24:
432:, the analyst applies evidence against each hypothesis in an attempt to disprove as many theories as possible. Some evidence will have greater "diagnosticity" than other evidence—that is, some will be more helpful in judging the relative likelihood of alternative hypotheses. This step is the most important, according to Heuer. Instead of looking at one hypothesis and all the evidence ("working down" the matrix), the analyst is encouraged to consider one piece of evidence at a time, and examine it against all possible hypotheses ("working across" the matrix).
635:
23:
534:
According to social constructivist critics, ACH also fails to stress sufficiently (or to address as a method) the problematic nature of the initial formation of the hypotheses used to create its grid. There is considerable evidence, for example, that in addition to any bureaucratic, psychological, or
589:
For example, two tested hypotheses could be that Iraq has WMD or Iraq does not have WMD. If the evidence showed that it is more likely there are WMDs in Iraq then two new hypotheses could be formulated: WMD are in
Baghdad or WMD are in Mosul. Or perhaps, the analyst may need to know what type of WMD
526:
analysis is employed to isolate assumptions implicit in the evaluation of paths in, or conclusions of, particular hypotheses. As evidence in the form of observations of states or assumptions is observed, they can become the subject of separate validation. Should an assumption or necessary state be
438:
Inconsistency – The analyst then seeks to draw tentative conclusions about the relative likelihood of each hypothesis. Less consistency implies a lower likelihood. The least consistent hypotheses are eliminated. While the matrix generates a definitive mathematical total for each hypothesis, the
453:
Conclusions and evaluation – Finally, the analyst provides the decisionmaker with his or her conclusions, as well as a summary of alternatives that were considered and why they were rejected. The analyst also identifies milestones in the process that can serve as indicators in future
446:, which weighs how the conclusion would be affected if key evidence or arguments were wrong, misleading, or subject to different interpretations. The validity of key evidence and the consistency of important arguments are double-checked to assure the soundness of the conclusion's
602:
to ACH. A generalization of this concept to a distributed community of analysts lead to the development of CACHE (the
Collaborative ACH Environment), which introduced the concept of a Bayes (or Bayesian) community. The work by Akram and Wang applies paradigms from
359:, in the 1970s for use by the Agency. ACH is used by analysts in various fields who make judgments that entail a high risk of error in reasoning. ACH aims to help an analyst overcome, or at least minimize, some of the cognitive limitations that make prescient
585:
The structured analysis of competing hypotheses offers analysts an improvement over the limitations of the original ACH. The SACH maximizes the possible hypotheses by allowing the analyst to split one hypothesis into two complex ones.
535:
political biases that may affect hypothesis generation, there are also factors of culture and identity at work. These socially constructed factors may restrict or pre-screen which hypotheses end up being considered, and then reinforce
839:
621:, a formal mathematical methodology that explicitly deals with uncertainty. This methodology forms the basis of the Sheba technology that is used in Veriluma's intelligence assessment software.
590:
Iraq has; the new hypotheses could be that Iraq has biological WMD, Iraq has chemical WMD and Iraq has nuclear WMD. By giving the ACH structure, the analyst is able to give a nuanced estimate.
556:
ACH misconceives the nature of the relationship between items of evidence and hypotheses by supposing that items of evidence are, on their own, consistent or inconsistent with hypotheses.
849:
1146:
Shrager, J., et al. (2009) Soccer science and the Bayes community: Exploring the cognitive implications of modern scientific communication. Topics in
Cognitive Science, 2(1), 53–72.
510:
Especially in intelligence, both governmental and business, analysts must always be aware that the opponent(s) is intelligent and may be generating information intended to
435:
Refinement – The analyst reviews the findings, identifies any gaps, and collects any additional evidence needed to refute as many of the remaining hypotheses as possible.
1071:
745:
DECIDE was developed by the analytic research firm SSS Research, Inc. DECIDE not only allows analysts to manipulate ACH, but it provides multiple visualization products.
610:
Other work focuses less on probabilistic methods and more on cognitive and visualization extensions to ACH, as discussed by Madsen and Hicks. DECIDE, discussed under
2085:
731:
A few online and downloadable software tools help automate the ACH process. These programs leave a visual trail of evidence and allow the analyst to weigh evidence.
2298:
1200:
1849:
913:
739:(PARC) in collaboration with Richards J. Heuer, Jr. It is a standard ACH program that allows analysts to enter evidence and rate its credibility and relevance.
1114:
2095:
414:
Hypothesis – The first step of the process is to identify all potential hypotheses, preferably using a group of analysts with different perspectives to
656:
649:
559:
ACH treats the hypothesis set as "flat", i.e. a mere list, and so is unable to relate evidence to hypotheses at the appropriate levels of abstraction
553:
ACH demands that the analyst makes too many discrete judgments, a great many of which contribute little if anything to discerning the best hypothesis
699:
439:
analyst must use their judgment to make the final conclusion. The result of the ACH analysis itself must not overrule analysts' own judgments.
671:
2228:
1892:
1128:
Valtorta, Marco; et al. (May 2005), "Extending Heuer's
Analysis of Competing Hypotheses Method to Support Complex Decision Analysis",
1875:
1842:
1747:
678:
425:
Evidence – The analyst then lists evidence and arguments (including assumptions and logical deductions) for and against each hypothesis.
1304:
418:
the possibilities. The process discourages the analyst from choosing one "likely" hypothesis and using evidence to prove its accuracy.
270:
2291:
1932:
759:
sheet that implements the scoring and weighting methodology of ACH, more specifically the weighted inconsistency counting algorithm.
78:
685:
514:. Since deception often is the result of a cognitive trap, Elsaesser and Stech use state-based hierarchical plan recognition (see
2120:
2090:
1835:
1730:
1686:
1086:
2273:
1254:
882:
667:
1156:
Akram, Shaikh
Muhammad; Wang, Jiaxin (23 August 2006), "Investigative Data Mining: Connecting the dots to disconnect them",
1922:
1681:
780:
996:
1436:
790:
374:
remains the goal of researchers, tool-builders, and analysts in industry, academia and government. Their domains include
1866:
1209:
960:
326:
48:
1176:
Madsen, Fredrik H.; Hicks, David L. (23 August 2006), "Investigating the
Cognitive Effects of Externalization Tools",
926:
897:
Elsaesser, Christopher; Stech, Frank J. (2007), "Detecting
Deception", in Kott, Alexander; McEneaney, William (eds.),
1582:
1346:
1046:
718:
383:
1233:
2215:
1617:
1330:
481:. This allows the decisionmaker or other analysts to see the sequence of rules and data that led to the conclusion.
2233:
367:
2324:
2164:
1989:
1904:
1484:
447:
169:
83:
977:
692:
1858:
260:
2281:
845:
562:
ACH cannot represent subordinate argumentation, i.e. the argumentation bearing up on a piece of evidence.
370:, but it was first described in relatively informal terms. Producing the best available information from
356:
285:
518:) to generate causal explanations of observations. The resulting hypotheses are converted to a dynamic
736:
43:
2196:
1927:
1038:
2248:
2238:
2186:
1917:
1567:
1537:
1429:
1026:
645:
68:
500:
It can be cumbersome for an analyst to manage a large database with multiple pieces of evidence.
2263:
2201:
2181:
2130:
1887:
319:
255:
1030:
2150:
1816:
1367:
477:
Since the ACH requires the analyst to construct a matrix, the evidence and hypotheses can be
360:
179:
53:
1308:
2253:
2191:
2077:
2033:
2018:
1967:
1912:
1742:
1725:
1698:
1461:
543:
523:
443:
429:
379:
194:
189:
1072:"Structured Analysis of Competing Hypotheses: Improving a Tested Intelligence Methodology"
8:
2329:
2286:
2160:
1977:
1950:
1804:
1708:
1456:
749:
528:
515:
395:
88:
2319:
2258:
2243:
2135:
2110:
2048:
1999:
1984:
1693:
1660:
1634:
1612:
1607:
1577:
1562:
1422:
800:
199:
63:
866:
Field
Evaluation in the Intelligence and Counterintelligence Context: Workshop Summary
2100:
1809:
1478:
1393:
1052:
1042:
956:
922:
878:
770:
599:
536:
506:
The evidence used in the matrix is static and therefore it can be a snapshot in time.
312:
234:
351:
for evaluating multiple competing hypotheses for observed data. It was developed by
2155:
2105:
1774:
1506:
1034:
870:
618:
519:
265:
250:
209:
139:
93:
1260:
2043:
1972:
1794:
1769:
1703:
1665:
1602:
1252:
785:
775:
159:
129:
98:
1177:
1157:
2140:
1960:
1472:
1280:
1129:
546:
471:
419:
371:
352:
300:
229:
899:
Adversarial
Reasoning: Computational Approaches to Reading the Opponent's Mind
2313:
2058:
2038:
2023:
1752:
1720:
1622:
1597:
1516:
1056:
940:
MITRE Sponsored
Research Project 51MSR111, Counter-Deception Decision Support
474:, though there is a lack of strong empirical evidence to support this belief.
415:
154:
144:
124:
953:
Constructing Cassandra, Reframing Intelligence Failure at the CIA, 1947-2001
2145:
2063:
2053:
1994:
1799:
1587:
1572:
1511:
1496:
1489:
604:
574:
478:
290:
114:
73:
1827:
1352:
1199:
Cluxton, Diane; Eick, Stephen G., "DECIDE Hypothesis Visualization Tool",
565:
ACH activities at realistic scales leave analysts disoriented or confused.
1955:
1789:
1655:
1501:
1239:
795:
387:
375:
348:
295:
204:
134:
58:
864:
598:
One method, by Valtorta and colleagues uses probabilistic methods, adds
2028:
1784:
1764:
1757:
1737:
1644:
1238:, Queensland University, Brisbane, Australia, ADA463908, archived from
391:
174:
149:
119:
838:
Heuer, Richards J. Jr, "Chapter 8: Analysis of Competing Hypotheses",
2009:
2004:
1942:
1779:
1592:
1521:
1445:
511:
224:
214:
164:
634:
527:
negated, hypotheses depending on it are rejected. This is a form of
2013:
1627:
1131:
International Conference on Intelligence Analysis Methods and Tools
1111:
Structured Analysis Of Competing Hypotheses: Theory and Application
874:
497:
The ACH matrix can be problematic when analyzing a complex project.
280:
219:
184:
406:
Heuer outlines the ACH process in considerable depth in his book,
1713:
1235:
Analysis of Competing Hypotheses using Subjective Logic (ACH-SL)
984:(55), Australian Institute of Professional Intelligence Officers
1398:
1372:
1256:
ACH2.0.3 Download Page: Analysis of Competing Hypotheses (ACH)
580:
756:
1414:
742:
Decision Command software was developed by Willard Zangwill.
1070:
Wheaton, Kristan J., et al. (November–December 2006),
863:
Thomason, Neil (2010), "Alternative Competing Hypotheses",
275:
1332:
SSS Research, Inc. – DECIDE, VAST 2006 Contest Submission
422:
is minimized when all possible hypotheses are considered.
2299:
Counterintelligence and counter-terrorism organizations
1253:
Xerox Palo Alto Research Center and Richards J. Heuer,
915:
Deception Detection by Analysis of Competing Hypotheses
442:
Sensitivity – The analyst tests the conclusions using
1115:
Mercyhurst College Institute for Intelligence Studies
503:
Evidence also presents a problem if it is unreliable.
997:"Exploring new directions for intelligence analysis"
1179:
Proceedings of the 2006 Intelligence Tools Workshop
1159:
Proceedings of the 2006 Intelligence Tools Workshop
1328:
1069:
951:Jones, Milo L. and; Silberzahn, Philippe (2013).
2311:
593:
398:is an earlier concept with similarities to ACH.
1329:Lankenau, Russell A., et al. (July 2006),
1127:
950:
494:The process to create an ACH is time-consuming.
1338:
1194:
1192:
896:
1843:
1430:
1108:
1023:Strategic Thinking in Complex Problem Solving
748:Analysis of Competing Hypotheses (ACH) is an
320:
969:
1857:
1322:
1189:
1175:
856:
581:Structured analysis of competing hypotheses
490:Weaknesses of doing an ACH matrix include:
1850:
1836:
1437:
1423:
1231:
1169:
1063:
1020:
994:
975:
911:
901:, Chapman & Hall/CRC, pp. 101–124
463:Some benefits of doing an ACH matrix are:
327:
313:
271:List of concept- and mind-mapping software
16:Process to evaluate alternative hypotheses
1368:"Burton/Analysis-of-Competing-Hypotheses"
1155:
1149:
1039:10.1093/acprof:oso/9780190463908.001.0001
912:Stech, Frank J.; Elsaesser, Christopher,
719:Learn how and when to remove this message
1391:
1344:
1246:
1232:Pope, Simon; Josang, Audun (June 2005),
1225:
1121:
890:
862:
844:, Center for the Study of Intelligence,
2264:Scientific & Technical intelligence
1202:2005 Intl conf on Intelligence Analysis
1198:
470:It is widely believed to help overcome
2312:
1687:Chinese espionage in the United States
1365:
655:Please improve this section by adding
410:. It consists of the following steps:
1831:
1418:
1109:Chido, Diane E., et al. (2006),
833:
831:
829:
827:
825:
823:
821:
819:
817:
2086:By alliances, nations and industries
1682:Chinese intelligence activity abroad
995:van Gelder, Tim (11 December 2012).
905:
781:Intelligence (information gathering)
628:
1748:Interpersonal (HUMINT) intelligence
1305:"Quantinus | Alignment | Execution"
841:Psychology of Intelligence Analysis
791:Multiple-criteria decision analysis
549:has made the following criticisms:
408:Psychology of Intelligence Analysis
13:
1348:DECIDE: from Complexity to Clarity
814:
668:"Analysis of competing hypotheses"
14:
2341:
1583:Computer and network surveillance
1394:"pstirparo/threatintel-resources"
1392:Stirparo, Pasquale (2020-12-10),
1079:Competitive Intelligence Magazine
976:van Gelder, Tim (December 2008),
837:
368:intelligence analysis methodology
1618:Short-range agent communications
633:
341:analysis of competing hypotheses
22:
2234:Words of estimative probability
2096:Operational platforms by nation
1385:
1359:
1297:
1273:
1140:
1102:
611:
1366:Burton, Matthew (2020-12-11),
1014:
988:
943:
735:PARC ACH 2.0 was developed by
84:Ontology (information science)
1:
1444:
955:. Stanford University Press.
657:secondary or tertiary sources
617:Work by Pope and Jøsang uses
594:Other approaches to formalism
485:
353:Richards (Dick) J. Heuer, Jr.
1307:. 2009-08-17. Archived from
978:"Can we do better than ACH?"
869:, National Academies Press,
577:) as an alternative to ACH.
458:
7:
2282:Intelligence cycle security
1021:Chevallier, Arnaud (2016).
846:Central Intelligence Agency
763:
624:
614:is visualization-oriented.
357:Central Intelligence Agency
355:, a 45-year veteran of the
286:Problem structuring methods
10:
2346:
1285:ach1.software.informer.com
1085:(6): 12–15, archived from
401:
366:ACH was a step forward in
2272:
2214:
2174:
2119:
2076:
1941:
1903:
1883:
1874:
1865:
1674:
1643:
1553:
1530:
1452:
737:Palo Alto Research Center
363:so difficult to achieve.
261:Entity–relationship model
44:Business decision mapping
807:
2249:Intelligence assessment
2239:All-source intelligence
1859:Intelligence management
1568:Covert listening device
1538:Intelligence assessment
1027:Oxford University Press
69:Knowledge visualization
1933:Operational techniques
1888:Special reconnaissance
1281:"Download ACH by PARC"
949:Chapters one to four,
644:relies excessively on
544:argumentation theorist
428:Diagnostics – Using a
256:Diagrammatic reasoning
79:Morphological analysis
2325:Intelligence analysis
1817:Targeted surveillance
361:intelligence analysis
281:Ontology (philosophy)
180:Layered graph drawing
54:Graphic communication
2254:Medical intelligence
2224:Competing hypotheses
2034:Industrial espionage
2019:Denial and deception
1743:Industrial espionage
1543:competing hypotheses
1025:. Oxford; New York:
569:Van Gelder proposed
524:value of information
444:sensitivity analysis
380:cognitive psychology
195:Organizational chart
190:Object-role modeling
107:Node–link approaches
2287:Counterintelligence
2202:Technical (TECHINT)
2197:Open-source (OSINT)
2187:Geospatial (GEOINT)
2161:Casualty estimation
755:ACH Template is an
752:ACH implementation.
539:in those selected.
529:root cause analysis
516:abductive reasoning
396:Abductive reasoning
89:Schema (psychology)
31:Information mapping
2259:Military geography
2244:Basic intelligence
2182:Financial (FININT)
2123:signature (MASINT)
2049:One-way voice link
1985:Concealment device
1694:Cold War espionage
1661:Front organization
1635:Surveillance tools
1613:Phone surveillance
1608:One-way voice link
1563:Concealment device
801:Working hypothesis
571:hypothesis mapping
200:Pathfinder network
64:Information design
49:Data visualization
2307:
2306:
2210:
2209:
2101:Direction finding
2091:In modern history
2072:
2071:
1825:
1824:
1479:Agent provocateur
1355:on March 28, 2007
1117:Press, p. 54
923:MITRE Corporation
884:978-0-309-15016-3
771:Decision analysis
729:
728:
721:
703:
600:Bayesian analysis
537:confirmation bias
337:
336:
36:Topics and fields
2337:
2106:Traffic analysis
2078:Signals (SIGINT)
1913:Asset recruiting
1881:
1880:
1872:
1871:
1852:
1845:
1838:
1829:
1828:
1439:
1432:
1425:
1416:
1415:
1409:
1408:
1407:
1406:
1389:
1383:
1382:
1381:
1380:
1363:
1357:
1356:
1351:, archived from
1342:
1336:
1335:
1326:
1320:
1319:
1317:
1316:
1301:
1295:
1294:
1292:
1291:
1277:
1271:
1270:
1269:
1268:
1259:, archived from
1250:
1244:
1243:
1242:on April 8, 2013
1229:
1223:
1222:
1221:
1220:
1214:
1208:, archived from
1207:
1196:
1187:
1186:
1184:
1173:
1167:
1166:
1165:, pp. 28–34
1164:
1153:
1147:
1144:
1138:
1137:
1136:
1125:
1119:
1118:
1106:
1100:
1099:
1098:
1097:
1091:
1076:
1067:
1061:
1060:
1018:
1012:
1011:
1009:
1007:
1001:timvangelder.com
992:
986:
985:
973:
967:
966:
947:
941:
939:
938:
937:
931:
925:, archived from
920:
909:
903:
902:
894:
888:
887:
860:
854:
853:
852:on June 13, 2007
848:, archived from
835:
724:
717:
713:
710:
704:
702:
661:
637:
629:
619:subjective logic
575:argument mapping
542:Philosopher and
520:Bayesian network
472:cognitive biases
467:It is auditable.
329:
322:
315:
266:Geovisualization
251:Design rationale
210:Semantic network
140:Conceptual graph
94:Visual analytics
26:
19:
18:
2345:
2344:
2340:
2339:
2338:
2336:
2335:
2334:
2310:
2309:
2308:
2303:
2268:
2206:
2192:Imagery (IMINT)
2170:
2131:Electro-optical
2122:
2121:Measurement and
2115:
2068:
2044:Numbers station
1973:Black operation
1937:
1899:
1861:
1856:
1826:
1821:
1795:Sting operation
1704:Black operation
1670:
1666:Limited hangout
1648:
1639:
1603:Numbers station
1555:
1549:
1526:
1466:
1448:
1443:
1413:
1412:
1404:
1402:
1390:
1386:
1378:
1376:
1364:
1360:
1343:
1339:
1327:
1323:
1314:
1312:
1303:
1302:
1298:
1289:
1287:
1279:
1278:
1274:
1266:
1264:
1251:
1247:
1230:
1226:
1218:
1216:
1212:
1205:
1197:
1190:
1185:, pp. 4–11
1182:
1174:
1170:
1162:
1154:
1150:
1145:
1141:
1134:
1126:
1122:
1107:
1103:
1095:
1093:
1089:
1074:
1068:
1064:
1049:
1019:
1015:
1005:
1003:
993:
989:
974:
970:
963:
948:
944:
935:
933:
929:
918:
910:
906:
895:
891:
885:
861:
857:
836:
815:
810:
805:
786:Model selection
776:Decision matrix
766:
725:
714:
708:
705:
662:
660:
654:
650:primary sources
638:
627:
596:
583:
488:
461:
404:
333:
160:Hyperbolic tree
130:Concept lattice
99:Visual language
17:
12:
11:
5:
2343:
2333:
2332:
2327:
2322:
2305:
2304:
2302:
2301:
2296:
2295:
2294:
2284:
2278:
2276:
2270:
2269:
2267:
2266:
2261:
2256:
2251:
2246:
2241:
2236:
2231:
2229:Target-centric
2226:
2220:
2218:
2212:
2211:
2208:
2207:
2205:
2204:
2199:
2194:
2189:
2184:
2178:
2176:
2172:
2171:
2169:
2168:
2158:
2153:
2151:Radiofrequency
2148:
2143:
2138:
2133:
2127:
2125:
2117:
2116:
2114:
2113:
2108:
2103:
2098:
2093:
2088:
2082:
2080:
2074:
2073:
2070:
2069:
2067:
2066:
2061:
2056:
2051:
2046:
2041:
2036:
2031:
2026:
2021:
2016:
2007:
2002:
1997:
1992:
1987:
1982:
1981:
1980:
1970:
1965:
1964:
1963:
1958:
1947:
1945:
1939:
1938:
1936:
1935:
1930:
1925:
1920:
1915:
1909:
1907:
1901:
1900:
1898:
1897:
1896:
1895:
1884:
1878:
1876:Human (HUMINT)
1869:
1863:
1862:
1855:
1854:
1847:
1840:
1832:
1823:
1822:
1820:
1819:
1814:
1813:
1812:
1807:
1797:
1792:
1787:
1782:
1777:
1772:
1767:
1762:
1761:
1760:
1755:
1745:
1740:
1735:
1734:
1733:
1728:
1718:
1717:
1716:
1711:
1701:
1696:
1691:
1690:
1689:
1678:
1676:
1672:
1671:
1669:
1668:
1663:
1658:
1652:
1650:
1641:
1640:
1638:
1637:
1632:
1631:
1630:
1620:
1615:
1610:
1605:
1600:
1595:
1590:
1585:
1580:
1575:
1570:
1565:
1559:
1557:
1556:communications
1551:
1550:
1548:
1547:
1546:
1545:
1534:
1532:
1528:
1527:
1525:
1524:
1519:
1514:
1509:
1504:
1499:
1494:
1493:
1492:
1482:
1475:
1473:Agent handling
1469:
1467:
1465:
1464:
1459:
1453:
1450:
1449:
1442:
1441:
1434:
1427:
1419:
1411:
1410:
1384:
1358:
1345:SSS Research,
1337:
1321:
1296:
1272:
1245:
1224:
1188:
1168:
1148:
1139:
1120:
1101:
1062:
1047:
1013:
987:
968:
962:978-0804793360
961:
942:
904:
889:
883:
875:10.17226/12854
855:
812:
811:
809:
806:
804:
803:
798:
793:
788:
783:
778:
773:
767:
765:
762:
761:
760:
753:
746:
743:
740:
727:
726:
641:
639:
632:
626:
623:
595:
592:
582:
579:
567:
566:
563:
560:
557:
554:
547:Tim van Gelder
508:
507:
504:
501:
498:
495:
487:
484:
483:
482:
475:
468:
460:
457:
456:
455:
451:
440:
436:
433:
426:
423:
420:Cognitive bias
403:
400:
372:uncertain data
335:
334:
332:
331:
324:
317:
309:
306:
305:
304:
303:
301:Wicked problem
298:
293:
288:
283:
278:
273:
268:
263:
258:
253:
245:
244:
240:
239:
238:
237:
232:
230:Tree structure
227:
222:
217:
212:
207:
202:
197:
192:
187:
182:
177:
172:
167:
162:
157:
152:
147:
142:
137:
132:
127:
122:
117:
109:
108:
104:
103:
102:
101:
96:
91:
86:
81:
76:
71:
66:
61:
56:
51:
46:
38:
37:
33:
32:
28:
27:
15:
9:
6:
4:
3:
2:
2342:
2331:
2328:
2326:
2323:
2321:
2318:
2317:
2315:
2300:
2297:
2293:
2292:organizations
2290:
2289:
2288:
2285:
2283:
2280:
2279:
2277:
2275:
2274:Dissemination
2271:
2265:
2262:
2260:
2257:
2255:
2252:
2250:
2247:
2245:
2242:
2240:
2237:
2235:
2232:
2230:
2227:
2225:
2222:
2221:
2219:
2217:
2213:
2203:
2200:
2198:
2195:
2193:
2190:
2188:
2185:
2183:
2180:
2179:
2177:
2173:
2166:
2162:
2159:
2157:
2154:
2152:
2149:
2147:
2144:
2142:
2139:
2137:
2134:
2132:
2129:
2128:
2126:
2124:
2118:
2112:
2109:
2107:
2104:
2102:
2099:
2097:
2094:
2092:
2089:
2087:
2084:
2083:
2081:
2079:
2075:
2065:
2062:
2060:
2059:Steganography
2057:
2055:
2052:
2050:
2047:
2045:
2042:
2040:
2039:Interrogation
2037:
2035:
2032:
2030:
2027:
2025:
2024:Eavesdropping
2022:
2020:
2017:
2015:
2011:
2008:
2006:
2003:
2001:
1998:
1996:
1993:
1991:
1988:
1986:
1983:
1979:
1976:
1975:
1974:
1971:
1969:
1966:
1962:
1959:
1957:
1954:
1953:
1952:
1949:
1948:
1946:
1944:
1940:
1934:
1931:
1929:
1928:Direct action
1926:
1924:
1923:Covert action
1921:
1919:
1916:
1914:
1911:
1910:
1908:
1906:
1902:
1894:
1893:organizations
1891:
1890:
1889:
1886:
1885:
1882:
1879:
1877:
1873:
1870:
1868:
1864:
1860:
1853:
1848:
1846:
1841:
1839:
1834:
1833:
1830:
1818:
1815:
1811:
1808:
1806:
1803:
1802:
1801:
1798:
1796:
1793:
1791:
1788:
1786:
1783:
1781:
1778:
1776:
1773:
1771:
1768:
1766:
1763:
1759:
1756:
1754:
1753:interrogation
1751:
1750:
1749:
1746:
1744:
1741:
1739:
1736:
1732:
1729:
1727:
1724:
1723:
1722:
1721:Eavesdropping
1719:
1715:
1712:
1710:
1707:
1706:
1705:
1702:
1700:
1697:
1695:
1692:
1688:
1685:
1684:
1683:
1680:
1679:
1677:
1673:
1667:
1664:
1662:
1659:
1657:
1654:
1653:
1651:
1646:
1642:
1636:
1633:
1629:
1626:
1625:
1624:
1623:Steganography
1621:
1619:
1616:
1614:
1611:
1609:
1606:
1604:
1601:
1599:
1598:Invisible ink
1596:
1594:
1591:
1589:
1586:
1584:
1581:
1579:
1576:
1574:
1571:
1569:
1566:
1564:
1561:
1560:
1558:
1552:
1544:
1541:
1540:
1539:
1536:
1535:
1533:
1529:
1523:
1520:
1518:
1517:Sleeper agent
1515:
1513:
1510:
1508:
1505:
1503:
1500:
1498:
1495:
1491:
1488:
1487:
1486:
1483:
1481:
1480:
1476:
1474:
1471:
1470:
1468:
1463:
1460:
1458:
1455:
1454:
1451:
1447:
1440:
1435:
1433:
1428:
1426:
1421:
1420:
1417:
1401:
1400:
1395:
1388:
1375:
1374:
1369:
1362:
1354:
1350:
1349:
1341:
1334:
1333:
1325:
1311:on 2009-08-17
1310:
1306:
1300:
1286:
1282:
1276:
1263:on 2008-03-18
1262:
1258:
1257:
1249:
1241:
1237:
1236:
1228:
1215:on 2008-08-07
1211:
1204:
1203:
1195:
1193:
1181:
1180:
1172:
1161:
1160:
1152:
1143:
1133:
1132:
1124:
1116:
1112:
1105:
1092:on 2007-09-28
1088:
1084:
1080:
1073:
1066:
1058:
1054:
1050:
1048:9780190463908
1044:
1040:
1036:
1032:
1028:
1024:
1017:
1002:
998:
991:
983:
979:
972:
964:
958:
954:
946:
932:on 2008-08-07
928:
924:
917:
916:
908:
900:
893:
886:
880:
876:
872:
868:
867:
859:
851:
847:
843:
842:
834:
832:
830:
828:
826:
824:
822:
820:
818:
813:
802:
799:
797:
794:
792:
789:
787:
784:
782:
779:
777:
774:
772:
769:
768:
758:
754:
751:
747:
744:
741:
738:
734:
733:
732:
723:
720:
712:
709:December 2020
701:
698:
694:
691:
687:
684:
680:
677:
673:
670: –
669:
665:
664:Find sources:
658:
652:
651:
647:
642:This section
640:
636:
631:
630:
622:
620:
615:
613:
608:
606:
601:
591:
587:
578:
576:
572:
564:
561:
558:
555:
552:
551:
550:
548:
545:
540:
538:
532:
530:
525:
521:
517:
513:
505:
502:
499:
496:
493:
492:
491:
480:
476:
473:
469:
466:
465:
464:
452:
449:
445:
441:
437:
434:
431:
427:
424:
421:
417:
413:
412:
411:
409:
399:
397:
393:
389:
385:
384:visualization
381:
377:
373:
369:
364:
362:
358:
354:
350:
346:
342:
330:
325:
323:
318:
316:
311:
310:
308:
307:
302:
299:
297:
294:
292:
289:
287:
284:
282:
279:
277:
274:
272:
269:
267:
264:
262:
259:
257:
254:
252:
249:
248:
247:
246:
242:
241:
236:
233:
231:
228:
226:
223:
221:
218:
216:
213:
211:
208:
206:
203:
201:
198:
196:
193:
191:
188:
186:
183:
181:
178:
176:
173:
171:
168:
166:
163:
161:
158:
156:
155:Graph drawing
153:
151:
148:
146:
145:Decision tree
143:
141:
138:
136:
133:
131:
128:
126:
125:Cognitive map
123:
121:
118:
116:
113:
112:
111:
110:
106:
105:
100:
97:
95:
92:
90:
87:
85:
82:
80:
77:
75:
72:
70:
67:
65:
62:
60:
57:
55:
52:
50:
47:
45:
42:
41:
40:
39:
35:
34:
30:
29:
25:
21:
20:
2223:
2064:Surveillance
2054:Resident spy
1995:Cryptography
1800:Surveillance
1588:Cyber spying
1573:Cryptography
1542:
1512:Resident spy
1497:Double agent
1477:
1403:, retrieved
1397:
1387:
1377:, retrieved
1371:
1361:
1353:the original
1347:
1340:
1331:
1324:
1313:. Retrieved
1309:the original
1299:
1288:. Retrieved
1284:
1275:
1265:, retrieved
1261:the original
1255:
1248:
1240:the original
1234:
1227:
1217:, retrieved
1210:the original
1201:
1178:
1171:
1158:
1151:
1142:
1130:
1123:
1110:
1104:
1094:, retrieved
1087:the original
1082:
1078:
1065:
1022:
1016:
1006:30 September
1004:. Retrieved
1000:
990:
981:
971:
952:
945:
934:, retrieved
927:the original
914:
907:
898:
892:
865:
858:
850:the original
840:
730:
715:
706:
696:
689:
682:
675:
663:
643:
616:
609:
605:graph theory
597:
588:
584:
573:(similar to
570:
568:
541:
533:
509:
489:
462:
450:and drivers.
407:
405:
365:
344:
340:
338:
291:Semantic Web
115:Argument map
74:Mental model
59:Infographics
2136:Geophysical
1918:Cell system
1905:Clandestine
1790:Stay-behind
1699:Recruitment
1656:Canary trap
1554:Devices and
1502:Field agent
796:Sensemaking
750:open-source
479:backtracked
388:probability
376:data mining
349:methodology
296:Treemapping
205:Radial tree
135:Concept map
2330:Hypotheses
2314:Categories
2165:earthquake
2029:False flag
1867:Collection
1785:Sexpionage
1765:COINTELPRO
1758:safe house
1738:False flag
1675:Operations
1649:techniques
1645:Tradecraft
1405:2020-12-28
1379:2020-12-27
1315:2020-12-28
1290:2020-12-28
1267:2008-03-13
1219:2008-05-01
1096:2008-05-01
1029:. p.
982:AIPIO News
936:2008-05-01
679:newspapers
646:references
612:automation
486:Weaknesses
416:brainstorm
392:statistics
175:Issue tree
150:Dendrogram
120:Cladistics
2320:Cognition
2156:Materials
2010:Defection
2005:Dead drop
1978:black bag
1943:Espionage
1709:black bag
1593:Dead drop
1522:Spymaster
1446:Espionage
1057:940455195
459:Strengths
454:analyses.
448:linchpins
225:Topic map
215:Sociogram
170:Issue map
165:Hypertext
2216:Analysis
2014:Turncoat
1961:handling
1775:SHAMROCK
1628:microdot
1531:Analysis
764:See also
625:Software
243:See also
220:Timeline
185:Mind map
2163: (
2141:Nuclear
2111:TEMPEST
1770:MINARET
1714:wetwork
693:scholar
512:deceive
402:Process
394:, etc.
347:) is a
2000:Cutout
1951:Agents
1805:Global
1731:MASINT
1726:SIGINT
1578:Cutout
1462:Assets
1457:Agents
1399:GitHub
1373:GitHub
1055:
1045:
959:
881:
695:
688:
681:
674:
666:
430:matrix
235:ZigZag
2175:Other
2146:Radar
1990:Cover
1968:Asset
1956:field
1490:Agent
1485:Cover
1213:(PDF)
1206:(PDF)
1183:(PDF)
1163:(PDF)
1135:(PDF)
1090:(PDF)
1075:(PDF)
930:(PDF)
919:(PDF)
808:Notes
757:Excel
700:JSTOR
686:books
1810:Mass
1780:FVEY
1507:Mole
1053:OCLC
1043:ISBN
1008:2018
957:ISBN
879:ISBN
672:news
522:and
390:and
382:and
339:The
276:Olog
1647:and
1035:doi
1031:113
871:doi
648:to
345:ACH
2316::
2012:/
1396:,
1370:,
1283:.
1191:^
1113:,
1081:,
1077:,
1051:.
1041:.
1033:.
999:.
980:,
921:,
877:,
816:^
659:.
607:.
531:.
386:,
378:,
2167:)
1851:e
1844:t
1837:v
1438:e
1431:t
1424:v
1318:.
1293:.
1083:9
1059:.
1037::
1010:.
965:.
873::
722:)
716:(
711:)
707:(
697:·
690:·
683:·
676:·
653:.
343:(
328:e
321:t
314:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.