We’re publishing research and adding new white papers frequently. Check back often.
Detecting Botnet Signals Using Process Mining: Detecting bots and elucidating botnets is an active area of research. This draft journal article presents weaponized bot detection analysis results from an analysis of an ISIS terrorist Twitter dataset using process technologies. A future effort is presented to understand cross-platform choreographed information warfare campaigns and recursive adversarial modeling.
Process Mining Organization Email Data and National Security Implications: Tremendous intelligence is contained within unstructured organizational data sources. Properly analyzed, these data provide government and private organizations with actionable management and risk mitigation insights. Using explainable process technologies combined with natural language processing, a private critical infrastructure participant’s organizational process model is discovered from semi-structured email data. Data derived from the process model are presented which elucidate internal operations. National security implications and future research needs are described.
A Process Mining Approach for Protecting Self-Organizing Critical Infrastructure Ecosystems: Self-organized ecosystems are found throughout the natural world, including critical infrastructure. Self-organized criticality is the tendency of some systems to naturally self-organize into critical states far from equilibrium and which are barely stable. Small changes or stimuli can result in cascading chain reactions which may have unwanted or devastating effects on economies or societies. Process technologies offer an expedient method for simulating self-organized critical infrastructure ecosystems, understanding criticality within these ecosystems, and adopting mitigation strategies analogous to controlled avalanches. Several case studies from broad domains present naturally occurring criticality as well as deliberate ecosystem attacks designed to induce criticality or trigger catastrophic events. (In print)
Whale Ecosystem Pattern of Life: We performed a pattern of life analysis using whale telemetry data; the preliminary results are interesting and warrant more rigorous statistical testing. This research was part of a Department of Defense AFWERX (Air Force/Space Force) funded small business research opportunity (SBIR) designed to understand the effects of space weather phenomena on satellite ecosystems. Changes in whale behavior during different periods of solar intensity are evident to the naked eye. Behavioral differences by gender are evident, as well. Using whale ecosystems as a proxy, our objective is to determine if our data tools may improve Space Domain Awareness using an “ecosystem” approach that combines advancements in process mining and artificial intelligence to monitor and predict impacts from space weather on space assets, links, and maneuvers.
COVID Disease Process: Using publicly available data, we created COVID patient flow process models for different patient cohorts. The disease progression processes are different to the naked eye for people with comorbidities compared to relatively healthy patients. With enhancements, these kinds of disease process models may improve decision & policy making, help optimize deployment of rapidly-emerging technologies, optimize patient workflow, help healthcare professionals understand emerging best practices, model geographic spread, plus other agent-based simulations.
Space Object Process Analysis: Objects in space from four different countries are examined from a process perspective using explainable artificial intelligence. For all countries, objects tend to remain predominantly in the same process activity state. Activity state transitions are observed, however, suggesting intentional maneuver, object degradation, or other ecosystem behaviors. Future work is suggested.
FOCAL Information Warfare Defense StandardTM: This Information Warfare Defense Standard helps public and private critical infrastructure participants defend against the growing information and cognitive threat, which is fueled by weaponized AI. It may also facilitate a whole-of-society effort to protect freedom and individual liberty. Five interlocking tenets help organizations shift culture, train the workforce, identify vulnerabilities, prepare for and recover from attack, and contribute to the community as a vested stakeholder. This short article offers and introduction, and a detailed technical paper accompanies the standard, as well. The FOCAL Information Warfare Defense StandardTM is available for free. Contact us to request a copy.
Process Mining: The Missing Capability in Information Warfare. From an information warfare perspective, The Cold War never ended. Moreover, the 21st Century presents vivid new security challenges related to information weaponry. This article describes novel, scalable, and extensible process-oriented methodologies not currently part of the United States’ informational warfare solution set.
Process Mining as a Platform Plug-in. Interested in Customer Journey Mapping? This paper discusses how process mining provides extreme value, at scale, for software platforms with large client/user bases.
Process Mining in a DoD Context. This paper articulates the necessity of adopting process mining technologies across the Department of Defense (DoD) and adjacent national security agencies in order to ensure America remains the premier global power in today’s emerging inter-state competitive environment.
Easing Organizational Change. Interested in mergers and acquisitions or re-orgs? Check this out.
Major New IT System Implementations. Process Mining eases the disruption caused by new system adoptions and outputs an improved solution.