Skip to main content

LISA - Threat Subcategorization

Intelligence Threats Framework with LISA

Intelligence Threats Framework

A comprehensive visualization and analysis of intelligence threats with a focus on LISA (Low Intensity Sustained Attack)

Intelligence Threats Mind Map

Intelligence Threats I. Broad Categories National Security Threats Foreign Threats State-Sponsored Non-State Actors Cyber Threats Domestic Threats Domestic Extremism Domestic Terrorism Organized Crime II. Conflict Spectrum Low Intensity Conflict Political-Military Ideological Struggles Multi-Instrument Grey Zone Warfare Peace-War Spectrum Ambiguous Tactics Cyber, Disinfo Hybrid Threats Conventional/Unconventional State/Non-State Domestic/Foreign Blur III. User-Proposed Sub-Categorization LISA (Low Intensity Sustained Attack) Ideological/Political Threat to Government Sustained Over Time Gaslighting Victims Domestic/Foreign Blur LISA to Low Intensity Conflict LISA to Domestic Threats LISA to Foreign Threats Intelligence Threats Mind Map

Understanding the Intelligence Threats Framework

The visualization above presents a comprehensive framework of intelligence threats, organized into three major categories that help us understand the complex landscape of national security challenges. This mind map illustrates how different threat types relate to each other and particularly highlights the concept of Low Intensity Sustained Attack (LISA) as a bridging concept across multiple domains.

The Three Main Categories

The framework is organized into three primary sections, each represented by a different colored region in the mind map:

I. Broad Categories (Red Section)

This section categorizes threats based on their origin and nature. National Security Threats branch into two primary subcategories:

Foreign Threats include state-sponsored activities (like espionage, sabotage, influence operations, and military aggression), non-state actors (such as foreign terrorist organizations and transnational criminal organizations), and cyber threats originating from foreign entities.

Domestic Threats encompass domestic extremism (ideologically motivated violence, anti-government extremism, racially/ethnically motivated extremism), domestic terrorism, organized crime when it impacts national stability, and cyber threats from domestic sources.

II. Conflict Spectrum (Purple Section)

This section describes the range of conflict intensities and methodologies employed by adversaries:

Low Intensity Conflict (LIC) involves political-military confrontation below the threshold of conventional war, characterized by protracted struggles between competing principles and ideologies, often using a combination of political, economic, informational, and military instruments.

Grey Zone Warfare refers to competitive interactions between peace and war that use ambiguous tactics to avoid full-scale conflict, including cyber attacks, disinformation campaigns, economic coercion, and the use of proxies.

Hybrid Threats blend conventional and unconventional tactics, combining state and non-state actors in ways that blur the lines between domestic and foreign elements, aiming to exploit vulnerabilities and create instability.

III. User-Proposed Sub-Categorization (Green Section)

This section introduces the concept of Low Intensity Sustained Attack (LISA), which has five defining characteristics:

  • Ideological/Political Motivation: Driven by specific ideological or political goals
  • Threat to Stable Government: Poses challenges to government stability and national security
  • Sustained Over Time: Operates as a persistent, long-term campaign rather than a single event
  • Gaslighting of Individual Victims: Employs psychological manipulation techniques at the level of organized crime
  • Quasi Position (Domestic/Foreign Blur): Operates in a space that blurs the traditional boundaries between domestic and foreign threats

LISA's Unique Position in the Framework

What makes LISA particularly significant in this framework is how it bridges multiple domains of traditional threat categorization. The dashed lines in the visualization illustrate these important connections:

The blue dashed line connects LISA to Low Intensity Conflict, highlighting how LISA operates below the threshold of conventional warfare while still posing a significant security challenge. Like Low Intensity Conflict, LISA employs a range of instruments (political, informational, etc.) to achieve its goals without triggering a full military response.

The red dashed line links LISA to Domestic Threats, showing that LISA can manifest through domestic actors or target domestic institutions and individuals through techniques like gaslighting.

The yellow dashed line connects LISA to Foreign Threats, indicating that LISA may involve foreign actors or influence, either directly or indirectly.

Implications for Security Analysis

This framework's value lies in its ability to help security analysts and policymakers understand threats that don't fit neatly into traditional categories. By recognizing LISA as a distinct concept that bridges multiple domains, security professionals can develop more comprehensive approaches to threats that:

1. Persist over time rather than manifest as discrete events

2. Operate across the domestic-foreign boundary, making attribution and response more challenging

3. Employ psychological manipulation alongside more traditional threat tactics

4. Remain below thresholds that would trigger conventional security responses

The framework suggests that security approaches must evolve to address these hybrid, sustained threats that deliberately exploit gaps in traditional security categorizations and responses.

Intelligence Threats Framework with LISA | Created April 18, 2025

Comments

Popular posts from this blog

You can't be like me

You Can't Be Me You Can't Be Me The Role of AI in Personal Growth & Ethical Transparency AI isn’t just for automation or content generation—it can be a powerful tool for personal growth, self-reflection, and effective communication . In the process of sharing my most important writing, I used AI not to replace my voice, but to enhance my ability to present it in a way that ensures clarity, accessibility, and impact. Transparency is essential when using AI in content creation, especially when building trust and credibility . That’s why I’m sharing the full conversation that led to the final presentation of my writing. This isn’t about hiding behind technology—it’s about showing what mindful, responsible AI use can look like in practice. ...

Declaration of the American People: Revocation of Donald J. Trump’s Return

Declaration of the American People: Revocation of Donald J. Trump’s Return Declaration of the American People Revocation of Donald J. Trump’s Visa and Prohibition of His Return Pending Constitutional Convention Published: April 26, 2025 We, the People of the United States of America — the rightful and ultimate sovereigns of this Nation — hereby DECLARE that Donald John Trump’s privileges to enter, reside in, or act within the jurisdiction of the United States are REVOKED , effective immediately. By this declaration, we assert: That the People possess an inalienable right to withdraw confidence from any individual who threatens the integrity of our Republic, irrespective of title or past office. That the sovereignty of the People supersedes any position or office, including the Presidency, and that the sacred trust between the governed and those in power...

Immediate demand for removal of Kash Patel as director of the Federal bureau of investigation - updated 1/6/26

Declaration Demanding Removal of Kash Patel as FBI Director Open Letter Declaration to the President of the United States ---- update --- kash patel has been kicking ass--- 01/06/2026 Date: April 26, 2025 From: Killian Yates and the American People Subject: ) Demand for the Removal of Kash Patel as Director of the Federal Bureau of Investigation (FBI) Mr. President, We, the American people — in one voice with clear minds and unwavering conviction — formally demand the immediate removal of Kash Patel from his position as Director of the Federal Bureau of Investigation. The FBI, under Kash Patel’s leadership, has utterly failed in its most fundamental duty: protecting the American people from threats both foreign and domestic. Despite multiple good-faith attempts to report credible information concerning: Law enforcement office...