The puzzle composed of thousands of data pieces

The puzzle composed of thousands of data pieces

This post is also available in: heעברית (Hebrew)

8626826_sOne of Israel’s well-known assets is its strong intelligence community, led by the Mossad and Shin Beth. Since their inception in 1959, those two organizations have become famous for their abilities in knowing everything and reaching everywhere to keep Israelis safe. But in today’s reality, where information flows endlessly through the World Wide Web, it has become much harder and more tedious to watch and analyze the available data and react to it in a timely manner.

Athena Security Implementations, an Israeli company founded by former head of Mossad, Shabtai Shavit and led by other Israeli intelligence veterans, has developed a system that aims to ease the process of collecting and analyzing information in this “transparent global village”, as Shavit referred to it in 2010. The solution, called CK2I – which stands for Centric Knowledge to Insights – can plug into any data collection mechanism, including national databases, emailed reports, security cameras or even social network feeds, and create what the company calls an “information pool”. Then it analyzes all the information, using rule-based algorithms that form the company’s iRube engine, and produces “actionable insights” that help agencies make decisions.

The system not only collects data and analyzes it, however. It also includes modules that handle the workflow of the output data, including case updates and linking between different materials. In addition, it enables high compartmentalization, automatically classifying different access levels to data and sharing each piece of information only with agents who have the right clearance level. Its security management capabilities helps in controlling access schemes so the information stays secure and delivered only “on a need to know basis”.

CK2I is highly scalable and supports existing management programs like Microsoft SharePoint and Oracle’s Java. Its algorithms can differ from one application to another and its modules are available separately. This lets security organizations build it in different ways to meet different needs and targets in todays connected world.


bigData 980x200