Information Technology Reference
In-Depth Information
CHAIN OF INFORMATION VALUE
Generation
(Transational
syst.,EIP)
Transformation
Loading
(ETL/ETT)
Presentation
(Informational
Syst.,Olap)
Storage
(DWH, Data Mart)
Increase of the value
Data
Knowledge
Figure 2. Chain of information value
3.
GLOBAL TERRORISM AND INTELLIGENCE REQUIREMENTS
Modern terrorism has shown the same aggressive and destructive potentiality of a real
war but with a totally different structure or organization characterized by invisibility,
mimicry and a worldwide de-localization of its forces. These characteristics have a
mandate for a strong requirement of communication, terrorist movement and transfer of
resources (money, weapons, information and documents).
Unfortunately terrorists have learned very well how to use public infrastructures which
remain largely unknown to the general public. It is clear from the first interceptions and
from seized discs and laptops that Al Qaeda has a great awareness of an extended use of
Internet and the Web, hacking methodologies, advanced information technologies and
low-tech coding.
It is very questionable if the terrorists' use of low-tech coding (as substitution codes or
code books, simple stenography and e-mail account diversion) is an example of their
naivety or sloppiness. It is well known also that experienced covert agents are rarely
available to run strong encryption devices or sophisticated spying paraphernalia as
evidence of their activities. It is also questionable if terrorists are gathering skills in
cyberwar capability in order to attack national critical infrastructures, to use information
as a weapon or to start a cyber-jihad.
Possibly the right answer to these questions already exists undiscovered in the
terabytes of data collected and stored in databases spread over not only intelligence
agencies but also banks, communication providers, airline companies and travel agencies.
In this classic “needle in the haystack problem” it is of paramount importance to
collect every piece of evidence (or suspicious evidence), which when analysed and
aggregated with other global pieces of information, should help the timely uncovering of
illegal activities. Once again intelligence must open the way to both measures of defence
and attack in counter-terrorism.
To cope with these new challenging requirements, intelligence must be strengthened
with a more flexible approach and more powerful analytical tools. Such an innovative
approach results in a new way for intelligence analysts to interact with raw data and
relevant data sources.
Search WWH ::




Custom Search