SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Visual Analytics for Security Dr Joe Parry Head of Research, i2 http://i2group.com/ Copyright © 2010 i2
010100101010001010101000101010101010 00010010010011000110000101010101010101010 10010101001010100101010101 010101010101010101010101101010010101 01100101010101010101001010101011001001010 10001010101010101011010010 100101010101010101010111101010010101 11011001010101010101001010101011001001010 01001010101010001011010010 .010r1v10e00i00el11gen010ma00ge11n00 so00w01e10o000nt11li00n0110ed0o11r0t00n10 0n100s110a1100i11a101at010  ..10rivi0e00intell1gene10ma0agem1n00 sof0ware10or00ntelli0en011led0oper0t00ns0 0nal0s1s0a1d00is1al01ati10 ..0privides0intell1gence0managem1nt0 sof0ware0for0intelligen0e1led0oper0ti0ns0 anal0sis0and0visualizatio0 ...provides intelligence management, software for intelligence-led operations. analysis and visualization
i2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],> i2
> Me?
> Me!
> The Threat
> Tasking
> Odd Insights
> Intelligence Agent
> Intelligence Agent
> People
> People > Photo: Peter Funch
> People > Photo: Peter Funch
> Photo: Bahbak Hashemi-Nezhad > People
Maslow’s Hierarchy of Human Needs Self-Actualization Esteem Love Safety Physiological
Joe’s Hierarchy of Analyst’s Needs The Right Action Collaboration, Sharing Understanding, Insight Provenance, Information Data
> Data
> Lots of it! > Held in lots of different databases > Structured and Unstructured > Sometimes on Paper > Usually a (legal) process for getting hold of it > Typically ‘streaming’– everything has a time stamp > Identifiers (and Identity Resolution) used to tie things together > Data
> Provenance, Information > Provenance of data necessary for evidence chain > Provenance necessary to judge reliability, disclosure > Misinformation > Vague information > Missing information > Rarely have the big picture
> Understanding, Insight > Insight often arises from combination of data from lots of sources > Often needs to be backed up by interviews/statements
> Example – Social Network Analysis > i2 Analyst’s Notebook
> Example – Pattern of Life > Nathan Eagle’s Eigenbehaviours
> Example – Pattern of Life > i2 Analyst’s Notebook > Work in Progress!
> Collaboration, Sharing > IT infrastructure often a barrier > Cultural and political boundaries > Printing is crucial for team communication Reports: > Output is A4 sheet > Labelling & summarization are critical > Visualizations always backed by text, which provides context
> The Right Action
Maslow’s Hierarchy of Human Needs Self-Actualization Esteem Love Safety Physiological
Danke! > All logos, trademarks, service marks and copyrights used in this presentation belong to their respective owners > Copyright © 2010 i2

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (6)

Serious Games Analytics - Lecture at TU Darmstadt
Serious Games Analytics - Lecture at TU DarmstadtSerious Games Analytics - Lecture at TU Darmstadt
Serious Games Analytics - Lecture at TU Darmstadt
 
Mediencampus: Info für Studienanfänger
Mediencampus: Info für StudienanfängerMediencampus: Info für Studienanfänger
Mediencampus: Info für Studienanfänger
 
openHAB @ Eclipse DemoCamp Darmstadt
openHAB @ Eclipse DemoCamp DarmstadtopenHAB @ Eclipse DemoCamp Darmstadt
openHAB @ Eclipse DemoCamp Darmstadt
 
Fachbereichsflyer Media Hochschule Darmstadt
Fachbereichsflyer Media Hochschule DarmstadtFachbereichsflyer Media Hochschule Darmstadt
Fachbereichsflyer Media Hochschule Darmstadt
 
Virgo 3.0 from OSGi Community Event 2011 at Darmstadt
Virgo 3.0 from OSGi Community Event 2011 at DarmstadtVirgo 3.0 from OSGi Community Event 2011 at Darmstadt
Virgo 3.0 from OSGi Community Event 2011 at Darmstadt
 
"Web 2.0 für Stiftungen", Facebook, Twitter & Co für Anfänger (Broschüre)
"Web 2.0 für Stiftungen", Facebook, Twitter & Co für Anfänger (Broschüre)"Web 2.0 für Stiftungen", Facebook, Twitter & Co für Anfänger (Broschüre)
"Web 2.0 für Stiftungen", Facebook, Twitter & Co für Anfänger (Broschüre)
 

Ähnlich wie Visual Analytics for Security Intelligence

Experience Strategy Journey Mapping
Experience Strategy Journey MappingExperience Strategy Journey Mapping
Experience Strategy Journey MappingMad*Pow
 
Data mining financial services
Data mining financial servicesData mining financial services
Data mining financial servicesHprentice
 
How to Map Business goals vs IT goals
How to Map Business goals vs IT goals How to Map Business goals vs IT goals
How to Map Business goals vs IT goals Fahad Ahmed
 
STEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery SolutionsSTEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery SolutionsSTEALTHbits Technologies
 
Commercial diving safety DA
Commercial diving safety DACommercial diving safety DA
Commercial diving safety DAKyra Richter
 
IT Strategy Development
IT Strategy DevelopmentIT Strategy Development
IT Strategy DevelopmentGreg Torski
 
NITF 2009 Spring Working Group
NITF 2009 Spring Working GroupNITF 2009 Spring Working Group
NITF 2009 Spring Working GroupStuart Myles
 
The Beginner's Guide to Threat Hunting
The Beginner's Guide to Threat HuntingThe Beginner's Guide to Threat Hunting
The Beginner's Guide to Threat HuntingDomainTools
 
Forms are boring
Forms are boringForms are boring
Forms are boringJoe Leech
 
Social Media Marketing: The 12 Step Program for the Traditional Media Addicted
Social Media Marketing: The 12 Step Program for the Traditional Media AddictedSocial Media Marketing: The 12 Step Program for the Traditional Media Addicted
Social Media Marketing: The 12 Step Program for the Traditional Media AddictedOrigin Whistler
 
Neuro scientific design
Neuro scientific designNeuro scientific design
Neuro scientific designDante Murphy
 
Chapter 13 theory and methodology
Chapter 13 theory and methodologyChapter 13 theory and methodology
Chapter 13 theory and methodologygrainne
 
IASSIST 2011 presentation: Problems with our Data Citation Solution
IASSIST 2011 presentation:  Problems with our Data Citation SolutionIASSIST 2011 presentation:  Problems with our Data Citation Solution
IASSIST 2011 presentation: Problems with our Data Citation SolutionHeather Piwowar
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Jisc
 
European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018Pierre Far
 
Persuading your organisation to do awesome things
Persuading your organisation to do awesome thingsPersuading your organisation to do awesome things
Persuading your organisation to do awesome thingsJacqueline (Jax) Wechsler
 
Master\'s Thesis
Master\'s ThesisMaster\'s Thesis
Master\'s Thesistaco_dols
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingThinAir
 
Quantified-Self and Lifelogging Meets Internet of Things (IOT)
Quantified-Self and Lifelogging Meets Internet of Things (IOT)Quantified-Self and Lifelogging Meets Internet of Things (IOT)
Quantified-Self and Lifelogging Meets Internet of Things (IOT)Dr. Mazlan Abbas
 

Ähnlich wie Visual Analytics for Security Intelligence (20)

Experience Strategy Journey Mapping
Experience Strategy Journey MappingExperience Strategy Journey Mapping
Experience Strategy Journey Mapping
 
Data mining financial services
Data mining financial servicesData mining financial services
Data mining financial services
 
How to Map Business goals vs IT goals
How to Map Business goals vs IT goals How to Map Business goals vs IT goals
How to Map Business goals vs IT goals
 
STEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery SolutionsSTEALTHbits Sensitive Data Discovery Solutions
STEALTHbits Sensitive Data Discovery Solutions
 
Commercial diving safety DA
Commercial diving safety DACommercial diving safety DA
Commercial diving safety DA
 
IT Strategy Development
IT Strategy DevelopmentIT Strategy Development
IT Strategy Development
 
NITF 2009 Spring Working Group
NITF 2009 Spring Working GroupNITF 2009 Spring Working Group
NITF 2009 Spring Working Group
 
The Beginner's Guide to Threat Hunting
The Beginner's Guide to Threat HuntingThe Beginner's Guide to Threat Hunting
The Beginner's Guide to Threat Hunting
 
Forms are boring
Forms are boringForms are boring
Forms are boring
 
Social Media Marketing: The 12 Step Program for the Traditional Media Addicted
Social Media Marketing: The 12 Step Program for the Traditional Media AddictedSocial Media Marketing: The 12 Step Program for the Traditional Media Addicted
Social Media Marketing: The 12 Step Program for the Traditional Media Addicted
 
Neuro scientific design
Neuro scientific designNeuro scientific design
Neuro scientific design
 
Chapter 13 theory and methodology
Chapter 13 theory and methodologyChapter 13 theory and methodology
Chapter 13 theory and methodology
 
IASSIST 2011 presentation: Problems with our Data Citation Solution
IASSIST 2011 presentation:  Problems with our Data Citation SolutionIASSIST 2011 presentation:  Problems with our Data Citation Solution
IASSIST 2011 presentation: Problems with our Data Citation Solution
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!
 
European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018
 
Persuading your organisation to do awesome things
Persuading your organisation to do awesome thingsPersuading your organisation to do awesome things
Persuading your organisation to do awesome things
 
Master\'s Thesis
Master\'s ThesisMaster\'s Thesis
Master\'s Thesis
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Quantified-Self and Lifelogging Meets Internet of Things (IOT)
Quantified-Self and Lifelogging Meets Internet of Things (IOT)Quantified-Self and Lifelogging Meets Internet of Things (IOT)
Quantified-Self and Lifelogging Meets Internet of Things (IOT)
 
Converge ppt
Converge pptConverge ppt
Converge ppt
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Visual Analytics for Security Intelligence

  • 1. Visual Analytics for Security Dr Joe Parry Head of Research, i2 http://i2group.com/ Copyright © 2010 i2
  • 2. 010100101010001010101000101010101010 00010010010011000110000101010101010101010 10010101001010100101010101 010101010101010101010101101010010101 01100101010101010101001010101011001001010 10001010101010101011010010 100101010101010101010111101010010101 11011001010101010101001010101011001001010 01001010101010001011010010 .010r1v10e00i00el11gen010ma00ge11n00 so00w01e10o000nt11li00n0110ed0o11r0t00n10 0n100s110a1100i11a101at010 ..10rivi0e00intell1gene10ma0agem1n00 sof0ware10or00ntelli0en011led0oper0t00ns0 0nal0s1s0a1d00is1al01ati10 ..0privides0intell1gence0managem1nt0 sof0ware0for0intelligen0e1led0oper0ti0ns0 anal0sis0and0visualizatio0 ...provides intelligence management, software for intelligence-led operations. analysis and visualization
  • 3.
  • 12. > People > Photo: Peter Funch
  • 13. > People > Photo: Peter Funch
  • 14. > Photo: Bahbak Hashemi-Nezhad > People
  • 15. Maslow’s Hierarchy of Human Needs Self-Actualization Esteem Love Safety Physiological
  • 16. Joe’s Hierarchy of Analyst’s Needs The Right Action Collaboration, Sharing Understanding, Insight Provenance, Information Data
  • 18. > Lots of it! > Held in lots of different databases > Structured and Unstructured > Sometimes on Paper > Usually a (legal) process for getting hold of it > Typically ‘streaming’– everything has a time stamp > Identifiers (and Identity Resolution) used to tie things together > Data
  • 19. > Provenance, Information > Provenance of data necessary for evidence chain > Provenance necessary to judge reliability, disclosure > Misinformation > Vague information > Missing information > Rarely have the big picture
  • 20. > Understanding, Insight > Insight often arises from combination of data from lots of sources > Often needs to be backed up by interviews/statements
  • 21. > Example – Social Network Analysis > i2 Analyst’s Notebook
  • 22. > Example – Pattern of Life > Nathan Eagle’s Eigenbehaviours
  • 23. > Example – Pattern of Life > i2 Analyst’s Notebook > Work in Progress!
  • 24. > Collaboration, Sharing > IT infrastructure often a barrier > Cultural and political boundaries > Printing is crucial for team communication Reports: > Output is A4 sheet > Labelling & summarization are critical > Visualizations always backed by text, which provides context
  • 25. > The Right Action
  • 26. Maslow’s Hierarchy of Human Needs Self-Actualization Esteem Love Safety Physiological
  • 27. Danke! > All logos, trademarks, service marks and copyrights used in this presentation belong to their respective owners > Copyright © 2010 i2

Hinweis der Redaktion

  1. Audience for this talk: Students, Researchers in Visual Analytics Not necessarily familiar with i2 or indeed crime/intel analysts May be some competition there Rola will be there Aims for the talk Establish i2 as the owner of that part of visual analytics Why am I here? Potential partner for research/ output of visual analytic research
  2. (subject) (Header & Footer notes date) (Header & Footer notes classification)
  3. As is probably obvious, I’m not this guy here.
  4. In fact I’m more like this guy. My job is to look out for new technologies, build prototypes, - heading up the Research Team. How do I decide what to work on? Obviously I can have fun building anything.. But what I build needs to be driven by their demands and their tasks… So what drives an analyst’s tasking?
  5. TASKING/MOTIVATION
  6. TASKING/MOTIVATION People use our products to produce Infographics Here are some of the icons we provide – this also gives you some idea of what they work on
  7. TASKING/MOTIVATION We get very strange insights into tasking by what people are requesting for icons in our products! Bonus prize for anyone who could construct a crime scene using these components!
  8. This is the kind of image intel analysts have of their future career when they join up.
  9. Unfortunately they get rather disappointed to see there working environment looks something like this!!
  10. This is the subject of their work: People. This kind of crowd picture is very ‘stock image’ – perhaps a better way of seeing is via the next few photos
  11. These can all be motivating factors for illegal behaviour. Analyst’s are trained to think about motivations as well as opportunities.
  12. So what motivates the analysts themselves? Here’s a model to help structure this talk.
  13. DATA – we generate huge quantities of this. Some estimates make it about 2GB a day per person.
  14. Consequences of this GENERIC TOOLS need to be able to bring data in from 3 different kinds of places – manual data entry, flat files, and database connections
  15. CONSEQUENCES: Visual clues for hypotheses Space in the data model for disclosure, reliability Information must be brought in from lots of different sources to bring out the big picture Information is gathered via an Intelligence Cycle – gaps identified and filled.
  16. Very hard to talk about INSIGHT. TRADECRAFT relevant here. Hard to work how insight is achieved.
  17. Define SNA (slide). What does it do? It allows you to take a large network and find nodes which are highly connected (betweenness). This can help you focus your investigation. Social Network Analysis has roots in the social sciences back in the 1920’s. For a long time this has lived and been developed in academia . The tools around it are quite hard to use by non-specialists. i2 started looking at this technology back in 2004 but decided it wasn’t quite ready for the ‘big-time’. This year we are releasing it. Analyst’s Notebook 8 has the capability of doing social network analysis. We felt that the innovation was sufficiently mature to be adopted. Of course it isn’t going to tell you who the bad guy is, but it may help you target the right people and focus your investigation. With the rise and rise of digital communications and social networking platforms, more and more data is becoming available to researchers. Some of the latest studies in this area, by people like Jon Kleinberg are truly amazing – I’d encourage anyone to read about them. So the social sciences are about to undergo a major revolution because many human-to-human interactions are very easily measurable . Social Network Analysis Quickly identify key individuals in complex target networks Gain most accurate picture of target networks with relationship weightings Quickly understand how social network dynamics change over time
  18. Some very nice work done at MIT by Nathan Eagle. Logs of cell-phones of a large body of students over a whole academic year. This particular diagram shows the results of aggregation techniques to identify behavioural patterns within that data set. Impressive work.
  19. HEATMAP Very Simple Technique! But we think it will be effective. Useful for seeing Unusual activity – quiet periods, bursts. Patterns of activity
  20. CONSEQUENCES Keep Collaboration SIMPLE! Forget the idea that two agencies are going to use the same IT infrastructure – ie can log on to the same systems. I2 have a way of sharing information which is based on file exchange. This has proved to be very simple and effective!
  21. END RESULT Three of these guys were convicted for the Heathrow Liquid Bomb plot – 7 flights were going to be targetted. Estimated deaths around 5,000. Plot was prevented by proactive intelligence action Kidnapping of Shannon Matthews – was her mother Karen and step-father Craig – who abducted her. Link-Charting techniques were used to communicate information about complex family connections. Timelines were used to work out the precise sequence of events surrounding the abduction Scarecrow Bandits – Dallas 2007. Solved by connection analysis with cellphone data.
  22. Visual analytics has a big role to play in Intelligence & Crime Analyst’s process: understanding of data, patterns in data, communication of results Decisions and Actions result in increasing SAFETY of our citizens Basic level of SAFETY is required in order to happily pursue the higher parts of Maslow’s hierarchy. Most people shouldn’t need to worry about safety, but can concentrate on achieving these higher goals.
  23. Thanks!