![]() |
![]() |
||||||||||||
GeoThreat utilizes various methodologies to manage data collection, data orientation and data analysis in order that extensive datasets can be translated into accurate and clearly defined information assessments. To find out more about these methodologies e-mail GeoThreat at inquiries@geothreat.com. The following methods are core techniques utilized by GeoThreat: |
|||||||||||||
Open Source Data Collection GeoThreat collects data from a multitude of open sources. GeoThreat's key advantage to completing threat assessments or military research in-house is our extensive range of data sources. GeoThreat has access to academia and libraries in the South Pacific. It also has available up to date security and strategic affairs publications and literature. Moreover GeoThreat is able to utilize satellite imagery if needed. Where data is not available GeoThreat personnel can travel to regions under investigation and carry out research as needed. However, travel is contingent on the safety of GeoThreat personnel traveling to those regions. |
Geo-Historical Analysis
commentary using various reference forms such as press reports and literary articles to map out threats within particular regions. For example, to interpret the restarting of North Korea’s nuclear dismantling talks, press reports could be analyzed for a one year period prior to the restart of talks. Geo- historical analysis is ideal for analyzing general threats in lesser developed regions. |
||||||||||||
Systems Decomposition and Localization Analysis
and sub-dividing them into manageable and intelligible components and parts. By identifying what each component is and does causal links between the behavior of the system and influence of its components can be identified. Systems decomposition offers two advantages. First, a systems approach can uncover competing or different influences that act upon particular processes making the analysis more thorough. Second, a systems approach can expose vulnerabilities at the lowest levels of the target analysis. Systems decomposition and localization allows for the greatest degree of detail out of all methodologies. It was originally adapted by GeoThreat from a scientific application specifically for organizational analysis, although its application can be extended further into many other research areas. |
|||||||||||||
Geo-Strategic Analysis
a critical form of geo-politics is used to identify links and causal relationships between geographical space and international political power. Through a complex vision of states that incorporates threatening visions of power and technology a discourse is utilized that lies somewhere between regional statecraft – the world divided into regions such as Southeast Asia, and intellectual statecraft – structures that guide and justify statecraft such as the Association for South East Asian Nations (ASEAN). In order to be able to visualize and see links, and causal relationships it is necessary to de- construct practices of culture within state-centric space. Critical geo-political analysis is ideal for analyzing detailed strategic threats located within lesser developed regions. |
|||||||||||||
Geographical Information Systems
analyze and display spatial data amassed during data collection. For example, GeoThreat could map the incidence of local kidnappings within a region or provide a trend analysis showing religious variations over a specified time period. GIS allows the operator to provide a visually effective representation of information to the client allowing for more effective assessments of regions. GIS systems are ideal for showing regional trend analyses, spatial distributions and for overlaying satellite imagery. |
|||||||||||||
GeoThreat > Research & Analysis |