298 research outputs found

    Investigative Simulation: Towards Utilizing Graph Pattern Matching for Investigative Search

    Full text link
    This paper proposes the use of graph pattern matching for investigative graph search, which is the process of searching for and prioritizing persons of interest who may exhibit part or all of a pattern of suspicious behaviors or connections. While there are a variety of applications, our principal motivation is to aid law enforcement in the detection of homegrown violent extremists. We introduce investigative simulation, which consists of several necessary extensions to the existing dual simulation graph pattern matching scheme in order to make it appropriate for intelligence analysts and law enforcement officials. Specifically, we impose a categorical label structure on nodes consistent with the nature of indicators in investigations, as well as prune or complete search results to ensure sensibility and usefulness of partial matches to analysts. Lastly, we introduce a natural top-k ranking scheme that can help analysts prioritize investigative efforts. We demonstrate performance of investigative simulation on a real-world large dataset.Comment: 8 pages, 6 figures. Paper to appear in the Fosint-SI 2016 conference proceedings in conjunction with the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining ASONAM 201

    Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A

    Get PDF
    2017 Summer.Includes bibliographical references.The number and lethality of violent extremist plots motivated by the Salafi-jihadist ideology have been growing for nearly the last decade in both the U.S and Western Europe. While detecting the radicalization of violent extremists is a key component in preventing future terrorist attacks, it remains a significant challenge to law enforcement due to the issues of both scale and dynamics. Recent terrorist attack successes highlight the real possibility of missed signals from, or continued radicalization by, individuals whom the authorities had formerly investigated and even interviewed. Additionally, beyond considering just the behavioral dynamics of a person of interest is the need for investigators to consider the behaviors and activities of social ties vis-à-vis the person of interest. We undertake a fundamentally systems approach in addressing these challenges by investigating the need and feasibility of a radicalization detection system, a risk assessment assistance technology for law enforcement and intelligence agencies. The proposed system first mines public data and government databases for individuals who exhibit risk indicators for extremist violence, and then enables law enforcement to monitor those individuals at the scope and scale that is lawful, and account for the dynamic indicative behaviors of the individuals and their associates rigorously and automatically. In this thesis, we first identify the operational deficiencies of current law enforcement and intelligence agency efforts, investigate the environmental conditions and stakeholders most salient to the development and operation of the proposed system, and address both programmatic and technical risks with several initial mitigating strategies. We codify this large effort into a radicalization detection system framework. The main thrust of this effort is the investigation of the technological opportunities for the identification of individuals matching a radicalization pattern of behaviors in the proposed radicalization detection system. We frame our technical approach as a unique dynamic graph pattern matching problem, and develop a technology called INSiGHT (Investigative Search for Graph Trajectories) to help identify individuals or small groups with conforming subgraphs to a radicalization query pattern, and follow the match trajectories over time. INSiGHT is aimed at assisting law enforcement and intelligence agencies in monitoring and screening for those individuals whose behaviors indicate a significant risk for violence, and allow for the better prioritization of limited investigative resources. We demonstrated the performance of INSiGHT on a variety of datasets, to include small synthetic radicalization-specific data sets, a real behavioral dataset of time-stamped radicalization indicators of recent U.S. violent extremists, and a large, real-world BlogCatalog dataset serving as a proxy for the type of intelligence or law enforcement data networks that could be utilized to track the radicalization of violent extremists. We also extended INSiGHT by developing a non-combinatorial neighbor matching technique to enable analysts to maintain visibility of potential collective threats and conspiracies and account for the role close social ties have in an individual's radicalization. This enhancement was validated on small, synthetic radicalization-specific datasets as well as the large BlogCatalog dataset with real social network connections and tagging behaviors for over 80K accounts. The results showed that our algorithm returned whole and partial subgraph matches that enabled analysts to gain and maintain visibility on neighbors' activities. Overall, INSiGHT led to consistent, informed, and reliable assessments about those who pose a significant risk for some latent behavior in a variety of settings. Based upon these results, we maintain that INSiGHT is a feasible and useful supporting technology with the potential to optimize law enforcement investigative efforts and ultimately enable the prevention of individuals from carrying out extremist violence. Although the prime motivation of this research is the detection of violent extremist radicalization, we found that INSiGHT is applicable in detecting latent behaviors in other domains such as on-line student assessment and consumer analytics. This utility was demonstrated through experiments with real data. For on-line student assessment, we tested INSiGHT on a MOOC dataset of students and time-stamped on-line course activities to predict those students who persisted in the course. For consumer analytics, we tested the performance on a real, large proprietary consumer activities dataset from a home improvement retailer. Lastly, motivated by the desire to validate INSiGHT as a screening technology when ground truth is known, we developed a synthetic data generator of large population, time-stamped, individual-level consumer activities data consistent with an a priori project set designation (latent behavior). This contribution also sets the stage for future work in developing an analogous synthetic data generator for radicalization indicators to serve as a testbed for INSiGHT and other data mining algorithms

    Optimization-based selection of influential agents in a rural Afghan social network

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2010.Cataloged from PDF version of thesis.Includes bibliographical references (p. 177-185).This work considers the nonlethal targeting assignment problem in counterinsurgency in Afghanistan, the problem of deciding on the people whom US forces should engage through outreach, negotiations, meetings, and other interactions in order to ultimately win the support of the population in their area of operations. We developed three models: 1) the Afghan COIN social influence model, to represent how attitudes of local leaders are affected by repeated interactions with other local leaders, insurgents, and counter-insurgents, 2) the network generation model, to arrive at a reasonable representation of a Pashtun district-level, opinion leader social network, and 3) the nonlethal targeting model, a nonlinear programming (NLP) optimization formulation that identifies the k US agent assignment strategy producing the greatest arithmetic mean of the expected long-term attitude of the population. We demonstrate in experiments the merits of the optimization model in nonlethal targeting, which performs significantly better than both doctrine-based and random methods of assignment in a large network.by Benjamin W. K. Hung.S.M

    Investigative Pattern Detection Framework for Counterterrorism

    Full text link
    Law-enforcement investigations aimed at preventing attacks by violent extremists have become increasingly important for public safety. The problem is exacerbated by the massive data volumes that need to be scanned to identify complex behaviors of extremists and groups. Automated tools are required to extract information to respond queries from analysts, continually scan new information, integrate them with past events, and then alert about emerging threats. We address challenges in investigative pattern detection and develop an Investigative Pattern Detection Framework for Counterterrorism (INSPECT). The framework integrates numerous computing tools that include machine learning techniques to identify behavioral indicators and graph pattern matching techniques to detect risk profiles/groups. INSPECT also automates multiple tasks for large-scale mining of detailed forensic biographies, forming knowledge networks, and querying for behavioral indicators and radicalization trajectories. INSPECT targets human-in-the-loop mode of investigative search and has been validated and evaluated using an evolving dataset on domestic jihadism.Comment: 9 pages, 4 figure

    DCE-MRI for pre-treatment prediction and post-treatment assessment of treatment response in sites of squamous cell carcinoma in the head and neck

    Get PDF
    Background and Purpose It is important to identify patients with head and neck squamous cell carcinoma (SCC) who fail to respond to chemoradiotherapy so that they can undergo post-treatment salvage surgery while the disease is still operable. This study aimed to determine the diagnostic performance of dynamic contrast enhanced (DCE)-MRI using a pharmacokinetic model for pre-treatment predictive imaging, as well as post-treatment diagnosis, of residual SCC at primary and nodal sites in the head and neck. Material and Methods Forty-nine patients with 83 SCC sites (primary and/or nodal) underwent pre-treatment DCEMRI, and 43 patients underwent post-treatment DCE-MRI, of which 33 SCC sites had a residual mass amenable to analysis. Pre-treatment, post-treatment and %change in the mean Ktrans, kep, ve and AUGC were obtained from SCC sites. Logistic regression was used to correlate DCE parameters at each SCC site with treatment response at the same site, based on clinical outcome at that site at a minimum of two years. Results None of the pre-treatment DCE-MRI parameters showed significant correlations with SCC site failure (SF) (29/83 sites) or site control (SC) (54/83 sites). Post-treatment residual masses with SF (14/33) had significantly higher kep (p = 0.05), higher AUGC (p = 0.02), and lower % reduction in AUGC (p = 0.02), than residual masses with SC (19/33), with the% change in AUGC remaining significant on multivariate analysis. Conclusion Pre-treatment DCE-MRI did not predict which SCC sites would fail treatment, but post-treatment DCE-MRI showed potential for identifying residual masses that had failed treatment

    DCE-MRI for pre-treatment prediction and post-treatment assessment of treatment response in sites of squamous cell carcinoma in the head and neck

    Get PDF
    Background and Purpose It is important to identify patients with head and neck squamous cell carcinoma (SCC) who fail to respond to chemoradiotherapy so that they can undergo post-treatment salvage surgery while the disease is still operable. This study aimed to determine the diagnostic performance of dynamic contrast enhanced (DCE)-MRI using a pharmacokinetic model for pre-treatment predictive imaging, as well as post-treatment diagnosis, of residual SCC at primary and nodal sites in the head and neck. Material and Methods Forty-nine patients with 83 SCC sites (primary and/or nodal) underwent pre-treatment DCEMRI, and 43 patients underwent post-treatment DCE-MRI, of which 33 SCC sites had a residual mass amenable to analysis. Pre-treatment, post-treatment and %change in the mean Ktrans, kep, ve and AUGC were obtained from SCC sites. Logistic regression was used to correlate DCE parameters at each SCC site with treatment response at the same site, based on clinical outcome at that site at a minimum of two years. Results None of the pre-treatment DCE-MRI parameters showed significant correlations with SCC site failure (SF) (29/83 sites) or site control (SC) (54/83 sites). Post-treatment residual masses with SF (14/33) had significantly higher kep (p = 0.05), higher AUGC (p = 0.02), and lower % reduction in AUGC (p = 0.02), than residual masses with SC (19/33), with the% change in AUGC remaining significant on multivariate analysis. Conclusion Pre-treatment DCE-MRI did not predict which SCC sites would fail treatment, but post-treatment DCE-MRI showed potential for identifying residual masses that had failed treatment

    Model of the Quark Mixing Matrix

    Full text link
    The structure of the Cabibbo-Kobayashi-Maskawa (CKM) matrix is analyzed from the standpoint of a composite model. A model is constructed with three families of quarks, by taking tensor products of sufficient numbers of spin-1/2 representations and imagining the dominant terms in the mass matrix to arise from spin-spin interactions. Generic results then obtained include the familiar relation Vus=(md/ms)1/2(mu/mc)1/2|V_{us}| = (m_d/m_s)^{1/2} - (m_u/m_c)^{1/2}, and a less frequently seen relation Vcb=2[(ms/mb)(mc/mt)]|V_{cb}| = \sqrt{2} [(m_s/m_b) - (m_c/m_t)]. The magnitudes of VubV_{ub} and VtdV_{td} come out naturally to be of the right order. The phase in the CKM matrix can be put in by hand, but its origin remains obscure.Comment: Presented by Mihir P. Worah at DPF 92 Meeting, Fermilab, November, 1992. 3 pages, LaTeX fil

    Intraperitoneal delivery of paclitaxel by poly(ether-anhydride) microspheres effectively suppresses tumor growth in a murine metastatic ovarian cancer model

    Get PDF
    Intraperitoneal (IP) chemotherapy is more effective than systemic chemotherapy for treating advanced ovarian cancer, but is typically associated with severe complications due to high dose, frequent administration schedule, and use of non-biocompatible excipients/delivery vehicles. Here, we developed paclitaxel (PTX)-loaded microspheres composed of di-block copolymers of poly(ethylene glycol) and poly(sebacic acid) (PEG-PSA) for safe and sustained IP chemotherapy. PEG-PSA microspheres provided efficient loading (∼13 % w/w) and prolonged release (∼13 days) of PTX. In a murine ovarian cancer model, a single dose of IP PTX/PEG-PSA particles effectively suppressed tumor growth for more than 40 days and extended the median survival time to 75 days compared to treatments with Taxol® (47 days) or IP placebo particles (34 days). IP PTX/PEG-PSA was well tolerated with only minimal to mild inflammation. Our findings support PTX/PEG-PSA microspheres as a promising drug delivery platform for IP therapy of ovarian cancer and potentially other metastatic peritoneal cancers

    Search for a Fourth-Generation Quark More Massive than the Z0 Boson in ppbar Collisions at sqrt(s) = 1.8 TeV

    Get PDF
    We present the results of a search for pair production of a fourth-generation charge -1/3 quark (b') in sqrt(s)=1.8 TeV ppbar collisions using 88 pb^(-1) of data obtained with the Collider Detector at Fermilab. We assume that both quarks decay via the flavor-changing neutral current process b' -> bZ and that the b' mass is greater than m_Z + m_b. We studied the decay mode b'b'bar -> ZZ b bbar where one Z0 decays into e^+e^- or mu^+ mu^- and the other decays hadronically, giving a signature of two leptons plus jets. An upper limit on the cross section of ppbar -> b'b'bar times [BR (b' -> bZ)]^2 is established as a function of the b' mass. We exclude at 95% confidence level a b' quark with mass between 100 and 199 GeV/c^2 for BR(b' -> bZ) = 100%.Comment: 12 pages, 2 figures, submitted to Phys. Rev. Letters on 9/12/9
    corecore