LEADER 03934nam 22007454a 450 001 9910220108003321 005 20200520144314.0 010 $a9786612451225 010 $a9781282451223 010 $a1282451227 010 $a9780833048172 010 $a0833048171 010 $a9781598754131 010 $a1598754130 035 $a(CKB)1000000000345830 035 $a(EBL)236877 035 $a(OCoLC)475945224 035 $a(SSID)ssj0000341195 035 $a(PQKBManifestationID)12115079 035 $a(PQKBTitleCode)TC0000341195 035 $a(PQKBWorkID)10389018 035 $a(PQKB)10956765 035 $a(MiAaPQ)EBC236877 035 $a(EXLCZ)991000000000345830 100 $a20031029d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aOut of the ordinary $efinding hidden threats by analyzing unusual behavior /$fJohn Hollywood ... [et al.] 210 $aSanta Monica, CA $cRAND Corp.$d2004 215 $a1 online resource (186 p.) 300 $a"MG-126"--P. [4] cover. 311 08$a9780833035202 311 08$a0833035207 320 $aIncludes bibliographical references (p. 151-155). 327 $aCover; Preface; The RAND Corporation Quality Assurance Process; Contents; Figures; Tables; Summary; Acknowledgments; Acronyms; CHAPTER ONE - Introduction; Prologue: Something Bad Happened on November 9th; The Problem of Connecting the Dots in Intelligence; Cognitive Processes for Connecting the Dots; A Solution for Connecting the Dots-The Atypical Signal Analysis and Processing Schema; Outline of the Monograph; CHAPTER TWO - Data Analyzed in the ASAP Schema; Types of Data; Sources of Data; CHAPTER THREE - The Atypical Signal Analysis and ProcessingArchitecture; The Scope of an ASAP System 327 $aLevels of Analysis in the ASAP ArchitectureMajor Functional Components Within the Architecture; Linking Dots; Generating and Testing Hypotheses; Control of the ASAP Architecture; Roles of Human Analysts and Automated Agents; CHAPTER FOUR - Finding the Dots; Finding Dots with Rules; Representing Context; Dimensions of Context; High-Dimensionality Detection Agents; CHAPTER FIVE - Connecting the Dots; Similarity Connections; Complementary Connections; CHAPTER SIX - Understanding the Dots: Generating and Testing Hypotheses; Generating Hypotheses; Testing Hypotheses; CHAPTER SEVEN - Conclusion 327 $aSummaryA Research Plan; Conclusion: Recommendations for Action; APPENDIX A - Case Study: "The November 9th Incident"; APPENDIX B - Systems Related to the ASAP Architecture; Bibliography 330 $aPresents a unique approach to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror activity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. 606 $aCriminal behavior, Prediction of$zUnited States 606 $aCrime forecasting$zUnited States 606 $aCriminal methods$zUnited States 606 $aTerrorism$xForecasting 606 $aTerrorism$xPsychological aspects 606 $aIntelligence service$zUnited States 606 $aNational security$zUnited States 615 0$aCriminal behavior, Prediction of 615 0$aCrime forecasting 615 0$aCriminal methods 615 0$aTerrorism$xForecasting. 615 0$aTerrorism$xPsychological aspects. 615 0$aIntelligence service 615 0$aNational security 676 $a363.32 701 $aHollywood$b John S.$f1973-$01233463 712 02$aRand Corporation. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910220108003321 996 $aOut of the ordinary$92864725 997 $aUNINA