来源类型 | Research Reports
|
规范类型 | 报告
|
ISBN | 9780833080929
|
来源ID | RR-215-NAVY
|
| Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base |
| Paul K. Davis; Walter L. Perry; Ryan Andrew Brown; Douglas Yeung; Parisa Roshan; Phoenix Voorhies
|
发表日期 | 2013
|
出版年 | 2013
|
页码 | 300
|
语种 | 英语
|
结论 |
Relevant information may be proximate (e.g., during preparations for or part of an attack) or from previous observations over days, months, or years.Three Types of Data for Using Behavioral Indicators to Detect Potential Violent Attacks- Many detection efforts focus on communication patterns. These include monitoring and analysis of online communications, text analysis and natural language processing, and speech analysis.
- Another class of detection efforts focus on pattern-of-life data, including data on communication, travel, and purchasing, much of which is held in private-industry databases.
- A third class of detection efforts focus on individuals' physical movement and physiology. These include monitoring and analysis of kinetics and gross movement (for example, the gait of individuals carrying weighted objects) as well as physiological state and reactions (for example, voice stress and facial expression).
Cross-Cutting Issues - There is current value and unrealized potential for using behavioral indicators as part of a system to detect attacks. Unfortunately, analytic quantification of that potential is poorly developed.
- Ongoing research is a mix of laboratory- and field-based empirical research and modeling. Operators in the field are often well ahead of the science base, which can be either good or bad.
- Probing to stimulate behavioral responses can sometimes improve detection effectiveness significantly, but such approaches involve significant tradeoffs between detection effectiveness and negative consequences for civil liberties, commerce, and the perceived legitimacy of the security system.
- Much of the literature and discussion focuses on detecting behavioral responses in the absence of countermeasures, but countermeasures are in fact a big problem.
- Many of the potentially attractive technologies and methods currently depend on such relatively benign circumstances as close-up observation by humans. Operational value will be much enhanced by improved capabilities to make observations from a distance, automatically, and in some instances without the subjects being aware of the observation.
- Nothing on the horizon presents a "magic bullet" for threat detection, raising the potential importance of effective information fusion, including networked real-time or near-real-time integration of information.
- A major challenge in detection systems is the tradeoff between false negatives (failure to detect) and false positives (false alarms).
- Many of the technologies and methods associated with monitoring behavioral indicators raise profound civil liberties concerns. Many problems and errors can be avoided by up-front review of procedures by experts.
|
摘要 |
- New technologies and methods for using behavioral indicators to detect potential violent attacks should be routinely and consistently subject to objective peer review and adequate community scrutiny, although sometimes within a classified domain.
- Vulnerability to countermeasures should be a prime consideration in evaluating investment programs.
- Investment decisions about individual technologies and methods should be informed by a structured portfolio-analysis approach.
- More research should be devoted to mitigating the costs of false alarms — not just by reducing the false-alarm rate, but also by mitigating such bad consequences of false alarms as wasting people's time, raising their fears, insulting their dignity, or invading their privacy.
- More effort should go toward developing methods for effective information fusion. Making sense of fuzzy, imperfect, heterogeneous information will require automated processing of vast amounts of data combined with human expertise and judgment. The emphasis should be on man-machine cooperation and not just automation.
|
主题 | Counterterrorism
; Emerging Technologies
; Suicide Attack
; Terrorist Bombings
|
URL | https://www.rand.org/pubs/research_reports/RR215.html
|
来源智库 | RAND Corporation (United States)
|
资源类型 | 智库出版物
|
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/107579
|
推荐引用方式 GB/T 7714 |
Paul K. Davis,Walter L. Perry,Ryan Andrew Brown,et al. Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base. 2013.
|