Semantic hacking and intelligence and security informatics

  • Authors:
  • Paul Thompson

  • Affiliations:
  • Institute for Security Technology Studies, Dartmouth College, Hanover, NH

  • Venue:
  • ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the context of information warfare Libicki first characterized attackson computer systems as being physical, syntactic, and semantic, wheresoftware agents were misled by an adversary's misinformation [1]. Recentlycognitive hacking was defined as an attack directed at the mind of the user of acomputer system [2]. Countermeasures against cognitive and semantic attacksare expected to play an important role in a new science of intelligence and securityinformatics. Information retrieval, or document retrieval, developed historicallyto serve the needs of scientists and legal researchers, among others. Inthese domains, documents are expected to be honest representations of attemptsto discover scientific truths, or to make sound legal arguments. This assumptiondoes not hold for intelligence and security informatics. Intelligence and security informatics will be supported by data mining, visualization,and link analysis technology, but intelligence and security analystsshould also be provided with an analysis environment supporting mixedinitiative,utility-theoretic interaction with both raw and aggregated data. Thisenvironment should include toolkits of semantic hacking countermeasures. Forexample, faced with a potentially deceptive news item, an automated countermeasuremight provide an alert using adaptive fraud detection algorithms [3], orthrough a retrieval mechanism allow the analyst to quickly assemble and analyzerelated documents bearing on the potential misinformation. The author iscurrently developing such countermeasures.