Professional Documents
Culture Documents
As seen recently in a shooting in Texas, USA, even walls in form of big oceans between the
Middle East and America have not stopped the Islamic State from launching an attack on
American soil! Pietersen gives a snapshot of what it takes to prepare for intelligence-led
missions:
Now looking back over nearly 40 years, I think I have learned the following six things.
First, how one thinks about the mission affects deeply how one does the mission.
Second, intelligence failures come from failing to step back to think about underlying
trends, forces, and assumptions not from failing to connect dots or to predict the future.
Third, good analysis makes the complex comprehensible, which is not the same as
simple.
Fourth, there is no substitute for knowing what one is talking about, which is not the
same as knowing the facts.
Fifth, intelligence analysis starts when we stop reporting on events and start explaining
them.
Sixth, managers of intelligence analysts get the behavior they reward, so they had better
know what they are rewarding.
Security. What is security? Dan Geer defined it best. Keynoting at the Recorded Future User
Network (RFUN) Conference in Washington, D.C. Geer said:
Security is about the absence of surprises that cant be mitigated. As such, security that is well
thought is security that changes the probability of surprise while foregoing as little as possible.
Therefore, there is no taking chances when it comes to matters security. Planning must be
comprehensive. Implementing data security plans must be surgically thorough.
For instance, America is at the forefront of the Data Mining/Big Data battleground through Data
Analysis and Research for Trade Transparency System (DARTTS). This is an office affiliated to
the Homeland Security Department that works pretty well in prevention of money laundering
and trade-related crimes.
Why then cant Kenya use the platform of Big Data to detect, deter and decimate terrorists?