server room with data overlay

Intelligence After Next: Deciphering Ubiquitous Technical Surveillance with Data-Driven Analytics and Artificial intelligence

By Shawn Benson

Without understanding how ubiquitous technical surveillance (UTS) data becomes intelligence, we assume anything UTS detects is compromised. In reality, substantial holes exist in our adversaries’ capabilities, creating gaps for the Department of Defense and Intelligence Community to exploit.

Download Resources

We must evolve our understanding of UTS and recognize that data generated by UTS does not, without significant effort, become actionable insight for our adversaries. Creating value from UTS data requires specific talents, skills, materials, technology, budgets, access to data, and an ability to distribute the resulting information to a receptive audience. UTS requires a subsequent process, data-driven analytics and artificial intelligence (D2A2), to create meaningful and actionable intelligence. If the DoD and IC recognize and embrace this differentiated concept, the U.S. national security community will find itself better positioned to tackle pernicious challenges posed by technical threats.

About Intelligence After Next:

MITRE strives to stimulate thought, dialogue, and action for national security leaders developing the plans, policy, and programs to guide the nation. This series of original papers is focused on the issues, policies, capabilities, and concerns of the Intelligence Community’s workforce as it prepares for the future. Our intent is to share our unique insights and perspectives surrounding a significant national security concern, a persistent or emerging threat, or to detail the integrated solutions and enabling technologies needed to ensure the success of the Intelligence Community.

MITRE has published more than 20 Intelligence After Next papers since 2020. Read them here.

INTELLIGENCE AFTER NEXT NEWSLETTER

Sign up to receive notifications when new papers from Intelligence After Next are published.