Event prediction using temporal and geospatial precursor networks
09727822 · 2017-08-08
Assignee
Inventors
- Charles Q. Miller (Boston, MA, US)
- Allen D. Bierbaum (Ames, IA, US)
- Donald D. Dudenhoeffer (Idaho Falls, ID, US)
- Anthony J. McDermott (Drakut, MA, US)
- David M. Miller-Klugman (Medfield, MA, US)
Cpc classification
G06N7/01
PHYSICS
G06Q10/06
PHYSICS
International classification
G06N7/00
PHYSICS
G08B31/00
PHYSICS
Abstract
The present invention provides a system and method for providing an alert notification prior to occurrence of a consequent event. The present invention provides a decision maker with the means to reconstitute his unfiltered operational environment such that the information needed to make an informed decision is extracted from a vast array of data available and presented in a manner that allows the decision maker to focus on the aspects of the decision that are most important to arriving at the best course of action under the exigent circumstances that are present when a response to an unexpected and possibly deleterious event is required.
Claims
1. A method for providing an alert notification prior to occurrence of a consequent event, comprising: providing, in a non-volatile computer memory, a precursor activity network comprising data associated with a plurality of precursor activities, each of the precursor activities having a weighting factor associated with, the precursor activity network being associated with a consequent event; upon occurrence of an actual event, determining whether the actual event is consistent with at least one of the precursor activities in the precursor activity network, in accordance with criteria associated with each of the precursor activities; if the actual event is consistent with at least one of the precursor activities in the precursor activity network, updating the precursor activity network by associating said one of the precursor activities with a geospatial location of the actual event; calculating, after updating, an indicator value of the precursor activity; if the indicator value exceeds a predefined threshold value, issuing an alert notification indicating an increased likelihood for the consequent event; and displaying, on a display panel, the alert notification to an operator.
2. The method of claim 1, wherein criteria associated with the plurality of precursor activities comprises a time period and a geospatial location of each of the precursor activities.
3. The method of claim 2, further comprising: if the time period associated with the actual event no longer satisfies a predefined time period associated with the precursor activity network, updating the precursor activity network by removing the actual event from the precursor activity network.
4. The method of claim 3, wherein at least one precursor activity in the precursor activity network is associated with a number counter which may be used to count a number of active qualifying actual events.
5. The method of claim 4, wherein calculating an indicator value comprises summing weighting factors of all triggered precursor activities.
Description
BRIEF DESCRIPTION OF THE DRAWING
(1) Embodiments of the present invention are described in connection with the accompanying drawings.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
DETAILED DESCRIPTION
(12) Embodiments of the present disclosure are described more fully hereinafter with reference to the accompanying drawings. It is to be understood that the detailed descriptions are presented for illustrative purposes only. Any computer configuration and architecture satisfying the speed and interface requirements herein described may be suitable for implementing the system and method of various embodiments of the present disclosure.
(13) The system and method of the present invention may be implemented as a computer software program stored in a computer memory (non-volatile) and executable on one or more computers (hardware or virtual). In one embodiment, the computer software program may be configured to identify (1) the likely occurrence of one or more Precursor Activities that are related to one or more possible identified Consequent Events, (2) the increased likelihood of the occurrence of one or more of such identified Consequent Events, and (3) the general characteristics (such as geographical area, time, target profile, and attack method) associated with each such Consequent Event so identified as being likely to occur.
(14) One objective of the present invention is to automate the process by which the specialized knowledge of a subject matter expert (SME), memorialized in computer software program, may be used by the computer software program to examine available information and apply rules developed by the SME to identify possible Precursor Activities and possible Consequent Events, as to possible time and location. These identified activities and/or events may be brought to the attention of individuals who are without specialized training so that alarms and notifications may be made and other steps taken to prevent the occurrence of an identified Consequent Event or to minimize the adverse effects thereof.
(15) The process embodied by the present invention creates multiple precursor activity networks based upon relationships developed by SMEs, each related to a specific type of Consequent Event. As actual events unfold, these precursor activity networks are geospatially and temporally aligned and realigned in a systematic process by identifying the precursor activities in the various precursor activity networks that are consistent with actual events in accordance with the geospatial, temporal, and other precursor characteristics set by the SME. Simplistically, the SMEs create a template of precursor activities along with relationship constraints including geospatial, temporal, and/or other elements, but without specification as to precise location and/or time of occurrence. These precursor activity networks are subsequently anchored in space and time based on the occurrence of actual events.
(16) The methodology may be analogized to that of assembling multiple puzzles piece-by-piece on a map. As actual events occur, additional pieces are added until pictures of evolving precursor activity networks and Consequent Events emerge overlaid on a geospatial region. The computer may be instructed that, when sufficient information has been gathered and embodied in a precursor activity network, the computer is to issue an alert or otherwise bring to the attention of an operator that a precursor activity network of critical significance exists. Otherwise, the computer, upon instruction, will create and provide reports that show the status of its various precursor activity networks using such parameters as the operator may determine.
(17) Referring now to
(18) Referring again to
(19) Precursor activity 103 pertains to the funding of a terrorist activity, and satisfactory events for precursor activity 101 include large cash deposit and money theft. Precursor activity 103 should remain active for a period of, for example, 4 months and within a geographical range of, for example, 30 miles.
(20) Precursor activity 105 pertains to target specific threats, and satisfactory events for precursor activity 105 include internet charter, informant intelligence, communication intercept, and voiced threats. Precursor activity 105 should remain active for a period of, for example, 1 month and within a geographical range of, for example, 0 miles.
(21) Precursor activity 107 pertains to general threats, and satisfactory events for precursor activity 101 include internet charter, informant intelligence, communication intercept, and voiced threats. Precursor activity 107 should remain active for a period of, for example, 6 months and within a geographical range of, for example, 20 miles.
(22) Precursor activity 109 pertains to improper access of building, and satisfactory events for precursor activity 109 include theft of uniforms or badges, and failure of alarm system. Precursor activity 109 should remain active for a period of, for example, 1 months and within a geographical range of, for example, 0 miles.
(23) Precursor activity 111 pertains to surveillance equipment, which may be monitored upon occurrence of precursor activity 103. Satisfactory events for precursor activity 111 include surveillance equipment purchase. Precursor activity 111 should remain active for a period of, for example, 3 months and within a geographical range of, for example, 30 miles.
(24) Precursor activity 113 pertains to bomb making equipment, which may be monitored upon occurrence of precursor activity 103. Satisfactory events for precursor activity 113 include purchase of fertilizer, purchase of explosives, and purchase of certain electronics. Precursor activity 113 should remain active for a period of, for example, 2 months and within a geographical range of, for example, 30 miles.
(25) Precursor activity 115 pertains to surveillance, which may be monitored upon occurrence of precursor activity 101 or precursor activity 111. Satisfactory events for precursor activity 113 include photography, alarm system probes, and questions to employees. Precursor activity 115 should remain active for a period of, for example, 2 months and within a geographical range of, for example, 0 miles.
(26) Precursor activity 117 pertains to bomb manufacturing, which may be monitored upon occurrence of precursor activity 113. Satisfactory events for precursor activity 117 include purchase of fertilizer, purchase of explosives, and purchase of certain electronics. Precursor activity 115 should remain active for a period of, for example, 2.5 months and within a geographical range of, for example, 10 miles.
(27) Precursor activity 119 pertains to action, which may be monitored upon occurrence of precursor activities 115, 117, 105, 109, and 109. Satisfactory events for precursor activity 117 include suspicious package at potential target.
(28) As shown in
(29) Below Table 1 illustrates another exemplary precursor activities network. As shown, the precursor activities may be recruitment, funding, general threats, target-specific threats, attempts to gain unauthorized access, ID theft, theft or purchase of surveillance equipment, theft or purchase of bomb making equipment, surveillance, evidence of bomb manufacturing. Each of the precursor activities may be associated therewith spatial and time relations. For example, the spatial relation of the “evidence of bomb manufacturing” precursor activity is a maximum of 10 miles distance from a consequent event; and the temporal relation of the “evidence of bomb manufacturing” precursor activity is a maximum of 1 month time before a consequent event. Further, each of the precursor activities in this illustration is assigned a numerical weighting factor. For example, a weighting factor of 70 is assigned to the “evidence of bomb manufacturing” precursor activity.
(30) TABLE-US-00001 TABLE 1 Exemplary Precursor Activities Network Max Distance Max Time from Before Consequent Consequent Weighting Factor Event Event (Event Alert Precursor Activity (miles) (months) Preset = 100) Recruitment 25 6 20 Funding 50 12 20 General threats 25 12 35 Target-specific No Limit 18 70 threats Attempts to gain 0.1 1 70 unauthorized access ID theft 0.1 0.5 35 Theft or purchase of 50 6 20 surveillance equipment Theft or purchase of 100 6 35 bomb making equipment Surveillance 1 1 35 Evidence of bomb 10 1 70 manufacturing
(31) Referring to
(32) As shown in
(33) Further, in Step 209, the computer system determines whether the actual event constitutes a possible match for one or more of the precursor activities in the precursor activities network stored in database 210. If the actual event does not constitute a possible match, then the actual event is ignored in Step 211. In Step 213, if the actual event constitutes a possible match, then the precursor activities network in database 210 is updated by adding the actual event to database 210, and an updated simulation/analysis database 220 is stored in a computer memory.
(34) The computer system continues to monitor actual events occurred at different times and locations as an ongoing analysis process in Step 215. In Step 217, if one of the qualifying actual event remains inactive in the precursor activities network beyond a predefined time period, for example, the computer system then removes the inactive actual event from the precursor activities network. In one embodiment, each precursor activity in the precursor activities network may be associated with a number counter which may be used to count the number of active qualifying actual events. As the monitoring process continues, the computer system calculates an indicator value based on the number of active precursor activities and the weighting factors (see Table 1 above) associated with the active precursor activities. In one embodiment, the indicator value may be calculated by summing the weighting factors of all triggered precursor activities. In Step 219, if the total indicator value exceeds the event alert preset value (in this particular case, 100), then an alerting notice is sent to a system operator indicating an increased likelihood that a consequent event would follow. In Step 221, the alerting notice is displayed to the system operator, showing a listing of ranking for the precursor activities network, selected precursor activities in timeline, and/or the geospatial influence zone of the precursor activities network.
(35) In sum, each Precursor Activity within the Precursor Activity Network for a representative Consequent Event can be identified, along with the maximum time and distance set by the SME for the occurrence of the Precursor Activity to be related to the Consequent Event. In addition, the criteria for determining whether an alert should trigger a Precursor Activity (alert type and keyword contained in the text accompanying the alert) is provided. Any confirmatory action that is to be automatically initiated to determine if the precursor activity should be triggered is also identified. Finally, each Precursor Activity is assigned a weighting factor. The weighting factors of all triggered Precursor Activities are summed, and, if the total exceeds the event alert preset value, the system operator is provided notice of the increased likelihood of the Consequent Event along with a summary of the alerts that triggered Precursor Activities in the Precursor Activity Network.
(36) Referring to
(37) Specifically, in Block 301, an SME may identify precursor activities and consequent events. In Block 302, the precursor activities and consequent events are formatted as elements in logic networks (precursor activity networks) that embody the geospatial, time, and/or other relationships of individual precursor activities to each other. A relation is also established between the precursor activities and the consequent events that they presage, all as specified by SME-created rules. Precursor activities may include the presence of a known individual with acknowledged skills. When possible, the characteristics of critical infrastructure and key assets (CI/KR) associated with precursor activities and Consequent Events are identified (e.g., hotels, chemical suppliers, etc.).
(38) In Block 305, the elements of actual events that cause the criteria for a precursor activity to have been satisfied are identified (e.g., types of suspicious activity reports (SARs), which are a method adopted by state and federal government agencies to document activities that may relate to illegal activities). Once an actual event that satisfies the criteria established for a precursor activity has occurred, the information relating to the actual event and the satisfaction of the precursor activity are recorded in a database in Block 307, using a suitable computer simulation/analysis program 311. In this embodiment, the Priority 5 Touch Assisted Command and Control System (TACCS™) Unity.sup.SM simulation/analysis manager 315 may be used.
(39) At the time the criteria for a precursor activity have been satisfied by an actual event, that precursor activity is associated with the geospatial location of the actual event; and the precursor activity and associated actual event may be displayed using a suitable GIS viewer, such as TACCS™.
(40) Once the criteria for a precursor activity have been satisfied, the precursor activity network containing that precursor activity remains active in the simulation/analysis program 311 until the geospatial, temporal, and/or other relationships that exist between the precursor activities in the precursor activity network can no longer be satisfied.
(41) Behavior rules that have been developed by SMEs or others may be assigned to each precursor activity and to each precursor activity network to stipulate the action to be taken by the simulation/analysis program 311 upon the occurrence of an actual event that satisfies the criteria for any precursor activity and upon the occurrence of sufficient events such that the criteria for a critical number of precursor activities within a particular precursor activity network have been satisfied. Such behavior rules may include the following:
(42) a. Whether or not there is an active precursor activity network containing the precursor activity, which embodies geospatial, temporal, and/or other relationships that exist between the precursor activities such that the precursor activity should be treated as part of the active precursor network; and
(43) b. Whether or not the satisfaction of the criteria for a particular precursor activity represents sufficient progress towards a Consequent Event, such that operator notification is warranted based on the number of precursor activities the criteria for which have been satisfied.
(44) Operator notifications may be generated, which may include:
(45) a. Notice of the existence of an active precursor activity network, including the extent of progress toward a Consequent Event; and
(46) b. Alerts indicating the progress toward a Consequent Event, including: (i) the location of actual events that have satisfied the criteria of precursor activities; and (ii) critical infrastructure and key assets associated with the precursor activities; and (iii) Consequent Events that meet the established geospatial range criteria.
(47)
(48)
(49)
(50)
(51) Advantages of the present invention includes, but are not limited to:
(52) 1. The task of identifying significant patterns of events within large amounts of data has been automated, not by examining data and looking for possible patterns on a case-by-case basis, but by establishing all patterns identified by the community of subject matter experts and associating actual events with these patterns as the actual events occur.
(53) 2. By using communities of subject matter experts to create rules that define patterns, and using new experience to refine the rules and thus better define the patterns, the process or method by which data are sought may thus be made more “expert.” Because the process, being automated, can be made widely available, the higher levels of analyses that can be achieved through continuous refinement will also be made widely available.
(54) 3. By using one or more computers to automate the search for precursor activities, the process of identifying evolving Consequent Events and providing alerts to users can be achieved on a real or near real time basis.
(55) Hereinafter, an exemplary implementation of the present invention is described in detail. Research shows that terrorist activities are not random activities as initially perceived. There are similar key indicators across the multiple terrorist events that if tracked and mapped, point to where the terrorist event occurred. The research identifies a core concept that terrorist tend to think globally, but act locally. Meaningful key indicators for a select region can be tracked based on a range for how far a terrorist is probably travelling and the time for how long an indicator would stay relevant.
(56) For example, an analyst tracks a potential hotel bombing and alerts come in of suspicious events, such as, explosive material stolen, uniforms stolen, and known recruitment of a fringe group occurring, which all have ranges associated therewith.
(57) While human behavior is unpredictable at best, this type of analysis provides a more thorough approach for processing what seemed to be initial independent intelligence spots. It also provides a method for tracking intelligence spots that may have occurred 6 months ago, but is still relevant to a particular terrorist type of event.
DEFINITION
(58) Suspicious Activity Reports (SARs)—Quick intelligence spot detailing potential criminal activity. Classification (indicator)—A specific type of event that an intelligence spot can be associated with so that it can be cataloged. Category—A grouping of associated classifications. Precursor Activity—A specific type of activity that takes into account the weight of a threat, the timeframe for the threat, the distance of the threat for each classified intelligence spot. Threat Value—A way to weight the importance of the intelligence. The higher the threat value the stronger the intelligence, for example, 0-50 (Blue); 51-100 (Orange); 101+ (Red). Precursor Activity Network (PAN)—A profile of a specific type of criminal activity made up of specific categories that typically lead up to that criminal activity taking place. Automated Alert Analysis—Based on a developed Precursor Activity Network, a warning panel illustrating the likelihood of the potential criminal activity.
(59) Preplanning
(60) Step 1—Identify a Precursor Activity Network (PAN). PAN is a specific list of terrorist events that an Intelligence Team is interested in tracking. These events in the system can be created by the analyst. Potential networks could be, for example, Station Bombing, Train Bombing, Railway Bombing (track, bridges, and tunnels), and Deranged Individual.
(61) Step 1.a—Identify Classifications and Categories. For each Precursor Activity Network, classifications and categories (key indicators) need to be identified. This can be done either by an agencies subject matter expert or from collected research. Once these have been identified then their threat value, time, and distance can be updated and changed by the analysis based on the differing Precursor Activity Network.
(62) A precursor activity report of, for example, station bombing is given in below Table 2.
(63) TABLE-US-00002 TABLE 2 Exemplary Precursor Activity Report Dis- Threat Time tance Category Classification Value (days) (km) Access Alarm Codes Breeched 30 30 2 Computers Hacked Key/key boxes compromised Theft of Uniform/Badges 30 30 2 Equipment Large quantities of bomb making 30 100 10 Purchase materials (fertilizer/chemicals) purchased or stolen Guns reported stolen 30 100 10 Surveillance Equipment purchased 20 190 10 Funding Large Cash Deposit by a group 20 120 10 Money Theft 20 120 10 General Bombing Threat Individual Attack Recruitment College Campus Mercenary Technical Experts 20 180 20 Surveillance Facility Alarm System Probe reported Suspicious individual identified and not cleared Suspicious individual identified and not cleared Suspicious photos of a facility taken and person not cleared Questioning of Employees Target Asset Specified 70 30 0 Specific Infrastructure Specified 70 30 0 Threat
(64) Operations
(65) Step 1—Processing Alerts—
(66) The system of the present invention receives alerts from an intelligence team. Each of the alerts is given an Alert Type and a geographic location. The alerts may be basic emails with text. The geographic location of the alerts may be provided by the Analyst. It is noted that an alert can also be created manually by the analyst if new intelligence is received, but it is not connected to the system. The alerts may be processed according to the following procedure:
(67) 1. Select the Alerts and Notifications from the system toolbar.
(68) 2. Select the Alert inbox from the submenu.
(69) 3. The step may vary based on filters established, but assuming no filters, review the title of the alert, and if it meets a potential criteria, select the alert to review.
(70) 4. Once the Alert has been selected, click the blue gear box on the bottom left to edit the alert.
(71) 5. Once the editable Alert has open, select the Edit Classification button to open the Activity Classification to categorize the alert.
(72) 6. Click ‘Ok’ and it will be saved.
(73) If at any point an alert needs its Category or Classification updated, that alert can be updated by following the same process. Also, it is recommended that the Analyst perform this task daily at a set time each day, except for new alerts that need to be manually typed in. Those exceptional alerts should be done as required.
(74) Step 2—Monitor Automated Alert Analysis Panel. Once the alert has been categorized as a potential key indicator, the system begins processing the alert automatically based on the developed PAN perimeters. Once a minimum of two (2) alerts have created an overlap, that PAN appears with a severity color and the alerts that triggered the PAN for review.
(75) Once PAN has entered into the Automated Alert Analysis the following procedure is followed.
(76) 1. When a PAN has entered the Automated Alert Analysis: a) if it is Orange/Blue, the Analyst notifies the Inspector for the Intelligence Team immediately via email with the PAN and the associated Alerts; b) if it is Red, the Inspector is notified immediately via phone. If the Inspector is not available, then the Officer in Charge for the day is notified. The next steps may include: i) Notification to, for example, APD Command Staff; Corporate; TSOC/JTTF/HSOC; and SAT Coordinators to notify State and Local officials; and ii) Actions to, for example, Dispatch Special Operations (K-9); Extend Patrol to 12 hour shifts; Daily briefings of events.
(77) 2. Since the weighting of an alert can span a period of time, each daily notification to the Inspector includes whether the PAN has risen, lowered, or that the threat is no longer active.
(78) In view of the foregoing, it can be seen that the present disclosure provides a system and a method to automate the search for precursor activities, identify evolving consequent events, and provide alerts to users in real time or near real time, thereby supporting the decision process. It is to be understood that embodiments of the present disclosure are described in detail for exemplary and illustrative purposes only. Various modifications and changes may be made by persons skilled in the art without departing from the spirit and scope of the present disclosure as defined in the appended claims.