Identifying information provenance in support of intelligence analysis, sharing, and protection

  • Authors:
  • Terrance Goan;Emi Fujioka;Ryan Kaneshiro;Lynn Gasch

  • Affiliations:
  • Stottler Henke Associates, Inc., Seattle, WA;Stottler Henke Associates, Inc., Seattle, WA;Stottler Henke Associates, Inc., Seattle, WA;Stottler Henke Associates, Inc., Seattle, WA

  • Venue:
  • ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In recent years, it has become clear that our ability to create vast information assets far outstrips our ability to exploit and protect them. The Intelligence Community faces particularly significant information management challenges as they seek to: improve information awareness amongst analysts; improve the reliability of intelligence; safely share information with warfighters and allies; and root out malicious insiders. One means to mitigating these challenges is to provide reliable knowledge of the provenance (i.e., lineage) of documents. This knowledge would allow, for instance, analysts to identify source information underpinning an intelligence report.