intelligence


As required by law, the Director of National Intelligence today disclosed that the budget for the National Intelligence Program in Fiscal Year 2007 was $43.5 billion.
     http://www.fas.org/sgp/news/2007/10/dni103007.pdf
The disclosure was strongly resisted by the intelligence bureaucracy, and for that very reason it may have significant repercussions for national security classification policy.
Although the aggregate intelligence budget figures for 1997 and 1998 ($26.6 and $26.7 billion respectively) had previously been disclosed in response to a Freedom of  information Act lawsuit brought by the Federation of American Scientists, intelligence officials literally swore under oath that any further disclosures would damage national
security.
“Information about the intelligence budget is of great interest to nations and non-state groups (e.g., terrorists and drug traffickers) wishing to calculate the strengths and weaknesses of the United States and their own points of vulnerability to U.S. intelligence and law enforcement agencies,” then-DCI George J. Tenet told a federal court in April 2003, explaining his position that disclosure of the intelligence budget total would cause “serious damage” to the United States.
Even historical budget information from half a century ago “must be withheld from public disclosure… because its release would tend to reveal intelligence methods,” declared then-acting DCI John E. McLaughlin in a 2004 lawsuit, also filed by FAS.
Deferring to executive authority, federal judges including Judge Thomas F. Hogan and Judge Ricardo M. Urbina accepted these statements at face value and ruled in favor of continued secrecy.
But now it appears that such information may safely be disclosed after all.
Because the new disclosure is so sharply at odds with past practice, it may introduce some positive instability into a recalcitrant classification system.  The question implicitly arises, if intelligence officials were wrong to classify this information, what other data are they wrongly withholding?

courtesy of : http://primaryintelligence.blogspot.com/2007/10/military-intelligence-template-for.html

More than 95% of U.S. based businesses indicate that they have dedicated some amount of resources to the gathering of intelligence. This may include market, sales or competitive intelligence, but the goal is usually the same: be better at business than the next guy.

But, few companies would rate themselves as being very effective with the intelligence. And, the funny thing is the discrepancy of the perception between those that gather the intelligence and those that would use it. Executives usually rate themselves as “somewhat effective” or “very effective” as using intelligence while the intelligence professionals generally rate the executives as “not very effective.” Hmmmm. Why so many axes to grind?

Every organization should examine and reexamine its practices to create a continual improvement process. During this process, I would recommend that each organization take a little time to review other organizations that make intelligence a priority.

Now, it would be difficult to peek into other businesses and discover their secrets. You wouldn’t open your doors to this kind of review. Why would anyone else?

But, you can look at an institution that, overall, leads the world in the gathering, analysis and use of intelligence – The military. In fact, you can make the case that the military has the longest running and most successful intelligence system in history. (We won’t talk about policy makers and their use or misuse of intelligence. That’s another story for another day…

Where else are the stakes higher than on the battlefield? In a situation where lives and equipment are constantly at risk, we can learn some very critical things about how the military values its “competitive intelligence”, from gathering through strategic use.

“Most militaries maintain a military intelligence corps with specialized intelligence units for collecting information in specific ways. Militaries also typically have intelligence staff personnel at each echelon down to battalion level. Intelligence officers and enlisted soldiers assigned to military intelligence may be selected for their analytical abilities or scores on intelligence tests. They usually receive formal training in these disciplines.

“Critical vulnerabilities are…indexed in a way that makes them easily available to advisors and line intelligence personnel who package this information for policy-makers and war-fighters. Vulnerabilities are usually indexed by the nation and military unit, with a list of possible attack methods.”

“Critical threats are usually maintained in a prioritized file, with important enemy capabilities analyzed on a schedule set by an estimate of the enemy’s preparation time. For example, nuclear threats between the USSR and the US were analyzed in real time by continuously on-duty staffs. In contrast, analysis of tank or army deployments are usually triggered by accumulations of fuel and munitions, which are monitored on slower, every-few-days cycles. In some cases, automated analysis is performed in real time on automated data traffic.”

“Packaging threats and vulnerabilities for decision makers is a crucial part of military intelligence. A good intelligence officer will stay very close to the policy-maker or war fighter, to anticipate their information requirements, and tailor the information needed. A good intelligence officer will ask a fairly large number of questions in order to help anticipate needs, perhaps even to the point of annoying the principal. For an important policy-maker, the intelligence officer will have a staff to which research projects can be assigned.”

Developing a plan of attack is not the responsibility of intelligence, though it helps an analyst to know the capabilities of common types of military units. Generally, policy-makers are presented with a list of threats, and opportunities. They approve some basic action, and then professional military personnel plan the detailed act and carry it out. Once hostilities begin, target selection often moves into the upper end of the military chain of command. Once ready stocks of weapons and fuel are depleted, logistic concerns are often exported to civilian policy-makers.” (http://en.wikipedia.org/wiki/Military_intelligence)

The points that catch my attention are:

  1. Intelligence professionals are present at each level of the military
  2. They receive formal training in intelligence practices
  3. Good intelligence officers stay very close to the policy-maker or war-fighter
  4. Good intelligence officers ask lots of questions to make sure that the intelligence program is on the right track and can anticipate the leaders’ needs
  5. Good intelligence officers package the intelligence in ways that the users can easily consume while still getting the intended “nutritional value”
  6. While competitive intelligence personnel are not responsible for policy, direction or decisions, they should try to understand how these decisions are made. This will provide a deeper context to make future intelligence efforts more valuable.

In the next post, we’ll look at the usual structure of intelligence in today’s business.

And, if you have any thoughts, leave me a comment. I dare you.

Upon lawful request and for a thousand dollars, Comcast, one of the nation’s leading telecommunications companies, will intercept its customers’ communications under the Foreign Intelligence Surveillance Act.

The cost for performing any FISA surveillance “requiring deployment of an intercept device” is $1,000.00 for the “initial start-up fee (including the first month of intercept service),” according to a newly disclosed Comcast Handbook for Law Enforcement.

Thereafter, the surveillance fee goes down to “$750.00 per month for each subsequent month in which the original [FISA] order or any extensions of the original order are active.”  With respect to surveillance policy, the Comcast manual hews closely to the letter of the law, as one would hope and expect.

“If your [FISA intercept] request pertains to individuals outside the U.S., please be sure you have complied with all the requirements in 50 U.S.C. sections 105A and/or 105B,” the manual says, referring to provisions of the Protect America Act that was enacted last month. “Requests such as these can not be honored after one year and must be dated prior to February 5, 2008, unless extended by Congress.”

Comcast will also comply with disclosure demands presented in the form of National Security Letters.  owever, the manual says, “Attention must be paid to the various court proceedings in which the legal status of such requests is at issue.”

In short, “Comcast will assist law enforcement agencies in their investigations while protecting subscriber privacy as required by law and applicable privacy policies.”

At the same time, “Comcast reserves the right to respond or object to, or seek clarification of, any legal requests and treat legal requests for subscriber information in any manner consistent with applicable law.”

A copy of the manual was obtained by Secrecy News.

See “Comcast Cable Law Enforcement Handbook,” September 2007:

http://www.fas.org/blog/secrecy/docs/handbook.pdf

For better or worse, contractors are now an indispensable part of the U.S. intelligence workforce, and greater attention is needed to manage them effectively, argues a recent study by a military intelligence analyst.

The author presents criteria for evaluating contractor support to various intelligence functions, and applies them in a series of case studies.

“This study assesses the value of current commercial activities used within DoD elements of the Intelligence Community, particularly dealing with operational functions such as analysis, collection management, document exploitation, interrogation, production, and linguistic support.”

In the best case, interactions with contractors can serve as a spur towards modernization of the intelligence bureaucracy itself, suggests the author, Glenn R. Voelz, a U.S. Army Major.

“Collaborative effort with nongovernmental entities offers a powerful mechanism to diversify and strengthen the IC’s collection and analytical capabilities, but to fully realize the benefit of these resources the management and oversight of commercial providers must become a core competency for all intelligence organizations.”

A copy of the study, published by the Joint Military Intelligence College, was obtained by Secrecy News.

See “Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations” by Maj. Glenn J. Voelz, Joint Military Intelligence College, June 2006:

http://www.fas.org/irp/eprint/voelz.pdf

Novità su www.intuslegere.it.

Intus Legere presenta il “Forum sulla Legge di riforma dei Servizi”.
Si apre oggi su Intus Legere il “Forum sulla Legge di riforma dei
Servizi”. Autorevolissimi commentatori ed esperti del settore
confronteranno idee, opinioni e proposte inerenti la nuova Legge
124/2007 sulla “Struttura del sistema di informazione per la sicurezza
della Repubblica e nuova discipina del segreto” che entrerà in vigore il
prossimo 12 ottobre.
Già disponibile on line il primo contributo del Prof. Marco Giaconi. A
breve il contributo del Prof. Mario Caligiuri.

Buona lettura.

Intus Legere Staff

questa la legge che andrà in vigore dal 12 Ottobre. su intuslegere.it il forum per la discussione sulle tematiche.

legge124-2007.pdf

Quite rightly there is increasing amounts of talk about ‘social media’ online. The jury is still out on the real value of some areas of social media and networks, but one area where the value is currently most apparent is using network analysis to help optimise your natural search engine rankings (SEO), largely by identifying suitable sites to get inbound links from.

But what with the internet being so big, and growing so fast, it has been hard to make any practical sense of all the network data available. Recently I came across a tool which showed me the potential power of visualising these relationships…The tool in question is provided by TouchGraph – for example here’s a visualisation map of sites related to E-consultancy.com based on Google data.

Of course, we can question the credibility and reliability of the actual data source (in this case Google’s related sites data) but I think the visualisation alone is very powerful. Particularly for mere marketing/commercial types like me, rather than data analysts.

It reminds me a little of the (site) web analytics tools and how they progressed and advanced in terms of data visualisation. I remember Site Intelligence’s  VBIS tool being amongst the first to do a good job of visualising traffic flows across an entire website; or Speed-trap’s video replays of user sessions and “heat” clickmaps. People like Visual Sciences are now doing some pretty cool visualisation stuff in the world of web/data analytics.

The point is that visualization itself is an extremely poweful and important part of making data intelligible, useful and actionable. (For further examples, do read Avinash Kaushik’s excellent blog piece “The Awesome Power of Data Visualization“).

It still seems quite early days (outside of web/data analytics as mentioned above) for seeing mature data and visualisation services and products for things like online competitive intelligence and benchmarking, or even link / social network analysis for search engine optimisation. Though we are beginning to see some search agencies develop and even productise such technology e.g. Spannerworks’ Network Sense.

With increasing use of standardised data sets (or, at least, better marked up data) and APIs, I’d be very surprised if there weren’t a rash a new services coming which took interesting data and made it commercially valuable by visualising it in a way which makes it meaningful and actionable.

Indeed, I’m sure they already exist and TouchGraph is just the one I happened to come across.

So I’m interested in hearing from you about other such tools and services that you’ve come across where interesting data and visualization is being brought together to provide you with something useful for your online marketing?

Ashley Friedlein
CEO
E-consultancy.com

Related Blog Article:
Blog and User Generated Content monitoring services

Next Page »