Intelligence Processing
Programs and Systems
Processing systems receive, convert, and correlate information into a form usable as combat information or intelligence. These processors are found at all echelons of the intelligence architecture, and include both primary processing and secondary exploitation systems. In some architectures, such as USIS 2000, the term processing is limited to those functions needed to convert imagery data into a scene contiguous pixel format. All other operations with the pixels are considered image analysis. Applications to accomplish image analysis are distributed among the exploitation elements. Systems and programs listed here include both processing and exploitation elements.
Hanna Arendt wrote :"The Okhrana, the Czarist predecessor of the GPU, is reported to have invented a filing system in which every suspect was noted on a large card in the center of which his name was surrounded by a red circle; his political friends were designated by smaller red circles and his nonpolitical acquaintances by green ones; brown circles indicated persons in contact with friends of the suspect but not known to him personally; cross-relationships between the suspect's friends, political and nonpolitical, and the friends of his friends were indicated by lines between the respective circles.*^*' Obviously the limi- tations of this method are set only by the size of the filing cards, and, theo- retically, a gigantic single sheet could show the relations and cross-relation- ships of the entire population. And this is the Utopian goal of the totalitarian secret police. It has given up the traditional old police dream which the lie detector is still supposed to realize, and no longer tries to find out who is who, or who thinks what."
Sources and Methods
- An Evaluation of Required Tools for the Imagery Analyst ADROIT SYSTEMS - OCT 1997
- RIGS Users' Group/CIGSS IPT Conference Briefing Download Area
- Terrain Visualization Division Hardware / Software Survey of Visualization Products
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|