This report presents research on various methods for heterogeneous information fusion — combining data that are qualitative, subjective, fuzzy, ambiguous, contradictory, and even deceptive, in order to form a realistic uncertainty-sensitive assessment of threat. The context is counterterrorism, for both military and civilian applications, but the ideas are more generally applicable in intelligence and law enforcement.
Uncertainty-Sensitive Heterogeneous Information Fusion
Assessing Threat with Soft, Uncertain, and Conflicting Evidence
Download
Full Document
Format | File Size | Notes |
---|---|---|
PDF file | 3.6 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Purchase
Purchase Print Copy
Format | List Price | Price | |
---|---|---|---|
Add to Cart | Paperback168 pages | $32.00 | $25.60 20% Web Discount |
Research Questions
- How can analysts fuse complex information from different sources to form a realistic assessment of threat?
- What capabilities should a research prototype system for uncertainty-sensitive heterogeneous information fusion have?
- How can information fusion be accomplished despite numerous uncertainties about threat models, fusion mathematics (structural uncertainties), the data to be fused?
An element of thwarting terrorist attacks is observing suspicious individuals over time with such diverse means as scanners and other devices, travel records, behavioral observations, and intelligence sources. Such observations provide data that are often both complex and "soft" — i.e., qualitative, subjective, fuzzy, or ambiguous — and also contradictory or even deceptive. Analysts face the challenge of heterogeneous information fusion — that is, combining such data to form a realistic assessment of threat. This report presents research on various heterogeneous information fusion methods and describes a research prototype system for fusing uncertainty-sensitive heterogeneous information. The context is counterterrorism, for both military and civilian applications, but the ideas are also applicable in intelligence and law enforcement.
Table of Contents
Chapter One
Introduction
Chapter Two
Concepts, Methods, and a Research Platform
Chapter Three
Creating Synthetic Data: Vignettes for Testing
Chapter Four
Simple and Bayesian Fusion Methods
Chapter Five
The Maximum Entropy/Minimum Penalty Fusion Method
Chapter Six
Illustrative Analysis
Chapter Seven
Conclusions and Recommendations
Appendix A
Defining Threat
Appendix B
A Factor-Tree Model for Propensity for Terrorism (PFT)
Appendix C
Extending Elementary Bayes Updating
Research conducted by
This research was sponsored by the Office of Naval Research and conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.
This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.