STOP terrorism software

February 25, 2008

Researchers at the University of Maryland’s Institute for Advanced Computer Studies (UMIACS) have developed the SOMA Terror Organization Portal (STOP) allowing analysts to query automatically learned rules on terrorist organization behavior, forecast potential behavior based on these rules, and, most importantly, to network with other analysts examining the same subjects.

SOMA (Stochastic Opponent Modeling Agents) is a formal, logical-statistical reasoning framework that uses data about past behavior of terror groups in order to learn rules about the probability of an organization, community, or person taking certain actions in different situations.

In a unique collaboration between computer scientists and political scientists, SOMA has generated tens of thousands of rules about the likely behavior of each of about 30 groups (including major terrorist organizations such as Hezbollah, Hamas, and Hezb-I-Islami).

“SOMA is a significant joint computer science and social science achievement that will facilitate learning about and forecasting terrorist group behavior based on rigorous mathematical and computational models,” said V.S. Subrahmanian, computer science professor and UMIACS director who heads the STOP project. “But even the best science needs to work hand in hand with social scientists and users. In addition to accurate behavioral models and forecasting algorithms, the SOMA Terror Organization Portal acts as a virtual roundtable that terrorism experts can gather around and form a rich community that transcends artificial boundaries.”

Funded by the Air Force Office of Scientific Research, the SOMA Terror Organization Portal currently has users from four defense agencies. The users, in addition to performing queries and running a prediction engine, can mark rules as useful or not useful and leave comments about the rules. They can learn what others have found useful and identify interesting rules and comments to. In combating asymmetric threats like terrorism, this last feature is particularly important according to Aaron Mannes, UMIACS researcher and author of “Profiles in Terror: The Guide to Middle East Terrorist Organizations” (Rowman & Littlefield 2004).

“Security analysts need more than piles of data.” Mannes explained, “It takes a network to fight a network. Analysts need to learn from other analysts. This system allows multiple users to arrive at a shared understanding of how a terror group operates and what it might do in the future. Using the queries analysts can examine the underlying data and then, using the forecasting capabilities, test their theories.”

The University of Maryland and its Institute for Advanced Computer Studies are involved in a broad array of interdisciplinary research to improve the nation’s security and combat global terrorism. This includes intelligence and security research conducted by the Center for Advanced Study of Language and the new Intelligence Advanced Research Projects Activity (IARPA), both based at the university; and the Human Language Technology Center of Excellence, a joint center of the Johns Hopkins University and the University of Maryland that is funded by U.S. Department of Defense. The University of Maryland’ is also home to the National Consortium for the Study of Terrorism and Responses to Terrorism (START) developer of the Global Terrorism Database, the world's largest unclassified database of terrorism attacks.

Source: University of Maryland

Explore further: Privacy advocates seek more openness on NSA surveillance

Related Stories

Privacy advocates seek more openness on NSA surveillance

April 22, 2015

As Congress considers whether to extend the life of a program that sweeps up American phone records, privacy advocates and civil liberties groups say too much about government surveillance remains secret for the public to ...

'Interview' ordeal at Sony just its latest crisis

December 18, 2014

How do you say "damage control" in Japanese? Sony Corp. is sealed within a hermetic cone of silence as executives try to prevent the slow motion train wreck at Sony Pictures from damaging the rest of the sprawling business ...

Reports: NSA gets under 30 percent of phone data (Update)

February 7, 2014

The National Security Agency collects less than 30 percent of calling data from Americans despite the agency's massive daily efforts to sweep up the bulk of U.S. phone records, two U.S. newspapers reported Friday.

Report: NSA uses radio waves to map pathway into computers

January 15, 2014

The National Security Agency has implanted software in nearly 100,000 computers around the world—but not in the United States—that allows the U.S. to conduct surveillance on those machines, The New York Times reported ...

Recommended for you

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.