Skip to main content

Two Real-World Geospatial Abduction Applications

  • Chapter
  • First Online:
Geospatial Abduction

Abstract

In this chapter, we discuss two real-world applications of geospatial abduction problems (GAPs). While both applications deal with finding weapons caches that support improvised explosive devices used by insurgent terror groups, they operate in two different environments. SCARE (Spatio-Cultural Abductive Reasoning Engine) implements point-based geospatial abduction and was used to find IED weapons caches in Baghdad. In contrast, SCARE-S2 is an extension of SCARE to region-based geospatial abduction which has been used, with various modifications, to find high value targets (either large weapons caches or insurgent commanders) in certain provinces of Afghanistan. The accuracy of both systems has been tested on real-world data, and over 18 organizations have requested or used either SCARE or SCARE-S2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. von Clausewitz, C. 1832. On War. Wilder Publications.

    Google Scholar 

  2. US Army. 2006. Counterinsurgency (US Army Field Manual), FM 3–24 edition.

    Google Scholar 

  3. Brantingham, P., and Brantingham, P. 2008. Crime Pattern Theory. In Wortley, R., and Mazerolle, L., eds., Enviromental Criminology and Crime Analysis. 78–93.

    Google Scholar 

  4. Rossmo, D. K., and Rombouts, S. 2008. Geographic Pro ling. InWortley, R., andMazerolle, L., eds., Enviromental Criminology and Crime Analysis. 136–149.

    Google Scholar 

  5. US Army. 2004. Intelligence (US Army Field Manual), FM 2–0 edition.

    Google Scholar 

  6. Brown, R. A. 2007. Commander s Assessment: South Baghdad. Military Review 27–34.

    Google Scholar 

  7. Moulton, J. 2009. Rethinking IED Strategies from Iraq to Afghanistan. Military Review.

    Google Scholar 

  8. Mansoor, P. R., and Ulrich, M. S. 2007. A New COIN Center-of-Gravity Analysis. Military Review.

    Google Scholar 

  9. McFate, M. 2005. Iraq: The Social Context of IEDs. Military Review.

    Google Scholar 

  10. Reed, B. 2007. A Social Network Approach to Understanding an Insurgency. Parameters.

    Google Scholar 

  11. Dickerson, J., Simari, G., Subrahmanian, V., Kraus, S. 2010. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In Proc. 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2010). 299–306.

    Google Scholar 

  12. Paruchuri, P., Tambe, M., Ord´o˜nez, F., Kraus, S. 2006. Security in multiagent systems by policy randomization. In Proc. 5th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS-2006).

    Google Scholar 

  13. Shakarian, P., Otstott, C. What is Old is New: Countering IEDs by Disrupting the Weapon Supply, Military Review, pp. 46–52, 2011.

    Google Scholar 

  14. Kagan, F.; Kagan, K.; and Pletka, D. 2008. Iranian Infulence in the Levant, Iraq, and Afghanistan. Technical report, American Enterprise Institute.

    Google Scholar 

  15. Cochrane, M. 2008c. The Growing Threat of Special Groups in Baghdad. Backgrounder 25, The Institute for the Study of War.

    Google Scholar 

  16. Cochrane, M. 2008b. Special Groups Regenerate. Iraq Report 11, The Institute for the Study of War.

    Google Scholar 

  17. Cochrane, M. 2009. The Fragmentation of the Sadrist Movement. Iraq Report 12, The Institute for the Study of War.

    Google Scholar 

  18. Nasr, V. 2007. The Shia Revival. W.W. Norton and Co.

    Google Scholar 

  19. IMC. 2007. IRAQIS ON THE MOVE: Sectarian Displacement in Baghdad, An Assessment by International Medical Corps.

    Google Scholar 

  20. Shakarian, P., Subrahmanian, V.S., Sapino, M.L. SCARE: A Case Study with Baghdad, Proc. 2009 Intl. Conf. on Computational Cultural Dynamics (eds. D. Nau, A. Mannes), Dec. 2009, AAAI Press.

    Google Scholar 

  21. Shakarian, P., Subrahmanian, V.S., Sapino, M.L. 2012. GAPS: Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), 3, 1, to appear.

    Google Scholar 

  22. Shakarian, P., Subrahmanian, V.S. Region-based Geospatial Abduction with Counter-IED Applications, accepted for publication in:Wiil, U.K. (ed.).Counterterrorism and Open Source Intelligence, Springer Verlag Lecture Notes on Social Networks, to appear, 2011.

    Google Scholar 

  23. Shakarian, P., Nagel, M., Schuetzle, B., Subrahmanian, V.S. 2011. Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan, in Proc. 2011 Intl. Conf. on Innovative Applications of Arti cial Intelligence, Aug. 2011, AAAI Press.

    Google Scholar 

  24. Shakarian, P., Dickerson, J., Subrahmanian, V.S. 2012. Adversarial Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), to appear.

    Google Scholar 

  25. US Army. 1994. Intelligence Preparation of the Battle led (US Army Field Manual), FM 34–130 edition.

    Google Scholar 

  26. Afghanistan Information Management Services (AIMS). GIS / Mapping Services, http://http://www.aims.org.af/.

  27. National Counter-Terrorism Center (NCTC). Worldwide Incident Tracking System (WITS), https://wits.nctc.gov/.

  28. International Security Assistance Force (ISAF) Afghanistan. Press Releases, http://www.isaf.nato.int/article/isaf-releases/index.php.

  29. Naval Postgraduate School (NPS). Program for Culture and Con ict Studies, http://www.nps.edu/programs/ccs/.

  30. Conover, T. 2010. The Routes of Man: How Roads Are Changing the World and the Way We Live Today. Knopf.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paulo Shakarian .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Shakarian, P., Subrahmanian, V.S. (2011). Two Real-World Geospatial Abduction Applications. In: Geospatial Abduction. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1794-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1794-1_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1793-4

  • Online ISBN: 978-1-4614-1794-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics