Acquiring & Exploiting Knowledge for Predicting Acts of Terrorism Rocky Termanini. PhD, CISSP Software Process Improvement Network (SPIN) Northrop Grumman, E2 Conference, Redondo Beach, CA April 6; 9:00 – 12:00 AM Copyright 2010, Rocky M. Termanini 1 The US Government is learning it the hard way: Predictive Models do not work unless you have been deeply involved in the fabric of the culture and religion of the country… Copyright 2010, Rocky M. Termanini 2 The US Government Did not pay much attention to the History of Egypt Copyright 2010, Rocky M. Termanini 3 Step one: dump everything we know about a country like Iraq, and “create systems that mirror the actual communities.” Step two: in the CEWPS plan: to realistically represent the social, cultural, and behavioral theories” about why people act the way they do”. Step three: let commanders run mock battle plans against these modeled Iraqis, to see how they might react. Copyright 2010, Rocky M. Termanini 4 A noble mission to explain the anatomy of Al Quada Copyright 2010, Rocky M. Termanini 5 Event E(t) Prior Attack Copyright 2010, Rocky M. Termanini Attack Post Attack Objective We’re building an is artificially intelligent reasoning machine that extract knowledge from historical bombing episodes and offer solid prediction and combat upcoming attacks... Event E(t) Prior Attack Copyright 2010, Rocky M. Termanini Attack Post Attack Objective Specifically speaking, 1. creating a Knowledge database of past attacks; 2. identifying trends in the attacks; 3. determining the correlation between attacks 4. using analysis to calculate the probabilities of future attacks and their location. Copyright 2010, Rocky M. Termanini 8 CEWPS Holistic vision CEWPS™ offers four robust advantages: • Early Warning Prediction of incoming attack. • Early Warning Detection • Evidential Reasoning to improve degree of certainty • Memorizing attacks for future similar attacks Copyright 2010, Rocky M. Termanini 9 Early Warning Rationale Early-warning is not about predicting the future … It is about preventing specific events (terror attacks) from happening at the right time Copyright 2010, Rocky M. Termanini 10 Terrorism What is It? Why do we worry about it What can we do to circumvent it Copyright 2010, Rocky M. Termanini 11 Let’s define some term Jihadism: الجهادOriginally had a significant meaning to represent Islam expansion…Now, it has a twisted meaning to represent Islamic terrorism Mujahedeen: المجاهدينRadical warriors who practice Islamic terrorism under the name of Jihad. They are dedicated to destroying anything that is not Islamic. They believe their action will win them the Paradise. Copyright 2010, Rocky M. Termanini 12 Dedication to a cause Copyright 2010, Rocky M. Termanini 13 Even a Camel is part of Jihad Copyright 2010, Rocky M. Termanini Suicide Bombing can take any form Copyright 2010, Rocky M. Termanini 15 Another Kind of Mujahedeen: Copyright 2010, Rocky M. Termanini 16 Another mission to to call for Holy War Copyright 2010, Rocky M. Termanini 17 U.S. RECOGNIZED TERRORIST ORGANIZATIONS Lashkar I Jhangvi (LJ) Abu Nidal organization (ANO) WORLDWIDE Liberation Tigers of Tamil Eelam (LTTE) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Ansar al-Islam (AI) Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo Basque Fatherland and Liberty (ETA) Communist Party of Philippines/ New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad, EIJ) Kahane Chai (Kach) Kongra-Gel (KGK, formerly Kurdistan Workers’ Party, PKK, KADEK) Lashkar-e-Tayyiba (LT) Copyright 2010, Rocky M. Termanini Mujahedin-e Khalq Organization (MEK) National Liberation Army (ELN)— Colombia Palestine Islamic Jihad (PIJ) Palestine Liberation Front (PLF) Popular Front for the Liberation of Palestine (PFLP) Popular Front for the Liberation of Palestine–General Command (PFLP-GC) Al-Qaida Real IRA (RIRA) Revolutionary Armed Forces of Colombia (FARC) Revolutionary Nuclei (RN) Revolutionary Organization 17 November (17 November) Revolutionary People’s Liberation Party/Front (DHKP/C) 135 Salafi st Group for Call and Combat-GSPC Sendero Luminoso (Shining Path or SL) United Self-Defense Forces/Group of Colombia (AUC) 60% Shi’a 30% Sunni 10% Misc. Copyright 2010, Rocky M. Termanini 19 890 /year 3200/year 1200 /year Copyright 2010, Rocky M. Termanini 20 http://www.youtube.com/watch?v=bel7Trt49hE http://www.youtube.com/watch?v=KOTH_xv6O4o&feature=related Copyright 2010, Rocky M. Termanini 21 The History of Islam and its relation to Jihad Copyright 2010, Rocky M. Termanini 22 Let’s go back and review the chemistry of the four Terrorists Copyright 2010, Rocky M. Termanini 23 Abdul Rahman Ghazi Nationality: Iraqi, Kurd Sect: Sunni, Married two kids; engineer; Joined AlQuada 2005; explosive knowledge- High Training in Pakistan. Jihadist Frequent visitor to UAE…brother works accountant Plan: Killing Shi’a Policemen Suicide in 2009 Baghdad… Copyright 2010, Rocky M. Termanini 24 Mustapha Hamwai Jalali Nationality: Yemeni, Sect: Sunni, Single; Accountant; Joined Al-Quada 2006; explosive knowledge- High Training in Yemen, Accountant in Iraq Jihadist Brother works in Dubai…HSBC bank Plan: Killing US troops Suicide in 2009 Basra, Iraq Copyright 2010, Rocky M. Termanini 25 Faysal Hasan Nationality: Iraqi, from Baghdad Sect: Shi’a, Single; Architect; Joined Muqtada alSadr 2006; explosive knowledge- High Training in Lebanon’s Hezbollah. Jihadist Plan: Killing US tourists Suicide in 2009 Mosel, Iraq Copyright 2010, Rocky M. Termanini 26 Mohammed Abdul Salam Nationality: Egyptian, Cairo Sect: Sunni, Single; Journalist; Married to a Palestinian girl Najwa, Joined Muslim Brotherhood 2004; Army officer, explosive knowledge- High Training in Mauritania. Jihadist, Radical Plan: Killing US troops in an Humvee Copyright 2010, Rocky M. Termanini 27 The Jihad War • • • • • • • • • • Believe 9/11 is an inside job Very savvy politically Highly educated Islamic war against enemies of God Not afraid to die Driven by radical Islamism Residual anger and vengeance Desire to go to Heaven They only can do it “once” They prefer to attack Americans outside the US Copyright 2010, Rocky M. Termanini 28 We can improve our Homeland security against suicide bombing, by learning from previous attacks, in the world... Copyright 2010, Rocky M. Termanini So, What can we learn from previous Suicide Bombing Episodes? Copyright 2010, Rocky M. Termanini 30 Experience & knowledge Relationship Experience Event Outcome Knowledge Store & Predict Created by external sensation or internal reflection Neurological image of the experience in the brain Copyright 2010, Rocky M. Termanini 31 If we inject the human knowledge and experience into the machine, we will be able to build an intelligent system that employs expert judgment and extensible reasoning capability Copyright 2010, Rocky M. Termanini 32 There are many registries and data repositories on terrorism....but, they are disparate , nonnormalized, non-correlative Copyright 2010, Rocky M. Termanini GTD from the University of Maryland Copyright 2010, Rocky M. Termanini Rand DB on Terrorism Incidents Copyright 2010, Rocky M. Termanini Copyright 2010, Rocky M. Termanini 36 FBI Terrorist Screening Center Copyright 2010, Rocky M. Termanini Institute of Terrorism Research and Response Copyright 2010, Rocky M. Termanini Most Episodes partially documented, incomplete and follow no standards Copyright 2010, Rocky M. Termanini Analyzing a suicide Bombing Episode Copyright 2010, Rocky M. Termanini 40 Episode attack Episode Episode attack Episode attack Episode Episode attack attack Episode Episode attack Attack Episodes have lots in common Copyright 2010, Rocky M. Termanini attack attack They all have common features Episode Tstart Tend Each episode is a stochastic Process Copyright 2010, Rocky M. Termanini Episode • • • • • • A Plan Actors Target Time Location Damage A suicide Episode has 6 basic attributes Copyright 2010, Rocky M. Termanini • • • • Casualties Destruction Disruption Social Trauma Forecast Zone Emergency Response Planning Planning Φ1 attack Φ2 Recovery Φ3 Tstart Tend Each episode has three Phases Copyright 2010, Rocky M. Termanini Bombing where Prediction Failed SB-1 SB-3 SB-2 M(t)1 M(t)2 M(t)3 P(t)1 P(t)2 P(t)3 Prediction Period M(t)0 P(t)0 SB-T A(t)0 The Process of Credible Prediction Copyright 2010, Rocky M. Termanini Bombing where Prediction Failed SB-1 M(t)1 M(t)2 SB-T SB-3 SB-2 M(t)3 M(t)0 P(t)0 A(t)0 When prediction shorter, prevention gets better P(t)1 P(t)2 P(t)3 The Process of Credible Prediction Copyright 2010, Rocky M. Termanini The Major Building Blocks Copyright 2010, Rocky M. Termanini 47 Bayesian Refinement Recursion By indicators Build Collecting grids Collect Bombing Episodes Normalize & Characterize Create Semantic Knowledge Build Bombing Patterns Build Reasoning Model Match Rules Analyze & Validate Dispatch & Alert Ontology Components& Semantic Rules Save Episode Analysis 48 Graph-G The Global Cyber Malware Data Collection Grid Global Terror Episode Collection Grid Copyright 2010, Rocky M. Termanini Global Terror Steady Updates The Intelligence Data Grid Steady Updates The Activity Monitoring Grid Steady Updates The Demographic Grid Steady Updates Copyright 2010, Rocky M. Termanini The Cognitive Early Warning Prediction System (CEWPS™) Collected Raw attributes on the attacker Copyright 2010, Rocky M. Termanini 51 Knowledge Base Ontological and Semantic Transformation Semantic attack Patterns US/Global Intelligence Grids Local Law Enforcement Monitoring Sources Attack Collectors Disparate Unstructured Attacks Unstructured Attack Episodes Are Collected, Filtered And Transformed Into A Patterns Copyright 2010, Rocky M. Termanini Jihad Faith Suicide Sacrifice Terrorism Heaven is the domain Ontology is used to represent a suicide attack as a knowledge model Copyright 2010, Rocky M. Termanini 53 • • • • Fighting for Islam Dedication to Islam Showing Courage Heaven is the award Suicide • • • • Go to Heaven Destroy Enemy of God Be an example to others Koran teaches us to kill enemies of Allah Sacrifice • • • • I am not afraid of dying I am enlisted in Mohammed’s Army Sacrifice is the best way to die for Islam Paradise is the desired place Jihad Semantic is to derive significant knowledge from words Copyright 2010, Rocky M. Termanini 54 Bombing History Bomber Profile Potential Occasions Potential Locations Explosives Knowledge Suspect Vehicles Semantic Bombing Episodes Knowledge Base Knowledge Collector Improvements Match Alerts Attack Clues incoming Scenario Builder Human Experience Bombing Predictor Bayesian and Heuristic Processing Dispatch Predicted Scenario Dispatch Early Warning Pre-emptive Alerts The Architecture of The Cognitive Early Warning Predictor System (CEWPS) Copyright 2010, Rocky M. Termanini Attack Knowledge Database Broadcast Alert to Agencies The Reasoner Select Optimal Predictive Attack Apprehend Terrorists Urgent Response Mode Attack Models with Higher Degree of Certainty Incoming Attack Clues Attack knowledge Models Data include Semantic Rules Ontological and Semantic Transformation CEWPS™ extracts credible forecasts and prediction about Bombing Attack Copyright 2010, Rocky M. Termanini 56 US/Global Intelligence Sources All the attributes are semantically connected Monitoring Sources Demographic Sources Each Attack Episode is Transformed into a Distinct Pattern Copyright 2010, Rocky M. Termanini Library of Attack Patterns Reasoning Engine Dynamic Prediction Queries Attack Pattern Selected Pattern CEWPS Semantic Knowledge Base As a finding is entered, the propagation algorithm updates the beliefs attached to each relevant node in the network A query produces the information to propagate through the network and the belief functions of several nodes are updated Copyright 2010, Rocky M. Termanini Small Illustration of Bayes Modeling Copyright 2010, Rocky M. Termanini 59 What Is it? It is a network-based model involving uncertainty What is it used for? Intelligent decision aids, data fusion, feature recognition, intelligent diagnostic aids, automated free text understanding, data mining Where did it come from? Cross fertilization between the artificial intelligence, Operations Research,, and statistic… Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics Visit to Asia Smoking Patient Information Tuberculosis Lung Cancer Bronchitis Medical Difficulties Tuberculosis or Cancer XRay Result Dyspnea Diagnostic Tests Network represents a knowledge structure that models the relationship between medical difficulties, their causes and effects, patient information and diagnostic tests Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics Tuber Lung Can Tub or Can Visit to Asia Present Present True Present Absent True Absent Present True Absent Absent False Tuberculosis Patient Information Lung Cancer Tuberculosis or Cancer XRay Result Smoking Bronchitis Dyspnea Medical Absent Difficulties Present Tub or Can Bronchitis True Present 0.90 0.l0 True Absent 0.70 0.30 False Present 0.80 0.20 False Absent 0.10 0.90 Dyspnea Diagnostic Tests Relationship knowledge is modeled by deterministic functions, logic and conditional probability distributions Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics V isit To Asia Visit 1.00 N o Visit 99.0 Tuberculosis Present 1.04 A bsent 99.0 Smoking Smoker 50.0 N onSmoker 50.0 Lung Cancer Present 5.50 A bsent 94.5 Patient Information Bronchitis Present 45.0 A bsent 55.0 Tuberculosis or Cancer True 6.48 False 93.5 XRay Result A bnormal 11.0 N ormal 89.0 D yspnea Present 43.6 A bsent 56.4 Propagation algorithm processes relationship information to provide an unconditional or marginal probability distribution for each node Which is called the belief function of that node Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics V isit To Asia Visit 100 N o Visit 0 Tuberculosis Present 5.00 A bsent 95.0 Smoking Smoker 50.0 N onSmoker 50.0 Lung Cancer Present 5.50 A bsent 94.5 Bronchitis Present 45.0 A bsent 55.0 Tuberculosis or Cancer True 10.2 False 89.8 XRay Result A bnormal 14.5 N ormal 85.5 D yspnea Present 45.0 A bsent 55.0 Interviewing the patient produces more information the “Visit” As this data is entered, the propagation algorithm updates the beliefs attached to each relevant node in the network Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics V isit To Asia Visit 100 N o Visit 0 Tuberculosis Present 5.00 A bsent 95.0 Smoking Smoker 100 N onSmoker 0 Lung Cancer Present 10.0 A bsent 90.0 Bronchitis Present 60.0 A bsent 40.0 Tuberculosis or Cancer True 14.5 False 85.5 XRay Result A bnormal 18.5 N ormal 81.5 D yspnea Present 56.4 A bsent 43.6 Further interviewing of the patient produces the finding “Smoking” is “Smoker”…This information propagates through the network Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics V isit To Asia Visit 100 N o Visit 0 Tuberculosis Present 0.12 A bsent 99.9 Smoking Smoker 100 N onSmoker 0 Lung Cancer Present 0.25 A bsent 99.8 Bronchitis Present 60.0 A bsent 40.0 Tuberculosis or Cancer True 0.36 False 99.6 XRay Result A bnormal 0 N ormal 100 D yspnea Present 52.1 A bsent 47.9 Finished with interviewing the patient, the physician begins the examination, and he now moves to specific diagnostic tests such as an X-Ray, which results in a “Normal” finding which propagates through the network… information from this finding propagates backward and forward Copyright 2010, Rocky M. Termanini Example from Medical Diagnostics Visit To Asia Visit 100 No Visit 0 Tuberculosis Present 0.19 Absent 99.8 Smoking Smoker 100 NonSmoker 0 Lung Cancer Present 0.39 Absent 99.6 Bronchitis Present 92.2 Absent 7.84 Tuberculosis or Cancer True 0.56 False 99.4 XRay Result Abnormal 0 Normal 100 Dyspnea Present 100 Absent 0 The physician also determines that the patient is having difficulty breathing, so “Present” is entered for “Dyspnea” which propagated through the network. The doctor might now conclude that the patient has bronchitis and does not have tuberculosis or lung cancer Copyright 2010, Rocky M. Termanini • • • • • • • • • • Behavior prediction of serial killers patient Prediction of Plagiarism in Academia speech and speaker recognition.... Military Surprise Attacks Cancer diagnosis Google search SPAM Filtering FBI Face recognition (Biometrics) Site profiler for Military against terrorism Modeling Oil drilling Bayesian Nets Modeling Copyright 2010, Rocky M. Termanini Arrive to airport Airport Biometric Picture Picked up by friend Arrive to Friend’s Home Rented car from HERTZ Raise Flag-1 Phone Call-1 Overseas Call-2 Meeting-1 Restaurant Given Instructions Restaurant Under Surveillance Check owner records Check e-mail Call Main Cell Overseas Check INS Records Meeting-2 Restaurant Phone Company Plan to visit location-1 E-mail Forensics Rendez-vous time set FBI Check State Department Track ISP Pattern Check-1 Track Itinerary Target not identified Raise Flag-3 Plan to visit location-2 Check Local Universities 3 visas from 3 countries Raise Flag-2 Registered But did not attend Two locations identified Target Somewhat identified Query Knowledge Base Bayes Acyclic Attack Network (Part-1) Bayes is a scientific approach to quantify our degree of certainty on the basis of incomplete information Diagram – EM.Unstructured Sequence Diagram Of The Attack Before Becoming A Pattern (Part-1) Copyright 2010, Rocky Termanini Phone calls to headquarters Terrorist rehearse attack E-mails sent to headquarters Visit-1 to Penn Station Take Pictures Visit-1 to WTC CEWPS predict 87% Attack CEWPS is processing data CEWPS predict 65% Attack July3d Attack date Get go-ahead with attack E-mail intercepted Grids sent more data on Jamal Caught On CCTV Camera FBI Notified FBI at Penn Station Amtrak Notified Query Knowledge Base Thursday 2:45 PM Surprise Arrest Document and send to KB Bayes Acyclic Attack Network (Part-2) Bayes is a scientific approach to quantify our degree of certainty on the basis of incomplete information Copyright 2010, Rocky M. Termanini Complete Attack Network Copyright 2010, Rocky M. Termanini 71 Copyright 2010, Rocky M. Termanini 72 Copyright 2010, Rocky M. Termanini 73 Copyright 2010, Rocky M. Termanini 74 Copyright 2010, Rocky M. Termanini 75 CEWPS can live on the cloud Copyright 2010, Rocky M. Termanini 76 Terrorism Service Providers Spying Services White Slavery Services Terror as a Service Trafficking Services Hacking Services Suicide Services Drug Traffiking Services Cyberterrorism is big time on the cloud Copyright 2010, Rocky M. Termanini 77 Data Collection Services VPN Gateway Early Warning Services Secure VPN Connection Attack Prediction Services The CEWPS™ Cloud Services Subscriber Network Copyright 2010, Rocky M. Termanini 78 The Newark Bombing Scenario Copyright 2010, Rocky M. Termanini 79 Thank you For Further Questions or inquires Dr. Rocky Termanini Email: rocky@termanini.com Copyright 2010, Rocky M. Termanini 80