Virtual intelligence



Download 384.47 Kb.
View original pdf
Page20/26
Date04.09.2023
Size384.47 Kb.
#61985
1   ...   16   17   18   19   20   21   22   23   ...   26
Virtual-Intelligence-Conflict-Avoidance-Resolution-Through-Information-Peacekeeping
Discovery. Policymakers have power and they should spend their time reflecting and deciding when they are not in negotiation and in face to face communication with their counterparts. It is for the "virtual intelligence community" to meet the policymakers needs for discovering as much of the raw information as is necessary to meet the policymakers needs for "just enough just in time" intelligence. o
Discrimination. A major value-added function is that of discriminating between valid and invalid information, through a constant process of source validation, generally a labor-intensive process requiring genuine human expertise as well as new developments in automated understanding. A cost element can also be provided here, by giving the customer the benefits of superior knowledge in selecting sources of equal content but lower prices.

o
Distillation. This is the essence of "intelligence" in that it combines research judgements which first discover and discriminate, and then it adds expert subject matter knowledge to distill the broader effort into "just enough" intelligence-intelligence being information which is tailored to the needs of the policymaker and tightly focused on helping the policymaker with a specific decision at a specific time and place. o
Dissemination. Often the timing, length, and even the format of the delivered product can be decisive in determining whether the intelligence contained in the document (or oral presentation, or video, or electronic mail, or whatever) is received by the intended policymaker, absorbed, and compelling enough to support action. There is far more to dissemination than simple delivery.
The above is not intended to make a case for the use of open sources from the private sector to the exclusion of either unclassified information or classified information from government sources. Indeed, the ideal situation emerges when both the policymaker and the intelligence community use open sources to the fullest extent possible, but with intelligence methods applied to produce open source intelligence, then task the classified systems for such information as is truly critical, and finally utilize open sources to protect classified findings but inform those who require information support but to whom classified information cannot be disclosed.

Download 384.47 Kb.

Share with your friends:
1   ...   16   17   18   19   20   21   22   23   ...   26




The database is protected by copyright ©ininet.org 2024
send message

    Main page