A SCALABLE INFERENCING SYSTEM FOR CIVILIAN TERRORISM INTELLIGENCE
AbstractThis paper describes an approach to developing a scalable intelligence inferencing system for civilian terrorism intelligence. There is an obvious need for such a system in light of failures in the intelligence community leading to the September 11th attacks. It is intended as a supplement to human intelligence analysis; while intelligence analysts are good at what they do, it’s hard to see what information is important and integrate it. Information and inferences don’t always flow up the chain of command and don’t always get to where they are needed. Automated assistance can aid intelligence analysts, and managers helping to prevent other tragedies from occurring. The work explored an approach to automate (or provide assistance for) information fusion which effectively makes inferences over huge amounts of information and number of events using a scalable architecture. It is based on number of technical thought patterns: (1)evolutionary development of a system; (2)the use of layered inference graphs and tree based interpretations of them; (3) combining top-down with bottom-up inference; (4) and pattern matching with (un)certainty and importance calculations; (5)explanation based user interaction; and (6)using spatio-temporal localization, extrapolation/simulation and parallelism to raise inferencing performance to acceptable levels.
I. Bratko. Prolog Programming for AI. Addison Wesley Publications. Third edition, 2001.
W.F.Clocksin and C.S.Mellish. Programming in Prolog, 4th edition. Springer-Verlag publication.
Hongge Gao. Formal Information Fusion Framework. Information fusion group, Dec 2000. http://www.ece.neu.edu/groups/ifg/projects.htm
Terrorism in the United States. US department of Justice. FBI publications. 1999 Report. http://www.fbi.gov/publications/terror/terroris.htm
Intelligence Monitoring. A special report from Answerchanse Inc, July 2001.
D. Rozenstein, N. Minsky. Controlling the use and evolution of Database systems: A Prolog based approach. Journal of Management Information Systems, v.3 n.1, p.5-31, Summer 1986.
Meeting the airport security challenge. Report of the Secretary's Rapid Response Team on Airport Security, Oct 2001. http://www.arsa.org/lobbying/airport%20security.htm
CIA Views on International Terrorism. DCI Testimony: 3/20/96, http://www.kimsoft.com/korea/ciachem1.htm
US: FBI Chief Admits 911 Might Have Been Headed Off. New York Times. 30 May 2002. http://www.mapinc.org/drugnews/v02/n1016/a09.htm
Could 9/11 Have Been Prevented?. Time online edition. Aug 2002. http://www.time.com/time/nation/article/0,8599,333835,00.html
W. N. Grigg. Did We Know What Was Coming?. The new American, Vol.18 March 11, 2002.
US Intelligence and Security Agencies. FAS. http://www.fas.org/irp/official.html
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.