You are here

Strategic Effects-based Objective Approach to Determine the Likelihood of Possible Terrorist Attacks

Award Information
Agency: Department of Homeland Security
Branch: N/A
Contract: NBCHC040111
Agency Tracking Number: 04111046
Amount: $99,983.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: H-SB04.1-004
Solicitation Number: N/A
Timeline
Solicitation Year: 2004
Award Year: 2004
Award Start Date (Proposal Award Date): 2004-04-09
Award End Date (Contract End Date): 2004-10-19
Small Business Information
11675 Jollyville Road Suite 300
Austin, TX 78759
United States
DUNS: N/A
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Paula DeWitte
 Director, New Business Development
 (512) 342-0010
 pdewitte@21technologies.com
Business Contact
 Joyce Massey
Phone: (512) 342-0010
Email: jmassey@21technologies.com
Research Institution
N/A
Abstract

The goal of this research is to extend TMODS (Terrorist Modus Operandi Detection System), that has been funded by DARPA¿s EELD (Evidence Extraction and Link Discovery) and Genoa 2, and TIA programs. TMODS uses terrorist network analysis (TNA) to build the representation for abnormal social networks indicative of terrorist or illicit network-centric cells and searches for these patterns in huge pools of transactional information to detect terrorist activities. We have integrated TMODS with CAT (Casual Analysis Tool) to enable analyzing the existence and detection of these cells to compute the probability of actual terrorist events and derive a probabilistic plan assessment of the successful execution of a terrorist event. Under this proposed Homeland Security SBIR effort, we will leverage this integration and develop new functionality for obtaining and reasoning about knowledge about terrorist groups, terrorist attack methods, and infrastructure targets to produce a strategic vulnerability assessment tool. Our proposed TMODS extensions will add the specific information about specific infrastructure targets, terrorist groups, and terrorist attack methods through ontology, process, and causal models to reason about the likelihood of attack and what method against critical infrastructure assets.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government