Two Real-World Geospatial Abduction Applications
In this chapter, we discuss two real-world applications of geospatial abduction problems (GAPs). While both applications deal with finding weapons caches that support improvised explosive devices used by insurgent terror groups, they operate in two different environments. SCARE (Spatio-Cultural Abductive Reasoning Engine) implements point-based geospatial abduction and was used to find IED weapons caches in Baghdad. In contrast, SCARE-S2 is an extension of SCARE to region-based geospatial abduction which has been used, with various modifications, to find high value targets (either large weapons caches or insurgent commanders) in certain provinces of Afghanistan. The accuracy of both systems has been tested on real-world data, and over 18 organizations have requested or used either SCARE or SCARE-S2.
KeywordsMultiagent System Attack Data Partner Location Abductive Inference Naval Postgraduate School
Unable to display preview. Download preview PDF.
- 1.von Clausewitz, C. 1832. On War. Wilder Publications.Google Scholar
- 2.US Army. 2006. Counterinsurgency (US Army Field Manual), FM 3–24 edition.Google Scholar
- 3.Brantingham, P., and Brantingham, P. 2008. Crime Pattern Theory. In Wortley, R., and Mazerolle, L., eds., Enviromental Criminology and Crime Analysis. 78–93.Google Scholar
- 4.Rossmo, D. K., and Rombouts, S. 2008. Geographic Pro ling. InWortley, R., andMazerolle, L., eds., Enviromental Criminology and Crime Analysis. 136–149.Google Scholar
- 5.US Army. 2004. Intelligence (US Army Field Manual), FM 2–0 edition.Google Scholar
- 6.Brown, R. A. 2007. Commander s Assessment: South Baghdad. Military Review 27–34.Google Scholar
- 7.Moulton, J. 2009. Rethinking IED Strategies from Iraq to Afghanistan. Military Review.Google Scholar
- 8.Mansoor, P. R., and Ulrich, M. S. 2007. A New COIN Center-of-Gravity Analysis. Military Review.Google Scholar
- 9.McFate, M. 2005. Iraq: The Social Context of IEDs. Military Review.Google Scholar
- 10.Reed, B. 2007. A Social Network Approach to Understanding an Insurgency. Parameters.Google Scholar
- 11.Dickerson, J., Simari, G., Subrahmanian, V., Kraus, S. 2010. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In Proc. 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2010). 299–306.Google Scholar
- 12.Paruchuri, P., Tambe, M., Ord´o˜nez, F., Kraus, S. 2006. Security in multiagent systems by policy randomization. In Proc. 5th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2006).Google Scholar
- 13.Shakarian, P., Otstott, C. What is Old is New: Countering IEDs by Disrupting the Weapon Supply, Military Review, pp. 46–52, 2011.Google Scholar
- 14.Kagan, F.; Kagan, K.; and Pletka, D. 2008. Iranian Infulence in the Levant, Iraq, and Afghanistan. Technical report, American Enterprise Institute.Google Scholar
- 15.Cochrane, M. 2008c. The Growing Threat of Special Groups in Baghdad. Backgrounder 25, The Institute for the Study of War.Google Scholar
- 16.Cochrane, M. 2008b. Special Groups Regenerate. Iraq Report 11, The Institute for the Study of War.Google Scholar
- 17.Cochrane, M. 2009. The Fragmentation of the Sadrist Movement. Iraq Report 12, The Institute for the Study of War.Google Scholar
- 18.Nasr, V. 2007. The Shia Revival. W.W. Norton and Co.Google Scholar
- 19.IMC. 2007. IRAQIS ON THE MOVE: Sectarian Displacement in Baghdad, An Assessment by International Medical Corps.Google Scholar
- 20.Shakarian, P., Subrahmanian, V.S., Sapino, M.L. SCARE: A Case Study with Baghdad, Proc. 2009 Intl. Conf. on Computational Cultural Dynamics (eds. D. Nau, A. Mannes), Dec. 2009, AAAI Press.Google Scholar
- 21.Shakarian, P., Subrahmanian, V.S., Sapino, M.L. 2012. GAPS: Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), 3, 1, to appear.Google Scholar
- 22.Shakarian, P., Subrahmanian, V.S. Region-based Geospatial Abduction with Counter-IED Applications, accepted for publication in:Wiil, U.K. (ed.).Counterterrorism and Open Source Intelligence, Springer Verlag Lecture Notes on Social Networks, to appear, 2011.Google Scholar
- 23.Shakarian, P., Nagel, M., Schuetzle, B., Subrahmanian, V.S. 2011. Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan, in Proc. 2011 Intl. Conf. on Innovative Applications of Arti cial Intelligence, Aug. 2011, AAAI Press.Google Scholar
- 24.Shakarian, P., Dickerson, J., Subrahmanian, V.S. 2012. Adversarial Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), to appear.Google Scholar
- 25.US Army. 1994. Intelligence Preparation of the Battle led (US Army Field Manual), FM 34–130 edition.Google Scholar
- 26.Afghanistan Information Management Services (AIMS). GIS / Mapping Services, http://http://www.aims.org.af/.
- 27.National Counter-Terrorism Center (NCTC). Worldwide Incident Tracking System (WITS), https://wits.nctc.gov/.
- 28.International Security Assistance Force (ISAF) Afghanistan. Press Releases, http://www.isaf.nato.int/article/isaf-releases/index.php.
- 29.Naval Postgraduate School (NPS). Program for Culture and Con ict Studies, http://www.nps.edu/programs/ccs/.
- 30.Conover, T. 2010. The Routes of Man: How Roads Are Changing the World and the Way We Live Today. Knopf.Google Scholar