Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 A framework for.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Klas Wallenius Common and Individual Situation Awareness from a Technical Point of View Klas Wallenius.
Robot Sensor Networks. Introduction For the current sensor network the topography and stability of the environment is uncertain and of course time is.
Sensors and location technologies – the front end of ISR
Keeping the Principal Happy Peter Malcolm Managing Director Proximities Consultancy in Organisational Learning &Partnership Working.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Information | Analytics | Expertise SOCIAL MEDIA INTELLIGENCE Practical Strategies for Using Social Media to Enhance Security AUGUST 2014 © 2014 IHS IHS.
Intelligence, Surveillance, and Reconnaissance
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
CPSC 695 Future of GIS Marina L. Gavrilova. The future of GIS.
Baqer 2007 Pattern Recognition for Wireless Sensor Networks Mohamed Baqer 24 May 2007.
Biometrics II CUBS, University at Buffalo
An Intelligent Tutoring System (ITS) for Future Combat Systems (FCS) Robotic Vehicle Command I/ITSEC 2003 Presented by:Randy Jensen
DEEDS Meeting Oct., 26th 2006 Dependable, Embedded Systems and Software Group Department of Computer Science Darmstadt University of Technology Summary.
California Common Operating Picture (Cal COP) for Public Safety
Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain.
IIT Indore © Neminah Hubballi
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
1 IEEE TRANSACTION ON KNOWLEDGE AND DATA ENGINEERING, VOL. 15 NO.5, SEPTEMBER/OCTOBER 2003 Manuscript received 10 July 2000; received 2 Jan. 2001; accept.
Event Metadata Records as a Testbed for Scalable Data Mining David Malon, Peter van Gemmeren (Argonne National Laboratory) At a data rate of 200 hertz,
The Science of Prediction Location Intelligence Conference April 4, 2006 How Next Generation Traffic Services Will Impact Business Dr. Oliver Downs, Chief.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B18 Business Intelligence.
Domain-Specific Languages for Composing Signature Discovery Workflows Ferosh Jacob*, Adam Wynne+, Yan Liu+, Nathan Baker+, and Jeff Gray* *Department of.
Generic Approaches to Model Validation Presented at Growth Model User’s Group August 10, 2005 David K. Walters.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
NC-BSI: 3.3 Data Fusion for Decision Support Problem Statement/Objectives: Problem - Accurate situation awareness requires rapid integration of heterogeneous.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Parallel and Distributed Simulation Introduction and Motivation.
Advanced Decision Architectures Collaborative Technology Alliance Regulating the Exchange of Tactical Information Using the KAoS Policy Services Framework.
B3AS Joseph Lewthwaite 1 Dec, 2005 ARL Knowledge Fusion COE Program.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
1 Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)5/15/2012 Advanced Radio Frequency Mapping (RadioMap) Dr. John Chapin.
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
Advances in Decision Modeling: The DMSO Vector Lt Col Eileen A. Bjorkman Chief, Concepts Application Division Zach Furness C4I Program Manager 31 July.
Marv Adams Chief Information Officer November 29, 2001.
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Sensors Directorate and ATR Overview for Integrated Fusion, Performance Prediction, and Sensor Management for ATE MURI 21 July 2006 Lori Westerkamp Sensor.
Lucent Technologies - Proprietary 1 Interactive Pattern Discovery with Mirage Mirage uses exploratory visualization, intuitive graphical operations to.
Identifying and Analyzing Patterns of Evasion HM Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Approved for public release; distribution is unlimited. 10/7/09 Autonomous Systems Sensors – The Front End of ISR Mr. Patrick M. Sullivan SPAWAR ISR/IO.
ERP and Related Technologies
Military Intelligence
Instance Discovery and Schema Matching With Applications to Biological Deep Web Data Integration Tantan Liu, Fan Wang, Gagan Agrawal {liut, wangfa,
1 APPROVED FOR PUBLIC RELEASE U.S. Army Research, Development and Engineering Command ARL-CISD Social Network Analysis Team Leader Visual Analytics Consortium,
Iveta Topalova, Microsoft/IJIS Institute John Daugherty, CIO Montana DOC.
Human Performance Enhancement System Park Young Ho Dept. of Nuclear & Quantum Engineering Korea Advanced Institute of Science and Technology December 23.
Machine Reasoning and Learning Workshops III and IV Kickoff Wen Masters Office of Naval Research Code 311 (703)
Headquarters U.S. Air Force
Business Intelligence
Viewing Data-Driven Success Through a Capability Lens
Some tools and a discussion.
Themes in Geosciences.
Instantiation of the Concept in GAMMA Prototypes
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Understanding Behavior and Performance In Organizations
Agent Based Learning Systems
Overview of CV2X Requirements
Towards Next Generation Panel at SAINT 2002
Dr. Mark A. Skinner The Boeing Company 4411 The 25 Way NE, Ste. 350
Data Warehousing Data Mining Privacy
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008

Program Goal Develop and then translate models of “who, where, how, when, why” to suggestion of action

Areas of Emphasis (1/2) Advanced Sensors – development of high information content sensors that can detect, classify, identify and/or geolocate actors or behaviors of interest at the sensor. Biometrics – development of capabilities that enable person identity dominance 24/7 over large areas. Tagging, Tracking and Location (TTL) – development of capabilities enabling the persistent tracking of actors or objects of interest and the classification of collected track data. Urban Situational Awareness – development of sensors to enable through structure situational awareness and the development of capabilities enabling structure classification. Wide Area Surveillance – the development of a tier-2 wide area surveillance payload, with supporting communications and the development of processing services that can translate persistent surveillance to actionable intelligence Sensor Planning and Management – development of decision aids that help the warfighter understand what to look for, where to look and how to look for it.

Areas of Emphasis (2/2) Determining Intent – development of software applications that expose the intent of irregular actors in clutter (who/where). Expose Enemy Structure & Decision Modeling – development of capabilities that can automatically expose enemy modus operandi with respect to their network structure or decision processes (how, why, when). Cultural Intelligence – development of the capabilities required to make cultural intelligence tactically actionable. Cognitive Information Operations– development of warfighter decision aids based on high resolution models, which enable decision space shaping or exploitation (proactive action). ISR to C2 – development of capabilities related to the complete integration of ISR into current tactical operations.

The Domain of Irregular Warfare Analysis approaches utilized against conventional forces have in large part been transferred to the domain of security and stabilization with limited success. –Case management (cannot be scalable) –Static What we believe we need to do better: –Expose at risk subpopulations –Efficiently and effectively act Disrupt Influence Stimulate

Capability Needs Develop persona and network signatures –The “signal” needed to support classification Map signatures to behaviors –Relevance of the signature Develop persona and network models that are causal to outcomes of interest – Actionable intelligence Analyze personas and networks as tracks –Time as an independent variable Understand how to classify subject tracks –Likelihood ratios (suspicion, clutter)

Persona, Human Network Fingerprints Persona (Persona discovery involves clustering entities by their attributes) Static Signature Persona = f (network stability, communication patterns, interactions with other humans and networks, proximity to values, proximity to goals, proximity to themes, proximity to places, material or events, observed behaviors/actions) or metadata Dynamic Signature Persona (X n, t+x) = Persona (X n, t) * IO( n ) Network Static Signature Human Network = f (membership, persona composition, structure, stability, communication patterns, interactions with other human networks, proximity to values, proximity to goals, proximity to themes, proximity to other entities or events, observed behaviors/actions) or metadata Dynamic Signature Human Network (Xn, t+x) = Human Network (Xn, t) * IO(n)

Communication Patterns Research questions: –What are the set of terms that uniquely describe the identity of a persona or a network –What are the set of terms that describe the function of a persona or a network Present state of the art: –Largely frequency based metrics Required capability: –What collective set of measurements can be made that uniquely describe the network, allow for network decomposition to nodes, shed light on its function and provide a predictive capability? Frequency, duration, track heading, likelihood of a match to a template of interest, likelihood of a match to a clutter model, other

Key Technologies Clustering in N-dimensional space Similarity measures across N-dimensional space Change detection Causality “Fusion” of soft sciences with computational techniques

Other Research Challenges Poor data environments –Networks are undersampled Reliance on second hand data –Source reliability Persona, human network or decision model resolution –How good is good enough Model definition –Normalization of terms –Mapping to behaviors Human network models –Aggregation in N-dimensions Decision models –Actionable via time as a independent variable Closeness measures –Calculation of the closeness between N-dimensional, un-normalized vectors Transfer learning –Moving models in space and time Non linear response –Low input, big output

Individuals Trending Toward Persona Types 11 #3 #306 #397 Persona A #300 #360 #200 Persona B

Network Behavior Over Time 12

Proprietary & Confidential13 Behavioral Trajectories Enabling Action HUMINT SIGINT Incident Data Signature Analyst Signature Analyst Existing Past Event Data IMINT MASINT ID threat locations Intel Feeds 4 Detect Change in TTPs Force Action Optimization

Uncertainty Reduction - Variable Reduction

Uncertainty Reduction with Cultural Models Analysis Challenge:  How to track the movement of networks through time/space Determine locale of the leadership cell, based on: Persona signature Infrastructure factors Causally relevant cultural factors SPADAC Proprietary15

Summary Human network and persona signatures can be used to understand the human terrain and to model IO effects. Higher resolution decision modeling enables own force action optimization