Semantic hacking and intelligence and security informatics (extended abstract)

5Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the context of information warfare Libicki first characterized attacks on computer systems as being physical, syntactic, and semantic, where software agents were misled by an adversary's misinformation [1]. Recently cognitive hacking was defined as an attack directed at the mind of the user of a computer system [2]. Countermeasures against cognitive and semantic attacks are expected to play an important role in a new science of intelligence and security informatics. Information retrieval, or document retrieval, developed historically to serve the needs of scientists and legal researchers, among others. In these domains, documents are expected to be honest representations of attempts to discover scientific truths, or to make sound legal arguments. This assumption does not hold for intelligence and security informatics. Intelligence and security informatics will be supported by data mining, visualization, and link analysis technology, but intelligence and security analysts should also be provided with an analysis environment supporting mixed-initiative, utility-theoretic interaction with both raw and aggregated data. This environment should include toolkits of semantic hacking countermeasures. For example, faced with a potentially deceptive news item, an automated countermeasure might provide an alert using adaptive fraud detection algorithms [3], or through a retrieval mechanism allow the analyst to quickly assemble and analyze related documents bearing on the potential misinformation. The author is currently developing such countermeasures. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Thompson, P. (2003). Semantic hacking and intelligence and security informatics (extended abstract). Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2665, 390. https://doi.org/10.1007/3-540-44853-5_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free