Documente Academic
Documente Profesional
Documente Cultură
Intelligence - page 1
Why Analysis Research?
Bad Guys!
Threats growing
Vulnerabilities Increasing
Computer Crime
- Organized Crime
- Identity Theft
- Extortion
Non-State Actors
- Terrorists
- Political Activists
Coupled with:
The systematic and broad-scale examination of Internet
activity to assess, predict and understand current and
prospective political, economic, societal, and
technological impacts (PEST).
stealth / advanced
Tools
High scanning techniques
- 1988-2000: 47,711
- 1999: 9,859
- 2000: 21,756
- Q1-Q3: 34,754
Vulnerabilities Discovered
- 1995-2000: 2,596
- 1999: 417
- 2000: 1,090
- Q1-Q3: 1,820
Fusion Analysis
- Country Studies
- Political, Social, Economic awareness
- Decision Maker support
Policy/Legal Analysis
- New Legislative efforts
- Lack of consistent policies
Overall Activity
Approx 2.5 Gbytes/day
Fusion Analysis
- Country Studies
- Political, Social, Economic awareness
- Decision Maker support
Policy/Legal Analysis
- New Legislative efforts
- Lack of consistent policies
Fusion Analysis
- Country Studies
- Political, Social, Economic awareness
- Decision Maker Support
Policy/Legal Analysis
- New Legislative efforts
- Lack of consistent policies
Ambiguous Laws
- Crime sometimes hard to
define
Lack of Precedent
- Case law limited at best
Conflicting Law
- Illegal in one state Legal in another
- Illegal in one country Legal in another
Slow Process
- Keeping up with Technology Trends
- Search Warrants
Intent