Two Real-World Geospatial Abduction Applications

Chapter

Abstract

In this chapter, we discuss two real-world applications of geospatial abduction problems (GAPs). While both applications deal with finding weapons caches that support improvised explosive devices used by insurgent terror groups, they operate in two different environments. SCARE (Spatio-Cultural Abductive Reasoning Engine) implements point-based geospatial abduction and was used to find IED weapons caches in Baghdad. In contrast, SCARE-S2 is an extension of SCARE to region-based geospatial abduction which has been used, with various modifications, to find high value targets (either large weapons caches or insurgent commanders) in certain provinces of Afghanistan. The accuracy of both systems has been tested on real-world data, and over 18 organizations have requested or used either SCARE or SCARE-S2.

Keywords

Explosive Heroin Iraq Nasr Donut 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    von Clausewitz, C. 1832. On War. Wilder Publications.Google Scholar
  2. 2.
    US Army. 2006. Counterinsurgency (US Army Field Manual), FM 3–24 edition.Google Scholar
  3. 3.
    Brantingham, P., and Brantingham, P. 2008. Crime Pattern Theory. In Wortley, R., and Mazerolle, L., eds., Enviromental Criminology and Crime Analysis. 78–93.Google Scholar
  4. 4.
    Rossmo, D. K., and Rombouts, S. 2008. Geographic Pro ling. InWortley, R., andMazerolle, L., eds., Enviromental Criminology and Crime Analysis. 136–149.Google Scholar
  5. 5.
    US Army. 2004. Intelligence (US Army Field Manual), FM 2–0 edition.Google Scholar
  6. 6.
    Brown, R. A. 2007. Commander s Assessment: South Baghdad. Military Review 27–34.Google Scholar
  7. 7.
    Moulton, J. 2009. Rethinking IED Strategies from Iraq to Afghanistan. Military Review.Google Scholar
  8. 8.
    Mansoor, P. R., and Ulrich, M. S. 2007. A New COIN Center-of-Gravity Analysis. Military Review.Google Scholar
  9. 9.
    McFate, M. 2005. Iraq: The Social Context of IEDs. Military Review.Google Scholar
  10. 10.
    Reed, B. 2007. A Social Network Approach to Understanding an Insurgency. Parameters.Google Scholar
  11. 11.
    Dickerson, J., Simari, G., Subrahmanian, V., Kraus, S. 2010. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In Proc. 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2010). 299–306.Google Scholar
  12. 12.
    Paruchuri, P., Tambe, M., Ord´o˜nez, F., Kraus, S. 2006. Security in multiagent systems by policy randomization. In Proc. 5th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2006).Google Scholar
  13. 13.
    Shakarian, P., Otstott, C. What is Old is New: Countering IEDs by Disrupting the Weapon Supply, Military Review, pp. 46–52, 2011.Google Scholar
  14. 14.
    Kagan, F.; Kagan, K.; and Pletka, D. 2008. Iranian Infulence in the Levant, Iraq, and Afghanistan. Technical report, American Enterprise Institute.Google Scholar
  15. 15.
    Cochrane, M. 2008c. The Growing Threat of Special Groups in Baghdad. Backgrounder 25, The Institute for the Study of War.Google Scholar
  16. 16.
    Cochrane, M. 2008b. Special Groups Regenerate. Iraq Report 11, The Institute for the Study of War.Google Scholar
  17. 17.
    Cochrane, M. 2009. The Fragmentation of the Sadrist Movement. Iraq Report 12, The Institute for the Study of War.Google Scholar
  18. 18.
    Nasr, V. 2007. The Shia Revival. W.W. Norton and Co.Google Scholar
  19. 19.
    IMC. 2007. IRAQIS ON THE MOVE: Sectarian Displacement in Baghdad, An Assessment by International Medical Corps.Google Scholar
  20. 20.
    Shakarian, P., Subrahmanian, V.S., Sapino, M.L. SCARE: A Case Study with Baghdad, Proc. 2009 Intl. Conf. on Computational Cultural Dynamics (eds. D. Nau, A. Mannes), Dec. 2009, AAAI Press.Google Scholar
  21. 21.
    Shakarian, P., Subrahmanian, V.S., Sapino, M.L. 2012. GAPS: Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), 3, 1, to appear.Google Scholar
  22. 22.
    Shakarian, P., Subrahmanian, V.S. Region-based Geospatial Abduction with Counter-IED Applications, accepted for publication in:Wiil, U.K. (ed.).Counterterrorism and Open Source Intelligence, Springer Verlag Lecture Notes on Social Networks, to appear, 2011.Google Scholar
  23. 23.
    Shakarian, P., Nagel, M., Schuetzle, B., Subrahmanian, V.S. 2011. Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan, in Proc. 2011 Intl. Conf. on Innovative Applications of Arti cial Intelligence, Aug. 2011, AAAI Press.Google Scholar
  24. 24.
    Shakarian, P., Dickerson, J., Subrahmanian, V.S. 2012. Adversarial Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), to appear.Google Scholar
  25. 25.
    US Army. 1994. Intelligence Preparation of the Battle led (US Army Field Manual), FM 34–130 edition.Google Scholar
  26. 26.
    Afghanistan Information Management Services (AIMS). GIS / Mapping Services, http://http://www.aims.org.af/.
  27. 27.
    National Counter-Terrorism Center (NCTC). Worldwide Incident Tracking System (WITS), https://wits.nctc.gov/.
  28. 28.
    International Security Assistance Force (ISAF) Afghanistan. Press Releases, http://www.isaf.nato.int/article/isaf-releases/index.php.
  29. 29.
    Naval Postgraduate School (NPS). Program for Culture and Con ict Studies, http://www.nps.edu/programs/ccs/.
  30. 30.
    Conover, T. 2010. The Routes of Man: How Roads Are Changing the World and the Way We Live Today. Knopf.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Kings Valley DriveBowieUSA
  2. 2.University of Maryland - College ParkPotomacUSA

Personalised recommendations