| 000 | 01785nab a22002297a 4500 | ||
|---|---|---|---|
| 003 | ES-MaBCA | ||
| 005 | 20160201125839.0 | ||
| 008 | 120330t xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aES-MaBCA _cES-MaBCA |
||
| 100 |
_913932 _aRoche, Edward M. |
||
| 100 |
_913933 _aBlaine, Michael J. |
||
| 100 |
_913934 _aMcCreary, John |
||
| 245 |
_aThe Cyber Intelligence Challenge of Asyngnotic Networks _h[Recurso electrónico] PDF |
||
| 520 | _a The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges. | ||
| 650 | 0 |
_95114 _aInteligencia |
|
| 650 | 0 |
_912849 _aTecnologías de la Información y de la Comunicación |
|
| 650 | 0 |
_91698 _aSeguridad en las Tecnologías |
|
| 650 | 0 |
_91708 _aDelitos informáticos |
|
| 773 | 0 |
_aJournal of Strategic Security _g. -- Vol 8 No. 3 (Special Issue: Fall 2015) Art. 7 _iEn : _tJournal of Strategic Security _w328 _x1944-0472 |
|
| 856 | 4 | _uhttp://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1448&context=jss | |
| 942 |
_2udc _cAN |
||
| 999 |
_c17527 _d17530 |
||