Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture
Summary
Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
Notes
"MG-126-RC."
Bibliography
Includes bibliographical references (pages 151-155) and appendices