Exploitation of Ambiguous Cues to Infer Terrorist Activity
Author(s) -
Kevin Ni,
Daniel Faissol,
Thomas Edmunds,
Richard Wheeler
Publication year - 2012
Publication title -
decision analysis
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.527
H-Index - 22
eISSN - 1545-8504
pISSN - 1545-8490
DOI - 10.1287/deca.1120.0259
Subject(s) - interdiction , notional amount , computer science , terrorism , inference , adversary , event (particle physics) , bayesian probability , process (computing) , resource (disambiguation) , data science , artificial intelligence , computer security , economics , political science , computer network , physics , finance , quantum mechanics , law , engineering , aerospace engineering , operating system
To aid intelligence analysts in processing ambiguous data regarding nuclear terrorism threats, we develop a methodology that captures and accounts for the uncertainty in new information and incorporates prior beliefs on likely nuclear terrorist activity. This methodology can guide the analyst when making difficult decisions regarding what data are most critical to examine and what threats require greater attention. Our methodology is based on a Bayesian statistical approach that incorporates ambiguous cues to update prior beliefs of adversary activity. We characterize the general process of a nuclear terrorist attack on the United States and describe, using a simplified example, how this can be represented by an event tree. We then define hypothetical cues for the example and give notional strengths to each cue. We also perform sensitivity analysis and show how cue strengths can affect inference. The method can be used to help support decisions regarding resource allocation and interdiction.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom