34
Semantic Technology for Intelligence, Defense, and Security - STIDS 2010 27 October 2010, Fairfax, VA Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B. Learning Agent Center George Mason University Department of Defense IC Advisory Board Kerr D. (chair), Allwein K., Anthony K., Ayers C., Hamilton S., Homer J., McIntyre J., Nolte W., Stemler G., Wible B.

Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

Semantic Technology for

Intelligence, Defense, and Security - STIDS 2010

27 October 2010, Fairfax, VA

Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B.

Learning Agent Center

George Mason University

Department

of Defense

IC Advisory Board

Kerr D. (chair), Allwein K., Anthony K., Ayers C., Hamilton S.,

Homer J., McIntyre J., Nolte W., Stemler G., Wible B.

Page 2: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 2

Overview

TIACRITIS System and Case Studies: Demo

Concluding Remarks and Discussion

TIACRITIS Textbook for Hands-on Training

Computational Theory of Intelligence Analysis

Intelligence Analysis Research and Development

Hands-on Training of Intelligence Analysts

Page 3: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 3

Intelligence Analysis for Decision-Making

• The purpose of Intelligence Analysis is to answer complex

questions arising in the decision-making process, such as:

Does Al Qaeda have nuclear weapons?

Will the United States be the world leader in alternative fuels within the

next decade?

• Complex arguments, requiring both imaginative and critical

reasoning, are necessary in order to establish and defend the

relevance, believability, and inferential force of evidence with

respect to the questions asked.

• The answers are necessarily probabilistic in nature because

our evidence is always incomplete, usually inconclusive,

frequently ambiguous, commonly dissonant, and with various

degrees of believability.

Page 4: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 4

Astonishing Complexity of Intelligence Analysis

Intelligence Analysis as Connecting the Dots

Problem 1: There is more than one kind of dot to be connected

(evidence dots, hypotheses, idea dots)

Problem 2: Which evidential dots should be connected?

(# of evidence combination: 2N - [N + 1], evidential synergism)

Problem 3: Which evidential dots can be believed?

(complex believability assessments)

Problem 4: What are the connections between evidential dots and hypotheses?

(inference networks)

Problem 5: What do our arguments mean?

(probabilstic views on inferential force of arguments)

Problem 6: Whose dots should be connected?

(need for collaboration and information sharing)

Page 5: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

Cognitive assistants are needed to support intelligence analysts in:

• learning to perform intelligence analysis through a hands-on approach;

• coping with the astonishing complexity of intelligence analysis.

5

Knowledge Base

Transactional Shared Access

Knowledge Bases Management Module

Pedagogical

Knowledge Base

Domain

Knowledge BaseSystem

Knowledge Base

Tran

saction

Mo

du

le

Repository Management

Module

Computer

File System

Abstraction of

Reasoning Modules

Lesson

Generation Modules

Student Model

Module

Test Learning and

Generation Modules

Problem and Rule

Learning Module

Plausible Explanation

Generation Module

Rule Analysis

Module

Problem and Rule

Refinement Module

Learn

ing

and

Refin

emen

t Assistan

t

Ontology Viewers

and Editors

Ontology Graphical

Browsers

Script Editor

Scenario Elicitation

On

tolo

gy V

alidatio

n

Problem Solving

Modules

Assumption and

Assessment Modules

Modeling Editors and

Modeling Assistant

External Solutions

Mixed-initiative

Manager

Mixed-initiative

Reasoner

Interaction Model

Learning & Refinement

Task Agenda

Module

Pro

blem

& R

ule V

alidatio

n

Knowledge

Integration Modules

Knowledge Base

Import Module

Knowledge Base

Export Module

Distributed

Repositories

Knowledge Base

Release

Knowledge Base

Versioning

Stan

dalo

ne G

raph

ical User In

terface

Kn

ow

led

ge E

ng

ine

er Ins

truc

tion

al D

es

ign

er

Su

bje

ct M

ate

r Ex

pe

rt

Mixed-initiative Messages

Interaction Ontology Solving Learning Tutoring

Knowledge Base OperationsKnowledge Repository and Knowledge Base

IC Advisory Board: Kerr D. (chair), Allwein K., Anthony K., Ayers C.,

Hamilton S., Homer J., McIntyre J., Nolte W., Stemler G., Wible B.

Coping with the Complexity of Intelligence Analysis

Page 6: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 6

Theory, Textbook, System

Computational Theory of

Intelligence Analysis

Introduction to Intelligence Analysis:

A Hands-on Approach with TIACRITIS

New Evidence

Hypothesis

Observations

Likelihood of

Hypothesis

Evidential testsof hypotheses

Hypotheses in searchof evidence

Evidence in searchof hypotheses

What is the likelihood of the hypothesis based on the available evidence?

(induction)

Assuming that the hypothesis is true, what other things

should be observable?(deduction)

What hypothesis would explain these

observations?(abduction)

TIACRITIS System

Page 7: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 7

Overview

TIACRITIS System and Case Studies: Demo

Concluding Remarks and Discussion

TIACRITIS Textbook for Hands-on Training

Computational Theory of Intelligence Analysis

Intelligence Analysis Research and Development

Hands-on Training of Intelligence Analysts

Page 8: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

Intelligence Analysis as Discovery

He

Hc

Ha

Ei

E*

Evidential tests of hypotheses

Items of

Evidence

Inductive reasoning

Hk: It is likely that a dirty bomb will be set off in the Washington DC area.

Hd

Hk true

Hypotheses in search of evidence

He

Deductive reasoning Hd

Potential

Items of

Evidence

Hc

Ha

Ei

E*

Abductive reasoning

Hk: A dirty bomb will be set off in the Washington

DC area.

Evidence in search of hypotheses

E*: Report on cesium-137

canister missing

Ha: stolen

E: missing

Hc: stolen by terrorist

organization

He: build dirty bomb

not missing

lost used in project

stolen by competitor

stolen by employee

8

Page 9: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

He

Hc

Ha

Ei

E*

Items of

Evidence

Inductive reasoning

Hk: It is likely that a dirty bomb will be set off in the Washington DC area.

Hd

Hk true

He

Deductive reasoning Hd

Potential

Items of

Evidence

Hc

Ha

Ei

E*

Abductive reasoning

Hk: A dirty bomb will be set off in the Washington

DC area.

E*: Report on cesium-137

canister missing

Ha: stolen

E: missing

Hc: stolen by terrorist

organization

He: build dirty bomb

not missing

lost used in project

stolen by competitor

stolen by employee

Abd Rule Ded Rule Ind Rule

Mixed-Initiative Multistrategy Learning

9

Page 10: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 10

Wigmorean Network for Hypothesis Analysis

Assess H1

Assess the favoring

evidence for H12

Assess the disfavoring

evidence for H12

Assess the relevance of

E1 to H12

Assess the believability

of E1

Assess the extent to which E1 favors H12

Assess the extent to which E2 favors H12

Assess H11

Assess H12

Assess H13

E*i

Relevance answers the question:

So what? How does this item of

information bear on what we are

trying to prove or disprove?

If we believe E1 then H12 is almost certain

Page 11: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 11

Wigmorean Network for Hypothesis Analysis

Assess H1

Assess the favoring

evidence for H12

Assess the disfavoring

evidence for H12

It is likely that E1 is

true

If we believe E1 then H12 is almost certain

Assess the relevance of

E1 to H12

Assess the believability

of E1

Assess the extent to which E1 favors H12

Assess the extent to which E2 favors H12

Assess H11

Assess H12

Assess H13

E*i

Believability answers the question:

Can we believe what this item of

intelligence information is telling us?

Page 12: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 12

Wigmorean Network for Hypothesis Analysis

Assess H1

Assess the favoring

evidence for H12

Assess the disfavoring

evidence for H12

Based on E1 it is likely that H12 is true

Inferential force of E1 on H12

Based on the favoring evidence it is almost

certain that H12 is true

Inferential force of favoring evidence on H12

It is very likely that H12 is true

Inferential force of evidence on H12

It is likely that E1 is

true

If we believe E1 then H12 is almost certain

Assess the relevance of

E1 to H12

Assess the believability

of E1

Based on E2 it is almost certain that H12 is true

Assess the extent to which E1 favors H12

Assess the extent to which E2 favors H12

Based on the disfavoring evidence it is an even

chance that H12 is false

Assess H11

Assess H12

Assess H13

It is almost certain that H11 is true

It is very likely that H13 is true

E*i

Inferential Force or Weight

answers the question:

How strong is this item of relevant

evidence in favoring or disfavoring various

alternative hypotheses being entertained?

It is very likely that H1 is true

Inferential force of evidence on H1

Page 13: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 13

Believability of Evidence

Evidence ontology

evidence

tangible evidence

testimonial evidence

demonstrative tangible evidence

real tangible evidence

unequivocal testimonial evidence

equivocal testimonial evidence

unequivocal testimonial evidence

based upon direct

observation

authoritative record

missing evidence

unequivocal testimonial evidence

obtained at second hand

testimonial evidence based on opinion

completely equivocal testimonial evidence

probabilistically equivocal testimonial evidence

believability of E

authenticity of E

reliability of E

accuracy of E

Believability assessments

believability of E

Source’s competence

Source’s credibility

Source’s understandability

Source’s access

Source’s veracity

Source’s objectivity

Source’s observational

sensitivity

Page 14: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 14

Overview

TIACRITIS System and Case Studies: Demo

Concluding Remarks and Discussion

TIACRITIS Textbook for Hands-on Training

Computational Theory of Intelligence Analysis

Intelligence Analysis Research and Development

Hands-on Training of Intelligence Analysts

Page 15: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 15

Learning Intelligence Analysis with TIACRITIS

Design, develop, and transition the TIACRITIS agent and

textbook for teaching intelligence analysts to perform

evidence-based reasoning:

• Web-based system with case studies and knowledge

bases incorporating a significant amount of knowledge

about evidence, its properties, uses, and discovery.

• Textbook with a wide variety of examples developed in

three formats: hardcopy, pdf, and SCORM.

Objective

Page 16: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 16

Production of Analysis Versus Process of Analysis

It appears that analysts are so often trained in the production

of intelligence analyses (i.e., writing of analytic reports) rather

than on the actual process of analysis itself.

Training intelligence analysts with TIACRITIS emphasizes the

properties, uses, discovery, and marshaling of the evidence

upon which all analyses rest.

Page 17: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 17

Learning Analytic Tradecraft by Doing

Training in evidential reasoning tasks must involve more than

just giving students assigned readings and lectures on the

topics. What is absolutely necessary is regular practice

involving analyses of evidence using either hypothetical

situations or examples drawn from actual situations.

Evidential analysis is mastered best by performing analyses

that illustrate the wide variety of subtleties and complexities

so often encountered in actual evidential analyses.

TIACRITIS agent and textbook enable a learning-by-doing

approach to intelligence analysis and evidence-based

reasoning.

Page 18: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 18

Copying with Analytic Complexity

There is a strong emphasis currently placed in the

Intelligence Community on developing structured analytic

techniques and computer-based tools to assist analysts.

Analysts need all the help they can get in the face of a

tsunami of information and the requirement to answer

questions of immediate interest that do not allow time for

extensive research on and deliberation of available evidence.

TIACRITIS is a web-based teaching agent which:

• is based on solid theoretical foundations (Science of

Evidence, Artificial Intelligence, Logic and Probabilities);

• does not make simplifying assumptions about the world;

• helps the analysts cope with the analytic complexity.

Page 19: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 19

Overview

TIACRITIS System and Case Studies: Demo

Concluding Remarks and Discussion

TIACRITIS Textbook for Hands-on Training

Computational Theory of Intelligence Analysis

Intelligence Analysis Research and Development

Hands-on Training of Intelligence Analysts

Page 20: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

Textbook Accompanying TIACRITIS

• Written for student analysts regardless of their prior backgrounds

and training

• Teaches basic knowledge about the properties, uses, and

marshaling of evidence to show students what is involved in

assessing the relevance, believability, and inferential force

credentials of evidence

• Includes a wide array of examples of the use of TIACRITIS and

hands on exercises involving both real and hypothetical cases

chosen to help students recognize and evaluate many of the

complex elements of the analyses they are learning to perform

• Provides essential tutoring on the use of TIACRITIS

• Easily customizable for specific organizations by selecting

corresponding examples and case studies, or developing new ones.

• Available in hardcopy, pdf, and SCORM.

20

Page 21: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 21

Introduction to Intelligence Analysis:

A Hands-on Approach with TIACRITIS

1. Intelligence Analysis: Connecting the Dots

2. Divide and Conquer: A Necessary Approach to Complex Analyses

3. Evidence

4. Establishing the Relevance of Evidence by Arguments

5. Assessing the Believability of Evidence

6. Chains of Custody

7. Recurrent Substance-blind Combinations of Evidence

8. The Major Sources of Uncertainty in Masses of Evidence

9. Assessing and Reporting Uncertainty: Some Alternative Methods

10. Competing Hypotheses and Analyses

11. Improving Structured Analytic Methods with TIACRITIS:

The Case of the Analysis of Competing Hypotheses

12. Analysis of Geospatial Intelligence

13. Analysis of Military Intelligence

Page 22: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 22

1. Intelligence Analysis: Connecting the Dots

1.5 Case Study: Introduction to the Use of TIACRITIS

2. Divide and Conquer: A Necessary Approach to Complex Analyses

2.7 Case Study: Analyzing Hypotheses through Problem Reduction and Solution Synthesis

3. Evidence

3.4 Case Study: Making Assessments and Assumptions in Arguments

4. Establishing the Relevance of Evidence by Arguments

4.2 Case Study: Evidence-based Hypothesis Analysis

5. Assessing the Believability of Evidence

5.8 Case Study: Believability Analysis

5.9 Case Study: Self-testing on Believability Analysis …

10. Competing Hypotheses and Analyses

10.2 Case Study: Comparison of Analyses of Competing Hypotheses

10.3 Case Study: Comparison of Competing Analyses of a Hypothesis

10.4 Case Study: Hypothesis Analyses and Evidence Search …

12. Analysis of Geospatial Intelligence

12.4 Case Study: Real-time Ambush Threat Analysis

13. Analysis of Military Intelligence

13.2 Case Study: External Support for Insurgency

Case Studies

with

TIACRITIS

Page 23: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 23

Overview

TIACRITIS System and Case Studies: Demo

Concluding Remarks and Discussion

TIACRITIS Textbook for Hands-on Training

Computational Theory of Intelligence Analysis

Intelligence Analysis Research and Development

Hands-on Training of Intelligence Analysts

Page 24: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

TIACRITIS Demo

Course Personalization

2.7 Case Study: Analyzing Hypotheses through Problem Reduction and Solution Synthesis

3.4 Case Study: Making Assessments and Assumptions in Arguments

10.2 Case Study: Comparison of Analyses of Competing Hypotheses

10.3 Case Study: Comparison of Competing Analyses of a Hypothesis

10.4 Case Study: Hypothesis Analyses and Evidence Search

12.4 Case Study: Real-time Ambush Threat Analysis

24

Page 25: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 25

Sample Problem: Analysis of Wide-Area Motion Imagery

From: Mita Desai, Multi-entity activity discovery over large

space-time windows, DARPA,

http://www.darpa.mil/ipto/solicit/baa/BAA-09-55_ID01.pdf

Real‐Time Analysis

Compare tracks against

known movement

patterns, or sets and

sequences of events,

and find matches that

may indicate an

impending threat event

(e.g., an ambush).

Forensic Analysis

Backtrack from a threat

event (e.g., ambush,

rocket launch) and

discover participants,

possible related

locations and events,

and movement patterns.

Page 26: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

Discovery of Evidence, Hypotheses and Arguments

Evidence in search of hypotheses

What threat does this evidence suggest?

E*: Evidence of road work

at Al Batha highway junction

at 1:17AM

Not Road work

Road repair

Traffic disruption

Potential Items of

Evidence

Abductive reasoning

Hk: Ambush threat at the Al Batha highway junction at 1:17AM

P Possibly Q

Evidential tests of hypotheses

What is the likelihood of the threat based on the available evidence?

Items of Evidence

Inductive reasoning

Hk: Ambush threat very likely

P Probably Q

Hypotheses in search of evidence

Assuming that the threat is real, what other events or entities should be observable?

Hk: Ambush threat

Deductive reasoning

P Necessarily Q

Hc: Ambush preparation

Hi: Ambush location

Ha: Road blocking

E: Road work

Hc: Ambush preparation

Page 27: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

Assess whether there is an ambush threat to the US forces at the Al Batha highway junction after 1:17AM.

Assess whether there is ambush preparation activity at the Al Batha highway junction around 1:17AM.

What is required for an ambush threat at the Al Batha highway junction?

Al Batha highway junction should be a good location for ambushing the US forces, and there should be some ambush preparation activity.

Assess whether the Al Batha highway junction is a good location

for ambushing the US forces.

Assess whether there is ambush cover near the Al Batha highway junction.

Assess whether the Al Batha highway junction is on a route

used by the US forces.

What are the required features of a good ambush location?

To be on a route used by the US Forces and to have cover.

Search for evidence that the Al Batha highway junction is on a route used by the US forces.

Search for evidence in WAMI that there is ambush cover near the Al

Batha highway junction.

WAMI evidence of extensive brush and trees at several locations

at the Al Batha highway junction, as well as some ruined buildings

that could also provide cover.

Hypotheses in Search of Evidence (Evd Collection)

Confidential information from the American Forces Command indicating that

the highway in the vicinity of Al Batha is the main north-south traffic artery used by the American and Iraqi government forces.

Page 28: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 28

Overview

TIACRITIS System and Case Studies: Demo

Concluding Remarks and Discussion

TIACRITIS Textbook for Hands-on Training

Computational Theory of Intelligence Analysis

Intelligence Analysis Research and Development

Hands-on Training of Intelligence Analysts

Page 29: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

Transition to DOD and IC Organizations

• Transitioned to Joint Forces Staff College

• To be transitioned to Army War College

• Desire to transition to other DOD/IC organizations:

o No user licensing cost.

o Limited-cost support for the development of

organization-specific knowledge bases, case studies,

and exercises, if desired.

o Cost for the development of new web-based modules

for increased functionality, if desired.

Page 30: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 30

Copying with the Astonishing Complexity of IA

Problem 1: There is more than

one kind of dot to be connected

(Agent-assisted drill-down

analysis)

Problem 2: Which evidential

dots should be connected?

(Evidence collection guidance;

reduction and synthesis rules)

Problem 3: Which evidential dots can be believed? (Believability analysis rules)

Problem 4: What are the connections between evidential dots and hypotheses?

(Learned reduction and synthesis rules for hypotheses testing)

Problem 5: What do our arguments mean? (Fuzzy and Baconian probabilities used

in evaluating the inferential force of evidence and the likelihood of hypotheses)

Problem 6: Whose dots should be connected? (Collaboration and information

sharing facilitated by the problem reduction paradigm)

E*: Evidence of road work

at Al Bathahighway junction

at 1:17AM

Not Road work

Roadrepair

Traffic disruption

Potential Items of

Evidence

Abductivereasoning

Hk: Ambush threat at the Al Bathahighway junction at 1:17AM

Items of Evidence

Inductivereasoning

Hk: Ambush threat very likelyHk: Ambush threat

Deductivereasoning

Hc: Ambush preparation

Hi: Ambush location

Ha: Road blocking

E: Road work

Hc: Ambush preparation

Page 31: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

The Arch of Knowledge

Evidential tests of hypotheses

Hypotheses in Search of evidence

New Observations

Evidence in search of hypotheses

Hypothesis

Observations

Likelihood of

Hypothesis

Aristotle

Galileo

Newton

Locke

Herschel

Whewell

Peirce

Oldroyd

Page 32: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center

The Arch of Knowledge Everywhere

New Observable Phenomena

Possible Hypotheses or Explanations

Observations of Events in Nature

New or Revised Theory

Intelligence

Analysis

Science

New Potential Evidence

Possible Charges or Complaints

Observations during Fact Investigation

Verdict

Law

New Potential Evidence

Possible Hypotheses

Observations of Events in the World

Likelihood of Hypotheses

Page 33: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 33

Questions

Page 34: Tecuci G., Boicu M., Marcu D., Schum D. Hamilton B ...stids.c4i.gmu.edu/STIDS2010/presentations/STIDS... · A Hands-on Approach with TIACRITIS 1. Intelligence Analysis: Connecting

2010, Learning Agents Center 34

This research was performed in the Learning Agents Center and was

supported by George Mason University and by several agencies of

the U.S. Government, including the Department of Defense, the

National Geospatial-Intelligence Agency, the Intelligence Community,

the Air Force Office of Scientific Research, the Air Force Research

Laboratory, the Defense Advanced Research Projects Agency, the

National Science Foundation, the U.S. Army War College, and the

Joint Forces Staff College. The U.S. Government is authorized to

reproduce and distribute reprints for Government purposes

notwithstanding any copyright notation thereon.

Acknowledgements and Contact Information

Contact information: Dr. Gheorghe Tecuci

Professor of Computer Science and Director of the Learning Agents Center

MSN 6B3, Learning Agents Center, George Mason Univ., Fairfax, VA 22030

[email protected] tel: 703 993 1722 http://lac.gmu.edu/