1 |
Unclassified Report of Investigation on Allegations Relating to USCENTCOM Intelligence Products
|
|
|
|
BASE
|
|
Show details
|
|
3 |
Applications of Text Analytics in the Intelligence Community
|
|
|
|
BASE
|
|
Show details
|
|
5 |
Assessing the Value of Structured Analytic Techniques in the U.S. Intelligence Community
|
|
|
|
BASE
|
|
Show details
|
|
6 |
A Commonsense Approach to Intelligence, Surveillance, and Reconnaissance Operations
|
|
|
|
BASE
|
|
Show details
|
|
7 |
MASTERS OF ANALYTICAL TRADECRAFT: CERTIFYING THE STANDARDS AND ANALYTIC RIGOR OF INTELLIGENCE PRODUCTS
|
|
|
|
BASE
|
|
Show details
|
|
8 |
Crowdsourcing Intelligence to Combat Terrorism: Harnessing Bottom-Up Collection to Prevent Lone-Wolf Terror Attacks
|
|
|
|
In: DTIC (2015)
|
|
BASE
|
|
Show details
|
|
9 |
Shifting Perspectives: Using Complexity Theory to Anticipate Strategic Surprise
|
|
|
|
In: DTIC (2015)
|
|
BASE
|
|
Show details
|
|
10 |
Using Target Audience Analysis to Aid Strategic Level Decisionmaking
|
|
|
|
In: DTIC (2015)
|
|
BASE
|
|
Show details
|
|
12 |
CultureMap: FORCEnet Science and Technology Large Tactical Sensor Networks II Program
|
|
|
|
In: DTIC (2014)
|
|
BASE
|
|
Show details
|
|
13 |
Using Target Network Modelling to Increase Battlespace Agility
|
|
|
|
In: DTIC (2013)
|
|
BASE
|
|
Show details
|
|
14 |
Advanced Analysis Cognition: Improving the Cognition of Intelligence Analysis
|
|
|
|
In: DTIC (2013)
|
|
BASE
|
|
Show details
|
|
15 |
Application of the Augmented Operator Function Model for Developing Cognitive Metrics in Persistent Surveillance
|
|
|
|
In: DTIC (2013)
|
|
BASE
|
|
Show details
|
|
16 |
Better Equipping Reserve Military Intelligence Analyst to Meet the Needs of the Commander by Championing a Process-Driven Training Model
|
|
|
|
In: DTIC (2013)
|
|
BASE
|
|
Show details
|
|
17 |
Enabling Efficient Intelligence Analysis in Degraded Environments
|
|
|
|
In: DTIC (2013)
|
|
Abstract:
When facing decisions in underdeveloped, degraded, and denied environments, commanders are likely to rely even more heavily on efficient intelligence analysis. Unfortunately, most of the time, the data gathered in these environments will be uncertain, ambiguous, and incomplete. Tools enabling fast and thorough analysis are thus required. Use of automated processing alone is vulnerable to data deficiencies, so human judgment is essential to ensure intelligence products' validity. Interactive visual interfaces can enable human analysis by leveraging the high bandwidth visual pathway into the human mind and unique human pattern-finding abilities. We propose visual analytics tools to support sensemaking and improve social network analysis in a counterinsurgency context. Our prototype is composed of a series of independent but coordinated generic widgets that can be applied to a broad range of application domains. Among the proposed analysis tools are a Multi-timelines widget for temporal events and situation evolution analysis; a Magnets Grid widget for multidimensional information exploration; and a record browser of Visual Summary Cards widget for fast visual identification of key information elements and comparison between entities. We also expose the concepts underlying an additional widget currently in definition. The Graph Analytics widget combines a visual presentation of graph diagrams composed of nodes and links to other visual presentations of analysis outputs like ranking and the semantic meaning of links based on a social network ontology. ; Presented at the 18th International Command and Control Research and Technology Symposium (ICCRTS) C2 in Underdeveloped, Degraded and Denied Operational Environments held in Alexandria, VA, on 19-21 June 2013. U.S. Government or Federal Rights License.
|
|
Keyword:
*ANALYSTS; *COMPUTER PROGRAMS; *COUNTERINSURGENCY; *DEGRADED ENVIRONMENTS; *GRAPHICAL USER INTERFACE; *INTELLIGENCE; *INTELLIGENCE ANALYSIS; *INTERPERSONAL RELATIONS; *NETWORKS; *SOCIAL NETWORK ANALYSIS IN COUNTERINSURGENCY; *VISUAL ANALYTICS TOOLS; *WIDGETS; BRIEFING CHARTS; CANADA; CANADIAN FORCES; Computer Programming and Software; COVERT NETWORKS; DATA MINING; DENIED ENVIRONMENTS; FOREIGN REPORTS; GRAPHS; INSURGENT GROUPS; INTERACTIONS; LINKAGES; Military Intelligence; NODES; ONTOLOGY; Psychology; SEMANTICS; SENSEMAKING; SITUATIONAL AWARENESS; SOFTWARE APPLICATIONS; SYMPOSIA; TRIBAL GROUPS; Unconventional Warfare; UNDERDEVELOPED ENVIRONMENTS; VISUALIZATION
|
|
URL: http://www.dtic.mil/docs/citations/ADA588001 http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA588001
|
|
BASE
|
|
Hide details
|
|
18 |
Automated Extraction and Characterisation of Social Network Data from Unstructured Sources -- An Ontology-Based Approach
|
|
|
|
In: DTIC (2013)
|
|
BASE
|
|
Show details
|
|
19 |
Military Intelligence Fusion for Complex Operations: A New Paradigm
|
|
|
|
In: DTIC (2012)
|
|
BASE
|
|
Show details
|
|
20 |
Capability Challenges in the Human Domain for Intelligence Analysis: Report on Community-Wide Discussions with Canadian Intelligence Professionals
|
|
|
|
In: DTIC (2012)
|
|
BASE
|
|
Show details
|
|
|
|