Multi-domain Counter-terrorism Modeling

Similar documents
Adopted by the Security Council at its 6557th meeting, on 17 June 2011*

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

Counter-Terrorism as Crime Prevention: A Holistic Approach

STRUCTURE APPENDIX D APPENDIX D

Official LOEs with Metrics by LOE Owner

ADMUN 2018 Combating ISIS in Syrian Territory UNSC

1267 and 1988 Committees Monitoring Team. CCW - Geneva, 2 April 2014

Adopted by the Security Council at its 7598th meeting, on

PROPOSED POLICY RECOMMENDATIONS FOR THE HIGH LEVEL CONFERENCE

Role of Security Sector and Civil Society in Responding to and Preventing VE

Countering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies

Three Part Peace Plan for The Middle East

Modern Terrorism and Counter-Terrorism Strategies

CHAPTER 20 NATIONAL SECURITY POLICYMAKING CHAPTER OUTLINE

Fifth Grade Pacing Guide This Pacing Guide includes Social Studies Pacing Guide Suggested Transitional Materials Suggested Field Trips

progress report on combating terrorism and extremism was submitted to the House on 22 June 2012.

Masters in Terrorism and Political Violence - Full time programme

DEVELOPING A COLLECTION PLAN FOR GATHERING VIDEO EVIDENCE

CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017

Counter-Terrorism Bill

NATIONAL MARITIME COORDINATION CENTRE (NMCC) BRUNEI DARUSSALAM MARITIME SECURITY CHALLENGES: BRUNEI DARUSSALAM S PROSPECTIVE

Delegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004.

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

2017 Survey of Cuban American Registered Voters

DETERMINATION NO. 01 OF 2016

A Resolution to Designate Pakistan as a State Sponsor of Terror

The Importance of Internal Security for Outlier Nations

The Strategic Context of the Paris Attacks

S/2001/1309. Security Council. United Nations

DIME/PMESII Structure

The Department of State s Annual Report on Terrorism

Objectives To explore the meanings of conflict and war. To make deductions and practise reasoning skills.

Chair s Statement 1. Strengthening Partnership for Peace and Sustainable Development

2015 Bailiffs and Warrant Officers Conference Course Descriptions

Political and Security Committee EU military mission to contribute to the training of Somali Security Forces (EUTM Somalia) - Information Strategy

Countering Violent Extremism and Radical Rhetoric

NSI Law and Policy Paper. Reauthorization of the FISA Amendments Act

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

c) Terrorist activity is such activity, the liability for which is defined in the Chapter XXXVIII of the Criminal Code of Georgia;

National IAS Academy Current Affairs: Contact: Hayabusa 2

I have included several cases of historic significance and several which have been decided in It is important that you read and understand these

UNCLASSIFIED OPENING STATEMENT BY MICHAEL V. HAYDEN BEFORE THE SENATE SELECT COMMITTEE ON INTELLIGENCE MAY 18, 2006

Interstate Commission for Adult Offender Supervision

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

1. Do you approve or disapprove of the job Barack Obama is doing as president? May 09 60% 30 9 Democrats 84% 11 6

1 18 in 08 Educational Guide

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet

Oldřich Černý. The. Ph.D. Scholarship at Charles University. in the field of: The Economic and Financial Threat Domain

CSF Vienna Working Groups Recommendations

Criminological Theories

Secure Border Initiative

Magruder s American Government

PROFILES ON COUNTER-TERRORISM CAPACITY

PROGRESS AND PROSPECTS

Counter-Terrorism and Security Act. What is Prevent? Counter Terrorism Branch. Inspector Andrea Bradbury MBE BScHons

CRS Report for Congress

Adopted by the Security Council at its 6459th meeting, on 20 December 2010

CHAPTER 26 THE UNITED STATES IN TODAY S WORLD

North Korea Sanctions Legislation: Comparing Three Bills under Active Consideration in Congress

Law Enforcement PRECISION EXAMS

Russian Disinformation War against Poland and Europe.

Inventive Step. Japan Patent Office

The Government anticipates requiring continuation of the following tasks:

Can t You Just Sanction Them? Financial Measures as an Instrument of Foreign Policy

The Transnational Threats Project at CSIS, in cooperation with the Center on Global Counterterrorism Cooperation. 5 June 2008

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

CLINTON FOREIGN POLICY

Broad Run. Spartan Invitational Legislation Packet

Ontario Provincial Police. Historical Highlights front panel

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

IACP s Principles for a Locally Designed and Nationally Coordinated Homeland Security Strategy

Political Opinion Poll Syrian Refugees

INTRODUCTION BACKGROUND. Chapter One

NEW PEACEKEEPING STRATEGIES FOLLOWING VIOLENT REGIME CHANGE. May 28-30, United States Institute of Peace. Washington, D.C.

ICE Investigating &Prosecuting Human Rights Violators and War Criminals: A Collaborative Approach

LAW OF GEORGIA ON COMBATING TERRORISM

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

Law of The Republic of Belarus. On The Fight Against Terrorism. 3 January 2002 No.77-Ç CHAPTER 1. GENERAL PROVISIONS

REGULATION FOR THE ELECTORAL CAMPAIGN

Fresh Perspectives on. the. War on Terror

Lebanon, Egypt, Palestine, Iraq, Syria, Tunisia, Morocco, Libya, Yemen and Kurdistan Region in Iraq.

Paris, Sharm el-sheikh and the Resurrection of Old Europe

Total Test Questions: 67 Levels: Grades Units of Credit:.50

10880/17 GdK/lwp 1 CAB LIMITE EN

THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE

Council of the European Union Brussels, 23 January 2015 (OR. fr)

CRS Report for Congress

Cross-Border Terror Networks: A Social Network Analysis across the Canada-US border

Promoting fundamental British values as part of SMSC in schools Policy Autumn 2015

Sanctions and Anti-Money Laundering Bill [HL]

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

Severing the Web of Terrorist Financing

National Action Plan for the Implementation of United Nations Security Council Resolution 1540 (2004) MEXICO

Export Control Through Rose Colored Glasses: Export Regulations Post 9/11 CSURMA Huron Consulting Services LLC. All rights reserved.

COURSE OUTLINE. Is course New, Revised, or Modified? Revised. Reference Criminal Justice Library Materials List

A year in review. First 12 months of the European Border and Coast Guard Agency

7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM

I recommend that the BBCSS s decadel survey put primary emphasis on research guided by practical theory. Most SBS research on Anti-American Extremism

Q&A: Protecting The Nation From Foreign Terrorist Entry To The United States

Follow-up to the recommendations of the Board of Auditors on the financial statements for previous years

Transcription:

www.titan.com Multi-domain Counter-terrorism Modeling Roger Smith Vice President and Group CTO Titan Systems Corporation rdsmith@titan.com MORS WG16 & WG29 The Goal Capture the complex dynamics of a global network of people, organizations, and resources Al Quaeda is one challenge Timothy McVeigh is another Equip our government with tools to enhance thinking, planning, and training Explore consistent, logical, and rigorous relationships through the construction of models 1

The Target The command nucleus is not the only target in counter-terrorism activities Field Cells, Communications, Weapons, Assets, Sympathizers, and National Hosts are all part of the target set Each of these is made up of assets that reside in different domains Operational Domains Information 2

Domain Models Information Domain Relationships Objects, Interactions, and Relationships must be grouped into functional domains Each domain requires a different modeling abstraction Missiles, Bank Transactions, Cases, Intelligence Analysis, and Medical relief will not fit into one simulation system Cross-domain data exchanges will carry very unique information Not valuable to every federated domain model 3

Trade Modification Sample Domain Relationships Information Asset Allocation United Nations Support Trade Sanctions Foreign Aid Terror Funds Host Nation Supporters People & Orgs Host Nation Supporters Protection Communications Intelligence Human Intelligence Communications Operational Assets Recruiting Military Forces Police Protection Security Controls Terrorist Networks International Trade Access to Assets Bank Regulation Source of Funds (Information Domain) Tactical Intel Captured Money Sympathizers Captured People Psychological, Family Influence Behavior Influence Counter-terrorism Laws International Prosecution Immigration Monitoring Target Identification (Information Domain) Medical Aid Refugee Support Media Images Convictions Dynamics Model of Relationships <transfer> <Immigration> <Training Camps> Bank Analysis Immigration Analysis Human Agents Intelligence US Policy Neighbor Country Intl Policy Host Country Information Military Police Command Nodes Radio Web Cellphone Security Target Facilities Weapons Stores Attacks capture Prisoners Field Cells capture2 Education Media Medical Support Potential Recruits <US Policy> Food Mind <Host Country> Training Camps pass recruits International Trade Terrorist Bank Acct Banks transfer Sympathizers Bank Accts immigrate Immigration fail Terror Laws Trial Conviction 4

Objects and Interactions of Interest Information Objects Terror Command Terror Field Cells Military Forces Special Forces Law Enforcement Customs Sensor Platforms Sensors Analysts Distribution Cells National Govt United Nations Tribal Govt Aid Workers Food Medicine Media Education Finance Institutions Finance Networks Account Holders Money Justice System Military Tribunals Modifiers Fear Loyalty Duty Org Visibility Coop Position Power Attention Enviro Mind Self-interest Asset Access Positions Info Mental State NOTE: This is not a FOM, further abstraction is required Classrooms Applications of CT Models Teach new concepts through exploration Training Exercises Rehearse actions in cross-functional teams Analysis Identify effective tactics & countermeasures Prediction Identify clues to future attacks 5

Conclusion Traditional physical combat simulations can not be modified to capture the entire domain of interest. Explorations with these tools will lead to known answers and brick walls We don t currently understand the problem well enough to create a simulation or a federation that can usefully represent it. It will require a combination of combat, information, political, cultural, financial, and legal sims to capture important details New objects, interactions, and object modifiers will have to be selected, discovered, and invented Counter-terrorism is this generation s Fulda Gap. It will be our primary focus for at least one decade. We should begin addressing the problem now 6