Threat Network Detection and Tracking
MIT Lincoln Laboratory Lexington United States
Pagination or Media Count:
Identifying and profiling threat actors arehigh priority tasks for a number of governmental organizations. These threat actors may operateactively, using the Internet to promote propaganda, recruit new members, or exert command and controlover their networks. Alternatively, threat actors may operate passively, demonstrating operational security awareness online while using their Internet presence togather information they need to pose an offline physical threat. This paper presents a flexible new prototype that allows analysts to automatically detect, monitor and characterize threat actors and their networks using publicly available information. It fills a need in the intelligence community for a capability to automate manual construction and analysis of online threat networks.
- Computer Systems Management and Standards