Skip to main content

LISA - Threat Subcategorization

Intelligence Threats Framework with LISA

Intelligence Threats Framework

A comprehensive visualization and analysis of intelligence threats with a focus on LISA (Low Intensity Sustained Attack)

Intelligence Threats Mind Map

Intelligence Threats I. Broad Categories National Security Threats Foreign Threats State-Sponsored Non-State Actors Cyber Threats Domestic Threats Domestic Extremism Domestic Terrorism Organized Crime II. Conflict Spectrum Low Intensity Conflict Political-Military Ideological Struggles Multi-Instrument Grey Zone Warfare Peace-War Spectrum Ambiguous Tactics Cyber, Disinfo Hybrid Threats Conventional/Unconventional State/Non-State Domestic/Foreign Blur III. User-Proposed Sub-Categorization LISA (Low Intensity Sustained Attack) Ideological/Political Threat to Government Sustained Over Time Gaslighting Victims Domestic/Foreign Blur LISA to Low Intensity Conflict LISA to Domestic Threats LISA to Foreign Threats Intelligence Threats Mind Map

Understanding the Intelligence Threats Framework

The visualization above presents a comprehensive framework of intelligence threats, organized into three major categories that help us understand the complex landscape of national security challenges. This mind map illustrates how different threat types relate to each other and particularly highlights the concept of Low Intensity Sustained Attack (LISA) as a bridging concept across multiple domains.

The Three Main Categories

The framework is organized into three primary sections, each represented by a different colored region in the mind map:

I. Broad Categories (Red Section)

This section categorizes threats based on their origin and nature. National Security Threats branch into two primary subcategories:

Foreign Threats include state-sponsored activities (like espionage, sabotage, influence operations, and military aggression), non-state actors (such as foreign terrorist organizations and transnational criminal organizations), and cyber threats originating from foreign entities.

Domestic Threats encompass domestic extremism (ideologically motivated violence, anti-government extremism, racially/ethnically motivated extremism), domestic terrorism, organized crime when it impacts national stability, and cyber threats from domestic sources.

II. Conflict Spectrum (Purple Section)

This section describes the range of conflict intensities and methodologies employed by adversaries:

Low Intensity Conflict (LIC) involves political-military confrontation below the threshold of conventional war, characterized by protracted struggles between competing principles and ideologies, often using a combination of political, economic, informational, and military instruments.

Grey Zone Warfare refers to competitive interactions between peace and war that use ambiguous tactics to avoid full-scale conflict, including cyber attacks, disinformation campaigns, economic coercion, and the use of proxies.

Hybrid Threats blend conventional and unconventional tactics, combining state and non-state actors in ways that blur the lines between domestic and foreign elements, aiming to exploit vulnerabilities and create instability.

III. User-Proposed Sub-Categorization (Green Section)

This section introduces the concept of Low Intensity Sustained Attack (LISA), which has five defining characteristics:

  • Ideological/Political Motivation: Driven by specific ideological or political goals
  • Threat to Stable Government: Poses challenges to government stability and national security
  • Sustained Over Time: Operates as a persistent, long-term campaign rather than a single event
  • Gaslighting of Individual Victims: Employs psychological manipulation techniques at the level of organized crime
  • Quasi Position (Domestic/Foreign Blur): Operates in a space that blurs the traditional boundaries between domestic and foreign threats

LISA's Unique Position in the Framework

What makes LISA particularly significant in this framework is how it bridges multiple domains of traditional threat categorization. The dashed lines in the visualization illustrate these important connections:

The blue dashed line connects LISA to Low Intensity Conflict, highlighting how LISA operates below the threshold of conventional warfare while still posing a significant security challenge. Like Low Intensity Conflict, LISA employs a range of instruments (political, informational, etc.) to achieve its goals without triggering a full military response.

The red dashed line links LISA to Domestic Threats, showing that LISA can manifest through domestic actors or target domestic institutions and individuals through techniques like gaslighting.

The yellow dashed line connects LISA to Foreign Threats, indicating that LISA may involve foreign actors or influence, either directly or indirectly.

Implications for Security Analysis

This framework's value lies in its ability to help security analysts and policymakers understand threats that don't fit neatly into traditional categories. By recognizing LISA as a distinct concept that bridges multiple domains, security professionals can develop more comprehensive approaches to threats that:

1. Persist over time rather than manifest as discrete events

2. Operate across the domestic-foreign boundary, making attribution and response more challenging

3. Employ psychological manipulation alongside more traditional threat tactics

4. Remain below thresholds that would trigger conventional security responses

The framework suggests that security approaches must evolve to address these hybrid, sustained threats that deliberately exploit gaps in traditional security categorizations and responses.

Intelligence Threats Framework with LISA | Created April 18, 2025

Comments

Popular posts from this blog

You can't be like me

You Can't Be Me You Can't Be Me The Role of AI in Personal Growth & Ethical Transparency AI isn’t just for automation or content generation—it can be a powerful tool for personal growth, self-reflection, and effective communication . In the process of sharing my most important writing, I used AI not to replace my voice, but to enhance my ability to present it in a way that ensures clarity, accessibility, and impact. Transparency is essential when using AI in content creation, especially when building trust and credibility . That’s why I’m sharing the full conversation that led to the final presentation of my writing. This isn’t about hiding behind technology—it’s about showing what mindful, responsible AI use can look like in practice. ...

We the People Petition Site - Bald Eagle Party Blog

We the People Petition Site - Bald Eagle Party Blog We the People Petition Site Introduction The "We the People" petition site is an essential platform for American citizens to voice their opinions and bring attention to critical issues. Launched by the Obama administration, this platform allows individuals to create and sign petitions, ensuring their voices are heard by the government. In this blog post, we will explore the significance of this platform, its challenges in recent years, and how it empowers citizens to participate in democracy. History and Background The "We the People" petition site was launched in September 2011 as part of President Obama's commitment to open government and civic engagement. This innovative platform enables citizens to create petitions on various iss...

Threats United States national security and space dominance

Threat Analysis: The Strategic Risks of Japan/India/UK Space Capabilities on U.S. Military Space Assets and National Security Killian H. Yates | Sunday, February 23, 2025 www.LinkedIn.com/in/KillianYates United States of America Executive Summary Japan’s advancements in space debris removal technologies—especially through initiatives like Astroscale and JAXA’s Commercial Removal of Debris Demonstration (CRD2) program—pose a dual-use risk to U.S. military assets in space. While these capabilities are publicly focused on maintaining space sustainability, their precision and operational flexibility could be repurposed to undermine U.S. space dominance. This paper explores the specific threats these technologies pose to U.S. military space infrastructure and examines the strategic implications of a potential shift in space power dynamics. 1. Overview of Japan’s Space Debris Capabilities Astroscale and JAXA Initiatives: ADRAS-J and ADRAS-J2 spacecraft demonstrate advan...