Query Result Set
SLIM21 Home
Advanced Search
My Info
Browse
Arrivals
Expected
Reference Items
Journal List
Proposals
Media List
Rules
ActiveUsers:746
Hits:19996329
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
Help
Topics
Tutorial
Advanced search
Hide Options
Sort Order
Natural
Author / Creator, Title
Title
Item Type, Author / Creator, Title
Item Type, Title
Subject, Item Type, Author / Creator, Title
Item Type, Subject, Author / Creator, Title
Publication Date, Title
Items / Page
5
10
15
20
Modern View
REGENS, JAMES L
(2)
answer(s).
Srl
Item
1
ID:
166776
Augmenting human cognition to enhance strategic, operational, and tactical intelligence
/ Regens, James L
Regens, James L
Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract
The unprecedented increase in the volume and velocity of data collected by open source and classified platforms is simultaneously disrupting and transforming the intelligence enterprise. This article posits a technology-based approach for augmenting human cognition by leveraging high-performance computing and artificial intelligence applications to enhance the intelligence enterprise’s capability to identify, synthesize, and act on the key intelligence-relevant information elements embedded in those data. Adapting AI to the intelligence enterprise and national security decisions more broadly thus facilitates rapidly bringing to bear the essential human element of interpreting context and intent amid an otherwise insurmountable cascade of data.
Key Words
Operational
;
Tactical Intelligence
;
Enhance Strategic
Links
'Full Text'
In Basket
Export
2
ID:
145314
Terrorism-centric behavior recognition and adversarial threat forecasting
/ Regens, James L; Mould, Nicholas A; Jensen, Carl J III; Edger, David N
Regens, James L
Article
0 Rating(s) & 0 Review(s)
Summary/Abstract
Analyzing raw information collected by humans to characterize prospective adversarial threats is a core function of intelligence, colloquially referred to as the “world's second oldest profession,” and dates back across multiple millennia to antiquity.1234567 For example, Homer's epic poem The Illiad refers to the use of spies by the Greeks and Trojans.
Key Words
Terrorism
;
Centric Behavior Recognition
;
Threat Forecasting
In Basket
Export