Amazon cover image
Image from Amazon.com

Using behavioral indicators to help detect potential violent acts : a review of the science base / Paul K. Davis, Walter L. Perry, Ryan Andrew Brown, Douglas Yeung, Parisa Roshan, Phoenix Voorhies. [electronic resource]

Contributor(s): Material type: TextTextPublication details: Santa Monica, CA : RAND, (c)2013.Description: 1 online resource (xliii, 258 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780833083364
  • 0833083368
Subject(s): Genre/Form: LOC classification:
  • HV6431
Online resources: Available additional physical forms:
Contents:
Introduction -- Developing intent -- Planning and laying groundwork -- Immediate pre-execution -- Execution and aftermath -- Technologies and methods -- Cross-cutting issues -- Conclusions -- Appendix A: Methodological notes -- Appendix B: References and cases to support historic examples -- Appendix C: References and cases to support indicator tables -- Appendix D: Information fusion methods.
Summary: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
Item type: Online Book
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

"RAND National Security Research Division."

"The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso

Includes bibliographies and index.

Introduction -- Developing intent -- Planning and laying groundwork -- Immediate pre-execution -- Execution and aftermath -- Technologies and methods -- Cross-cutting issues -- Conclusions -- Appendix A: Methodological notes -- Appendix B: References and cases to support historic examples -- Appendix C: References and cases to support indicator tables -- Appendix D: Information fusion methods.

Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

English.

There are no comments on this title.

to post a comment.