来源类型 | Report
|
规范类型 | 报告
|
来源ID | RR-215-NAVY
|
| Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base |
| Paul K. Davis; Walter L. Perry; Ryan Andrew Brown; Douglas Yeung; Parisa Roshan; Phoenix Voorhies
|
发表日期 | 2013-06-11
|
出版年 | 2013
|
语种 | 英语
|
结论 | Relevant information may be proximate (e.g., during preparations for or part of an attack) or from previous observations over days, months, or years.Three Types of Data for Using Behavioral Indicators to Detect Potential Violent Attacks- Many detection efforts focus on communication patterns. These include monitoring and analysis of online communications, text analysis and natural language processing, and speech analysis.
- Another class of detection efforts focus on pattern-of-life data, including data on communication, travel, and purchasing, much of which is held in private-industry databases.
- A third class of detection efforts focus on individuals' physical movement and physiology. These include monitoring and analysis of kinetics and gross movement (for example, the gait of individuals carrying weighted objects) as well as physiological state and reactions (for example, voice stress and facial expression).
Cross-Cutting Issues - There is current value and unrealized potential for using behavioral indicators as part of a system to detect attacks. Unfortunately, analytic quantification of that potential is poorly developed.
- Ongoing research is a mix of laboratory- and field-based empirical research and modeling. Operators in the field are often well ahead of the science base, which can be either good or bad.
- Probing to stimulate behavioral responses can sometimes improve detection effectiveness significantly, but such approaches involve significant tradeoffs between detection effectiveness and negative consequences for civil liberties, commerce, and the perceived legitimacy of the security system.
- Much of the literature and discussion focuses on detecting behavioral responses in the absence of countermeasures, but countermeasures are in fact a big problem.
- Many of the potentially attractive technologies and methods currently depend on such relatively benign circumstances as close-up observation by humans. Operational value will be much enhanced by improved capabilities to make observations from a distance, automatically, and in some instances without the subjects being aware of the observation.
- Nothing on the horizon presents a "magic bullet" for threat detection, raising the potential importance of effective information fusion, including networked real-time or near-real-time integration of information.
- A major challenge in detection systems is the tradeoff between false negatives (failure to detect) and false positives (false alarms).
- Many of the technologies and methods associated with monitoring behavioral indicators raise profound civil liberties concerns. Many problems and errors can be avoided by up-front review of procedures by experts.
|
摘要 | Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might — along with other information — help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist. |
目录 |
Chapter One
Introduction
Chapter Two
Developing Intent
Chapter Three
Planning and Laying Groundwork
Chapter Four
Immediate Pre-Execution
Chapter Five
Execution and Aftermath
Chapter Six
Technologies and Methods
Chapter Seven
Cross-Cutting Issues
Chapter Eight
Conclusions
Appendix A
Methodological Notes
Appendix B
References and Cases to Support Historic Examples
Appendix C
References and Cases to Support Indicator Tables
Appendix D
Information Fusion Methods
|
主题 | Counterterrorism
; Emerging Technologies
; Suicide Attack
; Terrorist Bombings
|
URL | https://www.rand.org/pubs/research_reports/RR215.html
|
来源智库 | RAND Corporation (United States)
|
资源类型 | 智库出版物
|
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/522283
|
推荐引用方式 GB/T 7714 |
Paul K. Davis,Walter L. Perry,Ryan Andrew Brown,et al. Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base. 2013.
|