Rice University software helps ID terrorists carrying out attacks

Jan 12, 2009

Rice University researchers have created a sophisticated new computer program that rapidly scans large databases of news reports to determine which terrorists groups might be responsible for new attacks. During the Thanksgiving Day attack in Mumbai, India, for example, researchers used the program to rapidly identify the Pakistan-based Lashkar-e-Tayyiba as the most likely culprit.

Rice researchers say the U.S. intelligence community and foreign intelligence agencies no doubt make good use of sophisticated computing tools in sifting through the massive amount of information available on terrorists, but a problem remains in the human capacity to absorb all of that information.

"There's an enormous amount of value in using computing to profile conflicts," said Christopher Bronk, fellow in technology, society and public policy at Rice's Baker Institute for Public Policy and development team member. "While experts on conflict are essential, they need new tools for coping with information overload. That's what we're trying to provide."

Bronk said even the best-funded intelligence operation cannot watch everything all the time. The Rice project demonstrates that information technology may help determine where to look. From that, human effort can be directed to make more complete assessment and analysis.

Bronk said he hopes to perfect a system that can assist the government in identifying future "hot spots" of activity before violence occurs.

The new software, which was designed using the latest techniques from artificial intelligence, takes advantage of the open-source database at the Institute for the Study of Violent Groups (ISVG) at Sam Houston State University. The program culls thousands of news stories reported throughout the world.

Mumbai attack

On Thanksgiving Day, as the attacks unfolded in Mumbai, India, Sean Graham, an undergraduate program assistant at Rice, ran a series of queries based on the information reported by television networks. By entering the weapons used (machine guns, grenades and explosives), the target (public structures) and tactics (raid, direct fire and ambush), and without respect to any geographic or ideological bent, he essentially asked, "Who in the world has done this sort of thing before?" The answers were the expected ones, with al-Qaida at the top of a list that also included the Liberation Tigers of Tamil Eelam, the Palestinian militant group Hamas, a Chechen independence group and the India-based United Liberation Front of Assam. This query provided a simple answer to the question of who might be able to pull off such an attack, regardless of geographic location.

Researchers then focused on groups known to be active in South Asia. Keeping the query open to territory beyond India, including Afghanistan and Sri Lanka, they generated a list of names that included Pakistan-based Lashkar-e-Tayyiba, the Bangladeshi Jamaat-ul-Mujahideen and Al-Mansoorian, a group active in Kashmir. By running extremely simple queries against the large, detailed ISVG database, which had no new content added in the immediate period before the Mumbai attacks, the research group came up with the same groups mentioned as likely suspects in Indian, U.S. and other international media. When they ran the queries against a second database constructed by researchers at the University of Maryland, Lashkar-e-Tayyiba was returned as the most likely culprit.

"We designed the software to better assign attribution in terror attacks, and it appears to have worked," said Bronk. "It allowed us to match signatures and say, with some confidence, what groups had the requisite experience, resources and coordinating factors to pull off the Mumbai attacks."

To read the complete paper, visit www.bakerinstitute.org/opinions/open-source-policy-informatics-and-python-understanding-the-mumbai-attacks-through-information-technology

Source: Rice University

Explore further: Algorithm accounts for uncertainty to enable more accurate modeling

Related Stories

Chemists characterize 3-D macroporous hydrogels

1 hour ago

Carnegie Mellon University chemists have developed two novel methods to characterize 3-dimensional macroporous hydrogels—materials that hold great promise for developing "smart" responsive materials that ...

Hidden cameras, invisibility cloaks in Israeli spy expo

1 hour ago

Hidden cameras, invisibility cloaks and mini-drones were among the gadgets on display Tuesday at an exhibition of Israeli surveillance technology, offering a rare peek into the secretive world of Israeli ...

Recommended for you

Cattle ID system shows its muzzle

Jun 29, 2015

Maybe it sounds like a cow and bull story, but researchers in Egypt are developing a biometric identification system for cattle that could reduce food fraud and allow ranchers to control their stock more efficiently. The ...

Combining personalization and privacy for user data

Jun 29, 2015

Computer scientists and legal experts from Trinity College Dublin and SFI's ADAPT centre are working to marry two of cyberspace's greatest desires, by simultaneously providing enhanced options for user personalisation alongside ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.