The Cyber Intelligence Challenge of Asyngnotic Networks [Recurso electrónico] PDF
Material type: ArticleSubject(s): Inteligencia | Tecnologías de la Información y de la Comunicación | Seguridad en las Tecnologías | Delitos informáticosOnline resources: Click here to access online In: Journal of Strategic Security Journal of Strategic Security . -- Vol 8 No. 3 (Special Issue: Fall 2015) Art. 7Summary: The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges.Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Centro de Análisis y Prospectiva de la Guardia Civil | Biblioteca Digital | Available | 2015971 |
The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges.
There are no comments on this title.