Access to data is a risky business.
Access to data and processed intelligence also brings risks, in some cases so many risks that they prohibit the full use of the new systems. Access to information has to be contextually restricted to the minimum necessary for analysts to do their current tasks. Not all users, including analysts, are authorized to access all data in the systems – they may not have sufficient clearance, or there is no need to know, or because data has to be specifically protected.
Other data may only be obtained under specific conditions and is bound to a specific purpose. In some countries and domains, for example in police intelligence, strict data protection regulations have to be met. Meeting those using conventional security technologies is not only challenging, it is almost impossible, as history has shown. Security and audit requirements. In addition, the usage of the system has to be strictly audited, including system administrators – to detect misuse by insiders and attacks from the outside.