A Data Fusion Approach to Indications and Warnings of Terrorist Attacks
نویسندگان
چکیده
Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity – the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.
منابع مشابه
Relationship between Perceived Impact of Terrorist Attacks, Resilience, and Religious Beliefs on death anxiety among Student in Islamabad
Objectives: The present research was carried out to explore the perceived impact of terrorist attacks in terms of dread, lack of control and extent of exposure in death anxiety. It was also intended to explore the moderating effect of resilient attributes, and religious beliefs were investigated. Methods: Sample consisted of 359 students (directly perceived =159, and in-directly perceived =20...
متن کاملPolitical Stability, Corruption, Democracy and Terrorism In the Middle East and North Africa
Terrorism has been considered as a challenge with serious effect in the world as a result of instability, corruption and lack of democracy in most countries. Confronting this phenomenon requires recognizing its roots to find possible solutions. This study aims to examine the effect of some actual factors which causes the terrorism in short and long run. To this end, investigation has been condu...
متن کاملImpact of Terrorism, Political System and Exchange Rate Fluctuations on Stock Market Volatility
Terrorism, political system instability and currency rate fluctuations are the three most evident issues of 21st century. In this study, comparative analysis is performed to check the impact of all these issues on PSX Volatility. EGARCH (1,1) approach is used on four different kinds of data collected from 1st January 2000 to 31st December 2015. Terrorist events, FX return fluctuations with rest...
متن کاملNew Science and Technology in Line with Terrorist Groups in the Middle East
Abstract:Terrorism is a phenomenon that has spread to almost all parts of the world in the late 20th century and the beginning of the 21th century to the extent that many Middle East-ern countries have been subjected to such violence and unrest; in fact, with the advent of science and technology, particularly the global spread of the Internet and social net-works, the face of terrorism ha...
متن کاملAn Analysis of Short-Term Responses to Threats of Terrorism
T important defensive mechanisms available to governments combating terrorism are warnings and the deployment of physical resources. Warnings are relatively inexpensive to issue but their effectiveness suffers from false alarms. Physical deployments of trained security personnel can directly thwart attacks but are expensive and need to be targeted to specific locations. In this paper, we model ...
متن کامل