Empowering Counterintelligence: A Proprietary Pipeline for Analyzing Critical Infrastructure Influence

Adversarial Socio-Technical Network Analysis (ASTNA) is a data processing pipeline for extracting a knowledge graph from SEC Documents to enable robust socio-technical analysis of critical infrastructure influence.
Technology No. CW-23-20

This proprietary data processing pipeline harnesses Apache Airflow and Python to create detailed knowledge graphs from SEC documents, providing critical insights into the socio-technical interdependencies that influence critical infrastructure operations.

Understanding their socio-technical interdependencies becomes crucial as critical infrastructures increasingly intertwine with emerging technologies. This pipeline addresses the need to model these relationships, focusing on impacts from mergers, acquisitions, and foreign investments, which are pivotal in shaping infrastructure security and resilience.

Our pipeline operates through a three-tier system: Social Network Extraction, Critical Infrastructure Network Extraction, and Inference and Fusion. The first stage utilizes SEC EDGAR data to build social networks of entities involved in critical infrastructures. In contrast, the second stage integrates critical infrastructure data from sources like the DOE’s NREL database. The final stage fuses these datasets into a comprehensive knowledge graph that illustrates the intricate web of influences at a regional level.

Advantages

  • Comprehensive Analysis: Integrates multiple data sources to provide a holistic view of socio-technical networks.
  • Proprietary Data Handling: Uses licensed methodologies to ensure secure and exclusive data processing.
  • Adversarial Behavior Modeling: Employs graph-theoretic measures and automated reasoning to detect and analyze adversarial tactics.
  • Scalability: Designed to handle expansive datasets efficiently, allowing for broad geographic and sectoral analysis.
  • Federal Application Readiness: Tailored to meet the needs of federal agencies like CFIUS and counterintelligence bodies.

Applications

  • Federal Counterintelligence: To understand and mitigate adversarial influences over time.
  • Infrastructure Security Analysis: For organizations assessing the security and resilience of critical infrastructures.
  • Corporate Risk Management: Enables companies to foresee and counteract potential adversarial tactics that could impact their operations.

This software is under copyright. To purchase a license, please use the 'Contact Us' form on this page. We will respond as promptly as possible.

  • swap_vertical_circlemode_editAuthors (1)
    Gabriel Weaver
  • swap_vertical_circlecloud_downloadSupporting documents (1)
    Product brochure
    Empowering Counterintelligence: A Proprietary Pipeline for Analyzing Critical Infrastructure Influence.pdf
Questions about this technology?