Skip to main content

2016 | OriginalPaper | Buchkapitel

15. A Model for Threat Assessment

verfasst von : Alan N. Steinberg

Erschienen in: Fusion Methodologies in Crisis Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A concept for characterizing, predicting and recognizing threat situations is developed. The goal is to establish a systematic approach to automation of some of these functions. Approaches are discussed to address the fundamental problems of (a) sparse and ambiguous indicators of potential or actualized threat activity buried in massive background data; and (b) uncertainty in threat capabilities, intent and opportunities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We argue in Steinberg (2015a) and Steinberg (2015b) that it makes more sense to distinguish inference problems on the basis of type of entity state variables rather than by type of entity: a given entity can be addressed at more than one level. For example, a vehicle can be the “target” of a level 1 fusion process if level 1 states (e.g., its location, velocity, size, weight, type, identity, or activity) are being estimated. The same vehicle can be the “target” of a level 2 process if it is considered as a complex or a structure, such that level 2 states (e.g., the relationships among its components or its subassemblies) are being estimated. It could also be the subject of a level 3 process if it is considered as a dynamic process, such that level 3 states (e.g., its course of action and outcome states) are being estimated. It could even be the subject of a level 4 process if it is considered as the system performing the estimation and level 4 states (e.g., the operating conditions and performance relative to users’ objectives) are being estimated.
 
2
McMichael, Jarrad, and colleagues at CSIRO (Commonwealth Scientific and Industrial Research Organisation) developed methods for efficient storage, search, and manipulation of such dynamic belief networks, employing what they call grammatical methods for representing and reasoning about situations and scenarios (McMichael and Jarrad 2005).
 
3
Means of threat assessment in the absence of complete, high-confidence models of such factors are addressed in Sect. 15.6.
 
4
Section 15.6 discusses categories of inference problems in which predictive statistical models of entities and activities of concern are not available.
 
5
Technology Readiness Levels as defined by the US Department of Defense are (TRL1) basic principles observed and reported; (TRL2) technology concept and/or application formulated; (TRL3) analytical and experimental critical function and or characteristic proof-of-concept; (TRL4) component and/or breadboard validation in laboratory environment; (TRL5) component and/or breadboard validation in relevant environment; (TRL6) system/subsystem model or prototype demonstration in relevant environment; (TRL7) system prototype demonstration in operational environment; (TRL8) actual system completed and qualified; and (TRL9) actual system proven in successful mission operations (paraphrased from Nolte et al. (2003)).
 
6
Such inferences are examples of Category 3 reasoning as discussed in Sect. 15.7.
 
7
JPL defined Concept Maturity Levels (CMLs) as (CML1) Cocktail Napkin (i.e., rudimentary understanding of the concept); (CML2) Initial Feasibility; (CML3) Trade Space; (CML4) Point Design; (CML5) Concept Baseline; (CML6) Initial Design; and (CML7) Integrated Baseline (Wessen et al. 2010).
 
8
Interpersonal interactions and influences add to complexity and model issues. There are well-known issues of emergent group behavior that are arguably not predictable by constructive modeling.
 
9
Methods for evaluating and compensating for source data quality are discussed in (Snidaro et al. 2015, Steinberg et al. 2014).
 
Literatur
Zurück zum Zitat Bennett M, Waltz E (2007) Counterdeception principles and applications for national security. Artech House, Boston, MA Bennett M, Waltz E (2007) Counterdeception principles and applications for national security. Artech House, Boston, MA
Zurück zum Zitat Boyd JR (1976) Destruction and creation. U.S. Army Command and General Staff College, 3 Sept 1976 Boyd JR (1976) Destruction and creation. U.S. Army Command and General Staff College, 3 Sept 1976
Zurück zum Zitat de Becker G (1997) The gift of fear (and other survival signals that protect us from violence). Dell Publishing, New York de Becker G (1997) The gift of fear (and other survival signals that protect us from violence). Dell Publishing, New York
Zurück zum Zitat Endsley MR (2000) Theoretical underpinnings of Situation Awareness: a critical review. In: Situation awareness analysis and measurement. Lawrence Erlbaum Associates Inc., Mahwah, NJ Endsley MR (2000) Theoretical underpinnings of Situation Awareness: a critical review. In: Situation awareness analysis and measurement. Lawrence Erlbaum Associates Inc., Mahwah, NJ
Zurück zum Zitat Garcia J, Snidaro L, Visentini I (2012) Exploiting context as binding element for multi-level data fusion. Proc., Fifteenth international conference on information Garcia J, Snidaro L, Visentini I (2012) Exploiting context as binding element for multi-level data fusion. Proc., Fifteenth international conference on information
Zurück zum Zitat Kahneman D (2011) Thinking, fast and slow. Farrar, Straus and Giroux, New York Kahneman D (2011) Thinking, fast and slow. Farrar, Straus and Giroux, New York
Zurück zum Zitat Lambert DA (2006) A unification of sensor and higher-level fusion. Proc. 9th international conference on information fusion Lambert DA (2006) A unification of sensor and higher-level fusion. Proc. 9th international conference on information fusion
Zurück zum Zitat Little EG, Rogova GL (2006) An ontological analysis of threat and vulnerability. Proc. Ninth international conference on information fusion, Florence Little EG, Rogova GL (2006) An ontological analysis of threat and vulnerability. Proc. Ninth international conference on information fusion, Florence
Zurück zum Zitat McMichael D, Jarrad G (2005). Grammatical methods for situation and threat analysis. Proc. Eighth international conference on information fusion, Philadelphia, June 2005 McMichael D, Jarrad G (2005). Grammatical methods for situation and threat analysis. Proc. Eighth international conference on information fusion, Philadelphia, June 2005
Zurück zum Zitat Moore KE (2005) Predictive Analysis for Naval Deployment Activities (PANDA), briefing to industry: PANDA Overview, 16 Sept 2005 Moore KE (2005) Predictive Analysis for Naval Deployment Activities (PANDA), briefing to industry: PANDA Overview, 16 Sept 2005
Zurück zum Zitat Nolte WL, Kennedy BC, Dziegiel Jr RJ (2003) Technology readiness level calculator. NDIA Systems Engineering Conf., 20 Oct 2003 Nolte WL, Kennedy BC, Dziegiel Jr RJ (2003) Technology readiness level calculator. NDIA Systems Engineering Conf., 20 Oct 2003
Zurück zum Zitat Rogova G, Nimier V (2004) Reliability in information fusion: literature survey. Proc. Seventh international conference on information fusion, Stockholm Rogova G, Nimier V (2004) Reliability in information fusion: literature survey. Proc. Seventh international conference on information fusion, Stockholm
Zurück zum Zitat Rogova GL, Steinberg AN (2015) Formalization of ‘Context’ for information fusion. Context Enhanced Information Fusion. Springer Rogova GL, Steinberg AN (2015) Formalization of ‘Context’ for information fusion. Context Enhanced Information Fusion. Springer
Zurück zum Zitat Salerno JJ (2007) Where’s level 2/3 fusion—a look back over the past 10 years. Proc. Tenth International Conference on Information Fusion, Quebec Salerno JJ (2007) Where’s level 2/3 fusion—a look back over the past 10 years. Proc. Tenth International Conference on Information Fusion, Quebec
Zurück zum Zitat Snidaro L, Garcia J, Llinas J (2015) Context-based information fusion: a survey and discussion. Inf Fusion 25:16–31CrossRef Snidaro L, Garcia J, Llinas J (2015) Context-based information fusion: a survey and discussion. Inf Fusion 25:16–31CrossRef
Zurück zum Zitat Steinberg AN (2005) An approach to threat assessment. Proc., Eighth international conference on information fusion, Philadelphia Steinberg AN (2005) An approach to threat assessment. Proc., Eighth international conference on information fusion, Philadelphia
Zurück zum Zitat Steinberg AN (2009) Foundations of situation and threat assessment. In: Liggins ME, Hall DL, Llinas J (eds) Chapter 18 of Handbook of multisensor data fusion. CRC Press, London Steinberg AN (2009) Foundations of situation and threat assessment. In: Liggins ME, Hall DL, Llinas J (eds) Chapter 18 of Handbook of multisensor data fusion. CRC Press, London
Zurück zum Zitat Steinberg AN (2013) Situation management for counter-piracy. In: Prediction and recognition of piracy efforts using collaborative human-centric information systems. Ios Press, Amsterdam Steinberg AN (2013) Situation management for counter-piracy. In: Prediction and recognition of piracy efforts using collaborative human-centric information systems. Ios Press, Amsterdam
Zurück zum Zitat Steinberg AN (2014) Threat assessment with technical intelligence applications. Proc. CogSIMA, San Antonio, TX, Mar 2014 Steinberg AN (2014) Threat assessment with technical intelligence applications. Proc. CogSIMA, San Antonio, TX, Mar 2014
Zurück zum Zitat Steinberg AN (2015) Levels? Proc. 18th international conference on information fusion, Washington Steinberg AN (2015) Levels? Proc. 18th international conference on information fusion, Washington
Zurück zum Zitat Steinberg AN (2015) Situations and contexts. ISIF Perspectives on Information Fusion (Perspectives), Vol 1(1) Steinberg AN (2015) Situations and contexts. ISIF Perspectives on Information Fusion (Perspectives), Vol 1(1)
Zurück zum Zitat Steinberg AN, Bowman CL (2009) Revisions to the JDL data fusion model. In: Liggins ME, Hall DL, Llinas J (eds) Chapter 3 of Handbook of multisensor data fusion. CRC Press, London Steinberg AN, Bowman CL (2009) Revisions to the JDL data fusion model. In: Liggins ME, Hall DL, Llinas J (eds) Chapter 3 of Handbook of multisensor data fusion. CRC Press, London
Zurück zum Zitat Steinberg AN, Bowman CL, Blasch E, Morefield C, Morefield M, Haith G (2014) Adaptive context assessment and context management, Proc., Seventeenth International Conference on Information Fusion, Salamanca, Spain, 2014 Steinberg AN, Bowman CL, Blasch E, Morefield C, Morefield M, Haith G (2014) Adaptive context assessment and context management, Proc., Seventeenth International Conference on Information Fusion, Salamanca, Spain, 2014
Zurück zum Zitat Steinberg AN, Rogova GL (2015) System-level use of contextual information. In: Snidaro L, Garcia J, Llinas J, Blasch E (eds) Context-enhanced information fusion. Springer, Berlin Steinberg AN, Rogova GL (2015) System-level use of contextual information. In: Snidaro L, Garcia J, Llinas J, Blasch E (eds) Context-enhanced information fusion. Springer, Berlin
Zurück zum Zitat Waltz E (2003) Knowledge management in the intelligence enterprise. Artech House, Boston, MA Waltz E (2003) Knowledge management in the intelligence enterprise. Artech House, Boston, MA
Zurück zum Zitat Wessen RR, Adler M, Leising CJ, Sherwood B (2010) Measuring the maturity of robotic planetary mission concepts II. SpaceOps 2010 Conference, Hosted by NASA Mars, Huntsville, Alabama, 25–30 Apr 2010 Wessen RR, Adler M, Leising CJ, Sherwood B (2010) Measuring the maturity of robotic planetary mission concepts II. SpaceOps 2010 Conference, Hosted by NASA Mars, Huntsville, Alabama, 25–30 Apr 2010
Zurück zum Zitat Whaley B (1969) Strategem: deception and surprise in war. Center for International Studies, MIT, Cambridge, MA Whaley B (1969) Strategem: deception and surprise in war. Center for International Studies, MIT, Cambridge, MA
Zurück zum Zitat White FE (1988) A model for data fusion. Proc. First national symposium on sensor fusion, GACIAC, IIT Research Institute, Chicago White FE (1988) A model for data fusion. Proc. First national symposium on sensor fusion, GACIAC, IIT Research Institute, Chicago
Metadaten
Titel
A Model for Threat Assessment
verfasst von
Alan N. Steinberg
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-22527-2_15

Neuer Inhalt