Using Autonomous Agent-Based Systems to Counter Asymmetric Threats from Non-State Sponsored Terror Organizations
نویسندگان
چکیده
Over the next two decades the United States is likely to see an increase in the number of asymmetric threats from nonstate sponsored terror organizations (e.g. al-Qaeda). As US and Coalition operations in Afghanistan draw to a close, current tactics used in the War on Terror will inevitably shift from primarily kinetic to non-kinetic. Currently, US forces have a wide variety of tools at their disposal with which to conduct non-kinetic operations but many of these tools are dated and not designed for the high-tech environment of the 21 Century. We propose an autonomous agent-based system to track terrorist behavior the way that financial behavior is tracked. This would allow teams to have an objective currency for trust transactions. These systems would allow another surface for autonomous agents to integrate the social fabric with information gathered in virtual environments. Further, the system would increase illumination of dark networks engaged in illicit covert activity. Participants would be assigned a score similar to FICO scores; when an individual score falls noticeably or falls below a threshold, further observation and investigation would occur. Better decision-making and situational awareness would result for the distribution of resources in monitoring ongoing terrorist threats. We are conducting a feasibility assessment of building such a system. The results will be discussed in terms of the underlying mathematical modeling and artificial intelligence needed to produce such a system and the use and appropriateness of social network analysis with this type of system.
منابع مشابه
Cyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملAssessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats may be carried out depending on the operational environment in which the system is used, i.e. the procedures that define how to operate the systems. We are interested in reasoning about the security of e-Voting procedur...
متن کاملAdaptive Neural Network Method for Consensus Tracking of High-Order Mimo Nonlinear Multi-Agent Systems
This paper is concerned with the consensus tracking problem of high order MIMO nonlinear multi-agent systems. The agents must follow a leader node in presence of unknown dynamics and uncertain external disturbances. The communication network topology of agents is assumed to be a fixed undirected graph. A distributed adaptive control method is proposed to solve the consensus problem utilizing re...
متن کاملControl of Multiple Underwater Vessels to Converge to a Desired Pattern
The important and hazardous of the rescue mission in oceans and seas, autonomous vessels now are one of the most appropriate applications among others. Due to safety, reliability, and accessibility of smart, Autonomous and Cooperative vessels today has attracted much attention from the industry. Regard to the complication of the mono vessel for different objects, the multi- agent system was pro...
متن کاملOptimizing counter-terror operations: Should one fight fire with "fire" or "water"?
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within a optimal control model, where the key state is the (relative) number of terrorists and the key controls are two types of counter-terror tactics, one (“water”) that does not one (“fire”) that does provoke recruitment of new terrorists. The mod...
متن کامل