The Cyber Intelligence Challenge of Asyngnotic Networks

The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to det...

Full description

Bibliographic Details
Main Authors: Edward M. Roche, Michael J. Blaine, John McCreary
Format: Article
Language:English
Published: Henley-Putnam University 2015-09-01
Series:Journal of Strategic Security
Subjects:
Online Access:http://scholarcommons.usf.edu/jss/vol8/iss3/7/
id doaj-45f8b46d8c044817b88c8705c4538671
record_format Article
spelling doaj-45f8b46d8c044817b88c8705c45386712020-11-24T21:24:20ZengHenley-Putnam UniversityJournal of Strategic Security1944-04641944-04722015-09-0183107136http://dx.doi.org/10.5038/1944-0472.8.3.1448The Cyber Intelligence Challenge of Asyngnotic NetworksEdward M. Roche0Michael J. BlaineJohn McCreary1Columbia Institute for Tele-Information, Columbia UniversityDefense Intelligence Agency (ret.)The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges. http://scholarcommons.usf.edu/jss/vol8/iss3/7/CounterterrorismIntelligence analysisIntelligence collectionMethodologyNational securityNetworks and network analysis
collection DOAJ
language English
format Article
sources DOAJ
author Edward M. Roche
Michael J. Blaine
John McCreary
spellingShingle Edward M. Roche
Michael J. Blaine
John McCreary
The Cyber Intelligence Challenge of Asyngnotic Networks
Journal of Strategic Security
Counterterrorism
Intelligence analysis
Intelligence collection
Methodology
National security
Networks and network analysis
author_facet Edward M. Roche
Michael J. Blaine
John McCreary
author_sort Edward M. Roche
title The Cyber Intelligence Challenge of Asyngnotic Networks
title_short The Cyber Intelligence Challenge of Asyngnotic Networks
title_full The Cyber Intelligence Challenge of Asyngnotic Networks
title_fullStr The Cyber Intelligence Challenge of Asyngnotic Networks
title_full_unstemmed The Cyber Intelligence Challenge of Asyngnotic Networks
title_sort cyber intelligence challenge of asyngnotic networks
publisher Henley-Putnam University
series Journal of Strategic Security
issn 1944-0464
1944-0472
publishDate 2015-09-01
description The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST) to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges.
topic Counterterrorism
Intelligence analysis
Intelligence collection
Methodology
National security
Networks and network analysis
url http://scholarcommons.usf.edu/jss/vol8/iss3/7/
work_keys_str_mv AT edwardmroche thecyberintelligencechallengeofasyngnoticnetworks
AT michaeljblaine thecyberintelligencechallengeofasyngnoticnetworks
AT johnmccreary thecyberintelligencechallengeofasyngnoticnetworks
AT edwardmroche cyberintelligencechallengeofasyngnoticnetworks
AT michaeljblaine cyberintelligencechallengeofasyngnoticnetworks
AT johnmccreary cyberintelligencechallengeofasyngnoticnetworks
_version_ 1725988904023097344