G2TT
来源类型Research Reports
规范类型报告
ISBN9780833080929
来源IDRR-215-NAVY
Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base
Paul K. Davis; Walter L. Perry; Ryan Andrew Brown; Douglas Yeung; Parisa Roshan; Phoenix Voorhies
发表日期2013
出版年2013
页码300
语种英语
结论

Relevant information may be proximate (e.g., during preparations for or part of an attack) or from previous observations over days, months, or years.

Three Types of Data for Using Behavioral Indicators to Detect Potential Violent Attacks

  • Many detection efforts focus on communication patterns. These include monitoring and analysis of online communications, text analysis and natural language processing, and speech analysis.
  • Another class of detection efforts focus on pattern-of-life data, including data on communication, travel, and purchasing, much of which is held in private-industry databases.
  • A third class of detection efforts focus on individuals' physical movement and physiology. These include monitoring and analysis of kinetics and gross movement (for example, the gait of individuals carrying weighted objects) as well as physiological state and reactions (for example, voice stress and facial expression).

Cross-Cutting Issues

  • There is current value and unrealized potential for using behavioral indicators as part of a system to detect attacks. Unfortunately, analytic quantification of that potential is poorly developed.
  • Ongoing research is a mix of laboratory- and field-based empirical research and modeling. Operators in the field are often well ahead of the science base, which can be either good or bad.
  • Probing to stimulate behavioral responses can sometimes improve detection effectiveness significantly, but such approaches involve significant tradeoffs between detection effectiveness and negative consequences for civil liberties, commerce, and the perceived legitimacy of the security system.
  • Much of the literature and discussion focuses on detecting behavioral responses in the absence of countermeasures, but countermeasures are in fact a big problem.
  • Many of the potentially attractive technologies and methods currently depend on such relatively benign circumstances as close-up observation by humans. Operational value will be much enhanced by improved capabilities to make observations from a distance, automatically, and in some instances without the subjects being aware of the observation.
  • Nothing on the horizon presents a "magic bullet" for threat detection, raising the potential importance of effective information fusion, including networked real-time or near-real-time integration of information.
  • A major challenge in detection systems is the tradeoff between false negatives (failure to detect) and false positives (false alarms).
  • Many of the technologies and methods associated with monitoring behavioral indicators raise profound civil liberties concerns. Many problems and errors can be avoided by up-front review of procedures by experts.
摘要
  • New technologies and methods for using behavioral indicators to detect potential violent attacks should be routinely and consistently subject to objective peer review and adequate community scrutiny, although sometimes within a classified domain.
  • Vulnerability to countermeasures should be a prime consideration in evaluating investment programs.
  • Investment decisions about individual technologies and methods should be informed by a structured portfolio-analysis approach.
  • More research should be devoted to mitigating the costs of false alarms — not just by reducing the false-alarm rate, but also by mitigating such bad consequences of false alarms as wasting people's time, raising their fears, insulting their dignity, or invading their privacy.
  • More effort should go toward developing methods for effective information fusion. Making sense of fuzzy, imperfect, heterogeneous information will require automated processing of vast amounts of data combined with human expertise and judgment. The emphasis should be on man-machine cooperation and not just automation.
主题Counterterrorism ; Emerging Technologies ; Suicide Attack ; Terrorist Bombings
URLhttps://www.rand.org/pubs/research_reports/RR215.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/107579
推荐引用方式
GB/T 7714
Paul K. Davis,Walter L. Perry,Ryan Andrew Brown,et al. Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base. 2013.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1495315148364.jpg(9KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR215.pdf(1446KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Paul K. Davis]的文章
[Walter L. Perry]的文章
[Ryan Andrew Brown]的文章
百度学术
百度学术中相似的文章
[Paul K. Davis]的文章
[Walter L. Perry]的文章
[Ryan Andrew Brown]的文章
必应学术
必应学术中相似的文章
[Paul K. Davis]的文章
[Walter L. Perry]的文章
[Ryan Andrew Brown]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1495315148364.jpg
格式: JPEG
文件名: RAND_RR215.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。