Earth Imaging Journal: Remote Sensing, Satellite Images, Satellite Imagery
Breaking News
Xeriant Announces Joint Venture with XTI, Developer of World’s Fastest, Longest-Range Commercial VTOL
XTI’s revolutionary hybrid-electric TriFan 600 aircraft has presales that...
Tony Spicci Takes the Reins as GISCI’s New Executive Director
After a comprehensive national search, the Board of Directors...
Drone Express Partners with FarEye To Launch Intelligent Drone Deliveries in the United States
CHICAGO - Drone Express, a commercial drone delivery service and... Partners With DataMap Intelligence and Moshe Newhouse Real Estate to Provide Organizations with Greater Insight When Making Critical Business Decisions
JACKSON, N.J. -, a provider of location intelligence solutions,...
Florida Region 1 Counties Select RapidDeploy for Next Generation Tactical Mapping and Data Analytics Services in 9-1-1 Centers Across the Region
TALLAHASSEE, Fla.- RapidDeploy, the industry's leading cloud-native emergency response platform, was selected...

October 17, 2013
Discovering and Derailing Asymmetric Threats

The Earth Imaging Journal staff has watched geospatial technology evolve for nearly two decades, and we long have recognized the important contributions the industry has made across a host of critical disciplines. But never before has the power of “where” been more vital to the intelligence community and our nation’s security in terms of addressing the modern reality of asymmetric threats.

For the past several decades, asymmetric threats have been gaining traction as a common form of warfare throughout the world. Kenneth F. McKenzie, Jr., divides asymmetric threats into six categories: nuclear, chemical, biological, information operations, operational concepts and terrorism.

The sophisticated technology employed by rogue nations and terrorist organizations in executing asymmetric strikes in many ways has leveled the playing field, allowing them to increase the effectiveness of transforming a local event into global upheaval, as in the dramatic case of 911. Thus, the intelligence community is tasked ever more with fighting fire with fire—or, in this case, technology with technology.

Underscoring Technology’s Importance

If there’s any doubt about the thirst for more and better technology within the intelligence community, look no further than the new National Security Agency (NSA) data facility in Utah, which reportedly will be operational by the end of September 2013. According to a Forbes report, high estimates of how much data it can handle have mentioned a staggering five zettabytes (1,000 zettabytes = 1 million exabytes = 1 billion petabytes = 1 trillion terabytes—you would need only 400 terabytes to hold every book ever written in every language).

Brewster Kahle, who engineered the Internet Archive, offers a far more conservative estimate of around 12 exabytes. That’s still a lot of storage. According to Kahle, the facility could be capable of storing every phone call made in the United States during an entire year with only 2 percent of that capacity. And, according to Moore’s Law, experts claim the capacity should double every 18 months.

Leveraging Activity-Based Intelligence

Mirroring NSA’s advanced technology needs to collect, store and analyze its vast sea of data, the National Geospatial-Intelligence Agency (NGA) faces the complex challenge of sifting through a seemingly infinite amount of geospatial data collected by a burgeoning array of sophisticated sensors. This challenge never has been more evident than in NGA’s current focus on activity-based intelligence (ABI).

The evolving ABI paradigm provides a powerful way to understand and analyze threats posed by sophisticated adversarial networks as they themselves employ the Internet and big data as tools to advance asymmetric threats. The Office of the Undersecretary of Defense calls ABI, “a discipline of intelligence where the analysis and subsequent collection is focused on the activity and transactions associated with an entity, population or area of interest.”

In other words, instead of focusing on a specific target, volumes of data on activities in a given area are gathered over time and stored for later metadata searches. Multiple data sources are integral components of ABI. Georeferencing and metatagging allow analysts to use custom tools to sift through large stores of data and display information that can reveal how various activities and events intersect in meaningful ways.

Many exhibitors at this year’s GEOINT Symposium are focused on ABI technology and its far-reaching potential. Additionally, turn to page 38 for an overview of ABI and how it benefits GEOINT analysts.

— By Jeff Specht, publisher, Earth Imaging Journal

Comments are closed.