Download presentation
Presentation is loading. Please wait.
Published byJasmin Nichols Modified over 9 years ago
1
Asymmetric Threat Tracker Advanced Convoy Scenario Donald E. Brown, PhD James H. Conklin Department of Systems & Information Engineering University of Virginia Charlottesville, VA 22904 October 26, 2006
2
Purpose The purpose of this scenario is to describe the capabilities of the Asymmetric Threat Tracker in the context of operational scenarios. The 3rd Infantry (c) BBC News http://news.bbc.co.uk/aboutbbcnews/hi/news_update/newsid_38500 00/3850491.stm Department of Systems & Information Engineering, University of Virginia.
3
Military Decision Making Process & Intelligence Cycle Intelligence Cycle Tasking Collection Processing Exploitation Dissemination Military Decision Making Process Receive Mission Mission Analysis Intelligence Preparation of the Battlefield Course of Action Development Course of Action Analysis Course of Action Comparison Course of Action Approval Orders Production
4
Department of Systems & Information Engineering, University of Virginia. Scenario Background The user in this scenario is a Convoy Planner The location is Baghdad, Iraq Threat: US Convoys have been repeatedly attacked en-route. The convoy planner’s role is to plan the convoy such that risk is minimized and security is commensurate with the cargo and within the resources available
5
Department of Systems & Information Engineering, University of Virginia. Convoy Planner’s Information The Convoy Planner has access to the following information: Database of past attacks on US Forces date location time type narrative Maps of region Previous convoy routes Intelligence databases Convoy Origination and Destination Points Convoy Departure Time
6
Department of Systems & Information Engineering, University of Virginia. Planner Objective With this data, the planner needs to Plan the route for the convoy Plan the departure time for the convoy Provide convoy drivers information about high risk areas Provide convoy drivers any possible alternate routes or backup plans
7
Department of Systems & Information Engineering, University of Virginia. Planner Performs Risk Assessment The planner can use the ATT to perform a risk assessment Open ATT Select Area of Interest Select Spatial Features for Analysis Select Temporal Features for Analysis Query Database for past Incidents Enter planned start and end times for convoy Run ATT algorithm to generate threat surface Run ATT change detection to generate a change surface Assess risk of convoy and plan accordingly Next slide shows example ATT analysis Inform convoy drivers of high risk areas and areas where the threat has changed significantly since their last run
8
Department of Systems & Information Engineering, University of Virginia. Planner Analyzes ATT Output Once the ATT has generated a threat surface, the planner can view the surface as an interactive map. View Map Observe “hot spot” and click click mouse Analyze relevant features and their values If a feature has a red bar, that means that at the clicked location, that feature has a value that contributes to a higher threat level. Conversely, if a feature has a black bar, that means that the clicked location has a feature value that does not contribute to a higher threat level. click mouse again
9
Department of Systems & Information Engineering, University of Virginia. Interpretation of ATT Result The ATT assesses threats using a feature based model Example Features: Distance to Roads Distance to Mosques Higher (or lower) values for these features may be predictive of a higher level of threat The less distance from a location to a road, the higher the threat is. Distance to road is the feature and a lower value is predictive of a higher threat When the clicked location is close to a road, the threat bar will be red Conversely, when the clicked location is far from a road, the bar will be black
10
Department of Systems & Information Engineering, University of Virginia. Interpretation of ATT Result In this example, the user clicked in a low threat area. Not surprisingly, most of the threat bars are dark. Click Mouse Now, the user has clicked on a high threat area. In this location six of the eight features are predicting a high threat.
11
Department of Systems & Information Engineering, University of Virginia. Report Dissemination to Convoy Drivers Once planner has selected the best time, route, and backup plans, he can brief the convoy drivers. This brief will outline dangerous areas areas of significant change points of recent activity Drivers connect to the network with their PDAs and download Threat report Threat surface Route information © Garmin, © Garmin, http://www.garmin.com/products/iQueM4/# http://www.garmin.com/products/iQueM4/#
12
Department of Systems & Information Engineering, University of Virginia. Convoy As convoy proceeds, the PDA/GPS keeps track of convoy progress As convoy approaches high risk areas, drivers are notified to be on guard Any major updates (threats, incidents, etc) could be broadcasted and received by PDA systems Advanced Feature: Drivers could wear sunglasses with small LEDs in them. The LEDs would change color depending on the threat level of the area where they are looking
13
Department of Systems & Information Engineering, University of Virginia. Update Data Once the convoy departs, they are collecting data for the next convoy. Any incident they experience/witness, is reported These new incidents get recorded in the intelligence databases and used for the next round of convoy planning Major updates are broadcast to deployed convoys
14
On The Horizon...
15
15 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Incident Query Ideally, the user would like the ability to query a database for incidents. This is a snapshot of the query tool today.
16
16 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 95 percent of areas.
17
17 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 90 percent of areas.
18
18 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 85 percent of areas.
19
19 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 80 percent of areas.
20
20 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 75 percent of areas.
21
21 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 70 percent of areas.
22
22 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 65 percent of areas.
23
23 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 60 percent of areas.
24
24 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 55 percent of areas.
25
25 Department of Systems & Information Engineering, University of Virginia CCRI Proprietary Information Threat Filter Map This map shows areas in the top 50 percent of areas.
26
A good run... US Air Force (USAF) Staff Sergeant (SSGT) Rene Anderson, of the 506th Expeditionary Logistics Readiness Squadron (ELRS), has a light moment during a convoy rest at Baghdad International Airport (BIAP), in support of Operation IRAQI FREEDOM. www.DefenseLINK.mil
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.