SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
What is Identity Intelligence?
Duane Blackburn
Charlottesville, VA
August 2013
Approved for Public Release;
Distribution Unlimited. 13-2977
Sponsor: Department of Defense
MITRE Department: J66C
Statement of fact, opinion, and/or analysis expressed in the paper are those of the author and
do not reflect the official policy or position of the Department of Defense or any U.S.
Government agency.
The views, opinions and/or findings contained in this report are those of The MITRE Corporation
and should not be construed as an official government position, policy, or decision, unless
designated by other documentation. MITRE cleared for public release, case # 13-2977.
© 2013 The MITRE Corporation. All rights reserved.
What is Identity Intelligence?
Introduction
A teenage girl is asked out on her first date. She is ecstatic. Her father is not, and immediately
works to find the boy’s Facebook page. Hundreds of pictures and dozens of “Likes” on the
boy’s profile paint a story of his character and the situations the girl may find herself in. The
story is further clarified by studying profiles of the boy’s close friends. Google Earth provides
satellite images of the boy’s neighborhood and house – “great, he’s got a hot tub and a sports
car,” the father thinks. Google Street View shows that the house doesn’t have a lot of doors to
escape from.
Familial links on Facebook provided the names of the boy’s parents. A quick check of LinkedIn
provides information on the parents’ jobs and how long they have been at the same employer.
LinkedIn also lists three individuals that he and the boy’s father have in common, including one
that he knows will provide him personal insight. Court records are clean, but the state’s sex
offender registry includes someone that lives four
houses down. He starts to search LexisNexis but
thinks better of it when he has to pay to see the results
– “I don’t want to be creepy,” he thinks.
Armed with information in hand, the father consents to
his daughter’s date but subjects her to a pre-date
orientation where he discusses every possible situation
that his research showed was possible. Possible
actions for each are recommended, and consequences
discussed. A post-date review is planned where
permission for future dates will be determined.
In this example, which surely occurs regularly, the
father used multiple sources to identify the boy and his associates, and to paint a picture of the
boy’s intentions and his available means. This information, in turn, enabled him to make an
informed decision on what action he should take.
Now consider an alternative example where the subjects are overseas terrorists instead of
innocent teenagers, the concerned father are federal agents, the sports car and hot tub are
replaced with weapons of mass destruction, and websites are replaced with intelligence assets.
The final assessment is then changed to federal agents using multiple sources to identify
terrorists and their associates, to paint a picture of their intentions and available means, and
developing informed decisions on which actions they should take. This is the new field of
identity intelligence.
“Sasha and Malia are huge fans,
but boys, don't get any ideas.
Two words for you: predator
drones. You will never see it
coming."
-- President Obama to the Jonas
Brothers at the 2010 White House
Correspondents Association Dinner
What is Identity Intelligence?
Identity Intelligence (I2) is a critical enabler across a variety of U.S. Government missions, such
as strategic and tactical intelligence, counterintelligence, law enforcement, and homeland
security. Through the collection, analysis, exploitation, and management of identity information1
and associated attributes across multiple encounters, I2 provides an all-source capability to
definitively establish and track identities and activities of foreign persons of interest, as well as
to protect, manage, and safeguard our own forces’ true identities and aliases.
Joint Publication 2-0, titled Joint Intelligence defines I2 as “The intelligence resulting from the
processing of identity attributes concerning individuals, groups, networks, or populations of
interest”. Additionally, Joint Publication 2-0 now identifies I2 as an intelligence production
category”
“I2 results from the fusion of identity attributes (biologic, biographic, behavioral, and reputational
information related to individuals) and other information and intelligence associated with those
attributes collected across all intelligence disciplines. I2 utilizes enabling intelligence activities, like
biometrics-enabled intelligence (BEI), forensics enabled intelligence (FEI), and document and media
exploitation (DOMEX), to discover the existence of unknown potential threat actors by connecting
individuals to other persons, places, events, or materials, analyzing patterns of life, and
characterizing their level of potential threats to US interests.”
Operationally, I2 consists two fundamental components:
 Identity discovery (or Identity resolution) – the actions taken to gain knowledge of an
identity to enable recognition and determination of who or what he, she, or it is.
 Identity protection – the actions taken to protect identity information and the systems on
which they reside
Why is I2 important?
While conventional (nation vs. nation) warfare was the major focus for the United States’
defense and intelligence activities in the 20th
century, their focus has understandably changed in
the 21st
century as asymmetric threats have become much more likely. The root cause of this
transition is twofold: nation-states that want to harm the U.S. but realize success in a
conventional war would not be feasible, and the rise of non-state actors such as Al Q’aeda.
This change means that our most likely and severe threats (as well as our trusted allies) are no
longer found in groups that wear the same color uniform and have a nationalistic chain of
command, but in small pockets of individuals that work mostly autonomously and are difficult for
us to identify because they blend into their local populace. This changing threat also coincides
with a shrinking world, as nations are no longer protected by vast oceans and rigid land borders.
1
Identity information typically includes a combination of biometric, biographic and contextual data. It is not
always linked to a specific individual. For example, a phone number that a terrorist repeatedly calls may not be
linked to an individual, but is still a valuable piece of identity intelligence.
Within a day’s time, an unknown terrorist can leave his Mid-East safe haven and be onsite at his
target in the United States. Threats within the cyber domain operate even faster, as harm can
be inflicted within milliseconds from anywhere in the world. Our nation’s screening and
protection systems rely upon I2 to guide their activities and to provide them information and
targets to look for. Without this I2 information, these systems would only be able to screen
against prior threats.
I2 issues
Although I2 is already critically relied upon throughout many different domains, it remains a
nascent concept with many issues that need to be addressed. Privacy is one such example,
even though our national security and intelligence communities work overseas and therefore
focus on non-U.S. citizens. But what happens when American citizens, such as Anwar al-Aulaqi
or John Walker Lindh, are overseas and helping terrorists, and I2 information about them is
gathered? What privacy protections must they be legally granted, and what steps must our
intelligence personnel take so that this valuable information can legally be used to keep the rest
of the country safe? Other countries also have privacy rights for their citizens that they will want
the U.S. to follow until adjudicated – how will the intelligence community keep all of these
variances straight when dealing with real-time threat information?
Another I2 issue is one that many other fields face: data overload. The sheer volume of who
this community needs to identify and “know” in today’s global environment is greater than the
community can handle via traditional methods. This data is itself a subset of the data available
on the worldwide population, which the community must comb through to find the bad guys
while simultaneously ignoring the data on the good guys. This is the proverbial “needle in a
haystack” problem – except the needle is incredibly important information to find while the hay
cannot be used or disturbed. The development and utilization of assistive technical tools shows
extreme promise in this regard, but will take significant effort to be optimally integrated into
intelligence processes.
A third I2 issue is the interactions across today’s identity systems, which creates seemingly
contrasting concerns. On one hand, most identity systems do not exist in a vacuum, as they
rely upon other identity systems for their information and to support decision making. In this
regard, inaccurate information (no matter if it is miskeyed by a well-meaning analyst or
surreptitiously planted by an adversary) can promulgate across multiple identity activities. An
intelligence analyst may view the same incorrect information in multiple locations and assume
that it is true. On the other hand, there is no master identity database for the worldwide
population. This not only leads to conflicting information, but also various approaches of
referring to information. For example, consider that there is no universally accepted standard
for transliterating Arabic names into English. One database may list an individual as “Usama
bin Laden” while another lists him as “Osama bin Mohammed bin Awad bin Laden”. Similarly,
while it is common in the U.S. to list a name as Given and then Family (Duane Blackburn),
many other cultures refer to individuals’ name as Family and then Given (Blackburn Duane).
Variances such as these create confusion in I2 databases and applications, which can take
considerable effort to address.
Conclusion
Identity intelligence will soon become one of the most critical tools within the national security
infrastructure, even though it is still a very nascent concept. A limited capability relying on the I2
subset of latent fingerprints, which was the major factor in bringing the IED threat in Iraq under
control, foreshadows its broader utility. The I2 community will need to rapidly mature, in
collections, technology, policy, and oversight, in order to handle tomorrow’s national security
requirements.

Weitere ähnliche Inhalte

Was ist angesagt?

Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks
 
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013- Mark - Fullbright
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.Matt Lemon
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Wiiisdom
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...David Cunningham
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Kroll
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Michael Torres
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
 

Was ist angesagt? (20)

Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
Chuck Brooks Profile: on Homeland Security, Cybersecurity, Emerging Technolog...
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects
 
TAP IntroDeck_06012015_Final PDF
TAP IntroDeck_06012015_Final PDFTAP IntroDeck_06012015_Final PDF
TAP IntroDeck_06012015_Final PDF
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 

Andere mochten auch

23204916
2320491623204916
23204916radgirl
 
Tapvert presentation
Tapvert presentationTapvert presentation
Tapvert presentationTeemu Airamo
 
Webinar: Leadership and Career Development for the 21st Century Information P...
Webinar: Leadership and Career Development for the 21st Century Information P...Webinar: Leadership and Career Development for the 21st Century Information P...
Webinar: Leadership and Career Development for the 21st Century Information P...Lisa Chow
 
10 min 2008 BNI
10 min 2008 BNI10 min 2008 BNI
10 min 2008 BNISonny1967
 
Trapper School: Trapper Trails
Trapper School: Trapper TrailsTrapper School: Trapper Trails
Trapper School: Trapper Trailsnsbsd
 
Rootstech-The Basics of Gamification
Rootstech-The Basics of GamificationRootstech-The Basics of Gamification
Rootstech-The Basics of GamificationDave McAllister
 
eLN Gamification of learning at work
eLN Gamification of learning at workeLN Gamification of learning at work
eLN Gamification of learning at workPete Baikins
 
Ethan Becker - Work Samples
Ethan Becker - Work SamplesEthan Becker - Work Samples
Ethan Becker - Work Samplesebeckerwork
 
Semana Santa Parroquia La Inmaculada
Semana Santa Parroquia La InmaculadaSemana Santa Parroquia La Inmaculada
Semana Santa Parroquia La Inmaculadacristinamoreubi
 
Velvet Search Management System
Velvet Search Management SystemVelvet Search Management System
Velvet Search Management Systemprospectcity
 
Basics of new twitter
Basics of new twitterBasics of new twitter
Basics of new twitterHeidi Allen
 
Delegation & Empowerment
Delegation & EmpowermentDelegation & Empowerment
Delegation & Empowermentkunna
 
Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Riskexcellence
 
OpenSocial State of the Union 2010
OpenSocial State of the Union 2010OpenSocial State of the Union 2010
OpenSocial State of the Union 2010weitzelm
 

Andere mochten auch (20)

23204916
2320491623204916
23204916
 
Tapvert presentation
Tapvert presentationTapvert presentation
Tapvert presentation
 
Webinar: Leadership and Career Development for the 21st Century Information P...
Webinar: Leadership and Career Development for the 21st Century Information P...Webinar: Leadership and Career Development for the 21st Century Information P...
Webinar: Leadership and Career Development for the 21st Century Information P...
 
10 min 2008 BNI
10 min 2008 BNI10 min 2008 BNI
10 min 2008 BNI
 
Trapper School: Trapper Trails
Trapper School: Trapper TrailsTrapper School: Trapper Trails
Trapper School: Trapper Trails
 
Rootstech-The Basics of Gamification
Rootstech-The Basics of GamificationRootstech-The Basics of Gamification
Rootstech-The Basics of Gamification
 
eLN Gamification of learning at work
eLN Gamification of learning at workeLN Gamification of learning at work
eLN Gamification of learning at work
 
Collateral Advantage
Collateral AdvantageCollateral Advantage
Collateral Advantage
 
Bc Dc Oh
Bc Dc OhBc Dc Oh
Bc Dc Oh
 
Ab430trainingoverview
Ab430trainingoverviewAb430trainingoverview
Ab430trainingoverview
 
Chipul Lui Iisus In Pictura Lui Ocampo
Chipul Lui Iisus  In Pictura Lui OcampoChipul Lui Iisus  In Pictura Lui Ocampo
Chipul Lui Iisus In Pictura Lui Ocampo
 
Ethan Becker - Work Samples
Ethan Becker - Work SamplesEthan Becker - Work Samples
Ethan Becker - Work Samples
 
QRcloud
QRcloudQRcloud
QRcloud
 
Semana Santa Parroquia La Inmaculada
Semana Santa Parroquia La InmaculadaSemana Santa Parroquia La Inmaculada
Semana Santa Parroquia La Inmaculada
 
Velvet Search Management System
Velvet Search Management SystemVelvet Search Management System
Velvet Search Management System
 
Basics of new twitter
Basics of new twitterBasics of new twitter
Basics of new twitter
 
KMap
KMapKMap
KMap
 
Delegation & Empowerment
Delegation & EmpowermentDelegation & Empowerment
Delegation & Empowerment
 
Face Overview 03 03 09 V3
Face Overview 03 03 09 V3Face Overview 03 03 09 V3
Face Overview 03 03 09 V3
 
OpenSocial State of the Union 2010
OpenSocial State of the Union 2010OpenSocial State of the Union 2010
OpenSocial State of the Union 2010
 

Ähnlich wie What is I2 Final-Approved

The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security AgencyToya Shamberger
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxelishaoatway
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEYusuf Qadir
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxbagotjesusa
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceAmber Wheeler
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxphilipnelson29183
 

Ähnlich wie What is I2 Final-Approved (11)

The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
GOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCEGOVERNMENT SURVEILANCE
GOVERNMENT SURVEILANCE
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 

Mehr von Duane Blackburn

Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementDuane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EDuane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual FoundationDuane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics ChallengeDuane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Duane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process OverviewDuane Blackburn
 

Mehr von Duane Blackburn (20)

Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 
BCC 2008 - NSTC
BCC 2008 - NSTCBCC 2008 - NSTC
BCC 2008 - NSTC
 
BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
 

What is I2 Final-Approved

  • 1. What is Identity Intelligence? Duane Blackburn Charlottesville, VA August 2013 Approved for Public Release; Distribution Unlimited. 13-2977
  • 2. Sponsor: Department of Defense MITRE Department: J66C Statement of fact, opinion, and/or analysis expressed in the paper are those of the author and do not reflect the official policy or position of the Department of Defense or any U.S. Government agency. The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. MITRE cleared for public release, case # 13-2977. © 2013 The MITRE Corporation. All rights reserved.
  • 3. What is Identity Intelligence? Introduction A teenage girl is asked out on her first date. She is ecstatic. Her father is not, and immediately works to find the boy’s Facebook page. Hundreds of pictures and dozens of “Likes” on the boy’s profile paint a story of his character and the situations the girl may find herself in. The story is further clarified by studying profiles of the boy’s close friends. Google Earth provides satellite images of the boy’s neighborhood and house – “great, he’s got a hot tub and a sports car,” the father thinks. Google Street View shows that the house doesn’t have a lot of doors to escape from. Familial links on Facebook provided the names of the boy’s parents. A quick check of LinkedIn provides information on the parents’ jobs and how long they have been at the same employer. LinkedIn also lists three individuals that he and the boy’s father have in common, including one that he knows will provide him personal insight. Court records are clean, but the state’s sex offender registry includes someone that lives four houses down. He starts to search LexisNexis but thinks better of it when he has to pay to see the results – “I don’t want to be creepy,” he thinks. Armed with information in hand, the father consents to his daughter’s date but subjects her to a pre-date orientation where he discusses every possible situation that his research showed was possible. Possible actions for each are recommended, and consequences discussed. A post-date review is planned where permission for future dates will be determined. In this example, which surely occurs regularly, the father used multiple sources to identify the boy and his associates, and to paint a picture of the boy’s intentions and his available means. This information, in turn, enabled him to make an informed decision on what action he should take. Now consider an alternative example where the subjects are overseas terrorists instead of innocent teenagers, the concerned father are federal agents, the sports car and hot tub are replaced with weapons of mass destruction, and websites are replaced with intelligence assets. The final assessment is then changed to federal agents using multiple sources to identify terrorists and their associates, to paint a picture of their intentions and available means, and developing informed decisions on which actions they should take. This is the new field of identity intelligence. “Sasha and Malia are huge fans, but boys, don't get any ideas. Two words for you: predator drones. You will never see it coming." -- President Obama to the Jonas Brothers at the 2010 White House Correspondents Association Dinner
  • 4. What is Identity Intelligence? Identity Intelligence (I2) is a critical enabler across a variety of U.S. Government missions, such as strategic and tactical intelligence, counterintelligence, law enforcement, and homeland security. Through the collection, analysis, exploitation, and management of identity information1 and associated attributes across multiple encounters, I2 provides an all-source capability to definitively establish and track identities and activities of foreign persons of interest, as well as to protect, manage, and safeguard our own forces’ true identities and aliases. Joint Publication 2-0, titled Joint Intelligence defines I2 as “The intelligence resulting from the processing of identity attributes concerning individuals, groups, networks, or populations of interest”. Additionally, Joint Publication 2-0 now identifies I2 as an intelligence production category” “I2 results from the fusion of identity attributes (biologic, biographic, behavioral, and reputational information related to individuals) and other information and intelligence associated with those attributes collected across all intelligence disciplines. I2 utilizes enabling intelligence activities, like biometrics-enabled intelligence (BEI), forensics enabled intelligence (FEI), and document and media exploitation (DOMEX), to discover the existence of unknown potential threat actors by connecting individuals to other persons, places, events, or materials, analyzing patterns of life, and characterizing their level of potential threats to US interests.” Operationally, I2 consists two fundamental components:  Identity discovery (or Identity resolution) – the actions taken to gain knowledge of an identity to enable recognition and determination of who or what he, she, or it is.  Identity protection – the actions taken to protect identity information and the systems on which they reside Why is I2 important? While conventional (nation vs. nation) warfare was the major focus for the United States’ defense and intelligence activities in the 20th century, their focus has understandably changed in the 21st century as asymmetric threats have become much more likely. The root cause of this transition is twofold: nation-states that want to harm the U.S. but realize success in a conventional war would not be feasible, and the rise of non-state actors such as Al Q’aeda. This change means that our most likely and severe threats (as well as our trusted allies) are no longer found in groups that wear the same color uniform and have a nationalistic chain of command, but in small pockets of individuals that work mostly autonomously and are difficult for us to identify because they blend into their local populace. This changing threat also coincides with a shrinking world, as nations are no longer protected by vast oceans and rigid land borders. 1 Identity information typically includes a combination of biometric, biographic and contextual data. It is not always linked to a specific individual. For example, a phone number that a terrorist repeatedly calls may not be linked to an individual, but is still a valuable piece of identity intelligence.
  • 5. Within a day’s time, an unknown terrorist can leave his Mid-East safe haven and be onsite at his target in the United States. Threats within the cyber domain operate even faster, as harm can be inflicted within milliseconds from anywhere in the world. Our nation’s screening and protection systems rely upon I2 to guide their activities and to provide them information and targets to look for. Without this I2 information, these systems would only be able to screen against prior threats. I2 issues Although I2 is already critically relied upon throughout many different domains, it remains a nascent concept with many issues that need to be addressed. Privacy is one such example, even though our national security and intelligence communities work overseas and therefore focus on non-U.S. citizens. But what happens when American citizens, such as Anwar al-Aulaqi or John Walker Lindh, are overseas and helping terrorists, and I2 information about them is gathered? What privacy protections must they be legally granted, and what steps must our intelligence personnel take so that this valuable information can legally be used to keep the rest of the country safe? Other countries also have privacy rights for their citizens that they will want the U.S. to follow until adjudicated – how will the intelligence community keep all of these variances straight when dealing with real-time threat information? Another I2 issue is one that many other fields face: data overload. The sheer volume of who this community needs to identify and “know” in today’s global environment is greater than the community can handle via traditional methods. This data is itself a subset of the data available on the worldwide population, which the community must comb through to find the bad guys while simultaneously ignoring the data on the good guys. This is the proverbial “needle in a haystack” problem – except the needle is incredibly important information to find while the hay cannot be used or disturbed. The development and utilization of assistive technical tools shows extreme promise in this regard, but will take significant effort to be optimally integrated into intelligence processes. A third I2 issue is the interactions across today’s identity systems, which creates seemingly contrasting concerns. On one hand, most identity systems do not exist in a vacuum, as they rely upon other identity systems for their information and to support decision making. In this regard, inaccurate information (no matter if it is miskeyed by a well-meaning analyst or surreptitiously planted by an adversary) can promulgate across multiple identity activities. An intelligence analyst may view the same incorrect information in multiple locations and assume that it is true. On the other hand, there is no master identity database for the worldwide population. This not only leads to conflicting information, but also various approaches of referring to information. For example, consider that there is no universally accepted standard for transliterating Arabic names into English. One database may list an individual as “Usama bin Laden” while another lists him as “Osama bin Mohammed bin Awad bin Laden”. Similarly, while it is common in the U.S. to list a name as Given and then Family (Duane Blackburn), many other cultures refer to individuals’ name as Family and then Given (Blackburn Duane).
  • 6. Variances such as these create confusion in I2 databases and applications, which can take considerable effort to address. Conclusion Identity intelligence will soon become one of the most critical tools within the national security infrastructure, even though it is still a very nascent concept. A limited capability relying on the I2 subset of latent fingerprints, which was the major factor in bringing the IED threat in Iraq under control, foreshadows its broader utility. The I2 community will need to rapidly mature, in collections, technology, policy, and oversight, in order to handle tomorrow’s national security requirements.