Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Enhancing IT Support to the Counter Terror Effort: Design Criteria
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Business Intelligence > Enhancing IT Support to the Counter Terror Effort: Design Criteria
Business Intelligence

Enhancing IT Support to the Counter Terror Effort: Design Criteria

BobGourley
BobGourley
10 Min Read
SHARE

This is the concluding post on enhancing IT innovation in support of the Counter Terror effort.  The first part focused on the challenge and importance context relevant to design criteria.  This post focuses on design criteria and proposes next steps.

Transforming the Challenge Into Design Criteria:

The legacy IT environment of the counter-terror community is complex.  Changes to the environment must be done by design or they may cause unintended consequences that result in more harm to the system than good. To enable good design, the challenges previously articulated can be captured in explicit goals that the counter-terror IT enterprise must achieve.   Primary Design Criteria are those that must be met in a successful design.  Secondary Design Criteria are those that are highly desirable but not absolutely essential.

Primary Design Criteria.  The counter-terror IT enterprise will possess the following features:

More Read

web design
Is Artificial Intelligence Setting A New Standard For Web Design?
Back to the basics
What’s Hot & What’s Next in Retail Intelligence? Find Out From Teradata
How Lyza stole the show at TDWI Las Vegas
The Value of Crowdsourced Insight
  • Data streams are the feeds of data normally moving across IP-based networks from sensors…

This is the concluding post on enhancing IT innovation in support of the Counter Terror effort.  The first part focused on the challenge and importance context relevant to design criteria.  This post focuses on design criteria and proposes next steps.

Transforming the Challenge Into Design Criteria:

The legacy IT environment of the counter-terror community is complex.  Changes to the environment must be done by design or they may cause unintended consequences that result in more harm to the system than good. To enable good design, the challenges previously articulated can be captured in explicit goals that the counter-terror IT enterprise must achieve.   Primary Design Criteria are those that must be met in a successful design.  Secondary Design Criteria are those that are highly desirable but not absolutely essential.

Primary Design Criteria.  The counter-terror IT enterprise will possess the following features:

  • Data streams are the feeds of data normally moving across IP-based networks from sensors, databases, command centers and other generators of message traffic and events.
    • Data stream design features supporting humans include the need to provide access to and insight into data streams in a way conducive to immediate understanding of importance.  Alerts on what is occurring in data streams should be provided.  Visualizations of data streams should be provided.  Since humans are the only component of the system which can assess relevance they must be able to inject their assessments of relevance into the data stream. Therefore, analysts/watchstanders/other approved users will be given an ability to rapidly tag information in stream as desired. Data streams must be designed to support humans with many other analytical capabilities including an ability to understand how the enterprise is functioning (data ingest rates, networks/nodes available, bottlenecks, what is nominal performance etc).
    • Data stream design features supporting computer to computer processing will include design of systems to evaluate data streams to produce alerts to users and to evaluate new data in the context of all legacy data (through pattern matching, correlation and database search).  This evaluation step may generate additional alerts.
    • A key note: the counter-terror mission requires data stream’s from from a wide community including communities operating at many different classification levels.  The engineering of solutions that bring these streams together seems to be a very straightforward task but the very high data rates and need for security make this a challenge. There are ways to use software to create cross domain data repositories and that may be the way ahead here. And an enduring challenge is in finding rapid ways to bring on new streams of data from other organizations.  This also requires focused engineering.
  • Databases are holders of and operators on data.
    • Database design features supporting humans include the need to provide enhanced means of accessing, discovering and working with data at rest. People need systems that automatically discover relationships in the data.  Users must also be given ways to assess the relevance of data at rest and then inject assessments of their judgment (users get to give the “so what” of the information).  Humans must be enabled with guided navigation and discovery engines, especially discovery engines that will enable discovery of all variations/spellings of names and locations.
    • Database design features focused on automation include design of a means to evaluate every update to a database in context of previous information in the enterprise. Every update to a database must be evaluated by automated routines to understand how the update related to existing information stores from throughout the enterprise.  When data is found that relates to other data, users must be notified so evaluations can be made on its relevance.  When databases are queried and when discovery engines are run against databases misspellings must not be an issue (modern discovery capabilities return all related results including all potential misspellings).  Multi-lingual search/correlation and other language support tools and information extraction capabilities are also required.

The primary design criteria are summarized in the following matrix:

Secondary Design Criteria.  If at all possible, the counter-terror IT enterprise will possess the following additional features:

  • Designs in this environment should accommodate change.  Open standards and open architecture are a must. Collaborative development environments which enable secure code development and application development lifecycle management are also a must.
  • The mission here places a very high premium on IT security and the protection of privacy.  The legacy architecture and objective design will both continue to emphasize protection of data and privacy.  Additionally, the objective design will work with an existing network and ride on top of existing infrastructure.  This means the objective design will accommodate multiple domains of classification and security policy.
  • A key shortfall in our capabilities (human and machine) is name spellings, however, we don’t do well in challenging people to validate their name entries.  There is a need for a “do you mean…?” feature when people are entering data.  Auto-fills driven by data from hundreds of indexes and databases could help drive this feature.
  • Production of intelligence in living/fluid/dynamic ways is in need of focused attention.  Little engineering needs to be done to accomplish this, but upgrading IT can at times be a good excuse to get the attention of business process owners and can help in improving business processes (we have all seen what IT can do to a bad process, it can automate the bad process and make it far worse).
  • The most significant situations confronting members of the intelligence community are those that require our best thinkers to collaborate together across many systems.  The need to enhance collaboration is a continuing, enduring requirement that should be a consideration in all designs.


Concluding Thoughts:

Redesign and modernization of current systems and the enterprise IT environment supporting counter terror work is a complex task involving far more than just the intelligence community.  It involves a large community of IC providers, IC users, law enforcement, homeland security and IT professionals.  Throughout the redesign of IT for this large community we should ensure computers support humans in ways where humans do what humans do best and computers do what computers do best.

Next Steps:

A useful next step will be to closely examine the entire framework of counter terror systems with the framework above.  This review can inform strategic decisions regarding future design work.

The framework above can also be used in developing requirements and in evaluating commercial technologies which can be relevant to meeting mission needs.  New design criteria do not always need to result in totally new systems.  Frequently existing systems can be improved by configuration changes and CONOP improvements and the design criteria above can aid in discussing those.

A closing note:  This paper addresses a framework for considering key design criteria.  It is the opinion of the author that governance must be addressed in conjunction with systems design.  Technology can help mitigate threats to the nation, but only if the right decisions are made regarding how data flows and that generally requires clear, non-ambiguous community-wide governance structures.

Link to original post

TAGGED:data quality
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Shut Your Mouth

5 Min Read

The Retail Data Nightmare: Coming to a Store Near You!

5 Min Read

Finance Analytics Requires Data Quality

9 Min Read

Sun Tzu and the Art of Data Quality (Part 3)

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?