Analyst's Notebook

Last updated
Analyst's Notebook
Developer(s) i2 Group, a subsidiary of Constellation Software
Operating system Windows
Type Productivity software, mind map, project management and knowledge management
License Commercial license
Website i2group.com

i2 Analyst's Notebook is a software product from i2 Group for data analysis. Based on ELP (entity-link-property) methodology, it reveals relationships between data entities to discover patterns and provide insight into data. It is commonly used by digital analysts at law enforcement, military and other government intelligence agencies, and by fraud departments. It is a part of the Human Terrain System, a United States Army program which embeds social scientists with combat brigades. Several investigations, including an investigation into fraud in the U.S. Army, are reported to have used it. [1] It is also used by Swedish police to analyse social contacts and social networks. [2] [ failed verification ]

Contents

IBM acquired i2 Analyst's Notebook when it bought the i2 Group [3] in 2011.

IBM sold all the i2 products, including i2 Analyst's Notebook, to Harris Computer [4] in January 2022.

See also

Related Research Articles

<span class="mw-page-title-main">SPSS</span> Statistical analysis software

SPSS Statistics is a statistical software suite developed by IBM for data management, advanced analytics, multivariate analysis, business intelligence, and criminal investigation. Long produced by SPSS Inc., it was acquired by IBM in 2009. Versions of the software released since 2015 have the brand name IBM SPSS Statistics.

Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

<span class="mw-page-title-main">CA Technologies</span> American software company (1976–2018)

CA Technologies, Inc., formerly Computer Associates International, Inc., and CA, Inc., was an American multinational enterprise software developer and publisher that existed from 1976 to 2018. CA grew to rank as one of the largest independent software corporations in the world, and at one point was the second largest. The company created systems software that ran in IBM mainframe, distributed computing, virtual machine, and cloud computing environments.

Structured systems analysis and design method (SSADM) is a systems approach to the analysis and design of information systems. SSADM was produced for the Central Computer and Telecommunications Agency, a UK government office concerned with the use of technology in government, from 1980 onwards.

<span class="mw-page-title-main">SAS (software)</span> Statistical software

SAS is a statistical software suite developed by SAS Institute for data management, advanced analytics, multivariate analysis, business intelligence, criminal investigation, and predictive analytics.

<span class="mw-page-title-main">System Architect</span> Enterprise architecture tool

Unicom System Architect is an enterprise architecture tool that is used by the business and technology departments of corporations and government agencies to model their business operations and the systems, applications, and databases that support them. System Architect is used to build architectures using various frameworks including TOGAF, ArchiMate, DoDAF, MODAF, NAF and standard method notations such as sysML, UML, BPMN, and relational data modeling. System Architect is developed by UNICOM Systems, a division of UNICOM Global, a United States-based company.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

BasisTech is a software company specializing in applying artificial intelligence techniques to understanding documents and unstructured data written in different languages. It has headquarters in Somerville, Massachusetts with a subsidiary office in Tokyo. Its legal name is BasisTech LLC.

The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. A-Space is built on Jive Software's Clearspace application.

Palantir Technologies is a public American company that specializes in big data analytics. Headquartered in Denver, Colorado, it was founded by Peter Thiel, Nathan Gettings, Joe Lonsdale, Stephen Cohen, and Alex Karp in 2003. The company's name is derived from The Lord of the Rings where the magical palantíri were "seeing-stones," described as indestructible balls of crystal used for communication and to see events in other parts of the world.

Hsinchun Chen is the Regents' Professor and Thomas R. Brown Chair of Management and Technology at the University of Arizona and the Director and founder of the Artificial Intelligence Lab. He also served as lead program director of the Smart and Connected Health program at the National Science Foundation from 2014 to 2015. He received a B.S. degree from National Chiao Tung University in Taiwan, an MBA from SUNY Buffalo and an M.S. and Ph.D. in Information Systems from New York University.

Recorded Future is a privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.

In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.

In network theory, link analysis is a data-analysis technique used to evaluate relationships between nodes. Relationships may be identified among various types of nodes (100k), including organizations, people and transactions. Link analysis has been used for investigation of criminal activity, computer security analysis, search engine optimization, market research, medical research, and art.

i2 Group Software companies of the United Kingdom

i2 Group is a UK-based software company that produces visual link analysis software for military intelligence, law enforcement, and commercial agencies. Since 2022, it has been a wholly owned subsidiary of Constellation Software.

<span class="mw-page-title-main">Distributed Common Ground System</span>

The Distributed Common Ground System(DCGS) is a system which produces military intelligence for multiple branches of the American military.

<span class="mw-page-title-main">Maltego</span>

Maltego is a link analysis software used for open-source intelligence, forensics and other investigations, originally developed by Paterva from Pretoria, South Africa. Maltego offers real-time data mining and information gathering, as well as the representation of this information on a node-based graph, making patterns and multiple order connections between said information easily identifiable. In 2019, the team of Maltego Technologies headquartered in Munich, Germany took over responsibility for all global customer-facing operations, and in 2023 complete technology development and management.

Cyber threat intelligence (CTI) is knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic and data derived for the deep and dark web.

References

  1. Jackson, Joab (14 July 2009), "Army employs visualization software to uncover procurement fraud", Government Computer News .
  2. Kleja, Monica (6 November 2013), "Säpos krav: Flöden från operatörerna", Ny Teknik (in Swedish), archived from the original on 29 October 2015, retrieved 26 September 2015
  3. Jackson, Joab (2011-08-31). "IBM to acquire i2 for criminal mastermind software". Computerworld. Retrieved 2021-02-26.
  4. "News". www.harriscomputer.com. Retrieved 2024-01-08.