top of page

I2 Analyst Notebook 14

  • settwalltentoula
  • Aug 12, 2023
  • 2 min read


i2 Analyst's Notebook is a software product from i2 Group for data analysis. Based on ELP (entity-link-property) methodology, it reveals relationships between data entities to discover patterns and provide insight into data. It is commonly used by digital analysts at law enforcement, military and other government intelligence agencies, and by fraud departments. It is a part of the Human Terrain System, a United States Army program which embeds social scientists with combat brigades. Several investigations, including an investigation into fraud in the U.S. Army, are reported to have used it.[1] It is also used by Swedish police to analyse social contacts and social networks.[2][failed verification]




I2 Analyst Notebook 14



i2 Analyst's Notebook from Harris (formerly IBM) has dominated the data analyst market for years. While the technology was leading edge when it was introduced in the early 1990's, it has fallen behind technologically and fails to meet the demanding needs of today's analyst.


In complex link analysis and networks, it becomes very difficult to understand what's really going on. The science of Social Network Analysis (SNA) helps analysts decipher the complex hidden relationship among entities to quickly identify cells and connections between cells.


A flexible data acquisition approach allows analysts to more quickly collate both structured and unstructured information to help build a single, cohesive intelligence picture. The flexible data model and visualization environment coupled with a wide range of visual analysis tools help users build multiple views for detailed network, temporal, statistical, or geospatial analysis and reduce the time taken to identify key connections, networks, patterns and trends that may exist. The results gained from this detailed analysis can be shared via intuitive and visual briefing charts or visualizations that can be included in end intelligence products. These can simplify the communication of sometimes complex information and ultimately help to drive more timely and accurate operational decision making.


According to Clemens, ConvertIt is designed to support cyber analysts and others who work in Security Operations Centers, on incident Response Teams, as forensic, Malware or TI Analysts, among other areas.


The process of becoming a certified analyst can seem overwhelming. Let us help you tame the beast that is the CLEA/LEAF exams. This year-long series serves as a study guide for the CLEA/LEAF exams, working through each of the 19 sections tested. The format includes a presentation of the material and a question-and-answer session for each topic.


We asked 79 intelligence research specialists to identify the tools that they were using to accomplish their intelligence analyst duties. They identified 62 different tools at their disposal. Some of them were specific to the law enforcement agencies and intelligence communities, such as SIPRNET, RISS, i2 Analyst Notebook (a software program that allows the intelligence research specialist to perform timeline and link analysis), research tools (such as LexisNexis and ChoicePoint), and Law Enforcement Online (a national, interactive law enforcement information system developed by the FBI). Other tools that they identified were everyday office equipment, such as facsimile machines, computers, and cellular phones. 2ff7e9595c


 
 
 

Recent Posts

See All

Comments


© 2023 by EPS Marketing. Proudly created with Wix.com

bottom of page