News Release

Rice University software helps ID terrorists carrying out attacks

Business Announcement

Rice University

Rice University researchers have created a sophisticated new computer program that rapidly scans large databases of news reports to determine which terrorists groups might be responsible for new attacks. During the Thanksgiving Day attack in Mumbai, India, for example, researchers used the program to rapidly identify the Pakistan-based Lashkar-e-Tayyiba as the most likely culprit.

Rice researchers say the U.S. intelligence community and foreign intelligence agencies no doubt make good use of sophisticated computing tools in sifting through the massive amount of information available on terrorists, but a problem remains in the human capacity to absorb all of that information.

"There's an enormous amount of value in using computing to profile conflicts," said Christopher Bronk, fellow in technology, society and public policy at Rice's Baker Institute for Public Policy and development team member. "While experts on conflict are essential, they need new tools for coping with information overload. That's what we're trying to provide."

Bronk said even the best-funded intelligence operation cannot watch everything all the time. The Rice project demonstrates that information technology may help determine where to look. From that, human effort can be directed to make more complete assessment and analysis.

Bronk said he hopes to perfect a system that can assist the government in identifying future "hot spots" of activity before violence occurs.

The new software, which was designed using the latest techniques from artificial intelligence, takes advantage of the open-source database at the Institute for the Study of Violent Groups (ISVG) at Sam Houston State University. The program culls thousands of news stories reported throughout the world.

Mumbai attack

On Thanksgiving Day, as the attacks unfolded in Mumbai, India, Sean Graham, an undergraduate program assistant at Rice, ran a series of queries based on the information reported by television networks. By entering the weapons used (machine guns, grenades and explosives), the target (public structures) and tactics (raid, direct fire and ambush), and without respect to any geographic or ideological bent, he essentially asked, "Who in the world has done this sort of thing before?" The answers were the expected ones, with al-Qaida at the top of a list that also included the Liberation Tigers of Tamil Eelam, the Palestinian militant group Hamas, a Chechen independence group and the India-based United Liberation Front of Assam. This query provided a simple answer to the question of who might be able to pull off such an attack, regardless of geographic location.

Researchers then focused on groups known to be active in South Asia. Keeping the query open to territory beyond India, including Afghanistan and Sri Lanka, they generated a list of names that included Pakistan-based Lashkar-e-Tayyiba, the Bangladeshi Jamaat-ul-Mujahideen and Al-Mansoorian, a group active in Kashmir. By running extremely simple queries against the large, detailed ISVG database, which had no new content added in the immediate period before the Mumbai attacks, the research group came up with the same groups mentioned as likely suspects in Indian, U.S. and other international media. When they ran the queries against a second database constructed by researchers at the University of Maryland, Lashkar-e-Tayyiba was returned as the most likely culprit.

"We designed the software to better assign attribution in terror attacks, and it appears to have worked," said Bronk. "It allowed us to match signatures and say, with some confidence, what groups had the requisite experience, resources and coordinating factors to pull off the Mumbai attacks."

###

To read the complete paper, visit http://www.bakerinstitute.org/opinions/open-source-policy-informatics-and-python-understanding-the-mumbai-attacks-through-information-technology

The Rice University group includes Bronk, political scientist Richard Stoll, computer scientist Devika Subramanian and students Derek Ruths and Sean Graham.

To speak with Bronk, contact David Ruth at 713-348-6327 or druth@rice.edu.

Christopher Bronk is the Baker Institute fellow in technology, society and public policy. He previously served as a career diplomat with the United States Department of State on assignments both overseas and in Washington. His last assignment was in the Office of eDiplomacy, the department's internal think tank on information technology, knowledge management, computer security and interagency collaboration. He also has experience in political affairs, counternarcotics, immigration and U.S. -- Mexico border issues. Since arriving at Rice, Bronk has divided his attention among a number of areas, including information security, technology for immigration management, broadband policy, Web 2.0 governance and the militarization of cyberspace. He teaches classes on the intersection of computing and politics in Rice's George R. Brown School of Engineering.

Bronk has provided commentary for a variety of news outlets, including ABC, NPR, the BBC and the Houston Chronicle. His latest research involves the political informatics of transnational terror. Bronk has a Ph.D. from the Maxwell School of Syracuse University and a bachelor's degree from the University of Wisconsin–Madison. He also studied international relations at Oxford University.


Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.