A Department of Homeland Security Emeritus Center of Excellence led by the University of Maryland

A consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism

New project seeks to provide DARPA with ways to deter CBRN attacks by non-state actors

New project seeks to provide DARPA with ways to deter CBRN attacks by non-state actors

May 28, 2020Erin Copland

A new START project for the Defense Advanced Research Projects Agency is creating a process to quickly identify potential chemical, biological, radiological or nuclear (CBRN) threats from non-state actors.

The project, Advancing U.S. CWMD/CWMT Capabilities in Support of the SIGMA+ Program through Development of Anticipatory Human Social Systems Models and Adversary Weapon Selection Decision Processes, supports DARPA’s SIGMA+ Program.

“This project expands upon previous work in which we sought to understand the behaviors of violent non-state actors in terms of their motivation to conduct a CBRN attack,” START Assistant Research Scientist Thomas Guarrieri said. “Now we’re trying to automate a process by which we can quickly identify threats from adversaries who might conduct CBRN attacks, given what we know about the motivations of CBRN adversaries.”

The project consists of three components, including an Adversary Weapon Selection Dataset (AWSD), an Adversary Automated Template Generation (AATG) tool and a Geospatial Risk Mapping Tool.

The AWSD will combine information about non-state actors who have pursued CBRN weapons from other START datasets, including the Chemical and Biological Non-State Adversaries Database (CABNSAD), Radiological and Nuclear Non-State Adversaries Database (RANNSAD) and the Profiles of Incidents Involving CBRN and Non-state Actors (POICN) database.

That information the will be merged with data on violent actors who have not pursued CBRN, but instead conducted attacks using conventional modalities, tapping the Global Terrorism Database (GTD), the Profiles of Individual Radicalization in the United States (PIRUS) dataset and the American Terrorism Study (ATS)

“What we’re looking for are differences between those groups. With that knowledge, we can use the AWSD as a foundation to build out the AATG tool, which can detect threats in an attack cycle that indicate a non-state actor might conduct a CBRN attack,” Guarrieri said.

The second component of the project, the AATG tool, will automate the processes of threat identification from the information provided by the AWSD.

The team built a repository of potential actions and decisions an adversary can make, based on a combination of historical events, red-teaming and subject matter expertise. Based on the current stage and previous decisions of the adversary, the AATG tool pulls from the repository to decide the next likely adversary action.

“The goal of the AATG tool is to simulate adversary behavior and generate realistic adversary scenarios using probabilistic behavior modeling,” START Junior Researcher Tyler Clark said. “The AATG tool has several uses, including creating templates of adversary activity that can help law enforcement recognize adversary activity and interdict before the adversary conducts an attack.”

The final component, a Geospatial Risk Mapping Tool, will be created with the assistance of START’s Geospatial Research Unit (GRU).

“We’re adapting criminologist Kim Rossmo's geographic profiling of serial criminals to identify likely locations where a nefarious actor would construct a CBRN weapon,” START Senior Researcher Marcus Boyd said. “We’re also incorporating variables gleaned from our knowledge of adversary behavior and spatial preferences. This will help refine the search area for mobile detection of CBRN build locations.”

The team members all expressed their excitement to be working for DARPA on a project that breaks new ground in the field.

“Computational modeling of human behavior is a new field,” Clark said. “Being a part of a team with diverse interests and expertise allows us to take unique interdisciplinary and multi-method approaches to solve incredibly complex problems. Using these methods to look at this particular problem-set has not been done before.”