×

Exploitation of ambiguous cues to infer terrorist activity. (English) Zbl 1355.91035

Summary: To aid intelligence analysts in processing ambiguous data regarding nuclear terrorism threats, we develop a methodology that captures and accounts for the uncertainty in new information and incorporates prior beliefs on likely nuclear terrorist activity. This methodology can guide the analyst when making difficult decisions regarding what data are most critical to examine and what threats require greater attention. Our methodology is based on a Bayesian statistical approach that incorporates ambiguous cues to update prior beliefs of adversary activity. We characterize the general process of a nuclear terrorist attack on the United States and describe, using a simplified example, how this can be represented by an event tree. We then define hypothetical cues for the example and give notional strengths to each cue. We also perform sensitivity analysis and show how cue strengths can affect inference. The method can be used to help support decisions regarding resource allocation and interdiction.

MSC:

91B06 Decision theory
91F10 History, political science
62P25 Applications of statistics to social sciences
PDFBibTeX XMLCite
Full Text: DOI Link

References:

[1] Atkinson MP, Wein LM. Spatial queueing analysis of an interdiction system to protect cities from a nuclear terrorist attack. Oper. Res. (2008) 56(1):247-254Link · Zbl 1167.90440
[2] Bier VM. Choosing what to protect. Risk Anal. (2007) 27(3):607-620CrossRef
[3] Bunn M, Wier A, Holdren J. Controlling nuclear warheads and materials: A report card and action plan. (2003) . Technical report, Nuclear Threat Initiative, Washington, DC
[4] Chengara A. Indicators of terrorist attacks. Security Res. Rev. (2004) 1(1). Accessed December 13, 2012, http://www.bharat-rakshak.com/SRR/Volume11/index.html
[5] Hausken K, Zhuang J. Governments’ and terrorists’ defense and attack in a T-period game. Decision Anal. (2011) 8(1):46-70Link · Zbl 1398.91368
[6] Heckerman D. A tutorial on learning with Bayesian networks. (1995) . Technical Report MSR-TR-95-06, Microsoft Research, Redmond, WA · Zbl 0921.62029
[7] Kass RE, Raftery AE. Bayes factors. J. Amer. Statist. Assoc. (1995) 90(430):773-794CrossRef · Zbl 0846.62028
[8] Khalsa S. Forecasting Terrorism: Indicators and Proven Analytic Techniques (2004) (The Scarecrow Press, Lanham, MD)
[9] Krupka JJ. Overcoming ambiguity at the operational level. (2006) . Technical Report ADA463433, Naval War College, Newport, RI
[10] Maurer SM. WMD Terrorism: Science and Policy Choices (2009) (MIT Press, Cambridge, MA) CrossRef
[11] Rabiner LR. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE (1989) 77(2):257-286CrossRef
[12] Rabiner LR, Juang B. An introduction to hidden Markov models. ASSP Magazine, IEEE (1986) 3(1):4-16CrossRef
[13] Secure Community Network Seven signs of terrorist activity. (2005) . Accessed December 13, 2012, http://www.scnus.org/page.aspx?id=101218
[14] Smith A. Detecting terrorist activity: Defining the state’s threshold of pain. Australian Defence Force J. (2005) 168:30-44
[15] Smith BL, Damphousse KR, Roberts P. Pre-incident indicators of terrorist incidents: The identification of behavioral, geographic, and temporal patterns of preparatory conduct. (2006) . Technical Report 214217, U.S. Department of Justice, Rockville, MD
[16] Sticha P, Buede D, Rees RL. Apollo: An analytical tool for predicting a subject’s decision making. Proc. Internat. Conf. Intelligence Anal. (2005) McLean, VA
[17] U.S. Army A military guide to terrorism in the twenty-first century. (2007) . Training and Doctrine Command, U.S. Army, Fort Leavenworth, KS
[18] Tu H, Allanach J, Singh S, Pattipati KR, Willett P. The adaptive safety analysis and monitoring system. Proc. of the SPIE: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III (2004) 5403:153-165CrossRef
[19] Wein LM, Atkinson MP. The last line of defense: Designing radiation detection-interdiction systems to protect cities from a nuclear attack. IEEE Trans. Nuclear Sci. (2007) 54(3):654-669CrossRef
[20] Wyllie D. 10 years after 9/11: 8 pre-attack indicators of terrorist activity. (2011) . Accessed December 13, 2012, http://www.policeone.com/federal-law-enforcement/articles/3421116-8-pre-attack-indicators-of-terrorist-activity/
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.