The Cyber Intelligence Challenge of Asyngnotic Networks
The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to det...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Henley-Putnam University
2015-09-01
|
Series: | Journal of Strategic Security |
Subjects: | |
Online Access: | http://scholarcommons.usf.edu/jss/vol8/iss3/7/ |
id |
doaj-45f8b46d8c044817b88c8705c4538671 |
---|---|
record_format |
Article |
spelling |
doaj-45f8b46d8c044817b88c8705c45386712020-11-24T21:24:20ZengHenley-Putnam UniversityJournal of Strategic Security1944-04641944-04722015-09-0183107136http://dx.doi.org/10.5038/1944-0472.8.3.1448The Cyber Intelligence Challenge of Asyngnotic NetworksEdward M. Roche0Michael J. BlaineJohn McCreary1Columbia Institute for Tele-Information, Columbia UniversityDefense Intelligence Agency (ret.)The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges. http://scholarcommons.usf.edu/jss/vol8/iss3/7/CounterterrorismIntelligence analysisIntelligence collectionMethodologyNational securityNetworks and network analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Edward M. Roche Michael J. Blaine John McCreary |
spellingShingle |
Edward M. Roche Michael J. Blaine John McCreary The Cyber Intelligence Challenge of Asyngnotic Networks Journal of Strategic Security Counterterrorism Intelligence analysis Intelligence collection Methodology National security Networks and network analysis |
author_facet |
Edward M. Roche Michael J. Blaine John McCreary |
author_sort |
Edward M. Roche |
title |
The Cyber Intelligence Challenge of Asyngnotic Networks |
title_short |
The Cyber Intelligence Challenge of Asyngnotic Networks |
title_full |
The Cyber Intelligence Challenge of Asyngnotic Networks |
title_fullStr |
The Cyber Intelligence Challenge of Asyngnotic Networks |
title_full_unstemmed |
The Cyber Intelligence Challenge of Asyngnotic Networks |
title_sort |
cyber intelligence challenge of asyngnotic networks |
publisher |
Henley-Putnam University |
series |
Journal of Strategic Security |
issn |
1944-0464 1944-0472 |
publishDate |
2015-09-01 |
description |
The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges.
|
topic |
Counterterrorism Intelligence analysis Intelligence collection Methodology National security Networks and network analysis |
url |
http://scholarcommons.usf.edu/jss/vol8/iss3/7/ |
work_keys_str_mv |
AT edwardmroche thecyberintelligencechallengeofasyngnoticnetworks AT michaeljblaine thecyberintelligencechallengeofasyngnoticnetworks AT johnmccreary thecyberintelligencechallengeofasyngnoticnetworks AT edwardmroche cyberintelligencechallengeofasyngnoticnetworks AT michaeljblaine cyberintelligencechallengeofasyngnoticnetworks AT johnmccreary cyberintelligencechallengeofasyngnoticnetworks |
_version_ |
1725988904023097344 |