Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
266 Military Communications and Information Technology... and analysis. In the course of the intelligence process, collected raw data must be processed to extract and analyze relevant information [2], [3]. In order to do this, in current operations, military analysts must read the source data and process its content. Only then can the results of the evaluation be incorporated into the command and control process. Due to capacity issues, information overload represents a serious intelligence problem, which not only applies to OSINT but often is also true for every kind of data, e.g., HUMINT data. This means that we have access to various sources of potentially relevant data but may miss critical information as we are not able to process it. Processing capacities become further limited if we deal with texts in foreign languages that need to be translated. In particular, with respect to less common languages not enough or no human translators might be available. For example, in the case of the Afghanistan mission, Dari is one such language that causes our forces different kinds of translation problems. In any case, it is clear that intelligence tools for efficient processing of data are required. The science of natural language processing (NLP) provides technology to assist military intelligence. There are different NLP applications to support the intelligence process on different levels, i.e., finding relevant documents, document classification, extraction of document content or specific information and even sentiment analysis. To meet the challenge of multilingual document processing, machine translation (MT) can be used. In our research project ISAF-MT [4] we have created a machine translation system for Dari to German. We proved that the approach of statistical machine translation (SMT) makes it possible to rapidly construct new translation systems. We argue that the generated output of such a system, a rough translation, even if usually not of high quality, can be used to assist military intelligence at different levels. Therefore, SMT can be applied for intelligence purposes to efficiently process large amounts of data. II. The significance of web information The modern connected world has significant impact on open source intelligence. Nowadays, global news sites as well as social media provide us with live information of different kinds, i.e., about events, public opinion, etc. As web technologies develop rapidly they become integrated into our lives. Therefore, the information content of the web will become increasingly relevant, also for military applications. An example for this is the role that social media played in the revolutions of the Arab world starting on December 18, 2010 in Tunisia. Here, social networks played as a critical function in sharing information and organizing protests [5]. Statistics mirror the importance of the internet in our world (visualized by Figure 1): with a world population of 7 billion, more than 2 billion people use the internet. Due to the recent development of mobile devices, i.e., smart phones and tablets, the use of the internet is no longer restricted to access locations. Over
Chapter 3: Information Technology for Interoperability and Decision... 267 80% of the world’s population now has a mobile phone and the share of smartphones is increasing. Here internet usage shows a rapid development trend. During the last 5 years the total number of internet users has increased from 18% in 2006 to 35% in 2011. This trend is not only present in the developed countries but also applies to the developing world [6]. Likewise, the rise of social networks can be seen in numbers: For example, Facebook, which launched in 2004, today has 845 million monthly active users [7]. Twitter, that started two years later, has 140 million users now and sees 340 million tweets per day [8]. This immense use of internet technologies results in an increasingly vast quantity of textual online data. Figure 1. Share of Internet users in the total population Along with the rise of modern web technologies, the use of the internet for criminal purposes has grown. Focusing on military issues, the internet holds many possibilities for terrorist purposes, e.g., ease of access, lack of regulation, vast potential audiences, fast flow of information, etc. It is utilized by terrorists in different ways, i.e., psychological warfare, publicity and propaganda, fundraising, recruiting and mobilization, networking, information sharing and planning and coordination [9]. In an 8-year-long monitoring of terrorist presence on the Internet from 1998 to 2007 a study by [10] found more than 5,000 terrorist web sites. All active terrorist groups had established at least one form of presence on the internet, i.e., web sites, online forums, and chat rooms serving terrorists and their supporters. Recent results showed that today about 90% of organized terrorism on the Internet
- Page 216 and 217: 216 Military Communications and Inf
- Page 218 and 219: 218 Military Communications and Inf
- Page 220 and 221: 220 Military Communications and Inf
- Page 222 and 223: 222 Military Communications and Inf
- Page 224 and 225: 224 Military Communications and Inf
- Page 226 and 227: 226 Military Communications and Inf
- Page 228 and 229: 228 Military Communications and Inf
- Page 230 and 231: 230 Military Communications and Inf
- Page 232 and 233: 232 Military Communications and Inf
- Page 234 and 235: 234 Military Communications and Inf
- Page 236 and 237: 236 Military Communications and Inf
- Page 239 and 240: Run-Time Ontology on the Basis of E
- Page 241 and 242: Chapter 3: Information Technology f
- Page 243 and 244: Chapter 3: Information Technology f
- Page 245 and 246: Chapter 3: Information Technology f
- Page 247 and 248: Chapter 3: Information Technology f
- Page 249 and 250: Chapter 3: Information Technology f
- Page 251 and 252: Chapter 3: Information Technology f
- Page 253 and 254: A Robust and Scalable Peer-to-Peer
- Page 255 and 256: Chapter 3: Information Technology f
- Page 257 and 258: Chapter 3: Information Technology f
- Page 259 and 260: Chapter 3: Information Technology f
- Page 261 and 262: Chapter 3: Information Technology f
- Page 263 and 264: Chapter 3: Information Technology f
- Page 265: Automatic Exploitation of Multiling
- Page 269 and 270: Chapter 3: Information Technology f
- Page 271 and 272: Chapter 3: Information Technology f
- Page 273 and 274: Chapter 3: Information Technology f
- Page 275 and 276: Chapter 3: Information Technology f
- Page 277 and 278: Chapter 3: Information Technology f
- Page 279 and 280: Chapter 3: Information Technology f
- Page 281 and 282: Information Fusion Under Network Co
- Page 283 and 284: Chapter 3: Information Technology f
- Page 285 and 286: Chapter 3: Information Technology f
- Page 287 and 288: Chapter 3: Information Technology f
- Page 289 and 290: Chapter 3: Information Technology f
- Page 291 and 292: Chapter 3: Information Technology f
- Page 293: Chapter 3: Information Technology f
- Page 296 and 297: 296 Military Communications and Inf
- Page 298 and 299: 298 Military Communications and Inf
- Page 300 and 301: 300 Military Communications and Inf
- Page 302 and 303: 302 Military Communications and Inf
- Page 305 and 306: Commanding Multi-Robot Systems with
- Page 307 and 308: Chapter 3: Information Technology f
- Page 309 and 310: Chapter 3: Information Technology f
- Page 311 and 312: Chapter 3: Information Technology f
- Page 313 and 314: Chapter 3: Information Technology f
- Page 315 and 316: Chapter 3: Information Technology f
Chapter 3: <strong>Information</strong> <strong>Technology</strong> for Interoperability <strong>and</strong> Decision...<br />
267<br />
80% of the world’s population now has a mobile phone <strong>and</strong> the share of smartphones<br />
is increasing. Here internet usage shows a rapid development trend. During<br />
the last 5 years the total number of internet users has increased from 18% in 2006<br />
to 35% in 2011. This trend is not only present in the developed countries but also<br />
applies to the developing world [6]. Likewise, the rise of social networks can be<br />
seen in numbers: For example, Facebook, which launched in 2004, today has 845<br />
million monthly active users [7]. Twitter, that started two years later, has 140 million<br />
users now <strong>and</strong> sees 340 million tweets per day [8]. This immense use of internet<br />
technologies results in an increasingly vast quantity of textual online data.<br />
Figure 1. Share of Internet users in the total population<br />
Along with the rise of modern web technologies, the use of the internet for<br />
criminal purposes has grown. Focusing on military issues, the internet holds many<br />
possibilities for terrorist purposes, e.g., ease of access, lack of regulation, vast potential<br />
audiences, fast flow of information, etc. It is utilized by terrorists in different<br />
ways, i.e., psychological warfare, publicity <strong>and</strong> propag<strong>and</strong>a, fundraising, recruiting<br />
<strong>and</strong> mobilization, networking, information sharing <strong>and</strong> planning <strong>and</strong> coordination<br />
[9]. In an 8-year-long monitoring of terrorist presence on the Internet from<br />
1998 to 2007 a study by [10] found more than 5,000 terrorist web sites. All active<br />
terrorist groups had established at least one form of presence on the internet, i.e.,<br />
web sites, online forums, <strong>and</strong> chat rooms serving terrorists <strong>and</strong> their supporters.<br />
Recent results showed that today about 90% of organized terrorism on the Internet