http://www.fastcompany.com/1750138/law-enforcement-embracing-open-source-int
elligence-for-counterterrorism 


Counterterrorism Software Helps Cops Shine Light Into Terrorism's Dark
Corners 


BY Neal Ungerleider <http://www.fastcompany.com/user/260653> Wed Apr 27,
2011 

One of the largest distributors of commercial law enforcement software in
the United States is integrating open source intelligence into its
products--and they are betting the results will lead to enhanced
counterterrorism efforts. 

 



More than ever, law enforcement agencies are connecting to far flung sources
of information in the fight against terrorism. Now Virginia's i2 Group
<http://www.i2group.com>  is offering police departments a new tool

The company is launching an open-source database on worldwide group-based
violence that gives local law agents access to a massive, searchable pool of
information on terrorist groups, organized crime, and militant organizations
culled from foreign language papers, chat rooms, and other frequently
walled-off sources. And it's hoping to garner interest from fusion centers
<http://en.wikipedia.org/wiki/Fusion_center> , inter-agency terrorism
investigation and response centers favored by local law enforcement agencies
because of the generous funding they receive from the federal government.
Federal agencies generally support them because they give access to
otherwise-unavailable intelligence from local police departments. Despite
criticism of their potential for misuse
<http://www.cato-at-liberty.org/we%E2%80%99re-all-terrorists-now/>  and
justified fears of civil liberties violations and data mining
<http://www.aclu.org/technology-and-liberty/whats-wrong-fusion-centers-execu
tive-summary> , fusion centers are a prominent part of the American
counterterrorism landscape.

I2's fusion center software suite includes an analysis tool called iBase
<http://www.knowledgecc.com/us/products--services/analysis-product-line/ibas
e>  and a related visualization tool called Analyst's Notebook
<http://www.knowledgecc.com/us/products--services/analysis-product-line/anal
ysts-notebook> , and it makes use of an open source database from the
Institute for the Study of Violent Groups <http://www.isvg.org/> . The
institute bills itself as "[building] the most comprehensive unclassified
database on group-based violence worldwide" and is based at Connecticut's
University of New Haven. The ISVG's database collects information from
public sources on the actions and capabilities of groups ranging from
Mexican drug gangs to Nigeria's Boko Haram
<http://en.wikipedia.org/wiki/Boko_Haram>  terrorist organization. This
information is then turned into proprietary products
<http://www.i2group.com/documents/product-sheets/solutions/US/DS_ISVG_AM_191
02010_Low.pdf>  with advanced cross-linking and visualization capabilities
for companies such as i2.



According to i2's Chriss Knisley, "Fusion centers and law enforcement
agencies are realizing the great value of open source data to enhance their
analyses. For fusion center analysts, it's about capturing that information
in a meaningful way to help them solve crimes and prevent violent acts. By
making the ISVG database easily available and analysis-ready as part of our
fusion center solution, we're adding the power of more than 120 open source
collectors to every fusion center."

Open source intelligence is turning into a primary tool for law enforcement
agencies in general. Organizations such as the ISVG collect information that
is easily available off the internet--but which cannot be sorted and
translated at each individual organization or fusion center that uses their
data. Information on Lebanon's Hezbollah militia, for instance, can be
collected from sources such as Beirut's  <http://www.al-akhbar.com/>
al-Akhbar newspaper or Hezbollah's al-Manar
<http://www.almanar.com.lb/english/>  satellite television station.
Similarly, information on Maoist guerillas in India
<http://en.wikipedia.org/wiki/Naxalite>  can be found on a variety of
local-language newspapers and websites. Many fusion centers focus on
activities such as fundraising for foreign militant groups in the United
States, which often takes place among expatriate communities. While the
information that open source intelligence collectors such as the ISVG
distribute can be found freely elsewhere, their partners and clients save
significant manpower hours by using them as the middlemen.

Knisley noted that "the data is tagged with dates, times, relationships and
latitude/longitude information and processed [...] The results are returned
as i2 analysis-ready data (entities, links and properties) and instantly
visualized as link associations, temporal patterns and geospatial
relationships, allowing analysts to quickly see how groups, individuals,
incidents and motivations are related to each other across geographic
jurisdictions."

While fusion centers are a primarily American institution, i2 sells a
significant portion of their products--and, by extension, American-compiled
counter-terrorism information--around the world. Knisley noted that the firm
exports versions of their software in 14 different languages, including
Russian, Arabic and Chinese. I2's best known products, Analyst's Notebook
and COPLINK
<http://www.i2group.com/us/products--services/coplink-product-line> , are
used by public and private sector clients in 150 countries. The exact
products used in the fusion center software suite in the United States vary
on a case-by-case basis.

Fusion centers have spawned a rich cottage industry of their own, complete
with conferences and conventions
<http://www.iir.com/registration/fusioncenter/?AspxAutoDetectCookieSupport=1
> . According to the Department of Homeland Security, more than 70 fusion
centers have already been founded in the United States.

[Image via Flickr user Konfu <http://www.flickr.com/photos/koomatuomio/> ]

 
<http://www.fastcompany.com/1750138/law-enforcement-embracing-open-source-in
telligence-for-counterterrorism> 




[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to