Knowledge

Analysis of competing hypotheses

Source đź“ť

24: 432:, the analyst applies evidence against each hypothesis in an attempt to disprove as many theories as possible. Some evidence will have greater "diagnosticity" than other evidence—that is, some will be more helpful in judging the relative likelihood of alternative hypotheses. This step is the most important, according to Heuer. Instead of looking at one hypothesis and all the evidence ("working down" the matrix), the analyst is encouraged to consider one piece of evidence at a time, and examine it against all possible hypotheses ("working across" the matrix). 635: 23: 534:
According to social constructivist critics, ACH also fails to stress sufficiently (or to address as a method) the problematic nature of the initial formation of the hypotheses used to create its grid. There is considerable evidence, for example, that in addition to any bureaucratic, psychological, or
589:
For example, two tested hypotheses could be that Iraq has WMD or Iraq does not have WMD. If the evidence showed that it is more likely there are WMDs in Iraq then two new hypotheses could be formulated: WMD are in Baghdad or WMD are in Mosul. Or perhaps, the analyst may need to know what type of WMD
526:
analysis is employed to isolate assumptions implicit in the evaluation of paths in, or conclusions of, particular hypotheses. As evidence in the form of observations of states or assumptions is observed, they can become the subject of separate validation. Should an assumption or necessary state be
438:
Inconsistency – The analyst then seeks to draw tentative conclusions about the relative likelihood of each hypothesis. Less consistency implies a lower likelihood. The least consistent hypotheses are eliminated. While the matrix generates a definitive mathematical total for each hypothesis, the
453:
Conclusions and evaluation – Finally, the analyst provides the decisionmaker with his or her conclusions, as well as a summary of alternatives that were considered and why they were rejected. The analyst also identifies milestones in the process that can serve as indicators in future
446:, which weighs how the conclusion would be affected if key evidence or arguments were wrong, misleading, or subject to different interpretations. The validity of key evidence and the consistency of important arguments are double-checked to assure the soundness of the conclusion's 602:
to ACH. A generalization of this concept to a distributed community of analysts lead to the development of CACHE (the Collaborative ACH Environment), which introduced the concept of a Bayes (or Bayesian) community. The work by Akram and Wang applies paradigms from
359:, in the 1970s for use by the Agency. ACH is used by analysts in various fields who make judgments that entail a high risk of error in reasoning. ACH aims to help an analyst overcome, or at least minimize, some of the cognitive limitations that make prescient 585:
The structured analysis of competing hypotheses offers analysts an improvement over the limitations of the original ACH. The SACH maximizes the possible hypotheses by allowing the analyst to split one hypothesis into two complex ones.
535:
political biases that may affect hypothesis generation, there are also factors of culture and identity at work. These socially constructed factors may restrict or pre-screen which hypotheses end up being considered, and then reinforce
839: 621:, a formal mathematical methodology that explicitly deals with uncertainty. This methodology forms the basis of the Sheba technology that is used in Veriluma's intelligence assessment software. 590:
Iraq has; the new hypotheses could be that Iraq has biological WMD, Iraq has chemical WMD and Iraq has nuclear WMD. By giving the ACH structure, the analyst is able to give a nuanced estimate.
556:
ACH misconceives the nature of the relationship between items of evidence and hypotheses by supposing that items of evidence are, on their own, consistent or inconsistent with hypotheses.
849: 1146:
Shrager, J., et al. (2009) Soccer science and the Bayes community: Exploring the cognitive implications of modern scientific communication. Topics in Cognitive Science, 2(1), 53–72.
510:
Especially in intelligence, both governmental and business, analysts must always be aware that the opponent(s) is intelligent and may be generating information intended to
435:
Refinement – The analyst reviews the findings, identifies any gaps, and collects any additional evidence needed to refute as many of the remaining hypotheses as possible.
1071: 745:
DECIDE was developed by the analytic research firm SSS Research, Inc. DECIDE not only allows analysts to manipulate ACH, but it provides multiple visualization products.
610:
Other work focuses less on probabilistic methods and more on cognitive and visualization extensions to ACH, as discussed by Madsen and Hicks. DECIDE, discussed under
2085: 731:
A few online and downloadable software tools help automate the ACH process. These programs leave a visual trail of evidence and allow the analyst to weigh evidence.
2298: 1200: 1849: 913: 739:(PARC) in collaboration with Richards J. Heuer, Jr. It is a standard ACH program that allows analysts to enter evidence and rate its credibility and relevance. 1114: 2095: 414:
Hypothesis – The first step of the process is to identify all potential hypotheses, preferably using a group of analysts with different perspectives to
656: 649: 559:
ACH treats the hypothesis set as "flat", i.e. a mere list, and so is unable to relate evidence to hypotheses at the appropriate levels of abstraction
553:
ACH demands that the analyst makes too many discrete judgments, a great many of which contribute little if anything to discerning the best hypothesis
699: 439:
analyst must use their judgment to make the final conclusion. The result of the ACH analysis itself must not overrule analysts' own judgments.
671: 2228: 1892: 1128:
Valtorta, Marco; et al. (May 2005), "Extending Heuer's Analysis of Competing Hypotheses Method to Support Complex Decision Analysis",
1875: 1842: 1747: 678: 425:
Evidence – The analyst then lists evidence and arguments (including assumptions and logical deductions) for and against each hypothesis.
1304: 418:
the possibilities. The process discourages the analyst from choosing one "likely" hypothesis and using evidence to prove its accuracy.
270: 2291: 1932: 759:
sheet that implements the scoring and weighting methodology of ACH, more specifically the weighted inconsistency counting algorithm.
78: 685: 514:. Since deception often is the result of a cognitive trap, Elsaesser and Stech use state-based hierarchical plan recognition (see 2120: 2090: 1835: 1730: 1686: 1086: 2273: 1254: 882: 667: 1156:
Akram, Shaikh Muhammad; Wang, Jiaxin (23 August 2006), "Investigative Data Mining: Connecting the dots to disconnect them",
1922: 1681: 780: 996: 1436: 790: 374:
remains the goal of researchers, tool-builders, and analysts in industry, academia and government. Their domains include
1866: 1209: 960: 326: 48: 1176:
Madsen, Fredrik H.; Hicks, David L. (23 August 2006), "Investigating the Cognitive Effects of Externalization Tools",
926: 897:
Elsaesser, Christopher; Stech, Frank J. (2007), "Detecting Deception", in Kott, Alexander; McEneaney, William (eds.),
1582: 1346: 1046: 718: 383: 1233: 2215: 1617: 1330: 481:. This allows the decisionmaker or other analysts to see the sequence of rules and data that led to the conclusion. 2233: 367: 2324: 2164: 1989: 1904: 1484: 447: 169: 83: 977: 692: 1858: 260: 2281: 845: 562:
ACH cannot represent subordinate argumentation, i.e. the argumentation bearing up on a piece of evidence.
370:, but it was first described in relatively informal terms. Producing the best available information from 356: 285: 518:) to generate causal explanations of observations. The resulting hypotheses are converted to a dynamic 736: 43: 2196: 1927: 1038: 2248: 2238: 2186: 1917: 1567: 1537: 1429: 1026: 645: 68: 500:
It can be cumbersome for an analyst to manage a large database with multiple pieces of evidence.
2263: 2201: 2181: 2130: 1887: 319: 255: 1030: 2150: 1816: 1367: 477:
Since the ACH requires the analyst to construct a matrix, the evidence and hypotheses can be
360: 179: 53: 1308: 2253: 2191: 2077: 2033: 2018: 1967: 1912: 1742: 1725: 1698: 1461: 543: 523: 443: 429: 379: 194: 189: 1072:"Structured Analysis of Competing Hypotheses: Improving a Tested Intelligence Methodology" 8: 2329: 2286: 2160: 1977: 1950: 1804: 1708: 1456: 749: 528: 515: 395: 88: 2319: 2258: 2243: 2135: 2110: 2048: 1999: 1984: 1693: 1660: 1634: 1612: 1607: 1577: 1562: 1422: 800: 199: 63: 866:
Field Evaluation in the Intelligence and Counterintelligence Context: Workshop Summary
2100: 1809: 1478: 1393: 1052: 1042: 956: 922: 878: 770: 599: 536: 506:
The evidence used in the matrix is static and therefore it can be a snapshot in time.
312: 234: 351:
for evaluating multiple competing hypotheses for observed data. It was developed by
2155: 2105: 1774: 1506: 1034: 870: 618: 519: 265: 250: 209: 139: 93: 1260: 2043: 1972: 1794: 1769: 1703: 1665: 1602: 1252: 785: 775: 159: 129: 98: 1177: 1157: 2140: 1960: 1472: 1280: 1129: 546: 471: 419: 371: 352: 300: 229: 899:
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
2313: 2058: 2038: 2023: 1752: 1720: 1622: 1597: 1516: 1056: 940:
MITRE Sponsored Research Project 51MSR111, Counter-Deception Decision Support
474:, though there is a lack of strong empirical evidence to support this belief. 415: 154: 144: 124: 953:
Constructing Cassandra, Reframing Intelligence Failure at the CIA, 1947-2001
2145: 2063: 2053: 1994: 1799: 1587: 1572: 1511: 1496: 1489: 604: 574: 478: 290: 114: 73: 1827: 1352: 1199:
Cluxton, Diane; Eick, Stephen G., "DECIDE Hypothesis Visualization Tool",
565:
ACH activities at realistic scales leave analysts disoriented or confused.
1955: 1789: 1655: 1501: 1239: 795: 387: 375: 348: 295: 204: 134: 58: 864: 598:
One method, by Valtorta and colleagues uses probabilistic methods, adds
2028: 1784: 1764: 1757: 1737: 1644: 1238:, Queensland University, Brisbane, Australia, ADA463908, archived from 391: 174: 149: 119: 838:
Heuer, Richards J. Jr, "Chapter 8: Analysis of Competing Hypotheses",
2009: 2004: 1942: 1779: 1592: 1521: 1445: 511: 224: 214: 164: 634: 527:
negated, hypotheses depending on it are rejected. This is a form of
2013: 1627: 1131:
International Conference on Intelligence Analysis Methods and Tools
1111:
Structured Analysis Of Competing Hypotheses: Theory and Application
874: 497:
The ACH matrix can be problematic when analyzing a complex project.
280: 219: 184: 406:
Heuer outlines the ACH process in considerable depth in his book,
1713: 1235:
Analysis of Competing Hypotheses using Subjective Logic (ACH-SL)
984:(55), Australian Institute of Professional Intelligence Officers 1398: 1372: 1256:
ACH2.0.3 Download Page: Analysis of Competing Hypotheses (ACH)
580: 756: 1414: 742:
Decision Command software was developed by Willard Zangwill.
1070:
Wheaton, Kristan J., et al. (November–December 2006),
863:
Thomason, Neil (2010), "Alternative Competing Hypotheses",
275: 1332:
SSS Research, Inc. – DECIDE, VAST 2006 Contest Submission
422:
is minimized when all possible hypotheses are considered.
2299:
Counterintelligence and counter-terrorism organizations
1253:
Xerox Palo Alto Research Center and Richards J. Heuer,
915:
Deception Detection by Analysis of Competing Hypotheses
442:
Sensitivity – The analyst tests the conclusions using
1115:
Mercyhurst College Institute for Intelligence Studies
503:
Evidence also presents a problem if it is unreliable.
997:"Exploring new directions for intelligence analysis" 1179:
Proceedings of the 2006 Intelligence Tools Workshop
1159:
Proceedings of the 2006 Intelligence Tools Workshop
1328: 1069: 951:Jones, Milo L. and; Silberzahn, Philippe (2013). 2311: 593: 398:is an earlier concept with similarities to ACH. 1329:Lankenau, Russell A., et al. (July 2006), 1127: 950: 494:The process to create an ACH is time-consuming. 1338: 1194: 1192: 896: 1843: 1430: 1108: 1023:Strategic Thinking in Complex Problem Solving 748:Analysis of Competing Hypotheses (ACH) is an 320: 969: 1857: 1322: 1189: 1175: 856: 581:Structured analysis of competing hypotheses 490:Weaknesses of doing an ACH matrix include: 1850: 1836: 1437: 1423: 1231: 1169: 1063: 1020: 994: 975: 911: 901:, Chapman & Hall/CRC, pp. 101–124 463:Some benefits of doing an ACH matrix are: 327: 313: 271:List of concept- and mind-mapping software 16:Process to evaluate alternative hypotheses 1368:"Burton/Analysis-of-Competing-Hypotheses" 1155: 1149: 1039:10.1093/acprof:oso/9780190463908.001.0001 912:Stech, Frank J.; Elsaesser, Christopher, 719:Learn how and when to remove this message 1391: 1344: 1246: 1232:Pope, Simon; Josang, Audun (June 2005), 1225: 1121: 890: 862: 844:, Center for the Study of Intelligence, 2264:Scientific & Technical intelligence 1202:2005 Intl conf on Intelligence Analysis 1198: 470:It is widely believed to help overcome 2312: 1687:Chinese espionage in the United States 1365: 655:Please improve this section by adding 410:. It consists of the following steps: 1831: 1418: 1109:Chido, Diane E., et al. (2006), 833: 831: 829: 827: 825: 823: 821: 819: 817: 2086:By alliances, nations and industries 1682:Chinese intelligence activity abroad 995:van Gelder, Tim (11 December 2012). 905: 781:Intelligence (information gathering) 628: 1748:Interpersonal (HUMINT) intelligence 1305:"Quantinus | Alignment | Execution" 841:Psychology of Intelligence Analysis 791:Multiple-criteria decision analysis 549:has made the following criticisms: 408:Psychology of Intelligence Analysis 13: 1348:DECIDE: from Complexity to Clarity 814: 668:"Analysis of competing hypotheses" 14: 2341: 1583:Computer and network surveillance 1394:"pstirparo/threatintel-resources" 1392:Stirparo, Pasquale (2020-12-10), 1079:Competitive Intelligence Magazine 976:van Gelder, Tim (December 2008), 837: 368:intelligence analysis methodology 1618:Short-range agent communications 633: 341:analysis of competing hypotheses 22: 2234:Words of estimative probability 2096:Operational platforms by nation 1385: 1359: 1297: 1273: 1140: 1102: 611: 1366:Burton, Matthew (2020-12-11), 1014: 988: 943: 735:PARC ACH 2.0 was developed by 84:Ontology (information science) 1: 1444: 955:. Stanford University Press. 657:secondary or tertiary sources 617:Work by Pope and Jøsang uses 594:Other approaches to formalism 485: 353:Richards (Dick) J. Heuer, Jr. 1307:. 2009-08-17. Archived from 978:"Can we do better than ACH?" 869:, National Academies Press, 577:) as an alternative to ACH. 458: 7: 2282:Intelligence cycle security 1021:Chevallier, Arnaud (2016). 846:Central Intelligence Agency 763: 624: 614:is visualization-oriented. 357:Central Intelligence Agency 355:, a 45-year veteran of the 286:Problem structuring methods 10: 2346: 1285:ach1.software.informer.com 1085:(6): 12–15, archived from 401: 366:ACH was a step forward in 2272: 2214: 2174: 2119: 2076: 1941: 1903: 1883: 1874: 1865: 1674: 1643: 1553: 1530: 1452: 737:Palo Alto Research Center 363:so difficult to achieve. 261:Entity–relationship model 44:Business decision mapping 807: 2249:Intelligence assessment 2239:All-source intelligence 1859:Intelligence management 1568:Covert listening device 1538:Intelligence assessment 1027:Oxford University Press 69:Knowledge visualization 1933:Operational techniques 1888:Special reconnaissance 1281:"Download ACH by PARC" 949:Chapters one to four, 644:relies excessively on 544:argumentation theorist 428:Diagnostics – Using a 256:Diagrammatic reasoning 79:Morphological analysis 2325:Intelligence analysis 1817:Targeted surveillance 361:intelligence analysis 281:Ontology (philosophy) 180:Layered graph drawing 54:Graphic communication 2254:Medical intelligence 2224:Competing hypotheses 2034:Industrial espionage 2019:Denial and deception 1743:Industrial espionage 1543:competing hypotheses 1025:. Oxford; New York: 569:Van Gelder proposed 524:value of information 444:sensitivity analysis 380:cognitive psychology 195:Organizational chart 190:Object-role modeling 107:Node–link approaches 2287:Counterintelligence 2202:Technical (TECHINT) 2197:Open-source (OSINT) 2187:Geospatial (GEOINT) 2161:Casualty estimation 755:ACH Template is an 752:ACH implementation. 539:in those selected. 529:root cause analysis 516:abductive reasoning 396:Abductive reasoning 89:Schema (psychology) 31:Information mapping 2259:Military geography 2244:Basic intelligence 2182:Financial (FININT) 2123:signature (MASINT) 2049:One-way voice link 1985:Concealment device 1694:Cold War espionage 1661:Front organization 1635:Surveillance tools 1613:Phone surveillance 1608:One-way voice link 1563:Concealment device 801:Working hypothesis 571:hypothesis mapping 200:Pathfinder network 64:Information design 49:Data visualization 2307: 2306: 2210: 2209: 2101:Direction finding 2091:In modern history 2072: 2071: 1825: 1824: 1479:Agent provocateur 1355:on March 28, 2007 1117:Press, p. 54 923:MITRE Corporation 884:978-0-309-15016-3 771:Decision analysis 729: 728: 721: 703: 600:Bayesian analysis 537:confirmation bias 337: 336: 36:Topics and fields 2337: 2106:Traffic analysis 2078:Signals (SIGINT) 1913:Asset recruiting 1881: 1880: 1872: 1871: 1852: 1845: 1838: 1829: 1828: 1439: 1432: 1425: 1416: 1415: 1409: 1408: 1407: 1406: 1389: 1383: 1382: 1381: 1380: 1363: 1357: 1356: 1351:, archived from 1342: 1336: 1335: 1326: 1320: 1319: 1317: 1316: 1301: 1295: 1294: 1292: 1291: 1277: 1271: 1270: 1269: 1268: 1259:, archived from 1250: 1244: 1243: 1242:on April 8, 2013 1229: 1223: 1222: 1221: 1220: 1214: 1208:, archived from 1207: 1196: 1187: 1186: 1184: 1173: 1167: 1166: 1165:, pp. 28–34 1164: 1153: 1147: 1144: 1138: 1137: 1136: 1125: 1119: 1118: 1106: 1100: 1099: 1098: 1097: 1091: 1076: 1067: 1061: 1060: 1018: 1012: 1011: 1009: 1007: 1001:timvangelder.com 992: 986: 985: 973: 967: 966: 947: 941: 939: 938: 937: 931: 925:, archived from 920: 909: 903: 902: 894: 888: 887: 860: 854: 853: 852:on June 13, 2007 848:, archived from 835: 724: 717: 713: 710: 704: 702: 661: 637: 629: 619:subjective logic 575:argument mapping 542:Philosopher and 520:Bayesian network 472:cognitive biases 467:It is auditable. 329: 322: 315: 266:Geovisualization 251:Design rationale 210:Semantic network 140:Conceptual graph 94:Visual analytics 26: 19: 18: 2345: 2344: 2340: 2339: 2338: 2336: 2335: 2334: 2310: 2309: 2308: 2303: 2268: 2206: 2192:Imagery (IMINT) 2170: 2131:Electro-optical 2122: 2121:Measurement and 2115: 2068: 2044:Numbers station 1973:Black operation 1937: 1899: 1861: 1856: 1826: 1821: 1795:Sting operation 1704:Black operation 1670: 1666:Limited hangout 1648: 1639: 1603:Numbers station 1555: 1549: 1526: 1466: 1448: 1443: 1413: 1412: 1404: 1402: 1390: 1386: 1378: 1376: 1364: 1360: 1343: 1339: 1327: 1323: 1314: 1312: 1303: 1302: 1298: 1289: 1287: 1279: 1278: 1274: 1266: 1264: 1251: 1247: 1230: 1226: 1218: 1216: 1212: 1205: 1197: 1190: 1185:, pp. 4–11 1182: 1174: 1170: 1162: 1154: 1150: 1145: 1141: 1134: 1126: 1122: 1107: 1103: 1095: 1093: 1089: 1074: 1068: 1064: 1049: 1019: 1015: 1005: 1003: 993: 989: 974: 970: 963: 948: 944: 935: 933: 929: 918: 910: 906: 895: 891: 885: 861: 857: 836: 815: 810: 805: 786:Model selection 776:Decision matrix 766: 725: 714: 708: 705: 662: 660: 654: 650:primary sources 638: 627: 596: 583: 488: 461: 404: 333: 160:Hyperbolic tree 130:Concept lattice 99:Visual language 17: 12: 11: 5: 2343: 2333: 2332: 2327: 2322: 2305: 2304: 2302: 2301: 2296: 2295: 2294: 2284: 2278: 2276: 2270: 2269: 2267: 2266: 2261: 2256: 2251: 2246: 2241: 2236: 2231: 2229:Target-centric 2226: 2220: 2218: 2212: 2211: 2208: 2207: 2205: 2204: 2199: 2194: 2189: 2184: 2178: 2176: 2172: 2171: 2169: 2168: 2158: 2153: 2151:Radiofrequency 2148: 2143: 2138: 2133: 2127: 2125: 2117: 2116: 2114: 2113: 2108: 2103: 2098: 2093: 2088: 2082: 2080: 2074: 2073: 2070: 2069: 2067: 2066: 2061: 2056: 2051: 2046: 2041: 2036: 2031: 2026: 2021: 2016: 2007: 2002: 1997: 1992: 1987: 1982: 1981: 1980: 1970: 1965: 1964: 1963: 1958: 1947: 1945: 1939: 1938: 1936: 1935: 1930: 1925: 1920: 1915: 1909: 1907: 1901: 1900: 1898: 1897: 1896: 1895: 1884: 1878: 1876:Human (HUMINT) 1869: 1863: 1862: 1855: 1854: 1847: 1840: 1832: 1823: 1822: 1820: 1819: 1814: 1813: 1812: 1807: 1797: 1792: 1787: 1782: 1777: 1772: 1767: 1762: 1761: 1760: 1755: 1745: 1740: 1735: 1734: 1733: 1728: 1718: 1717: 1716: 1711: 1701: 1696: 1691: 1690: 1689: 1678: 1676: 1672: 1671: 1669: 1668: 1663: 1658: 1652: 1650: 1641: 1640: 1638: 1637: 1632: 1631: 1630: 1620: 1615: 1610: 1605: 1600: 1595: 1590: 1585: 1580: 1575: 1570: 1565: 1559: 1557: 1556:communications 1551: 1550: 1548: 1547: 1546: 1545: 1534: 1532: 1528: 1527: 1525: 1524: 1519: 1514: 1509: 1504: 1499: 1494: 1493: 1492: 1482: 1475: 1473:Agent handling 1469: 1467: 1465: 1464: 1459: 1453: 1450: 1449: 1442: 1441: 1434: 1427: 1419: 1411: 1410: 1384: 1358: 1345:SSS Research, 1337: 1321: 1296: 1272: 1245: 1224: 1188: 1168: 1148: 1139: 1120: 1101: 1062: 1047: 1013: 987: 968: 962:978-0804793360 961: 942: 904: 889: 883: 875:10.17226/12854 855: 812: 811: 809: 806: 804: 803: 798: 793: 788: 783: 778: 773: 767: 765: 762: 761: 760: 753: 746: 743: 740: 727: 726: 641: 639: 632: 626: 623: 595: 592: 582: 579: 567: 566: 563: 560: 557: 554: 547:Tim van Gelder 508: 507: 504: 501: 498: 495: 487: 484: 483: 482: 475: 468: 460: 457: 456: 455: 451: 440: 436: 433: 426: 423: 420:Cognitive bias 403: 400: 372:uncertain data 335: 334: 332: 331: 324: 317: 309: 306: 305: 304: 303: 301:Wicked problem 298: 293: 288: 283: 278: 273: 268: 263: 258: 253: 245: 244: 240: 239: 238: 237: 232: 230:Tree structure 227: 222: 217: 212: 207: 202: 197: 192: 187: 182: 177: 172: 167: 162: 157: 152: 147: 142: 137: 132: 127: 122: 117: 109: 108: 104: 103: 102: 101: 96: 91: 86: 81: 76: 71: 66: 61: 56: 51: 46: 38: 37: 33: 32: 28: 27: 15: 9: 6: 4: 3: 2: 2342: 2331: 2328: 2326: 2323: 2321: 2318: 2317: 2315: 2300: 2297: 2293: 2292:organizations 2290: 2289: 2288: 2285: 2283: 2280: 2279: 2277: 2275: 2274:Dissemination 2271: 2265: 2262: 2260: 2257: 2255: 2252: 2250: 2247: 2245: 2242: 2240: 2237: 2235: 2232: 2230: 2227: 2225: 2222: 2221: 2219: 2217: 2213: 2203: 2200: 2198: 2195: 2193: 2190: 2188: 2185: 2183: 2180: 2179: 2177: 2173: 2166: 2162: 2159: 2157: 2154: 2152: 2149: 2147: 2144: 2142: 2139: 2137: 2134: 2132: 2129: 2128: 2126: 2124: 2118: 2112: 2109: 2107: 2104: 2102: 2099: 2097: 2094: 2092: 2089: 2087: 2084: 2083: 2081: 2079: 2075: 2065: 2062: 2060: 2059:Steganography 2057: 2055: 2052: 2050: 2047: 2045: 2042: 2040: 2039:Interrogation 2037: 2035: 2032: 2030: 2027: 2025: 2024:Eavesdropping 2022: 2020: 2017: 2015: 2011: 2008: 2006: 2003: 2001: 1998: 1996: 1993: 1991: 1988: 1986: 1983: 1979: 1976: 1975: 1974: 1971: 1969: 1966: 1962: 1959: 1957: 1954: 1953: 1952: 1949: 1948: 1946: 1944: 1940: 1934: 1931: 1929: 1928:Direct action 1926: 1924: 1923:Covert action 1921: 1919: 1916: 1914: 1911: 1910: 1908: 1906: 1902: 1894: 1893:organizations 1891: 1890: 1889: 1886: 1885: 1882: 1879: 1877: 1873: 1870: 1868: 1864: 1860: 1853: 1848: 1846: 1841: 1839: 1834: 1833: 1830: 1818: 1815: 1811: 1808: 1806: 1803: 1802: 1801: 1798: 1796: 1793: 1791: 1788: 1786: 1783: 1781: 1778: 1776: 1773: 1771: 1768: 1766: 1763: 1759: 1756: 1754: 1753:interrogation 1751: 1750: 1749: 1746: 1744: 1741: 1739: 1736: 1732: 1729: 1727: 1724: 1723: 1722: 1721:Eavesdropping 1719: 1715: 1712: 1710: 1707: 1706: 1705: 1702: 1700: 1697: 1695: 1692: 1688: 1685: 1684: 1683: 1680: 1679: 1677: 1673: 1667: 1664: 1662: 1659: 1657: 1654: 1653: 1651: 1646: 1642: 1636: 1633: 1629: 1626: 1625: 1624: 1623:Steganography 1621: 1619: 1616: 1614: 1611: 1609: 1606: 1604: 1601: 1599: 1598:Invisible ink 1596: 1594: 1591: 1589: 1586: 1584: 1581: 1579: 1576: 1574: 1571: 1569: 1566: 1564: 1561: 1560: 1558: 1552: 1544: 1541: 1540: 1539: 1536: 1535: 1533: 1529: 1523: 1520: 1518: 1517:Sleeper agent 1515: 1513: 1510: 1508: 1505: 1503: 1500: 1498: 1495: 1491: 1488: 1487: 1486: 1483: 1481: 1480: 1476: 1474: 1471: 1470: 1468: 1463: 1460: 1458: 1455: 1454: 1451: 1447: 1440: 1435: 1433: 1428: 1426: 1421: 1420: 1417: 1401: 1400: 1395: 1388: 1375: 1374: 1369: 1362: 1354: 1350: 1349: 1341: 1334: 1333: 1325: 1311:on 2009-08-17 1310: 1306: 1300: 1286: 1282: 1276: 1263:on 2008-03-18 1262: 1258: 1257: 1249: 1241: 1237: 1236: 1228: 1215:on 2008-08-07 1211: 1204: 1203: 1195: 1193: 1181: 1180: 1172: 1161: 1160: 1152: 1143: 1133: 1132: 1124: 1116: 1112: 1105: 1092:on 2007-09-28 1088: 1084: 1080: 1073: 1066: 1058: 1054: 1050: 1048:9780190463908 1044: 1040: 1036: 1032: 1028: 1024: 1017: 1002: 998: 991: 983: 979: 972: 964: 958: 954: 946: 932:on 2008-08-07 928: 924: 917: 916: 908: 900: 893: 886: 880: 876: 872: 868: 867: 859: 851: 847: 843: 842: 834: 832: 830: 828: 826: 824: 822: 820: 818: 813: 802: 799: 797: 794: 792: 789: 787: 784: 782: 779: 777: 774: 772: 769: 768: 758: 754: 751: 747: 744: 741: 738: 734: 733: 732: 723: 720: 712: 709:December 2020 701: 698: 694: 691: 687: 684: 680: 677: 673: 670: â€“  669: 665: 664:Find sources: 658: 652: 651: 647: 642:This section 640: 636: 631: 630: 622: 620: 615: 613: 608: 606: 601: 591: 587: 578: 576: 572: 564: 561: 558: 555: 552: 551: 550: 548: 545: 540: 538: 532: 530: 525: 521: 517: 513: 505: 502: 499: 496: 493: 492: 491: 480: 476: 473: 469: 466: 465: 464: 452: 449: 445: 441: 437: 434: 431: 427: 424: 421: 417: 413: 412: 411: 409: 399: 397: 393: 389: 385: 384:visualization 381: 377: 373: 369: 364: 362: 358: 354: 350: 346: 342: 330: 325: 323: 318: 316: 311: 310: 308: 307: 302: 299: 297: 294: 292: 289: 287: 284: 282: 279: 277: 274: 272: 269: 267: 264: 262: 259: 257: 254: 252: 249: 248: 247: 246: 242: 241: 236: 233: 231: 228: 226: 223: 221: 218: 216: 213: 211: 208: 206: 203: 201: 198: 196: 193: 191: 188: 186: 183: 181: 178: 176: 173: 171: 168: 166: 163: 161: 158: 156: 155:Graph drawing 153: 151: 148: 146: 145:Decision tree 143: 141: 138: 136: 133: 131: 128: 126: 125:Cognitive map 123: 121: 118: 116: 113: 112: 111: 110: 106: 105: 100: 97: 95: 92: 90: 87: 85: 82: 80: 77: 75: 72: 70: 67: 65: 62: 60: 57: 55: 52: 50: 47: 45: 42: 41: 40: 39: 35: 34: 30: 29: 25: 21: 20: 2223: 2064:Surveillance 2054:Resident spy 1995:Cryptography 1800:Surveillance 1588:Cyber spying 1573:Cryptography 1542: 1512:Resident spy 1497:Double agent 1477: 1403:, retrieved 1397: 1387: 1377:, retrieved 1371: 1361: 1353:the original 1347: 1340: 1331: 1324: 1313:. Retrieved 1309:the original 1299: 1288:. Retrieved 1284: 1275: 1265:, retrieved 1261:the original 1255: 1248: 1240:the original 1234: 1227: 1217:, retrieved 1210:the original 1201: 1178: 1171: 1158: 1151: 1142: 1130: 1123: 1110: 1104: 1094:, retrieved 1087:the original 1082: 1078: 1065: 1022: 1016: 1006:30 September 1004:. Retrieved 1000: 990: 981: 971: 952: 945: 934:, retrieved 927:the original 914: 907: 898: 892: 865: 858: 850:the original 840: 730: 715: 706: 696: 689: 682: 675: 663: 643: 616: 609: 605:graph theory 597: 588: 584: 573:(similar to 570: 568: 541: 533: 509: 489: 462: 450:and drivers. 407: 405: 365: 344: 340: 338: 291:Semantic Web 115:Argument map 74:Mental model 59:Infographics 2136:Geophysical 1918:Cell system 1905:Clandestine 1790:Stay-behind 1699:Recruitment 1656:Canary trap 1554:Devices and 1502:Field agent 796:Sensemaking 750:open-source 479:backtracked 388:probability 376:data mining 349:methodology 296:Treemapping 205:Radial tree 135:Concept map 2330:Hypotheses 2314:Categories 2165:earthquake 2029:False flag 1867:Collection 1785:Sexpionage 1765:COINTELPRO 1758:safe house 1738:False flag 1675:Operations 1649:techniques 1645:Tradecraft 1405:2020-12-28 1379:2020-12-27 1315:2020-12-28 1290:2020-12-28 1267:2008-03-13 1219:2008-05-01 1096:2008-05-01 1029:. p.  982:AIPIO News 936:2008-05-01 679:newspapers 646:references 612:automation 486:Weaknesses 416:brainstorm 392:statistics 175:Issue tree 150:Dendrogram 120:Cladistics 2320:Cognition 2156:Materials 2010:Defection 2005:Dead drop 1978:black bag 1943:Espionage 1709:black bag 1593:Dead drop 1522:Spymaster 1446:Espionage 1057:940455195 459:Strengths 454:analyses. 448:linchpins 225:Topic map 215:Sociogram 170:Issue map 165:Hypertext 2216:Analysis 2014:Turncoat 1961:handling 1775:SHAMROCK 1628:microdot 1531:Analysis 764:See also 625:Software 243:See also 220:Timeline 185:Mind map 2163: ( 2141:Nuclear 2111:TEMPEST 1770:MINARET 1714:wetwork 693:scholar 512:deceive 402:Process 394:, etc. 347:) is a 2000:Cutout 1951:Agents 1805:Global 1731:MASINT 1726:SIGINT 1578:Cutout 1462:Assets 1457:Agents 1399:GitHub 1373:GitHub 1055:  1045:  959:  881:  695:  688:  681:  674:  666:  430:matrix 235:ZigZag 2175:Other 2146:Radar 1990:Cover 1968:Asset 1956:field 1490:Agent 1485:Cover 1213:(PDF) 1206:(PDF) 1183:(PDF) 1163:(PDF) 1135:(PDF) 1090:(PDF) 1075:(PDF) 930:(PDF) 919:(PDF) 808:Notes 757:Excel 700:JSTOR 686:books 1810:Mass 1780:FVEY 1507:Mole 1053:OCLC 1043:ISBN 1008:2018 957:ISBN 879:ISBN 672:news 522:and 390:and 382:and 339:The 276:Olog 1647:and 1035:doi 1031:113 871:doi 648:to 345:ACH 2316:: 2012:/ 1396:, 1370:, 1283:. 1191:^ 1113:, 1081:, 1077:, 1051:. 1041:. 1033:. 999:. 980:, 921:, 877:, 816:^ 659:. 607:. 531:. 386:, 378:, 2167:) 1851:e 1844:t 1837:v 1438:e 1431:t 1424:v 1318:. 1293:. 1083:9 1059:. 1037:: 1010:. 965:. 873:: 722:) 716:( 711:) 707:( 697:· 690:· 683:· 676:· 653:. 343:( 328:e 321:t 314:v

Index

detail of a Tree of Knowledge after Diderot & d'Alembert's Encyclopédie, by Chrétien Frédéric Guillaume Roth
Business decision mapping
Data visualization
Graphic communication
Infographics
Information design
Knowledge visualization
Mental model
Morphological analysis
Ontology (information science)
Schema (psychology)
Visual analytics
Visual language
Argument map
Cladistics
Cognitive map
Concept lattice
Concept map
Conceptual graph
Decision tree
Dendrogram
Graph drawing
Hyperbolic tree
Hypertext
Issue map
Issue tree
Layered graph drawing
Mind map
Object-role modeling
Organizational chart

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑