continue until they believe the task to be completed.
• They use Western technology but despise its creators.
• They seriously believe women are lower in the social
and intellectual order.
• Their revolution had failed in every country they tried.
• Use Toyota vehicles.
• They have been given prominence by the West.
• They have been branded by America.
Scenario Planning – Creative Options
•These methods suggest thinking out of the box.
• They mean teams of both specialists and generalists working
rather than the focus of a few specialist individuals.
• These methods are very useful for bringing ideas to the surface
• They are not a replacement for Linear techniques but should
work as a complementary methodology.
• We are using technology and scenario techniques to clarify our
thought processes.
Twelve Categories of Information
•
•
•
•
•
•
Factual
Contextual
Analytical
Opinion
Covert
Operational
•
•
•
•
•
•
Publicity
Historical
Inaccurate
Propaganda
Spin
Bias
Unintended Consequences – future
training and targeting – historical
parallels and practices
A Scenario Analysis Model
Bias, Spin, Propaganda
History
Opinion
Analysis
Current
B
focus
Validation
Analysis
Scenario
Finally lets look at a Mosaic Method
Mosaic Method
• Created by Information thinkers like Marshall McLuhan
and writers like Robert D. Kaplan.
• Building the world you wish to investigate from its
history, imagery, graffiti, popular culture, humour
through to its boundaries, prejudices, cultural
conventions, social economics and local politics.
• Useful as a means towards new perspectives on a
problem but a method that works along side others.
Mosaic
• Research methods that link different
cultural understandings such that usable
new knowledge is created.
• Using technology to condition
information’s context so the links are
relevant and actionable.
• Bringing clients, researchers and
generalists together in an equal and
collaborative focus.
The Global Stress Point Matrix (GSPM)
15 Lebanon – Hezbollah
Mosaic Method
Open Sources
Al Qaeda
• Copies other terrorist organisations.
• Uses technology it despises.
• Encourages suicide attacks and pays
martyrs’ families for sacrifices.
• 9/11 originally included an attack on LAX Los Angeles airport.
• Trained pilots one of whom said he did not
need training in landing.
• Had studied Kamikaze pilot techniques.
Hezbollah
• Has carried out more suicide attacks than Al Qaeda.
• Designated as a terrorist group by some Western
governments and not by others. The IRA was similarly
designated by some and not others.
• Has had significant disagreements with al Qaeda.
• What is considered acceptable by one culture is not
allowed in another.
• Sophisticated Web sites continue to move location to
stop interference and censorship.
• They consider they won the recent 2006 conflict with
Israel.
Summary
• In a global electronic environment pattern recognition has
become as important as linear analysis.
• As analysis and consultants we have to be aware of the new
client requirements for actionable Intelligence that will
measurably save them people, time and money.
• We must understand where our cultural bias lies and what
effect this has on our final analysis.
• We have to take account of the cultural shock that the Web is
causing and the effect it has on understanding, authority and
power.
• Intelligence must be designed for the action and the
understanding of the final user.
Final Conclusion
• Digital Publishing is altering the cultural landscape.
• Re-writing the past and the future will be common place.
• Expect massive technology and social shifts - and a
backlash as government e-surveillance increases.
• Continually re-educate yourself to ensure
that someone in another country who you
will never meet, cannot take your job.
Intelligence for the 21st Century
Electric Shock –The End
Thank you for Listening
May 2008
[email protected]