SlideShare uma empresa Scribd logo
1 de 16
Advanced Concepts Group War on   Terrorism Activities http:// www.sandia.gov/capabilitites/acg/index.html Presentation to DHS TV/TA Committee Nancy K. Hayden April 23, 2004 SAND2004-2130W Unclassified Unlimited Release Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration  under contract DE-AC04-94AL85000.
Terrorism: It’s About People ,[object Object],[object Object],[object Object],[object Object],Samuel Huntington  The Clash of Civilizations
Terrorism is a Complex Problem  Knowledge Network The key is to better understand the future—plan to change it, and change it Logistics/ Infrastructure Social/ psychological  Simulation Multidimensional Games Red, Blue, Green White, Purple MOADB indications & warnings increase hope warn first  responders manipulate - deceive -  control - dissuade -  deter - destroy enhanced collection scenario  driven hypothesis smart decision making  individuals    and groups mitigate Reality
Complexity Science Yields  New Analysis Paradigms Intrinsic network features  transcend domains   Santa Fe Institute Workshop April 10-11, 2003 How Complex Adaptive  Systems Dynamics  are Related to  Understanding and  Modeling Terrorist Behavior Sandia, Argonne, LANL, CIA, DTRA, MITRE, Navy Cornell, U of Penn, Intel,  CMU, Icosystems, USAF,  Galisteo, Humana, Alidade, U of Maryland, MIIS, Brookings
Systems Thinking: Frame the Problem Predict Analysis Function Timeframe System Complexity Describe Explore Interpret Infer Suggest Modeling approaches depend on what problem  is being addressed
The Advanced Concepts Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Problem and Approach Accomplishments and Current Work The Future of This Concept Improve our nation’s ability to "connect the dots" to allow interdiction prior to an terrorist event. Creation of a national “red gaming” capability to generate and collect hypothetical scenarios and the creation of a data warehouse that would store these scenarios and fragments, in a computer manipulatible format at the level of “observable” events.  Design of a tool,  the “Hypothesizer”, calling on the data warehouse to expand the view of analysts for what might be unfolding and to eliminate spurious “dots” inconsistent with reasonable scenarios. ,[object Object],[object Object],[object Object],[object Object],[object Object],The Science of Connecting the Dots
A Recurrent Need ,[object Object],[object Object],[object Object],[object Object],[object Object],Control Dangerous Things Control Bad Actors rists Enable Dynamic Mitigation Support Apprehension & Prosecution Strengthen Emergency Response Know Ourselves, the Threat, & the Current Situation Resources Targets & Public & Private Responders Harden Critical Resources Terr o
Problem The nation needs to develop deep and comprehensive knowledge of terrorism and make this knowledge accessible where it is needed, when it is needed, and in the form needed. Approach Create a (inter-)national network that provides insight on short and long-term terrorist-related issues using experts who are fed with high-grade source information and supported by an infrastructure that enables communication, analysis, and collaboration. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Accomplishments The Future
Knownet Toolbox ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network models 3d models Scenarios Visualizations VxInsight
SELDON -  Computational Simulation of Social Tipping Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Problem and Approach Accomplishments and Current Work The Future of This Concept Problem:  improve our understanding of the factors and processes that lead to the emergence and persistence of terrorists Research question:  how do we intervene in the recruitment pipeline so groups do not achieve size and structure necessary to support violent behavior? Approach:  develop a computational psycho-social model that allows us to play ‘what if’ games with interventions in the recruitment pipeline to identify those which will preclude the development of a group structure that will lead to violence
Threat Awareness and Response Relevant Information Time Event Delayed Detection Response Threshold System Overload Desired Response Curve Today’s Response Curve
Mentor/Pal Team ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Problem and Approach Accomplishments and Current Work The Future of This Concept ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Accelerometry, GSR, Pulse oximetry EMG, EKG, Respiration, Voice Face video, keystroke, Mouse x, y, click Voice recognition, EEG
S ense D ecide A ct C ommunicate  Project Team  ,[object Object],[object Object],[object Object],[object Object],Problem and Approach Accomplishments and Current Work The Future of This Concept ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Long Term Solutions… Goal: understand the society and shift the distribution in our favor Lovers Lover supporters Undecided Hater supporters Haters Lovers Lover supporters Undecided Hater supporters Haters

Mais conteúdo relacionado

Destaque

Terrorism Threat and Workplace Saftety
Terrorism Threat and Workplace SaftetyTerrorism Threat and Workplace Saftety
Terrorism Threat and Workplace SaftetyJmaes Macdonald
 
Boko haram rise and spread of fundamentalist islam in nigeria final
Boko haram  rise and spread of fundamentalist islam in nigeria finalBoko haram  rise and spread of fundamentalist islam in nigeria final
Boko haram rise and spread of fundamentalist islam in nigeria finalDibussi Tande
 
Al-Qaeda Terrorist PPT
Al-Qaeda Terrorist PPTAl-Qaeda Terrorist PPT
Al-Qaeda Terrorist PPTGift Ele
 
Global terrorism
Global terrorism Global terrorism
Global terrorism namaniitian
 
Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)Nitin Sharma
 
Terrorism presentation
Terrorism presentationTerrorism presentation
Terrorism presentationKamala Imanova
 
Terrorism
TerrorismTerrorism
Terrorismu439
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorismtariqmehsud
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 

Destaque (12)

The roots of terroris mxy
The roots of terroris mxyThe roots of terroris mxy
The roots of terroris mxy
 
Terrorism Threat and Workplace Saftety
Terrorism Threat and Workplace SaftetyTerrorism Threat and Workplace Saftety
Terrorism Threat and Workplace Saftety
 
Boko haram rise and spread of fundamentalist islam in nigeria final
Boko haram  rise and spread of fundamentalist islam in nigeria finalBoko haram  rise and spread of fundamentalist islam in nigeria final
Boko haram rise and spread of fundamentalist islam in nigeria final
 
Al-Qaeda Terrorist PPT
Al-Qaeda Terrorist PPTAl-Qaeda Terrorist PPT
Al-Qaeda Terrorist PPT
 
ISIS
ISISISIS
ISIS
 
Global terrorism
Global terrorism Global terrorism
Global terrorism
 
Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Terrorism presentation
Terrorism presentationTerrorism presentation
Terrorism presentation
 
Terrorism
TerrorismTerrorism
Terrorism
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorism
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

Semelhante a Acg Terr Sand2004 2130w

Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerAmit Sheth
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsLea Shanley
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
Distributed Scalable Systems Short Overview
Distributed Scalable Systems Short OverviewDistributed Scalable Systems Short Overview
Distributed Scalable Systems Short OverviewRNeches
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
The Importance of Large-Scale Computer Science Research Efforts
The Importance of Large-Scale Computer Science Research EffortsThe Importance of Large-Scale Computer Science Research Efforts
The Importance of Large-Scale Computer Science Research EffortsLarry Smarr
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebNoshir Contractor
 
Transforming Intelligence Analysis with Knowledge Graphs
Transforming Intelligence Analysis with Knowledge GraphsTransforming Intelligence Analysis with Knowledge Graphs
Transforming Intelligence Analysis with Knowledge GraphsNeo4j
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Stanford University
 
Collaboration Technology for Public Health and Humanitarian Action and Global...
Collaboration Technology for Public Health and Humanitarian Action and Global...Collaboration Technology for Public Health and Humanitarian Action and Global...
Collaboration Technology for Public Health and Humanitarian Action and Global...Taha Kass-Hout, MD, MS
 
Ben Shneiderman: Thrill of Discovery
Ben Shneiderman: Thrill of DiscoveryBen Shneiderman: Thrill of Discovery
Ben Shneiderman: Thrill of Discoveryruss9595
 
Social Computing : Virtual Worlds
Social Computing : Virtual WorldsSocial Computing : Virtual Worlds
Social Computing : Virtual Worldstjoozey tjoozey
 

Semelhante a Acg Terr Sand2004 2130w (20)

Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft Power
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Distributed Scalable Systems Short Overview
Distributed Scalable Systems Short OverviewDistributed Scalable Systems Short Overview
Distributed Scalable Systems Short Overview
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
cyber_sunum.pdf
cyber_sunum.pdfcyber_sunum.pdf
cyber_sunum.pdf
 
The Importance of Large-Scale Computer Science Research Efforts
The Importance of Large-Scale Computer Science Research EffortsThe Importance of Large-Scale Computer Science Research Efforts
The Importance of Large-Scale Computer Science Research Efforts
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
 
Transforming Intelligence Analysis with Knowledge Graphs
Transforming Intelligence Analysis with Knowledge GraphsTransforming Intelligence Analysis with Knowledge Graphs
Transforming Intelligence Analysis with Knowledge Graphs
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8
 
Collaboration Technology for Public Health and Humanitarian Action and Global...
Collaboration Technology for Public Health and Humanitarian Action and Global...Collaboration Technology for Public Health and Humanitarian Action and Global...
Collaboration Technology for Public Health and Humanitarian Action and Global...
 
Ben Shneiderman: Thrill of Discovery
Ben Shneiderman: Thrill of DiscoveryBen Shneiderman: Thrill of Discovery
Ben Shneiderman: Thrill of Discovery
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Computing : Virtual Worlds
Social Computing : Virtual WorldsSocial Computing : Virtual Worlds
Social Computing : Virtual Worlds
 

Acg Terr Sand2004 2130w

  • 1. Advanced Concepts Group War on Terrorism Activities http:// www.sandia.gov/capabilitites/acg/index.html Presentation to DHS TV/TA Committee Nancy K. Hayden April 23, 2004 SAND2004-2130W Unclassified Unlimited Release Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.
  • 2.
  • 3. Terrorism is a Complex Problem Knowledge Network The key is to better understand the future—plan to change it, and change it Logistics/ Infrastructure Social/ psychological Simulation Multidimensional Games Red, Blue, Green White, Purple MOADB indications & warnings increase hope warn first responders manipulate - deceive - control - dissuade - deter - destroy enhanced collection scenario driven hypothesis smart decision making individuals and groups mitigate Reality
  • 4. Complexity Science Yields New Analysis Paradigms Intrinsic network features transcend domains Santa Fe Institute Workshop April 10-11, 2003 How Complex Adaptive Systems Dynamics are Related to Understanding and Modeling Terrorist Behavior Sandia, Argonne, LANL, CIA, DTRA, MITRE, Navy Cornell, U of Penn, Intel, CMU, Icosystems, USAF, Galisteo, Humana, Alidade, U of Maryland, MIIS, Brookings
  • 5. Systems Thinking: Frame the Problem Predict Analysis Function Timeframe System Complexity Describe Explore Interpret Infer Suggest Modeling approaches depend on what problem is being addressed
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Network models 3d models Scenarios Visualizations VxInsight
  • 12.
  • 13. Threat Awareness and Response Relevant Information Time Event Delayed Detection Response Threshold System Overload Desired Response Curve Today’s Response Curve
  • 14.
  • 15.
  • 16. Long Term Solutions… Goal: understand the society and shift the distribution in our favor Lovers Lover supporters Undecided Hater supporters Haters Lovers Lover supporters Undecided Hater supporters Haters

Notas do Editor

  1. While globalization is making the world “smaller”, we will continue to live in a world of increasing cultural, economic, and technological divides that have the potential to fuel the fires of hate and resentment against the west. In the studies done since September 11, including our own study within the ACG, one repeatedly sees calls for understanding and addressing “root causes” of terrorism, as well as understanding and protecting against our vulnerabilities. A key part of security will be understand what this means, and find ways to deal with these root causes, drawing on communication and cooperation across these divides. Current administration recognizes these factors and is engaged in proactive research partnerships globally. One such initiative is the US – Mexico Cooperation.
  2. Structural and functional properties of complex systems rest on foundations in mathematics, physics, biology, social sciences, computer science, philosophy, art, technology. Methods developed for artificial intelligence, artificial life, catastrophe theory, chaos theory, nonlinear dynamics, evolution, systems theory, statistical mechanics can be applied cross-domains using the underlying formalisms, and structure and functional framework of networks. MIT search on complexity:   information theory, computer science, physics, manufacturing, applied mathematics, electrical engineering control systems Workshop participants: Crutchfield – evolutionary dynamics, networks, need to define observables for terrorism. Castillo-Sanchez: epidemiological formalism, when applied to ideological transference examined susceptibility, resilience of extreme communities and spread of ideologies with phase transitions dependent upon initial core group size and rate of recruitment; ANL – work on interconnected networks; Eric bonabeau: swarm behaviors; psychology of terrorism; user needs; INTEL – real world problems of cyber security and organizational robustness under malicious attack scenarios. Josh Epstein – Brookings work for spread of bio-agents and inoculation strategies included people interacting with institutions and infrastructures. There were four general themes that could be abstracted from the workshop.        The need for increased formalism in areas such as standardized methodologies and approaches, and accessible data sets – aka infrastructure or mechanisms allowing models and simulation tools to be built        Issues related to use of the models, including definition of user needs, questions, and type of analysis desired correlated to what different model types can provide        Need for emergence of new paradigms – new ways of thinking about organizations (non-linear), cross-disciplinary conversations and novel application of metaphors across fields, cross-agency conversations…        Discussions around fundamental understandings of terrorist organizations as complex systems and the nature of terrorism itself  
  3. Complexity: Order from disorder – what does system structure look like? Random? Centralized? Growing? Directed? Degree of connectivity? Embedded? Timescale of Processes and decision making: Evolutionary dynamics look at functional role of network and how fitness functions evolve. Robustness can be examined with respect to how systems adapt, evolve in response to environmental perturbations – Self-aware? Here it is key to look at the immediate needs and threats, versus long term. Key will be timeframe of these – punctuated equilibria? Epochal? Diffusive? Function role for analysis (human or machine) -
  4. ACG-sponsored workshop aimed at vetting the KnowNet concept Questions addressed: what needs KnowNet would serve, how the network might be employed by various end users and researchers, how the human and technical aspects of the network might be structured, how the KnowNet might be grown and managed, and how it might be funded Gary Ackerman, MIIS Harry Betz, FBI / NM AG Jeff Cares, Alidade Hsinchun Chen, U of AZ John Cummings, DHS David Hamon, DTRA Merle Lefkoff, LANL Mark Maybury, MITRE Ariel Merari, Peter Levine Greg Treverton, RAND Patricia Medvick, PNNL Jerrold Post, GWU Raghu Ramakrishnan, U of WI Marc Sageman, U of PA Desmond Saunders-Newton, DARPA Marissa Urgo, DOE
  5. I will move through this section quickly, as you will be hearing more about these tools later… These tools use information accessable through the Library and News sections -Info vis tools for summarizing large data sets (VxInsight) Attensity Corp. in Salt Lake City has created what amounts to a high-tech sentence diagrammer, which can examine a document and figure out whether a reference to "Wood," for example, means a person or a place. (Washington Post) Linguistics based. Potential for ontology automation?????? -scenarios and models for representation, communication, and further analysis
  6. Organization by information view (local navigation) is consistent with the general requirement of providing different views for different needs. VxInsight is featured, in this instance, showing the distribution of patents, with the hills showing the highest concentration of data. This particular visualization can be used to determine areas ripe for innovation. We’ve seen community and tools, next- the information….. What are other useful ways to visualize information? Are they cheap? Effective? Understandable?
  7. See “chatter” in signal where there are ambiguous warnings and signals…when event happens, it is often too late for a resopnse – goes into system overload….like emergency room experience if wait too long to go. Need to visit doctor early on to prevent the situation in the first place, and have actionable intermediate steps if headed towards a problem. At present, have too much “chatter: in the system to know that are heading towards a problem. What are the means by which we can increase the quality of the signal? understanding the threat (know what is a significant event within a chain of events and context) understanding our vulnerabilities (contributes to relevance of information)
  8. “With suicide terrorism, the attributional problem is to understand why nonpathological individuals respond to novel situational factors in numbers sufficient for recruiting organizations to implement policies. In the Middle East, perceived contexts in which suicide bombers and supporters express themselves include a collective sense of historical injustice, political subservience, and social humiliation vis-à-vis global powers and allies, as well as countervailing religious hope (supporting online text on radical Islam's historical novelty). Addressing such perceptions does not entail accepting them as simple reality; however, ignoring the causes of these perceptions risks misidentifying causes and solutions for suicide bombing”. Scott Atran, Science, Vol 299, March 7 2003 Beginning in the late 70’s, Mark Granovetter, initiated research into the system dynamics involved in individual and collective behaviors, developing mathematical models for thresholds of collective behaviors, and the complex relationship between these thresholds, other causal factors of behavior, and “emergent norms”, . A key concept in his work was that of “Threshold”: The number or proportion of others who must make one decision before a given actor does so. This threshold point is where net benefits begin to exceed net costs for that particular actor. In the twenty years since,a rich body of research has contributed to this field, including best seller books, such as gladwell’s “”the Tipping Point” , which looks at how major society changes can come about from little things, and Gary Klein’s work on human decision making (Sources of Power), showing the importance of recognizing “leverage points”. Recent work by Samuel Bowles and others at the Santa Fe Institute (winter 2000) has taken this work further to explore the dynamics of trust and exclusion in networks…modeling trust as a best response in a mixed-strategy Nash equilibrium…this work explores the idea of parochial networks, which he defines as “sets of agents negated in relatively frequent, non-anonymous interactions structured by high entry and exit costs, but lacking centralized collective decision-making institutions” …”often motivated by racial and ethnic hatred and religious intolerance”…as an optimization problem. These examples are part of a growing body of research work that lays a foundation for examining social dynamics in the language and formalism of complex systems analysis.