Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September...

29
Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011

Transcript of Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September...

Page 1: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Situation Managementto Counter Piracy

Alan SteinbergGeorgia Tech Research Institute

September 2011

Page 2: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Piracy & Hijacking (2004)

9

4

Page 3: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Outline

• Recognition-based approaches to threat detection & prediction– Model-based

• Attributes• Activities• Associations

– Anomaly-based• Explanation-based approaches• Recommended approach

– Threat prediction: opportunity-focused– Situation resolution

• Capability, Intent, Opportunity• Context exploitation

– Response management

Page 4: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Traditional Model-Based Approaches to Threat

Assessment

Signature-Based Indicators:

• Eye patch

• Peg leg

• Parrot on shoulder

• Skull-and-crossbones

Activity-Based Indicators:

• Rum drinking

• Frequent use of “arrrr”

• Treasure-burying

• Plank-walking

Feature Selection

Target Model

Feature Extraction

LiveData

MatchID

Decision

Page 5: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

• Threats can be highly variable & ambiguous– Highly variable

– Non-linear and multi-modal

– Dynamic

– Complex & poorly-modeled causality

– Ambiguous

• Signatures

• Behaviors

• Relationships

Problem withModel-Based Detection

Page 6: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

• A new trend in Automated Target Recognition−Model backgrounds

−Detect anomalies: possible targets

−Diagnose anomalies

• Adapt to human, social, cultural and behavioral modeling– Understanding the context within which they

operate: the “patterns of life” that characterize normalcy

– Allow discrimination of subtle deviations

Anomaly-Based Detection

Page 7: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

PANDA Concept[199] PANDA[2]

(Predictive Analysis for Naval Deployment Activities)

Operational Challenges• Broad and diffuse threat• Highly cluttered environment (126,000 surface vessels > 100 tons; >50,000 merchant vessels)

• Highly variable environment (behaviors and updates)

• “Stovepiped” data sources prevent cross-organization analysis

• Use of global and local sensors complicates data fusion

Operational Needs• Exploit all-source data to maintain a complete and continuous surface picture

• Classify vessels in terms of what they are doing in addition to where they are

• Predict where vessels will be 6, 12, and 24 hours out to support Naval operations

• Detect potential threats to support interdiction activities

• PANDA system will provide anticipatory situation awareness for 100,000 vessels

• PANDA will go beyond merely tracking to perform motion-based change detection and infer intent

• PANDA will– Learn motion-based activity patterns from long-duration tracks and

correlated data

– Detect deviations from these patterns

– Learn and apply context models to predict potential threats even as patterns evolve

Page 8: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

On-

Line

PANDA Anomaly-Based Processing[2]

Prediction & Activity MonitoringPredict vessel behavior and detect anomalies

Off-

Line

Motion-Based Pattern LearningExploit track data to learn patterns of normal

vessel behavior

Adaptive Context ModelingCapture domain models (case bases) of

obvious & non-obvious anomalies

Anomaly Processing & PresentationResolve anomalies and focus user attention

on prioritized threats

Global Traffic Patterns

• Alerts• Notifications• Warnings

COP

Page 9: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

• Normal behavior can be very difficult to model– High dimensional: difficult to model dependencies– Non-linear and multi-modal

• Normal behavior can be highly variable & ambiguous

– High probability of mis-classification and of missed detection

• Anomalies may be very subtle (of high-order)– Requiring deep understanding for modeling– Requiring sophisticated detection process

• An intelligent adversary will maximize ambiguity[6]

– Steganography: “pretend, portray, profess an intended lie”[7]

– Work within our response cycle: Drop cover only when we have no time to respond

Problems with Anomaly-Based Detection

Page 10: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

• Targets of Intelligence: activities rather than objects• Detect, identify, and track known activity types

• Discover previously unknown activity types

• Emerging ABI concepts hold promise for dealing with the increased data collection capabilities of – Advanced full motion video

– Wide area motion imagery

– SIGINT/GMTI

Activity-Based Intelligence

− Background objects (“normal objects”)

− Background activities (“normal behavior”)

• In reality, would like to be able to exploit ALL aspects:– Objects of interest

– Activities of interest

Page 11: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

ABI View of Piracy

• Piracy is all about “Encounters”

• Look for current and potential for two objects to be within “effective” range of one another– One vessel attacking, boarding (etc.) another

– Vessel attacking shore asset

– Vessels transferring cargo or people

Page 12: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.
Page 13: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

PotentialVictim

Encounter Opportunity Map

PotentialAttacker

Effective range| Encounter type A

Effective range| Encounter type BTime to opportunity A

| max. closing velocity

Time to opportunity B | max. closing velocity

• Collision

• Boarding/ Trans- loading

• Suicide bomb

• Small arms

• Shoulder-fired missile

• Torpedo

• Aid & Rescue

• etc.

Page 14: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Activity-Based Approach to Counter Piracy

• Opportunity Assessment: • Detect potential encounters & time-to-go (for various

encounter types)

• Capability/Intent Assessment: – Diagnose potential encounters

• Collision (unintentional)• Collision (intentional)• Boarding/ trans-loading• Suicide bomb

• Response– Situation resolution– Interdiction, etc.

• Small arms attack

• Shoulder-fired missile

• Torpedo

• Aid, Rescue, etc.

Page 15: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Example Scenario (1 of 5)[8]

?

?

?

Page 16: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

?

?

?

Example Scenario (2 of 5)[8]

Page 17: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

-40 -30 -20 -10 0 +10 +20 +30 +40

Target Selection Decision Tgt Engagement Decision

Estimated History Estimated Present Situation Projected Situation

Received Reports Predicted Coverage

Situation Time (Hyp H)

Report Time (Plan P)

PD

Contours

?

?

?

Example Scenario (3 of 5)[8]

Current Estimate of Present Situation

Page 18: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

PD

Contours

?

?

?

-40 -30 -20 -10 0 +10 +20 +30 +40

Target Selection Decision Tgt Engagement Decision

Estimated History Estimated Present Situation Projected Situation

Received Reports Predicted Coverage

Expected Update of Present Situation

Example Scenario (4 of 5)[8]

Situation Time (Hyp H)

Report Time (Plan P)

Page 19: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

?

?

?

PD

Contours

Target Selection Decision Tgt Engagement Decision

Estimated History Estimated Present Situation Projected Situation

Received Reports Predicted Coverage

-40 -30 -20 -10 0 +10 +20 +30 +40

Projection of Future Situation

Example Scenario (5 of 5)[8]

Situation Time (Hyp H)

Report Time (Plan P)

Page 20: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Available time to resolve

Available time to respond

No time to respond:“Check!”

Attack

Response Opportunity Map

Page 21: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Track potential threats (attackers, etc.)

• Attributes• Behaviors• Associations

Notional Processing Architecture

Track defended assets (potential victims)

Detect & project vessels within effective range

| encounter types

Prioritize threat potential• Opportunity• Capability • Intent

Resolve (as time & resources are available)

• Opportunity• Capability • Intent

Respond (as time & resources are available)

• Resources: equipment, human, information

• Coordination• Plausible attack plan

Page 22: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Summary

• Acts of piracy constrained more by Opportunity than by Capability or Intent

• Monitor defended assets (potential victims) for encounter opportunities

• Reason about encounter Opportunities– Encounter type / players / scenario– Time to go– Time to resolve– Time to respond

• Resolve encounter likelihood & characteristics – Assessing Capability and Intent

Page 23: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Outline

• Recognition-based approaches to threat detection & prediction– Model-based

• Attributes• Activities• Associations

– Anomaly-based• Explanation-based approaches• Recommended approach

– Threat prediction: opportunity-focused– Situation resolution

• Capability, Intent, Opportunity• Context exploitation

– Response management

Page 24: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

Context Exploitationin Data Fusion[3,4]

• Define a data fusion problem in terms of – An explicit set of “problem variables” XS

– A utility function on the resolution of these variables ωS:σ(XS)→Ω

• Allow the system to select additional "context variables" YS

on the basis of

−The mutual information of the problem and context variables I(XS ;YS)

−The cost of the respective information acquisition/inferencing process: CA:{XS U YS}→Ω

Page 25: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

World State Variables

Observable variables x

Latent variables ξ

Observable

Latent

Problem Variables and Context Variables[3]

Selected observable context

variables xs

Selected latent context variables ξs

Exogenousvariables

Observable problem variables y

Latent problem variables η

Endogenous(problem)variables

Page 26: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

System-Level Management of Information Exploitation

Process[5,6]• Complex Interactions of actions & latencies require

ability to–Predict utility of information over time, given planned operational actions

–Predict availability & quality of data over time, given planned sensing actions

–Predict cost of planned actions:• Resource availability• Resource expenditure• Interference with system & external

activities (e.g. jamming, exposure)• Requires system-level

–Model of uncertainty, utility & cost–Model of resource performance

• Utility of information: (Z,tr)

• Probability of obtaining info given action plan: P(Z,tr|A)

• Cost of plan: C(A,tA)

• Net value of plan:

*(A) = [(Z,tr)- C(A,tA)] P(Z,tr|A) dZdtrtA

tr = time information received; tA = time of action

Page 27: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

X)

A)

Generalized AdaptiveEvidence Accrual Process[4]

)(),|( AcAp Y

)(),|)(( AcAp Y

Inference Engine

Information Acquisition Manager

Needs SatisfactionDeterminat’n

Info Acq Planner

User Interface

Information Needs

Generation

Context DBs

Sit Hypotheses

Collection Data

Info Needs

Collection Management

DataRetrieval/

Mining

Data Collection

InferenceY X

A

Predict Utility of Info to Satisfy INs

Predict Utility of Info to Satisfy INs

Predict Prob & Cost of Acquiring Information

Predict Prob & Cost of Acquiring Information

Information Needs

Generation

Collection Management

DataRetrieval/

MiningInference

Needs SatisfactionDeterminat’n

Retrieve Collection & Context Data, (Component) Models & Hypotheses

Retrieve Collection & Context Data, (Component) Models & Hypotheses

Compose & Evaluate Situation Hypotheses

Compose & Evaluate Situation Hypotheses

Info Acq Planner

)( Y

X)Â

Page 28: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

References[1] Nassim Nicholas Taleb, The Black Swan, The Impact of the Highly Improbable, Random

House, 2006

[2] Kendra E. Moore, Predictive Analysis for Naval Deployment Activities (PANDA), Briefing to Industry: PANDA Overview,” 16 September, 2005

[3] Alan N. Steinberg and Galina L. Rogova, “Situation and context in data fusion and natural language understanding,” Proc., Eleventh International Conference on Information Fusion, Cologne, 2008

[4] Alan N. Steinberg, “Context-sensitive data fusion using structural equation modeling,” Proc., Twelfth International Conference on Information Fusion, Seattle, 2009

[5] Robert C. Whitehair, A Framework for the Analysis of Sophisticated Control, Ph.D. Dissertation, University of Massachusetts CMPSCI Technical Report 95, February, 1996

[6] Michael Bennett and Edward Waltz, Counterdeception Principles and Applications for National Security, Artech House, 2007

[7] B. Whaley, Strategem: Deception and Surprise in War, Center for International Studies, MIT, 1969

[8] Alan N. Steinberg and Robert Pack, “Pixel-level fusion of active/passive data for real-time composite feature extraction and visualization,” NATO IST Panel Workshop, Massive Military Data Fusion and Visualisation, IST-036-RWS-005, Halden, Norway, 2002.

Page 29: Situation Management to Counter Piracy Alan Steinberg Georgia Tech Research Institute September 2011.

THAT’S ALL,

FOLKS!