You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Iraq
Computer sleuthing to fight the insurgents
2003-12-22
Edited for brevity.
U.S. troops battling the shadowy guerrilla insurgency in Iraq have adopted the computer-sleuthing tactics of big-city American police departments to prepare strikes against rebel fighters and their sources of money and weapons. Military intelligence analysts have adopted databases and software used by civilian law enforcers to catalog names, pictures and suspects’ fingerprints and to search such for links among guerrilla suspects, said Lt. Col. Ken Devan, the top intelligence officer for the U.S. Army’s 1st Armored Division.

Devan and the division’s intelligence analysts study clusters of attacks in Baghdad neighborhoods, looking for the time of day and days of the week when strikes are most likely. They then alter their convoy schedules and routes to avoid ambushes or send patrols to confront the guerrillas, Devan said. The division uses three programs in tandem, entering data on every bomb blast, every firefight, every suspect detained and every tip given by a local resident. Digital fingerprints are taken from every arrested suspect and added to the database.

"We’re seeing patterns emerge. There are certain neighborhoods you don’t want to be out in, or there’s a better likelihood you’ll be attacked," Devan said. "You try to predict what the enemy’s going to do next. We try to cut him off at the knees." The software allows the military to plot on a Baghdad street map, for instance, the locations of roadside bomb blast that occurred between 7 p.m. and 10 p.m. in a given month. Commanders then tailor raids to catch the bombers by watching the neighborhood and rounding up suspects until they find a weapons cache, Devan said. On Friday, one 1st Armored unit did just that, turning up a cache of about 50 130mm artillery shells _ commonly used to make roadside bombs, Devan said.

Analysts have compared attack clusters with weather and other data to pick up interesting clues. Intelligence analysts struggling to find a pattern among seemingly random nightly mortar attacks compared attack histories with a chart showing the phases of the moon, and learned the attacks tend to come bunched on nights when the moon is fullest. "They need moon illumination with their mortars especially," Devan said. "The database tracks all these events."
Posted by:Dar

#3  I saw a Discovery Channel special on software used by the FBI to geographically profile criminals guilty of assaults. We are making a mistake if we do not try this in Baghdad.
Posted by: Super Hose   2003-12-22 3:20:43 PM  

#2  Insurance companies have used relationship software for years to fight organized fraud. If you have ever filed a claim, you're in the database. It tracks and organizes addresses, phone numbers, properties, cars, scenarios, etc. of both the claimants and any other related parties (read - lawyers, doctors, police, hospitals and so on). It was very good at linking seemingly unconnected events. When I last was in contact with it, the pointy head guys were fine tuning it's predictive capabilities. Hopefully, the DoD has bought the advanced versions.
Posted by: Doc8404   2003-12-22 1:00:00 PM  

#1  (sings)
O-RI-ON. doo doo doo doooo.



The Quiet War.
Posted by: mojo   2003-12-22 12:31:31 PM  

00:00