Outsmarting Digital Opponents

Outsmarting
digital opponents
Using public safety technology to confront
online threats to national security
Outsmarting digital opponents
Digital technologies have changed everything.
Governments, businesses and citizens now treat
high speed, secure access to the Internet, 24x7
online services, and near-instant global sharing of
information as the norm. This enthusiastic embrace
of digital technologies is not only powerfully
represented in the 289 million Twitter users1 and
nearly one-and-a-half billion Facebook accounts,2
but also offers a new route to exploitation by threat
groups. From extremism, to foreign state espionage,
cyber threats, or proliferation activities, the use of
online means to recruit and task vulnerable citizens
is adding an unwelcome burden on the highpressure workload of national security agencies.
Faced with the virtually limitless scope and scale
of digital technologies, it is more vital than ever
to stay one step ahead of security threats.
Traditionally, national security agencies knew what
data they needed and generally where to find it.
But today, gaining real-time insights from a large,
fragmented and ever-changing pool of data is like
looking for a needle in a haystack—one that is
expanding at an ever-increasing pace. Current
approaches to the collection, analysis, development
and use of intelligence from open-source
information (including social media, websites,
blogs, online news, web fora, and similar) are
already outdated. Using emerging digital
technologies to process and present this
information effectively offers national security
agencies a more effective route to preventing
threats and outsmarting violent extremists.
1
2
3
4
5
3
Tackling threats
Today, national security agencies’ operational
advantages are at risk from rapid advances in
technology and the maturity of opponents’
technical security tradecraft. For example,
violent extremists have operational security
(OPSEC) manuals3 and even a 24-hour help desk
to help their foot soldiers to recruit and conduct
terrorist acts worldwide. Education is readily
available on how to secure and hide their
communications through the use of encryption
and digital tradecraft.4 In a climate of shrinking
resources, reacting to these complex, ever-changing
threats has many national security agencies
finding it difficult to juggle their overarching
technology strategy with the constant demand
to react to short-term, tactical challenges.
Rapid changes in threat levels and the increasing
sophistication of opponents’ digital activities are
compounded by the big data that national
security agencies need to interpret, which is
affecting operational agility. Following the San
Bernardino attacks that left 14 people dead, it
was reported that United States security officials
had failed to detect social media posts
sympathetic to violent jihad on one of the
killer’s accounts during the immigration
screening processes.5 Without the time or
resources for deep and accurate analysis of every
case which arises, the ability to use advanced
analytics to integrate covertly-acquired
intelligence with open-source information
is a highly attractive proposition for national
security agencies.
http://www.statisticbrain.com/twitter-statistics/
http://www.statisticbrain.com/facebook-statistics/
http://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols/
http://www.nbcnews.com/storyline/paris-terror-attacks/isis-has-help-desk-terrorists-staffed-around-clock-n464391
San Bernardino attacks: Killer’s social media ‘not checked’ December 2015 http://www.bbc.co.uk/news/world-us-canada-35094415
4
Outsmarting digital opponents
Governments are aware of the increasing
difficulty in combating digital threats and
recognize a more complete all-source picture is
required. In February 2016, the United Kingdom
Home Secretary, Theresa May, called on the
“Five Eyes” alliance to increase intelligence
sharing to “remove terrorist propaganda online”
and purge extremist messaging from the Internet.6
The Australian Strategic Policy Institute (ASPI) has
echoed this and recommended the harnessing
of communication, marketing and social media
experts to fight new propaganda challenges.7
A number of governments are already moving
in this direction. For example, the Australian
government is investing AUD $21 million to build a
stronger social media counter-narrative capability.8
Using a much wider range of data is not the only
way that digital transformation can support
national security agencies. Governments can
enhance their expertise in tackling traditional
threats through smart investment in digital
technologies. An example of blending traditional
surveillance and digital solutions is Singapore’s
Safe City Testbed. This nationwide solution uses
the latest video analytics technologies to
identify street incidents and threats, and alert
the appropriate national security or public safety
agency. The approach enables rapid response
to either prevent future incidents or more
effectively respond to those already in motion.9
6
7
8
9
10
Two transformative steps
Two steps can help national security agencies
better manage security threats:
Step 1. Use digital technologies to enhance
information sharing and collaboration
Public safety technology can supplement
existing approaches to information sharing
and collaboration to accelerate and enhance
intelligence. Advanced digital and collaborative
tools enable national security agencies to
pre-empt threats, target violent extremists, and
counter-extremist narratives online. Following
the shooting by 15-year-old Farhad Jabar of
a New South Wales police force employee in
October 2015, the local police union in Australia
called upon the government to implement a
more sophisticated law enforcement database
and encourage better intelligence sharing.10
The ability to collect, analyze and develop
actionable intelligence from data shared
between multiple agencies significantly
increases capabilities without the need for
additional resources. Using digital tools to share
such data can elicit a response more effortlessly,
securely and effectively than by sending and
receiving unstructured text requests. Matching
data models, ontologies and taxonomies, as well
as the auto-processing of data and use of joint
analytical tools can greatly increase the speed
and scope of information sharing. Taking
advantage of secure, private cloud solutions
enables national security agencies to benefit
from a larger, consolidated pool of data
(as appropriate under law) to identify threats
or avenues of inquiry.
http://www.theregister.co.uk/2016/02/17/five_eyes_must_purge_terrorists_from_web_theresa_may/
https://www.aspi.org.au/publications/gen-y-jihadists-preventing-radicalisation-in-australia/GenY_jihadists.pdf
https://www.attorneygeneral.gov.au/Mediareleases/Pages/2015/FirstQuarter/20-February-2015-Combating-terrorist-propaganda-online.aspx
https://www.accenture.com/us-en/success-singapore-government-safe-city-test-bed
http://www.abc.net.au/news/2015-10-03/nsw-police-headquarters-gunman-named/6825466
Outsmarting digital opponents
Agencies and governments know that such
solutions need to be implemented at the national
level so they can also be realized, in time,
on an international scale. With rapid digital
advancements, national security agencies should
continuously scan their environment and educate
themselves on what new capabilities are available
to keep pace with the latest developments.
“There must be international
cooperation, a common approach, free
flows of intelligence and information,
and the closing of technological gaps
which the extremists exploit.”11
United Kingdom Home Secretary
Theresa May, 16 February 2016
Step 2. Seize digital transformation opportunities
There is no single solution to combat existing
and emerging threats, but by using the same
emerging technologies that opponents are using,
national security agencies can enhance
operational effectiveness. Islamic State are
currently using social media to reach out
virtually to promote and recruit nationally and
internationally12 and collaborate with potential
future members. With 46 percent of social
11
12
13
14
15
5
media users actively discussing news items
online, it is easy to see why digital makes an
attractive radicalization platform.13 But this vast
data pool can be exploited by national security
agencies, too. Historically, no-one questioned
the effective analysis of call data records; today,
social media and other digital and online sources
of information are being assessed as ways to
affect predictive policing or intelligence
activities in the future.
Applying public safety technologies that make
use of a wide range of content analytics
(including sentiment analysis, word analysis,
opinion mining and natural language processing)
to open-source information can help prevent
and detect threats.14 Such technologies now
work effectively and instantly across diverse
language datasets. London’s Metropolitan Police
Service piloted predictive analytics technology
on data from various sources to better
understand gang activities across the city.
The insights derived highlighted and risk-scored
known serial offenders, enabling the police
to enhance decision-making.15 The digital
transformation of traditional collection sources
such as surveillance, interception, video, and
pattern-of-life data means that it can then be
enriched and analyzed with open-source
information to draw a much more complete
picture for national security agencies. The
adversaries may be getting smarter, but using
digital technologies, agencies can beat them
at their own game.
https://www.gov.uk/government/speeches/home-secretary-international-action-needed-to-tackle-terrorism
‘The Twitter jihad: ISIS insurgents in Iraq, Syria using social media to recruit fighters, promote violence’, ABC News, 21 June 2014
Accenture Research & International Association of Chiefs of Police, Making Social Media Part of the Uniform: How Policing Solutions
use #Socialmedia to #Buildcommunities and #Fightcrime, 2014; p 6.
Accenture Research & International Association of Chiefs of Police: Making Social Media Part of the Uniform
https://newsroom.accenture.com/industries/health-public-service/london-metropolitan-police-service-and-accenture-completeanalytics-pilot-program-to-fight-gang-crime.htm
6
Outsmarting digital opponents
Ask yourself
• With only a laptop, Internet connection and open-source technology, a bomb-maker can
instantly, securely and anonymously send bomb-making techniques and methodologies
to a potential bomb-maker anywhere in the world. Can you share information with your
State, National or International partners as easily?
• If your data or analytical product is your commodity, does it serve its true value if in a silo?
• If you are unable to share your information with your State, National or International
partners, would you still want the ability to analyze theirs to achieve your operational
outcomes?
A proactive advantage
National security agencies operate in a digital
world where vast amounts of relevant
information reside in the public domain. As
new generations of businesses and citizens are
“persistently connected,” being able to evaluate
this information for intelligence purposes
becomes more critical. It is not a case of
whether to use any or all of a range of public
safety technologies—such as biometrics, video
analytics or offender management systems—but
rather how to employ them in the right way to
manage the growing diversity of both threats
and data. Going forward, national security
agencies need to:
•
T ake advantage of existing data: Use digital
technologies and analytics proactively to mine
legacy data and use new data (such as social
media and open-source intelligence) to gain
new intelligence and drive decision making.
•
ork ever more collaboratively: Alleviate
W
resource constraints and manage security
restrictions with technology to focus on the
core business.
•
edefine digital value: Use digital technologies
R
to enhance capabilities and situational
awareness while reducing resource liabilities.
Contact
Dirk Hodgson
[email protected]
Joshua Kennedy-White
[email protected]
Kevin O’Brien
[email protected]
Connect with us to learn more on delivering public service for the future on Twitter
@AccenturePubSvc
About Accenture
Accenture is a leading global professional services company,
providing a broad range of services and solutions in strategy,
consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more
than 40 industries and all business functions—underpinned
by the world’s largest delivery network—Accenture works at
the intersection of business and technology to help clients
improve their performance and create sustainable value for
their stakeholders. With approximately 373,000 people
serving clients in more than 120 countries, Accenture drives
innovation to improve the way the world works and lives.
Visit us at www.accenture.com
About Delivering Public Service
for the Future
What does it take to deliver public service for the future?
Public service leaders must embrace four structural
shifts—advancing toward personalized services, insightdriven operations, a public entrepreneurship mind-set
and a cross-agency commitment to mission productivity.
By making these shifts, leaders can support flourishing
societies, safe, secure nations and economic vitality for
citizens in a digital world— delivering public service for
the future.
The views and opinions expressed in this document are meant
to stimulate thought and discussion. As each business has
unique requirements and objectives, these ideas should not
be viewed as professional advice with respect to your business.
This document makes descriptive reference to trademarks
that may be owned by others. The use of such trademarks
herein is not an assertion of ownership of such trademarks
by Accenture and is not intended to represent or imply the
existence of an association between Accenture and the
lawful owners of such trademarks.
Copyright © 2016 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.