Detecting, tracking, and counteracting terrorist networks via hidden Markov models

In reaction to the tragic events of September 11th 2001, DARPA made plans to develop a terrorism information awareness system with an eye to the detection and interdiction of terrorist activities. Under this program and in conjunction with Aptima, Inc., the University of Connecticut is developing its adaptive safety analysis and monitoring (ASAM) tool for assisting US intelligence analysts with: 1) identifying terrorist threats; 2) predicting possible terrorist actions; and 3) elucidating ways to counteract terrorist activities. The focus of this paper, and an important part of the ASAM tool, is modeling and detecting terrorist networks using hidden Markov models (HMMs). The HMMs used in the ASAM tool model the time evolution of suspicious patterns within the information space gathered from sources such as financial institutions, intelligence reports, newspapers, emails, etc. Here we report our software's ability to detect multiple terrorist networks within the same observation space, distinguish transaction "signatures" of terrorist activity from the ambient background of transactions of benign origin, and incorporate information relating to terrorist activity, timing and sequence.

[1]  Roy L. Streit,et al.  Frequency line tracking using hidden Markov models , 1990, IEEE Trans. Acoust. Speech Signal Process..

[2]  Krishna R. Pattipati,et al.  An overview of decision networks and organizations , 1998, IEEE Trans. Syst. Man Cybern. Part C.

[3]  Peter Willett,et al.  Quickest detection of superimposed hidden Markov models using a multiple target tracker , 1998, 1998 IEEE Aerospace Conference Proceedings (Cat. No.98TH8339).

[4]  J. Andel Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.

[5]  Peter Willett,et al.  Some methods to evaluate the performance of Page's test as used to detect transient signals , 1999, IEEE Trans. Signal Process..

[6]  Peter Willett,et al.  Detection of hidden Markov model transient signals , 2000, IEEE Trans. Aerosp. Electron. Syst..

[7]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[8]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[9]  Krishna R. Pattipati,et al.  Distributed detection in teams with partial information: a normative-descriptive model , 1993, IEEE Trans. Syst. Man Cybern..

[10]  L. Rabiner,et al.  An introduction to hidden Markov models , 1986, IEEE ASSP Magazine.

[11]  Michèle Basseville,et al.  Detection of abrupt changes , 1993 .

[12]  Yakov Bar-Shalom,et al.  Multitarget-Multisensor Tracking: Principles and Techniques , 1995 .

[13]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .

[14]  Samuel S. Blackman,et al.  Design and Analysis of Modern Tracking Systems , 1999 .

[15]  R. E. Bethel,et al.  A PDF multitarget tracker , 1994 .

[16]  Krishna R. Pattipati,et al.  Multi-signal flow graphs: a novel approach for system testability analysis and fault diagnosis , 1994 .

[17]  K. Carley,et al.  Evolution of Networks ON THE EVOLUTION OF SOCIAL AND ORGANIZATIONAL NETWORKS , 2001 .

[18]  T. Moon The expectation-maximization algorithm , 1996, IEEE Signal Process. Mag..

[19]  Rakesh K. Bansal,et al.  An algorithm for detecting a change in a stochastic process , 1986, IEEE Trans. Inf. Theory.

[20]  L. R. Rabiner,et al.  A probabilistic distance measure for hidden Markov models , 1985, AT&T Technical Journal.

[21]  D. Siegmund Sequential Analysis: Tests and Confidence Intervals , 1985 .

[22]  Peter Willett,et al.  Superimposed HMM transient detection via target tracking ideas , 2001 .