Page 72 - Cyber Warnings
P. 72







The AAAT Concept



The experience with the security and intelligence work would suggest that the selected sources
as the providers to confidential findings are supposed to satisfy some requirements.

The current trends with the defense would seek from the source to get accessible, available,
and accurate offering the good timing to the information providing.

These requirements are the consequence of the very high standards within the modern army
and policing technological advancements which should get updated with the extremely
qualitative reports.

The source is a person who would, by the belief of the Defense Forces, deal with the
confidential information about the crime or with some details about the criminal environment.

So often the source may be directly exposed to the criminal activities and get encouraged to
share its experience with the local authorities or intelligence community.

As it’s suggested above, through this report – we would deal with the AAAT concept – or
accessibility, availability, accuracy and timing system of the source activity valuing. The Table 1
would illustrate that AAAT system of dealing with the defense source.

The further explanations would get provided the later on.

T Ta ab bl le e 1 1. . The AAAT concept of the source activity valuing
The findings The The availability The accuracy The timing
attributes accessibility


The person The person The person The person
dealing with dealing with dealing with dealing with
some findings some findings some findings some findings
from the interest from the interest from the interest from the interest

to the authorities to the authorities to the authorities to the authorities
is accessible is available only provides the got the good
only if he is if he can accurate reports timing only if his
The period of willing to share maintain the only if those reports got
time his findings with communications findings can be provided at the
the Defense with the Defense confirmed in a right time.
Services. Forces. practice.





72 Cyber Warnings E-Magazine – February 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   67   68   69   70   71   72   73   74   75   76   77