Abstract
In this chapter, we discuss two real-world applications of geospatial abduction problems (GAPs). While both applications deal with finding weapons caches that support improvised explosive devices used by insurgent terror groups, they operate in two different environments. SCARE (Spatio-Cultural Abductive Reasoning Engine) implements point-based geospatial abduction and was used to find IED weapons caches in Baghdad. In contrast, SCARE-S2 is an extension of SCARE to region-based geospatial abduction which has been used, with various modifications, to find high value targets (either large weapons caches or insurgent commanders) in certain provinces of Afghanistan. The accuracy of both systems has been tested on real-world data, and over 18 organizations have requested or used either SCARE or SCARE-S2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
von Clausewitz, C. 1832. On War. Wilder Publications.
US Army. 2006. Counterinsurgency (US Army Field Manual), FM 3–24 edition.
Brantingham, P., and Brantingham, P. 2008. Crime Pattern Theory. In Wortley, R., and Mazerolle, L., eds., Enviromental Criminology and Crime Analysis. 78–93.
Rossmo, D. K., and Rombouts, S. 2008. Geographic Pro ling. InWortley, R., andMazerolle, L., eds., Enviromental Criminology and Crime Analysis. 136–149.
US Army. 2004. Intelligence (US Army Field Manual), FM 2–0 edition.
Brown, R. A. 2007. Commander s Assessment: South Baghdad. Military Review 27–34.
Moulton, J. 2009. Rethinking IED Strategies from Iraq to Afghanistan. Military Review.
Mansoor, P. R., and Ulrich, M. S. 2007. A New COIN Center-of-Gravity Analysis. Military Review.
McFate, M. 2005. Iraq: The Social Context of IEDs. Military Review.
Reed, B. 2007. A Social Network Approach to Understanding an Insurgency. Parameters.
Dickerson, J., Simari, G., Subrahmanian, V., Kraus, S. 2010. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In Proc. 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2010). 299–306.
Paruchuri, P., Tambe, M., Ord´o˜nez, F., Kraus, S. 2006. Security in multiagent systems by policy randomization. In Proc. 5th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2006).
Shakarian, P., Otstott, C. What is Old is New: Countering IEDs by Disrupting the Weapon Supply, Military Review, pp. 46–52, 2011.
Kagan, F.; Kagan, K.; and Pletka, D. 2008. Iranian Infulence in the Levant, Iraq, and Afghanistan. Technical report, American Enterprise Institute.
Cochrane, M. 2008c. The Growing Threat of Special Groups in Baghdad. Backgrounder 25, The Institute for the Study of War.
Cochrane, M. 2008b. Special Groups Regenerate. Iraq Report 11, The Institute for the Study of War.
Cochrane, M. 2009. The Fragmentation of the Sadrist Movement. Iraq Report 12, The Institute for the Study of War.
Nasr, V. 2007. The Shia Revival. W.W. Norton and Co.
IMC. 2007. IRAQIS ON THE MOVE: Sectarian Displacement in Baghdad, An Assessment by International Medical Corps.
Shakarian, P., Subrahmanian, V.S., Sapino, M.L. SCARE: A Case Study with Baghdad, Proc. 2009 Intl. Conf. on Computational Cultural Dynamics (eds. D. Nau, A. Mannes), Dec. 2009, AAAI Press.
Shakarian, P., Subrahmanian, V.S., Sapino, M.L. 2012. GAPS: Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), 3, 1, to appear.
Shakarian, P., Subrahmanian, V.S. Region-based Geospatial Abduction with Counter-IED Applications, accepted for publication in:Wiil, U.K. (ed.).Counterterrorism and Open Source Intelligence, Springer Verlag Lecture Notes on Social Networks, to appear, 2011.
Shakarian, P., Nagel, M., Schuetzle, B., Subrahmanian, V.S. 2011. Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan, in Proc. 2011 Intl. Conf. on Innovative Applications of Arti cial Intelligence, Aug. 2011, AAAI Press.
Shakarian, P., Dickerson, J., Subrahmanian, V.S. 2012. Adversarial Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), to appear.
US Army. 1994. Intelligence Preparation of the Battle led (US Army Field Manual), FM 34–130 edition.
Afghanistan Information Management Services (AIMS). GIS / Mapping Services, http://http://www.aims.org.af/.
National Counter-Terrorism Center (NCTC). Worldwide Incident Tracking System (WITS), https://wits.nctc.gov/.
International Security Assistance Force (ISAF) Afghanistan. Press Releases, http://www.isaf.nato.int/article/isaf-releases/index.php.
Naval Postgraduate School (NPS). Program for Culture and Con ict Studies, http://www.nps.edu/programs/ccs/.
Conover, T. 2010. The Routes of Man: How Roads Are Changing the World and the Way We Live Today. Knopf.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Shakarian, P., Subrahmanian, V.S. (2011). Two Real-World Geospatial Abduction Applications. In: Geospatial Abduction. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1794-1_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1794-1_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1793-4
Online ISBN: 978-1-4614-1794-1
eBook Packages: Computer ScienceComputer Science (R0)