My Background Need for a better system. While in the Army we need better tech platform for whole lot of activities . Army has always remained manpower intensive, it needs to get smarter and look for intelligent solution based on scientific principles. Intelligence and Security Concerns
Moore's law precisely describes a driving force of technological and social change in the late 20th and early 21st centuries
You know how many servers does Google use – Any guess 4 - 5 Lacs
Look what happened prior to 26/11 and we failed in so many instances ?????
A closer examination of the violence prone districts could possibly reduce the actual footprint by say another 20 to 30 per cent
Distinct difference in the strategy and operational concepts has been seen in Naxalism – But can we say the same what our security forces are doing ? I read an article recently on Gadichorly after 05 Oct incident in which 5 cops of ITBP were killed. The Maoists have infact come to the police post and given open challenge to them. Police forces have stopped doing patrolling in those areas. I do not blame them – they are not prepared and nor any one is thinking in trg them. We can continue to think that what can we do and do nothing as its best that we do not make any mistakes. Naxalite dominated areas will continue to remain as another place of posting to side line the potential trouble creators from police and bueracracy. How and when will we change
“ cripple India’s economic growth, destroy national confidence in its political system, attack its open society and provoke destabilizing communal rivalries”, all of which are seen as a hindrance to establishing an Islamic Caliphate (Tellis 2008). At the centre of this phenomenon are two Islamist militant groups – the Lashkar-e-Taiba and the HUJI-B, both of which are part of the International Islamic Front (IIF) of which al Qaeda is a founding member, and are committed to the cause of establishing an Islamic Caliphate.
Int agencies are faced with multiferious issues besides the turf battle for information and jurisdiction part. Data is assymmetrical form, it is humongous and therefore needs parallel computing on HPC platforms
Automate Int have a uniform platform on which you can add and analyse multi dimensional information seamlessly
Multiple sources as well levels makes sharing not only impossible, but is fraught with inter departmentmental turf battles and therefore another challenge for political leadership to decide. As a country we are argumentative for even a small idea and therefore it is a major challenge to take some hard decisions
Promote all source Info, its automation, Analysis based on technological platforms for technical as well as humint – thus arrive at better processed intelligence. We have very good analysts, but not many sources of information
The intelligence gaps can be reduced through various layers and also by using collective intelligence tools
Tgt Centric Int models can be created – which makes better visualization and prediction using trend analysis
Need of the hour is to converge the existing resources of HUMINT as well as technology to enhance real time intelligence and be able to predict the un foreseen by understanding patterns - which is humanly not possible and not achievable
This will make Intelligence more transparent as well as reduce redundancies and element of error. Humongous data can be analyzed and therefore better chances of quality analysis and prevent corrupt and age old archaic practices
UCIMS is designed for Uncon conflicts; but its data points can be suitably modified for any other Security and business intelligence environment for eg bank wants to monitor the loans. Traffic police wants to monitor accidents as well as time and location specific sensitivities. It can give various outputs, which can allow decision makers to take appropriate decisions
Warfare and intelligence is becoming very complexed and just having HUMINT is not enough and therefore needs more network based approach which collates as well as demistifies the intelligence from unstructured data bases to structured analyses to derive the intelligence – Helpful in 9/11 and 26/11 kind of investigations as well as bring actual perpetrators to their final destination or Karma
What it does is that it shows linkages and locations – which otherwise remain uncollated and mere another file to be lost in a fire or organizational inefficiencies. Long time ago we were told that government records are being automated. Even today except for Hyderabad which has done reasonably well under the CM Mr Naidu, rest of the states still function on the basis of “chirkut” in the names of land records and therefore allows corruption and greed to creep in allowing land scams and missing files. As aware citizens we need to be responsible as well as ask necessary questions in the right forum. So that decision makers do not shy away from their responsibilities as well as are forced to take hard decisions
This is the question I will leave it for you all to ponder and debate
TACKLING INTERNAL SECURITY THREATS AND UNCONVENTIONAL CONFLICTS
Technological advancement impacting the world as well as how we think .
Internet revolution, social networking sites as well as world is becoming increasingly networked and flat
Innovative ideas and Time to market (T2M) and to masses decreasing and is changing in geometric proportions – at a much faster pace. Interdicting an idea with better technology or exploiting it with using different tools makes or mars survival of a company
Flat world and connected world poses different challenges in the domain of security and Intelligence systems
Intelligence is no longer just physical source based , but it combines technology – as a backbone. Intelligence process has become tech innovative and savvy both in corporate as well as for security environment ; uses social networks and Twitter and facebooks have potential to break marriages as well as nations security infrastructure – Negative opinions or forcing decisions
It is faster, smarter and automated. Uses multiple tools and analytics from visual to thermal.
This has posed even different challenges in the field of data mining and computation. No longer people are talking of CPU based computation - GPU and Cuda softwares are being talked to overcome the barrier of reducing the chip size to computation speed. How many of us are familiar with these three names
Moore’s law – Computation gets doubled in 18 months
Pranav Mistri’s – Presentation on using Sixth sense
Orkash is an India headquartered, international management-consulting and high-technology R&D company operating in the following areas:
Investment & Transaction Advisory Support
Operational Risk and Security Risk Management
Strategic Business & Market Intelligence
Battlefield Management, Intelligence, Decision Support & Homeland Security Platforms
On the technology side, ORKASH is focused on creating new technology applications (and the highly-scalable back-end infrastructure) to plug the gap between information access (search engines, etc.) and information analysis (human-intelligence). These are designed to support decision makers in the business, the government and the security agencies. The company has cutting edge technology and R&D expertise across:
AI systems, NLP and Expert Engines
Massively large and parallel data-mining systems
Automated Intelligence Analysis, Business Intelligence & Decision Support Analytics
Use of semantics to decipher the content Unstructured to structured data Using domain specific ontologies Network analysis Tools and analytics Analysis of the geospatial context and better data visualization Geospatial intelligence for effective decision making Location intelligence for better interpretation of networks & activities Data Mining on real time basis Analysis of trends and patterns of activities Internet & Cyber Forensics Target Centric Social Network Analysis Pattern Tracing and Tracking
Semantic enrichmen t is the process of creating or associating semantic tags in unstructured data or text, usually involving concepts, entities, relationships, events and properties described in an ontology or rule based
Adding semantic metadata tags to the original unstructured data enables advanced correlation and data fusion capabilities.
Enables concept , event and relationship extraction and automated metadata tagging.