Sign up to get full access to our latest articles, reports, videos and events delivered by military and industry experts and decision makers.

Small Data Intelligence vs. Big Data Analysis & the Future of Intelligence Analytics

Add bookmark

Introduction


“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” -Sun Tzu, The Art of War

This quote often serves as a credo for the U.S. Intelligence Community (IC). The IC, both the so-called “alphabet agencies” such as the CIA, FBI, and NSA, as well as the various intelligence components of the Department of Defense are constantly seeking to know the enemy. Whether it is to gain a strategic advantage in war, defend the homeland against foreign threats, or preventing terrorism, the IC uses every tool at its disposal to know and defeat the enemy.

The IC has numerous disciplines, collection methods, and tools that cumulatively collect immense amounts of raw data that it uses to piece together the enemy and their intentions. Yet there is a flaw in the system - not one due to improper practice or ignorance, but an inherent limitation in any organization. At its core, any intelligence organization is made up of and relies on people to analyze the raw data, and convert it into actionable data. This limitation is an inherent bottleneck - the amount of raw data to be analyzed is vastly disproportionate to the available manpower. This reliance on Small Data, only that which has already been analyzed by a human, limits our potential to know our adversaries.


Further, even the most studious of analysts is still imperfect. Whether you consider the effects of fatigue and being overworked, or the effects of inherent cognitive bias, or even simply overlooking crucial data, the answer remains the same. Humans simply cannot accurately analyze information on the scale increasingly needed to effectively contend with the adversaries the U.S. now faces. 


It is no surprise, then, that the U.S. and its adversaries and peers around the world are increasingly looking to technological solutions to bridge this gap. In particular, there is a worldwide push to increase the use of Big Data and Artificial Intelligence (AI) for military and national security applications, especially in intelligence analysis. For the remainder of this article, we will discuss the use of Small Data, Big Data, and efforts by the IC to incorporate AI and other technological solutions to enhance their capabilities.

DOWNLOAD to continue reading......

Upcoming Events

Military Flight Training USA

October 28 - 29, 2025

The Westin San Antonio North, San Antonio, TX

Military Flight Training USA

Biometrics for Government and Law Enforcement

November 19 - 20, 2025

Sheraton Reston Hotel, Reston, VA

Biometrics for Government and Law Enforcement

Next Generation Missiles and Hypersonics Summit

December 9 - 10, 2025

Sheraton Reston Hotel, Reston, VA

Next Generation Missiles and Hypersonics Summit

Future Indirect Fires

January 27 - 28, 2026

The Westin Arlington, Arlington, VA

Future Indirect Fires

Military Simulation Training Summit

February 24 - 25, 2026

The Celeste Hotel, Orlando, FL

Military Simulation Training Summit

Latest Webinars

Responsible and Transparent Approaches to AI in Biometric Algorithm

2024-08-14

01:00 PM - 01:45 PM EDT

Join the Department of Homeland Security and IDEMIA as they discuss how to bring security and transp...

Securing the Defence Industrial Base: Mitigating Risk and Delivering Resiliency in Physical and Digital Supply Chains

2022-04-21

12:00 PM - 01:00 PM EST

This webinar discusses the current risks in today's supply chain and the recent military initiatives...

Treatment Option for Two Subsets of Challenging to Treat Major Depressive Disorder in Adults

2021-08-25

12:00 PM - 01:00 PM EST

The latest IDGA webinar looks at treatment plans for the VA's adult patients with two subtypes of ma...

Recommended