Saturday, May 30, 2009

SAM Soundtrack: "Baby, Please Don't Go" (YouTube)

I am a sucker for good Mississippi Delta Blues...

Friday, May 29, 2009

Introduction To Pivot Tables In Intelligence Analysis (Original Research)

Pivot tables are a handy but under-utilized feature of Microsoft Excel's program. Crime analyst's, in particular, make good use of these in their work but they are largely unknown to the wider community of intel analysts.

One of my students, Brent Pearson, explored this particular tool as part of my Advanced Analytic Techniques class last term. As part of his final assignment, he put together a couple of useful videos to introduce the novice to this particular tool:





A couple of caveats: First, Brent used law enforcement data in his examples but you can create pivot tables from virtually any structured data set. Second, Brent was starting at the very beginning with pivot tables. There are many more tricks and tips to pivot tables than he was able to discuss. If you use pivot tables in your work or know of some good resources about how to get more out of them, leave a comment!

Reblog this post [with Zemanta]

Wednesday, May 27, 2009

Visual Analysis Everywhere! (Original Research And NVAC.pnl.gov)

I have finally gotten over enough of my jet lag to get back to work and it seems like everywhere I turn there is something interesting cropping up on visual analysis.

Two projects, in particular, recently crossed my desk, one by a student in my Advanced Analytic Techniques class, Andrew Canfield, and the other from the US's premier resource on visual analysis, the National Visualization and Analytics Center at Pacific Northwest National Laboratories.

Visual analysis allows people to more easily identify patterns in the massive data flows that are pervasive today. There are a wide variety of tools available for this purpose but Andrew focused on one, Starlight, to conduct his preliminary analysis (which he conveniently documented in the YouTube video below) of Turkish foreign policy with respect to the Caucasus.



While subject matter experts on Turkey might disagree with Andrew's conclusions, the real intent of his efforts was to experiment with the method. I think his video gives a fine introduction to some of the benefits of visual analysis.

In addition to Andrew's work, the NVAC also recently published their quarterly magazine on visual analytics, called VAC Views. Under the heading of full disclosure, I suppose I have to mention that Mercyhurst gets a nice write-up (on page 19 for those of you keeping score at home...). Beyond the shameless self-promotion, however, there are a number of articles that are quite interesting, not the least of which is NVAC's taxonomy of visual analytics. Previous issues of VAC Views contain other, similar, gems.

The rest of the NVAC site is also worth checking out. It contains a wide variety of videos and other resources including the invaluable Illuminating The Path e-book. Much more than the research agenda it describes itself as, Illuminating The Path is an essential background reference for anyone interested in visual analysis.

Reblog this post [with Zemanta]

Tuesday, May 19, 2009

New Challenges (Day 2 -- International Security Forum)

Related Posts:
Live-blogging The ISF
BBC Monitoring
Towards An Unruly World: Ideas Of Interest

After a quick trip to the Routledge booth to talk about books past and future, I trotted off to a full day of seminars on various topics tied to the parade of horribles from yesterday.

There are four time slots today with six panels in each slot. This means that you can see no more than one-sixth of what the conference has to offer. Since I am presenting in one of those time slots, that limits my participation even more. I am not a big fan of this type of conference format as it really limits your exposure to new ideas. It also explains some of the hit and miss quality of this post. Still, I managed to pick up some new stuff of interest today as well.

(Note: In case you are new to this series of blog posts, this conference is being held under the Chatham House Rule which does not limit my use of the ideas that come out of the conference but does prohibit my use of the names or affiliations of the people speaking about those ideas. The ideas mentioned below, then, are not my own. In some cases, I don't even agree with them. I am reporting them merely because I found these ideas interesting.)

When can NGOs do better with non state actors than states or international organizations? When the non-state actor wants to be seen like a state (i.e. has political ambitions, needs international attention, leadership under pressure to deliver something to the people, etc.). This condition often occurs late in the game -- when the non-state actor has tried other avenues. Likewise, because of the timing and the purpose, states typically do not want the NGO to succeed.

The legal framework is an important factor in cyberwar. The lack of an adequate legal framework actually impeded efforts to respond effectively to the series of cyber attacks in Estonia 2 years ago. There has been some good thinking on this issue but it is not widely known and has not yet been incorporated into legal systems. This results in a continuing exploitable weakness in the system despite efforts to more directly address the cyberwar threat.

Russia. The current sabre rattling over Georgia is likely just that. The next major crunch point with Russia is likely in Ukraine and will revolve around the status of the Black Sea Fleet currently stationed in Sevastopol. Russia's ability to act has not been hurt as much as some people think by the recent sharp decline in gas and oil prices or by the economic meltdown generally.

Secrecy is a force divisor in asymmetric warfare. Asymmetric warfare is anti-Clausewitz. It focuses on weaknesses in the system rather than on the center of mass. Fighting an asymmetric war, then, requires more knowledge than force ("all the force you need to deal with most terrorists is a cop with a gun"). Secrecy is an impediment to the system effectively applying its collective knowledge, ergo, secrecy reduces the efficacy of force.

The Intelligence Cycle can be thought of as an out of date operating system. Dealing with modern intelligence problems using the framework of the intel cycle is like trying to get Windows 95 to run Vista programs.

Reblog this post [with Zemanta]

Towards An Unruly World: Ideas Of Interest (Day 1 -- International Security Forum)

Related Posts:
Live-blogging The ISF
BBC Monitoring

The ISF Conference began yesterday at the International Conference Centre in Geneva. It is a magnificent facility, with 640 attendees, and the speaker's list looks very interesting but the rules of the conference are going to cramp my style.

The whole ISF is being held under the Chatham House Rule and this prohibits me from citing who said what. That said, I can report some of the ideas to emerge from the conference.

Some of these ideas were unsurprising but some of them either had surprising twists or were brand new ideas entirely. I will start with the unsurprising ones first:

The Parade of Horribles. Climate change, war, terrorism, energy, food and water shortages, the demographic time bomb, WMDs, cyberwar, economic collapse... Lawyers call a lengthy string of terrible things like this the "Parade of Horribles". It is a rhetorical device designed to engage attention and compel action and it was used in much the same way here. What was interesting was the degree of consistency -- the same list of threats came up in multiple different contexts.

China and India. There seemed to be a good bit of concern and a certain sense of inevitability that China and India would emerge as future powerhouses. Nothing new here, of course, but the degree of certainty about this shift in power was noticeable. Certainly I heard more of this type of talk here in 24 hours than you do in the States over the course of several months. In addition, it was rarely just "China" and mostly "China and India".

Solutions. There was also a remarkable consensus about solutions: Reinforce international institutions (including the UN Security Council and regional initiatives); establish the "right amount" of regulation for markets; and increased coordination between defense, diplomacy and development agencies/organizations.

Some of the surprises:

Cyberwar/crime. There was far more talk concerning this issue than I thought there would be. If you take a look at the panels in detail, you can see that cyber takes up quite a bit of real estate. Interestingly, there is not a single panel devoted exclusively to terrorism (though it permeates the discussions here) but there are several devoted exclusively to cybersecurity issues. At one point there was even talk of Alternate Reality Games!

Emphasis on intelligence analysis tools and methods. No one called it that, of course. No, they used code words such as "security foresight" but they couldn't fool me -- they were talking about intelligence. Collection of information did not seem to be an issue; figuring out what the info we have actually means did.

"Resiliency". I think I witnessed the birth of a buzzword. The word "resiliency" kept coming up. The need to build resilient societies, have resilient systems. I think that the use here is similar to the way environmentalists use the word "sustainable" and the way network theorists use the word "robust". There was a sense that the runaway process of globalization had sacrificed too much of the world's resiliency for the sake of efficiency and that at least part of the current set of problems was due to this imbalance (Note: John Robb has been talking about the "resilient community" for quite some time but it was interesting to see the same term crop up here).

Reblog this post [with Zemanta]