G2TT
来源类型Report
规范类型报告
来源IDRR-215-NAVY
Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base
Paul K. Davis; Walter L. Perry; Ryan Andrew Brown; Douglas Yeung; Parisa Roshan; Phoenix Voorhies
发表日期2013-06-11
出版年2013
语种英语
结论

Relevant information may be proximate (e.g., during preparations for or part of an attack) or from previous observations over days, months, or years.

Three Types of Data for Using Behavioral Indicators to Detect Potential Violent Attacks

  • Many detection efforts focus on communication patterns. These include monitoring and analysis of online communications, text analysis and natural language processing, and speech analysis.
  • Another class of detection efforts focus on pattern-of-life data, including data on communication, travel, and purchasing, much of which is held in private-industry databases.
  • A third class of detection efforts focus on individuals' physical movement and physiology. These include monitoring and analysis of kinetics and gross movement (for example, the gait of individuals carrying weighted objects) as well as physiological state and reactions (for example, voice stress and facial expression).

Cross-Cutting Issues

  • There is current value and unrealized potential for using behavioral indicators as part of a system to detect attacks. Unfortunately, analytic quantification of that potential is poorly developed.
  • Ongoing research is a mix of laboratory- and field-based empirical research and modeling. Operators in the field are often well ahead of the science base, which can be either good or bad.
  • Probing to stimulate behavioral responses can sometimes improve detection effectiveness significantly, but such approaches involve significant tradeoffs between detection effectiveness and negative consequences for civil liberties, commerce, and the perceived legitimacy of the security system.
  • Much of the literature and discussion focuses on detecting behavioral responses in the absence of countermeasures, but countermeasures are in fact a big problem.
  • Many of the potentially attractive technologies and methods currently depend on such relatively benign circumstances as close-up observation by humans. Operational value will be much enhanced by improved capabilities to make observations from a distance, automatically, and in some instances without the subjects being aware of the observation.
  • Nothing on the horizon presents a "magic bullet" for threat detection, raising the potential importance of effective information fusion, including networked real-time or near-real-time integration of information.
  • A major challenge in detection systems is the tradeoff between false negatives (failure to detect) and false positives (false alarms).
  • Many of the technologies and methods associated with monitoring behavioral indicators raise profound civil liberties concerns. Many problems and errors can be avoided by up-front review of procedures by experts.
摘要

Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might — along with other information — help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Developing Intent

  • Chapter Three

    Planning and Laying Groundwork

  • Chapter Four

    Immediate Pre-Execution

  • Chapter Five

    Execution and Aftermath

  • Chapter Six

    Technologies and Methods

  • Chapter Seven

    Cross-Cutting Issues

  • Chapter Eight

    Conclusions

  • Appendix A

    Methodological Notes

  • Appendix B

    References and Cases to Support Historic Examples

  • Appendix C

    References and Cases to Support Indicator Tables

  • Appendix D

    Information Fusion Methods

主题Counterterrorism ; Emerging Technologies ; Suicide Attack ; Terrorist Bombings
URLhttps://www.rand.org/pubs/research_reports/RR215.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/522283
推荐引用方式
GB/T 7714
Paul K. Davis,Walter L. Perry,Ryan Andrew Brown,et al. Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base. 2013.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR215.pdf(1387KB)智库出版物 限制开放CC BY-NC-SA浏览
x1495315148364.jpg.p(5KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Paul K. Davis]的文章
[Walter L. Perry]的文章
[Ryan Andrew Brown]的文章
百度学术
百度学术中相似的文章
[Paul K. Davis]的文章
[Walter L. Perry]的文章
[Ryan Andrew Brown]的文章
必应学术
必应学术中相似的文章
[Paul K. Davis]的文章
[Walter L. Perry]的文章
[Ryan Andrew Brown]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR215.pdf
格式: Adobe PDF
文件名: x1495315148364.jpg.pagespeed.ic.itD9mrnUvH.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。