1.

Record Nr.

UNINA9910220108003321

Titolo

Out of the ordinary : finding hidden threats by analyzing unusual behavior / / John Hollywood ... [et al.]

Pubbl/distr/stampa

Santa Monica, CA, : RAND Corp., 2004

ISBN

1-282-45122-7

9786612451225

0-8330-4817-1

1-59875-413-0

Descrizione fisica

1 online resource (186 p.)

Altri autori (Persone)

HollywoodJohn S. <1973->

Disciplina

363.32

Soggetti

Criminal behavior, Prediction of - United States

Crime forecasting - United States

Criminal methods - United States

Terrorism - Forecasting

Terrorism - Psychological aspects

Intelligence service - United States

National security - United States

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"MG-126"--P. [4] cover.

Nota di bibliografia

Includes bibliographical references (p. 151-155).

Nota di contenuto

Cover; Preface; The RAND Corporation Quality Assurance Process; Contents; Figures; Tables; Summary; Acknowledgments; Acronyms; CHAPTER ONE - Introduction; Prologue: Something Bad Happened on November 9th; The Problem of Connecting the Dots in Intelligence; Cognitive Processes for Connecting the Dots; A Solution for Connecting the Dots-The Atypical Signal Analysis and Processing Schema; Outline of the Monograph; CHAPTER TWO - Data Analyzed in the ASAP Schema; Types of Data; Sources of Data; CHAPTER THREE - The Atypical Signal Analysis and ProcessingArchitecture; The Scope of an ASAP System

Levels of Analysis in the ASAP ArchitectureMajor Functional Components Within the Architecture; Linking Dots; Generating and Testing Hypotheses; Control of the ASAP Architecture; Roles of Human Analysts and Automated Agents; CHAPTER FOUR - Finding the Dots; Finding Dots with Rules; Representing Context; Dimensions of Context;



High-Dimensionality Detection Agents; CHAPTER FIVE - Connecting the Dots; Similarity Connections; Complementary Connections; CHAPTER SIX - Understanding the Dots: Generating and Testing Hypotheses; Generating Hypotheses; Testing Hypotheses; CHAPTER SEVEN - Conclusion

SummaryA Research Plan; Conclusion: Recommendations for Action; APPENDIX A - Case Study: "The November 9th Incident"; APPENDIX B - Systems Related to the ASAP Architecture; Bibliography

Sommario/riassunto

Presents a unique approach to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror activity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings.