Paper
21 February 2001 Intelligence analysis for internet security: ideas, barriers, and possibilities
Timothy J. Shimeall, Casey J. Dunlevy, Phil Williams
Author Affiliations +
Proceedings Volume 4232, Enabling Technologies for Law Enforcement and Security; (2001) https://doi.org/10.1117/12.417518
Event: Enabling Technologies for Law Enforcement, 2000, Boston, MA, United States
Abstract
The amazing growth of the Internet, both in size and in influence on our society has lead to increased risks of its exploitation by criminal and terrorist groups. As of now, this exploitation has been relatively limited, at least with respect to the likely activity in the years to come. There is a need to act now to develop and put into place intelligence methodologies to aid analysis of Internet-based national security and criminal threats and to augment existing Internet security practices. These methodologies cannot be a purely technically based, or the true societal significant of Internet activity will be overlooked. They cannot be a purely localized activity, or the divergent needs of various regions and organizations will not be represented. They cannot be simply responsive to incidents, such as viruses or system attacks, or the advantage will remain with the intruders. They cannot be centrally controlled or performed, or the need for rapid `Internet- speed' response will not be met. Internet security threats are distributed, ongoing and multifaceted, so the strategy for dealing with them must be distributed ongoing and multifaceted.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Timothy J. Shimeall, Casey J. Dunlevy, and Phil Williams "Intelligence analysis for internet security: ideas, barriers, and possibilities", Proc. SPIE 4232, Enabling Technologies for Law Enforcement and Security, (21 February 2001); https://doi.org/10.1117/12.417518
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Internet

Network security

Legal

Strategic intelligence

Telecommunications

Signals intelligence

RELATED CONTENT

Study of risk based on web software testing
Proceedings of SPIE (March 20 2013)
Computer loss experience and predictions
Proceedings of SPIE (March 12 1996)
Design and study of security system based on WWW
Proceedings of SPIE (October 03 2001)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top