finding hidden threats by analyzing unusual behavior /
John Hollywood [and others].
Santa Monica, Calif. :
RAND Corp.,
2004.
1 online resource (xxx, 155 pages) :
illustrations, charts
"MG-126-RC."
Title from title screen (viewed 11/23/2004).
Includes bibliographical references (pages 151-155) and appendices.
Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture.
0
Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described.
JSTOR
22573/cttdfh6
Out of the ordinary.
0833035207
Crime forecasting-- United States.
Criminal behavior, Prediction of-- United States.
Criminal methods-- United States.
Intelligence service-- United States.
National security-- United States.
Terrorism-- Forecasting.
Terrorism-- Psychological aspects.
Crime forecasting.
Criminal behavior, Prediction of.
Criminal methods.
Intelligence service.
National security.
POLITICAL SCIENCE-- Political Freedom & Security-- Law Enforcement.
POLITICAL SCIENCE-- Security (National & International)