Finding Needles in a Haystack
A Resource Allocation Methodology to Design Strategies to Detect Terrorist Weapon Development
Download eBook for Free
Format | File Size | Notes |
---|---|---|
PDF file | 0.5 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Detecting terrorist weapon development is a fundamental goal of the intelligence and law enforcement communities. Achieving this goal can be quite difficult as many of the actions taken by terrorists can be executed covertly or may be seemingly innocuous against a background of non-terrorist related activities. This dissertation presents a systematic resource allocation methodology to design strategies to detect terrorist weapon development. First, a framework to approach the problem of detection of terrorist weapon development is introduced. Then, weapon pathways are generated, which define the target set of potential evidence the intelligence and law enforcement communities could pursue to discover terrorist weapon development. Finally, Bayesian networks are used to create a logical structure for how potential observations would affect our belief a weapon is being developed. Information entropy measures how much uncertainty is present in a system and can be used to assess the relative information content of potential evidence in the Bayesian networks. Resource allocations can be guided by these information-theoretic measures. The dissertation then shows how these methods might be used to detect terrorist development of improvised explosive devices (IEDs) and radiological dispersal devices (RDDs). This method is an example of how expert judgments made prior to observations can guide collection and analytic resource allocations.
Table of Contents
Chapter One
Introduction
Chapter Two
A Framework to Detect Terrorist Weapon Development
Chapter Three
Weapon Pathway Analysis
Chapter Four
Bayesian Networks
Chapter Five
Bayesian Network Analysis of Weapon Pathways
Chapter Six
Conclusions
Appendix A
Glossary
Research conducted by
This document was submitted as a dissertation in June 2009 in partial fulfillment of the requirements of the doctoral degree in public policy analysis at the Pardee RAND Graduate School. The faculty committee that supervised and approved the dissertation consisted of Gregory F. Treverton (Chair), Lynn E. Davis, David E. Mosher, and Walter L. Perry.
This publication is part of the RAND Corporation Dissertation series. Pardee RAND dissertations are produced by graduate fellows of the Pardee RAND Graduate School, the world's leading producer of Ph.D.'s in policy analysis. The dissertations are supervised, reviewed, and approved by a Pardee RAND faculty committee overseeing each dissertation.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.