You are here

INSIGHT: Interpreting Network Structures to Obtain Intelligence on Groups of Hidden Terrorists

Award Information
Agency: Department of Defense
Branch: Defense Advanced Research Projects Agency
Contract: DAAH0103CR111
Agency Tracking Number: 02SB2-0177
Amount: $99,000.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: N/A
Solicitation Number: N/A
Solicitation Year: N/A
Award Year: 2003
Award Start Date (Proposal Award Date): N/A
Award End Date (Contract End Date): N/A
Small Business Information
50 Mall Road, Burlington, MA, 01803
DUNS: 094841665
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Connie Fournelle
 Senior Mathematician
 (781) 273-3388
Business Contact
 Andrew Mullin
Title: General Counsel & Dir. of
Phone: (781) 273-3388
Research Institution
Detecting and disrupting a terrorist network requires the ability to: link disparate (noisy, deceptive) data and recognize patterns in the underlying networks, estimate where further intelligence would be useful, and predict the network's response topossible attacks.We propose to combine state-of-the-art social network analysis (meta-networks) and statistical inferencing (probabilistic relational models) techniques to develop mathematical models for characterizing terrorist organizations, and implement those models ina software tool that can be used to detect terrorist organizations and analyze their structural vulnerabilities. Meta-networks capture the connections between people, skills, events, and locations, and generate more effective representations oforganizations than do traditional person-to-person social networks. PRMs capture the variability and uncertainty in these connections in a compact representation and provide efficient inferencing mechanisms. By combining both, we can represent variedterrorist organization structures and facilitate updates and modifications to those structures, while maintaining the level of detail needed for accurate detection/exploitation.In Phase I we will develop and demonstrate models and software to characterize terrorist networks, and evaluate their sensitivity to varying levels of data quality and completeness. Phase II will extend the models and software, to detect terroristorganizations and perform exploitable structure analysis for disrupting terrorist networks. Benefits of this effort include increased utilization of intelligence data, earlier detection of terrorist organizations, and decision support tools to support efforts to disrupt terrorist networks. Tools from this effort will also support structuralcharacterization and exploitation for other domains, such as criminal investigation, corporate structure analysis, and diplomatic assessment.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government