Skip to main content

Currently Skimming:

Do the SBE Sciences Advance NSF's Mission? National Defense
Pages 16-17

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 16...
... These applications have focused on government hostage negotiations; an evaluation of the International Criminal Police Organization (INTERPOL) cooperative program for combating international terrorism; the value of counterterror intelligence; and the first evaluation of the use of metal detectors to screen airline passengers.78 Forecasting Political Instability NSF has funded research examining the root causes of political instability and indicators of early observable cues that a change in governance or political state is imminent.
From page 17...
... As an example, some NSF-supported research has combined social network anal ysis with automated text analysis techniques to provide valuable information about the patterns of behavior of hackers and the vulnerabilities of the nation's cyber networks. These tools analyze hacker chats and other data faster and more efficiently than had previously been possible, with the poten tial to improve predictions about future threats that are based on hackers' intentions.81 The U.S.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.