'Fighting' IED attacks with SCARE technology

Dec 10, 2009
'Fighting' IED attacks with SCARE technology
Screen shot of sample Google Earth output from SCARE compared with attack data for Baghdad. Predicted caches are yellow bulls-eyes, attacks (those used for the reasoning of the predictions) are pink push-pins. Image Courtesy University of Maryland and Google Earth.

(PhysOrg.com) -- University of Maryland researchers have developed and successfully tested new computer software and computational techniques to analyze patterns of improvised explosive device (IED) attacks in Iraq, Afghanistan or other locations and predict the locations of weapons caches that are used by insurgents to support those attacks.

University of Maryland computer science Ph.D. student Paulo Shakarian and computer science Professor V.S. Subrahmanian, together with University of Torino (Italy) Professor Maria-Luisa Sapino developed a new computational technique called geospatial abduction designed to help analysts locate caches of explosive weapons. Their resulting , called SCARE (Spatio-Cultural Abductive Reasoning Engine) allows human analysts to combine available intelligence with this analytical computational technique to identify the most probable locations of IED weapons caches. The researchers say tests conducted with the SCARE software have been quite accurate.

"The SCARE software is not a stand-alone tool," said Subrahmanian, who also is director of the University of Maryland's Institute for Advanced Computer Studies "Military commanders and intelligence analysts would use SCARE in conjunction with their own experience and knowledge of a region, and together with available intelligence to pinpoint likely cache locations."

"SCARE is designed to address a very real tactical problem our soldiers encounter on a regular basis," said Shakarian, who is a U.S. Army Captain enrolled in the Army's Advanced Civil Schooling program "By helping concentrate the focus of both observations and searches, we think SCARE would allow field commanders to better deploy resources, and in many cases, catch insurgents in the process of resupplying such locations or actually carrying out IED attacks." Shakarian has spent over two years in Iraq.

To test their technique, Subrahmanian, Shakarian and Sapino ran through the SCARE program publically available data on the locations of IED attacks in Baghdad that occurred over a 21-month period. The locations of IED caches predicted by SCARE were then compared with actual locations of caches found in that region during that time. The predictions usually were within a half mile of actual locations. A paper on these findings was presented during the Third International Conference on Computational Cultural Dynamics, December 7- 8, 2009 (P. Shakarian, V.S. Subrahmanian, M.L. Sapino. SCARE: A Case Study with Baghdad - ICCCD, 2009)

An Army Stryker armored vehicle framed by concertina wire departs Forward Operating Base Wolverine in the Zabul province of Afghanistan, Dec. 4, 2009. Photo courtesy U.S. Army. Photo credit Air Force Tech. Sgt. Efren Lopez

Revealing NUMB3RS

The SCARE software with its logic-based, mathematical algorithms works like something out of the CBS TV show NUMB3RS, a "drama about an FBI agent who recruits his mathematical-genius brother to help the Bureau solve a wide range of challenging crimes in Los Angeles." Like the problems solved through application of logic-based mathematical formulas in the show, SCARE starts from known information to plot out underlying patterns and locations.

And like many of the NUMB3RS episodes, the SCARE mathematical formula is based on abductive logic. Classical deductive reasoning tries to state what follows from a set of facts, while abduction tries to find the best explanation for a set of observations. In this case, the observations are the locations of the IED attacks, together with the ethnic make-up of neighborhoods. The best explanations correspond to the most likely locations for the weapons caches supporting these attacks.

A different type of logic-based computational system and software called SOMA developed by at the University of Maryland actually was cited on a recent NUMB3RS show ("Hydra," Season 6, Episode 5), though the university was not credited. Developed for the Department of Defense, SOMA (Stochastic Opponent Modeling Agents) is a formal, logical-statistical reasoning language. It uses data about past behavior of terror groups to learn rules about the probability of an organization, community, or person taking certain actions in different situations in the future.

Building Real Security through Virtual Worlds

Subrahmanian and another Maryland colleague, John Dickerson, recently wrote in the journal Science about how computerized modeling and prediction of group behavior, together with improvements in video game graphics, are making possible virtual worlds in which defense analysts can explore and predict results of many different possible military and policy actions.

More information: www.umiacs.umd.edu/research/LC… D/projects/SCARE.jsp

Source: University of Maryland (news : web)

Explore further: Ride-sharing could cut cabs' road time by 30 percent

add to favorites email to friend print save as pdf

Related Stories

Building real security with virtual worlds

Nov 26, 2009

(PhysOrg.com) -- Advances in computerized modeling and prediction of group behavior, together with improvements in video game graphics, are making possible virtual worlds in which defense analysts can explore ...

STOP terrorism software

Feb 25, 2008

Researchers at the University of Maryland’s Institute for Advanced Computer Studies (UMIACS) have developed the SOMA Terror Organization Portal (STOP) allowing analysts to query automatically learned rules on terrorist ...

Security from chaos

Apr 16, 2008

There’s safety (and security) in numbers … especially when those numbers are random. That’s the lesson learned from a DHS-sponsored research project out of the University of Southern California (USC). ...

Salmonella scare prompts legal action

Apr 23, 2007

A salmonella scare in Britain leading to the recall of 1 million Cadbury chocolate bars has prompted authorities to begin prosecuting the candymaker.

Location spoofing possible with WiFi devices

Apr 14, 2008

Apple iPhone and iPod (touch) support a new self-localization feature that uses known locations of wireless access points as well as the device's own ability to detect access points. Now ETH Zurich researchers ...

Recommended for you

Ride-sharing could cut cabs' road time by 30 percent

23 hours ago

Cellphone apps that find users car rides in real time are exploding in popularity: The car-service company Uber was recently valued at $18 billion, and even as it faces legal wrangles, a number of companies ...

Avatars make the Internet sign to deaf people

Aug 29, 2014

It is challenging for deaf people to learn a sound-based language, since they are physically not able to hear those sounds. Hence, most of them struggle with written language as well as with text reading ...

Chameleon: Cloud computing for computer science

Aug 26, 2014

Cloud computing has changed the way we work, the way we communicate online, even the way we relax at night with a movie. But even as "the cloud" starts to cross over into popular parlance, the full potential ...

User comments : 4

Adjust slider to filter visible comments by rank

Display comments: newest first

Mr_Frontier
not rated yet Dec 10, 2009
Is it true that an IED doesn't strike the same place twice?
plasticpower
not rated yet Dec 11, 2009
Mmm, can't wait until they apply that sort of thing to advertising. NOT
TJ_alberta
not rated yet Dec 11, 2009
walk the road with a dog trained in explosives detection.
baudrunner
not rated yet Dec 11, 2009
I'd like to get a copy of SCARE so that I can predict the next lottery numbers.