Asymmetric Threat Tracker Advanced Convoy Scenario Donald E. Brown, PhD James H. Conklin Department of Systems & Information Engineering University of.

Slides:



Advertisements
Similar presentations
Chapter 5: Analytical frameworks. Important notes These slides are not a replacement for the text Please use these slides as a starting point for your.
Advertisements

UN-HABITAT Inter-Agency Task Force on Disaster Reduction 8 th Meeting, Geneva, Nov Working Group # 3 Tools and Best Practices for Risk and Vulnerability.
UJTL Ontology Effort TMCM Nelson And Marti Hall. Overview Vision for the UJTL and METLs Scenario Mapping Findings Proposed POA&M outline.
Presumed Asbestos Training Programme. Introduction Getting Started The Interface Top Tool Bar Creating a New Site Type I Survey Type II Survey Type III.
Joint Operation Planning Process:
All actions in PADDS begin with setting up the patient.
Usually the next step is to run the Cognitive Tests. Click on “Run Cognitive Tests” button to start testing. All of the tests begin with you giving a brief.
CAS: Crime Anticipation System Predictive Policing in Amsterdam.
Templates and Styles Excel Advanced. Templates are pre- designed and formatted spreadsheets –They provide consistency of layout/structure –They.
GIS Applications in Traffic Accidents Hongtao Gao.
The Experience Factory May 2004 Leonardo Vaccaro.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Search Engines and Information Retrieval
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
Syr Johnathan Duncan. GIS What is GIS? Geography is information about the earth's surface and the objects found on it, as well as a framework for organizing.
August 7, 2003 Sensor Network Modeling and Simulation in Ptolemy II Philip Baldwin University of Virginia Motivation With.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 5: Navigation in OBIEE – Touring the Catalog Page.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
What is so good about Archie and RevMan 5
Defence R&D Canada R et D pour la défense Canada UNCLASSIFIED – APPROVED FOR PUBLIC RELEASE Challenges for a Distributed Collaborative Environment Functioning.
Studying Geography The Big Idea
Ogden Air Logistics Center. Purpose of Excel2FV Many agencies produce point lists of different data (target lists, force locations, etc.) in either Excel.
IP10 Monday, January 13 th Using the Blurring Effect.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Search Engines and Information Retrieval Chapter 1.
Capability Cliff Notes Series PHEP Capability 3—Emergency Operations Coordination What Is It And How Will We Measure It? For sound, click on the megaphone.
Lecture 4 Transport Network and Flows. Mobility, Space and Place Transport is the vector by which movement and mobility is facilitated. It represents.
Copyright OpenHelix. No use or reproduction without express written consent1.
A Military Logistics and Transportation Security Application.
01/09/2004 Interacting with the Decision Maker – ISMOR 2004 Col N-J K Kvist (JFC); Sara Dean (NC3A) “Facts, Figures and Facilitation”
By Touseef Tahir Software Testing Basics. Today's Agenda Software Quality assurance Software Testing Software Test cases Software Test Plans Software.
Acquiring Information Systems and Applications
FAMILY AND CHILDREN’S TRUST FUND (FACT) RESEARCH AND DATA MATERIALS.
Sinha and Kotzab: Supply Chain Management, Copyright © 2012 by Tata McGraw-Hill Education CHAPTER 8 Production Planning and Scheduling.
IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Chapter 1 – A Geographer’s World
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
B3AS Joseph Lewthwaite 1 Dec, 2005 ARL Knowledge Fusion COE Program.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
Command Post of the Future Limited Objective Experiment-1 Presented to: Information Superiority Workshop II: Focus on Metrics March 2000 Presented.
1 OGM Presentation for Your Hospital Today. 2 The Ongoing Maintenance Program The OGM Program Components.
Flowsheet Analysis Design Concepts Introduction Acknowledgements Proposed Design By studying PICU flowsheets in the context of their actual use, we have.
Intelligent Site Selection Models for Asymmetric Threat Prediction and Decision Making Michael D. Porter North Carolina State University.
IAEA Training Course on Safety Assessment of NPPs to Assist Decision Making Temelin NPP Risk Panel A PSA and Safety Monitor Application Workshop Information.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Wildland Fire Decision Support System – What’s New in 2015 From the Wildland Fire Management Research Development & Application Program.
Welcome to the combined BLAST and Genome Browser Tutorial.
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
University of Southern California Center for Systems and Software Engineering Core Capability Drive-Through Preparation Pongtip Aroonvatanaporn CSCI 577b.
ANASOFT VIATUS. Challenges Supply chain optimization is necessary for achieving competitive price of final products Synchronization and utilization of.
1 Requirements Elicitation – 2 Lecture # Requirements Engineering Process Requirements Elicitation Requirements Analysis and Negotiation Requirements.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Chapter 1 – A Geographer’s World
Applied Software Project Management SOFTWARE TESTING Applied Software Project Management 1.
Security Operations Update
ODMAP Level 2 access.
Ch 1 A Geographer’s World
Presenter Date | Location
ODMAP Level 2 access.
GNOSIS eLearning Modules How-To Guide
Product Development Scenario Overview
International Defence Enterprise Architecture Specification (IDEAS)
Natural Analytics Donald Farmer
INTERNATIONAL MARITIME SECURITY.
WebTRAGIS: Status Update and Development Overview
Presentation transcript:

Asymmetric Threat Tracker Advanced Convoy Scenario Donald E. Brown, PhD James H. Conklin Department of Systems & Information Engineering University of Virginia Charlottesville, VA October 26, 2006

Purpose The purpose of this scenario is to describe the capabilities of the Asymmetric Threat Tracker in the context of operational scenarios. The 3rd Infantry (c) BBC News 00/ stm Department of Systems & Information Engineering, University of Virginia.

Military Decision Making Process & Intelligence Cycle Intelligence Cycle Tasking Collection Processing Exploitation Dissemination Military Decision Making Process Receive Mission Mission Analysis Intelligence Preparation of the Battlefield Course of Action Development Course of Action Analysis Course of Action Comparison Course of Action Approval Orders Production

Department of Systems & Information Engineering, University of Virginia. Scenario Background The user in this scenario is a Convoy Planner The location is Baghdad, Iraq Threat: US Convoys have been repeatedly attacked en-route. The convoy planner’s role is to plan the convoy such that risk is minimized and security is commensurate with the cargo and within the resources available

Department of Systems & Information Engineering, University of Virginia. Convoy Planner’s Information The Convoy Planner has access to the following information: Database of past attacks on US Forces date location time type narrative Maps of region Previous convoy routes Intelligence databases Convoy Origination and Destination Points Convoy Departure Time

Department of Systems & Information Engineering, University of Virginia. Planner Objective With this data, the planner needs to Plan the route for the convoy Plan the departure time for the convoy Provide convoy drivers information about high risk areas Provide convoy drivers any possible alternate routes or backup plans

Department of Systems & Information Engineering, University of Virginia. Planner Performs Risk Assessment The planner can use the ATT to perform a risk assessment Open ATT Select Area of Interest Select Spatial Features for Analysis Select Temporal Features for Analysis Query Database for past Incidents Enter planned start and end times for convoy Run ATT algorithm to generate threat surface Run ATT change detection to generate a change surface Assess risk of convoy and plan accordingly Next slide shows example ATT analysis Inform convoy drivers of high risk areas and areas where the threat has changed significantly since their last run

Department of Systems & Information Engineering, University of Virginia. Planner Analyzes ATT Output Once the ATT has generated a threat surface, the planner can view the surface as an interactive map. View Map Observe “hot spot” and click click mouse Analyze relevant features and their values If a feature has a red bar, that means that at the clicked location, that feature has a value that contributes to a higher threat level. Conversely, if a feature has a black bar, that means that the clicked location has a feature value that does not contribute to a higher threat level. click mouse again

Department of Systems & Information Engineering, University of Virginia. Interpretation of ATT Result The ATT assesses threats using a feature based model Example Features: Distance to Roads Distance to Mosques Higher (or lower) values for these features may be predictive of a higher level of threat The less distance from a location to a road, the higher the threat is. Distance to road is the feature and a lower value is predictive of a higher threat When the clicked location is close to a road, the threat bar will be red Conversely, when the clicked location is far from a road, the bar will be black

Department of Systems & Information Engineering, University of Virginia. Interpretation of ATT Result In this example, the user clicked in a low threat area. Not surprisingly, most of the threat bars are dark. Click Mouse Now, the user has clicked on a high threat area. In this location six of the eight features are predicting a high threat.

Department of Systems & Information Engineering, University of Virginia. Report Dissemination to Convoy Drivers Once planner has selected the best time, route, and backup plans, he can brief the convoy drivers. This brief will outline dangerous areas areas of significant change points of recent activity Drivers connect to the network with their PDAs and download Threat report Threat surface Route information © Garmin, © Garmin,

Department of Systems & Information Engineering, University of Virginia. Convoy As convoy proceeds, the PDA/GPS keeps track of convoy progress As convoy approaches high risk areas, drivers are notified to be on guard Any major updates (threats, incidents, etc) could be broadcasted and received by PDA systems Advanced Feature: Drivers could wear sunglasses with small LEDs in them. The LEDs would change color depending on the threat level of the area where they are looking

Department of Systems & Information Engineering, University of Virginia. Update Data Once the convoy departs, they are collecting data for the next convoy. Any incident they experience/witness, is reported These new incidents get recorded in the intelligence databases and used for the next round of convoy planning Major updates are broadcast to deployed convoys

On The Horizon...

15 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Incident Query Ideally, the user would like the ability to query a database for incidents. This is a snapshot of the query tool today.

16 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 95 percent of areas.

17 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 90 percent of areas.

18 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 85 percent of areas.

19 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 80 percent of areas.

20 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 75 percent of areas.

21 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 70 percent of areas.

22 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 65 percent of areas.

23 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 60 percent of areas.

24 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 55 percent of areas.

25 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 50 percent of areas.

A good run... US Air Force (USAF) Staff Sergeant (SSGT) Rene Anderson, of the 506th Expeditionary Logistics Readiness Squadron (ELRS), has a light moment during a convoy rest at Baghdad International Airport (BIAP), in support of Operation IRAQI FREEDOM.