Beruflich Dokumente
Kultur Dokumente
Paul Whitney*, Sandy Thompson, Alan Brothers, Garill Coles, Cindy Henderson, Jon Young, Dave Niesen, John Madsen
March 2009
*paul.whitney@pnl.gov
PNNL-SA-65672
Outline
Topics
Representing Process and Behavior Models IED Scenario Development & Description The Bayes net General Threat Model and IED Process
...
...
...
...
Detecting Threatening Behavior Using Bayesian Networks Laskey et al - Proceedings of the Conference on Behavioral Representation in Modeling and Simulation, 2004.
P(Successful IED Attack via Particular Sequence) = P(Successful IED Attack via Particular Sequence | Attempt ) * P( Attempt)+ P(Successful IED Attack via Particular Sequence | no Attempt) * P(no Attempt)
Techno
Behavioral
IED Scenarios
Who What When Where Why How Roadside emplacements, remotely detonated (by wire, by plate, by remote control), on a person, with a vehicle, buried, letter bombs, car bombs,
Why Study IEDs? Real problem temporal/spatial variation Significant available expertise Social/behavioral is the driver! Materials/capability ubiquitous, but, rate of occurrences vary
IED Scenarios
Group X has the objective of repelling and limiting the efficiency of a well-armored occupying force in order to preserve the sanctity of their way of life from the corrupting influences of the occupying force. This group has access to a wide variety of demolitions and explosives as well as experts in employing them, having had many of their members trained in military service and universities across the world. To send a message to the occupying forces, a low-level recruit places an IED in a roadside mailbox well aligned to target a passing vehicle, on a route frequently traveled by the occupiers. After placing the device, an observer remains nearby to set off the charge at the appropriate time when a target vehicle passes the mailbox (detonation in this case done by command wire) and to also record the attack for effects analysis and future training, motivational, propaganda, and recruitment purposes.
Planning occurred
No planning occurred
Techno Behavioral
Calculate
Structure
Fault trees Decomposition of causes of root event of interest Event trees Begin with undesired initiator event and track outcomes thru sequence of events Possibility tree combinatorial representations of possible scenario outcomes Process models sequence of steps and actions to execute a scenario Bayes nets; Dynamic Bayes nets probabilistic relationships among variables
Behavior models General threat models