global perceptions · 2015. 3. 8. · global perceptions • three premiere companies partner for...

Post on 27-Sep-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

GLOBAL PERCEPTIONS

• Three premiere companies partner for one powerful mission (ISI, Threat Pattern & PSS).

• All have an extensive, proven track record and pedigree.

• Blend of the latest technology and time-tested human-based collection.

WHAT WE OFFER Anticipating threats and

avoiding surprises.

3

Proactive support to law enforcement and military consumers.

• Human Intelligence Networks: Local Collection, Global Context

• Messaging: Traditional and Social Media Perception Management

• Surveillance and Reconnaissance: Airships, Aerostats, Drones and other WAS (Wide Area Surveillance) platforms

• Real-time Intelligence: Early Warning and Coverage of Fast Moving Events

• Influence: Finding Influencers, Measuring Influence

• Big Data Intelligence: Analyzing “Digital Exhaust”

Our human intelligence gathering

networks report on local

perceptions, rumors, and sentiment.

HUMAN INTELLIGENCE Local human intelligence assets are recruited, hired,

managed and trained to listen and report

Key people

Key places

Key events

4

CYBER INTELLIGENCE Information is drawn from

thousands of online sources, including “non- public” Twitter and Facebook

accounts

Example: Current residents of Iraqi Kurdistan with extremist sympathies on social media

Personal networks analysis

Social media content analysis

Extremist web forums

5

INTELLIGENCE ANALYSIS AND SOURCE VETTING

Locating new assets or

corroborating current assets’

claims of access, their role in the hierarchy, intentions, and

contacts

Example: Individual affiliated with Jabhat al-Nusra ( ) faction in Tripoli, Lebanon

Photographs may confirm access, location, intentions, and

capabilities

Personal networks may confirm access and role in hierarchy

Over 100,000 online discussions, records,

and mentions of in Tripoli in

2013

6

Growing local human

intelligence networks for long-term

collection to meet your strategic priorities

Human intelligence teams target priority geographical areas, population subsets, industry personnel, and

extremists subpopulations

ENHANCING REAL-TIME INTELLIGENCE

People with access to hotspots

7

Organizations with access to hotspots

Coverage of fast-breaking

events – analysis, vetting, and creation of

quality controlled,

“crowd- sourced”

intelligence collection platforms

Example: Social media users in Zamboanga, Philippines describing a terrorist incident in real time on September 16,

2013.

ENHANCING REAL-TIME INTELLIGENCE

Early Context First Civilian Reports

Local Government Confirmation

Aftermath Sentiment

A few minutes

8

after attack.

Understanding who has

influence over the population

and key leaders is typically a critical goal

Local human intelligence assets will identify, monitor, and, when appropriate, influence or recruit local opinion leaders

LOCATING AND EVALUATING LOCAL INFLUENCERS

9

Identifying and monitoring key influencers in social media

and traditional media

LOCATING AND EVALUATING LOCAL INFLUENCERS

Example: Malian politicians and journalists with the greatest influence over public debates in Mali.

Who they influence

Where they have influence

Who influences

them

10

“Digital exhaust” created by

social media users can be

aggregated to improve

numerous aspects of the

intelligence analysis process

LEVERAGING BIG DATA FOR INTELLIGENCE AND ANALYSIS

Example: Using the “big data” outputs of social media to identify people who have visited North Korea recently—the most common “home bases” for these individuals include

Bangkok, Hanoi, Jakarta, and Kathmandu.

11

Hawkeye II WASS Global Perception’s ISR solution, provided by PSS, features the Hawkeye II WASS

(Wide Area Surveillance System).

Exemple : Multiple platforms combined with

on a range of applications

Q

!"#$#%&$#%'%&($)$&*+%(,)-./#/%0(+"%+"#%1&2()%3&)4&5#6%%7(-8+2%)&,%1#%+$&(,#/%&+%+"#%799%*&)(-(+:%(,%;"(8<%8$%799%)&,%3$8=(/#%"(5"-:%#>3#$(#,)#/%3(-8+2%*8$%83#$&+(8,26%

Wide Area Surveillance System Complete System Components

Cirrus SR-22 Aircraft – 6 total for continuous operations HawkEye II 192 Megapixel full color sensor Airborne Image Processing Unit Broadband Communications Data Links Surveillance Image Server and Data Storage 10 Dual Screen Analyst Workstation Integrated Command Center Mobile Command Center Full Aircraft and System warranty On Site training and Support

Air to Ground Operations !"#$%$&"'&()*+"#,-"(*+"#(,'(

.#",%/",0(1%2"()*'$&,'&(3*4'0*,5%

6*'-(/,'-"(!"#%*5%7()*+"#,-"%8*#5"#(9:#+"%00,'7"%

Anti-Poaching, BorderProtection, Smuggling,Facility

&Infrastructure Protection,Law Enforcementand anyother applications

requiringpersistent oractive

monitoringcanbe metwithGlobal Perception’sISR customsolutions.

Q

!99(;*<%0"()*22,'5()"'&"#%)*'=%-:#,<0"()*22,'5(;*5:0">(?(3:,0(97#""'(@*#A(9&,&%*'$%

!99()*22,'5()"'&"#(B(C%D"5(9%&"%

.',0E$&$(F'&"-#,&"5(G#*:'5(,'5(."#%,0(F2,-"#E(/"H*#&(9:$H"7&(),#(I(,'5(),#(J(!*$&>;:#5"#(.7&%+%&%"$%

?@ABCAD?A%%E.$/#$%F&$%?%$#+.$,2%+8%-8)&+(8,%8*%3$#G#=#,+%H##+(,5%<%3&$42%1$(#*-:6%%7#$28,%#>(+2%3&22#,5#$%2(/#%I(+%(2%3822(1-#%+"&+%+"(2%(2%+"#%H.$/#$#$J%&,/%#,+#$2%+"(2%K-.#%%1.(-/(,5%I&-28%3()+.$#/%#&$-(#$J6%

?@ABCAD@A%E.$/#$%F&$%L%$#+.$,2%"#$#%&*+#$%H.$/#$%&,/%3&$426%%M$(=#$%&33#&$2%+8%#>(+%=#"()-#6%?@ABNA@?A%M$(=#$%*$8H%E.$/#$%F&$%L%E##+2%E.$/#$%

)&$%?%+"#,%#,+#$2%+"(2%1.(-/(,56%

F8$,#$%8*%7&2).&-%O&$&H(--8%P%Q#$8#2%/#-%F&$$(R&-%

;:0&%>+"K%70"(L#%-%'>3"$&%',&%*'(9"7*'5(<E($"7*'5(1#,7A%'-%

9%'-0"(+"K%70"(L#%-%'>3"$&%',&%*'(9"7*'5(<E($"7*'5(1#,7A%'-%

S&+)"%+"#%KKF%$#38$+%8,%+"#%#**#)+(=#,#22%8*%+"#%Q&04#:#%TT%2:2+#H%%"++3AUU000611)6)8HU,#02U+#)",8-85:GLVDBLBD'%%

top related