Worldwide Incidents Tracking System

Last updated

The Worldwide Incidents Tracking System (WITS) was the US government's database on tracking acts of terrorism. It contained details about incidents of violence against civilians and non-combatants (including military personnel and assets outside of war-like settings) from publicly viewable information. [1]

Contents

The National Counterterrorism Center (NCTC) discontinued WITS in 2012 and was merged into the Global Terrorism Database (GTD), which can be downloaded from the National Consortium for the Study of Terrorism and Responses to Terrorism (START) website at the University of Maryland. [1]

Data collection

When collecting data WITS addressed two areas of concern: it practiced basic knowledge management techniques to ensure consistency in data collection and it cast a wider net on political violence than what may be considered terrorism. Casting a wider net ensured all candidate events are given fair consideration. Data was collected in a variety of ways. The NCTC gathered data from open sources manually using commercial subscription news services, the USG's Open Source Center (OSC), local news websites reported in English, and, as permitted by the linguistic capabilities of the team, local news websites reported in foreign languages. [1] Team members on the NCTC read and reviewed each article. A senior intelligence analyst provided quality control over his or her team. The senior analyst reviewed each article to maintain consistency before publishing to the database. [1]

To reduce interpretation bias further (or increase inter-rater reliability), NCTC has analysts maintained account notes of commonly used terms and phrases found in the press, recurring political and ethnic issues, terrain notes, weather related trends, and other factors that influence a mastery of context surrounding acts of violence in countries assigned to their area of responsibility. [1]

To ensure WITS would give fair and proper consideration to all the events available in open source, WITS collected information on attacks that have any indications of terrorism. [1]

Humans and computers

NCTC designed the WITS data coding process to make the best use of humans and computers. There is evidence to suggest that statistical models based on expert human judgment in older cases tend to outperform the same expert human judgment in newer cases. John Wiggle says, "Studies show that humans are good at categorizing and recognizing discrete objects and concepts, but often lack the ability to make effective aggregate judgments." [1] Being able to use humans and computers allows analysts to separate data quickly and effectively to determine what is or is not an act of violence. Analysts can then code them into the database, and the WITS system then made a logical decision on whether the act meets the criteria for terrorism. Having the computer assist NCTC with what is or is not terrorism allowed an analyst to compare the computer’s answer with human thinking about the attack. [1]

Content

As of September 2010, WITS contained over 68,939 records.

The database was organized in the following dimensions:

Related Research Articles

Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle and is a critical aspect to the design, implementation, and usage of any system that stores, processes, or retrieves data. The term is broad in scope and may have widely different meanings depending on the specific context – even under the same general umbrella of computing. It is at times used as a proxy term for data quality, while data validation is a prerequisite for data integrity. Data integrity is the opposite of data corruption. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended. Moreover, upon later retrieval, ensure the data is the same as when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.

Information Awareness Office DARPA division overseeing the "Total Information Awareness" program

The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA).

Total Information Awareness US mass detection program

Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.

Computer-aided dispatch A method of dispatching vehicle-based services assisted by computer

Computer-aided dispatch (CAD), also called computer-assisted dispatch, is a method of dispatching taxicabs, couriers, field service technicians, mass transit vehicles or emergency services assisted by computer. It can either be used to send messages to the dispatchee via a mobile data terminal (MDT) and/or used to store and retrieve data. A dispatcher may announce the call details to field units over a two-way radio. Some systems communicate using a two-way radio system's selective calling features. CAD systems may send text messages with call-for-service details to alphanumeric pagers or wireless telephony text services like SMS. The central idea is that persons in a dispatch center are able to easily view and understand the status of all units being dispatched. CAD provides displays and tools so that the dispatcher has an opportunity to handle calls-for-service as efficiently as possible.

A geocode is a code that represents a geographic entity. It is a unique identifier of the entity, to distinguish it from others in a finite set of geographic entities. In general the geocode is a human-readable and short identifier.

Data logger Recording device

A data logger is an electronic device that records data over time or in relation to location either with a built in instrument or sensor or via external instruments and sensors. Increasingly, but not entirely, they are based on a digital processor, and called digital data loggers (DDL). They generally are small, battery powered, portable, and equipped with a microprocessor, internal memory for data storage, and sensors. Some data loggers interface with a personal computer, and use software to activate the data logger and view and analyze the collected data, while others have a local interface device and can be used as a stand-alone device.

In computer science, data validation is the process of ensuring data has undergone data cleansing to ensure they have data quality, that is, that they are both correct and useful. It uses routines, often called "validation rules", "validation constraints", or "check routines", that check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or by the inclusion of explicit application program validation logic of the computer and its application.

Address geocoding, or simply geocoding, is the process of taking a text-based description of a location, such as an address or the name of a place, and returning geographic coordinates, frequently latitude/longitude pair, to identify a location on the Earth's surface. Reverse geocoding, on the other hand, converts geographic coordinates to a description of a location, usually the name of a place or an addressable location. Geocoding relies on a computer representation of address points, the street / road network, together with postal and administrative boundaries.

National Counterterrorism Center U.S. government organization responsible for national and international counterterrorism efforts

The National Counterterrorism Center (NCTC) is a United States government organization responsible for national and international counterterrorism efforts. It is based in Liberty Crossing, a modern complex near Tysons Corner in McLean, Virginia. NCTC advises the United States on terrorism.

A human resource for health information system (HRHIS), also known as human resource information system (HRIS) — is a system for collecting, processing, managing and disseminating data and information on human resource for health (HRH). Depending on the level of development of a country's health care system and the organization of its workforce, an HRHIS can be computerized or paper-based, including information on numbers and distribution of health workers and track their career information. It is usually an integral part of a comprehensive health management information system, and may be used to monitor and assess the performance of the overall health system.

The TOC search is a dynamic database which offers comprehensive information on global terrorist networks and helps researchers, analysts, students and others to prevent terrorism. It is result of a common project realized by the Faculty of Security Studies and Faculty of Mathematics, University of Belgrade, which had started the program in December 2007. The scope of TOCSearch is to provide in-depth research and analysis on terrorist incidents, terrorist groups, organizations, their members, leaders and also links and relations between the individuals and groups. The purpose of the database is to integrate data from variety of sources, including foreign and domestic news, professional security journals, reports and databases, and academic works.

In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.

Information security operations center Facility where enterprise information systems are monitored, assessed, and defended

An information security operations center is a facility where enterprise information systems are monitored, assessed, and defended.

Crime hotspots are areas that have high crime intensity. These are usually visualized using a map. They are developed for researchers and analysts to examine geographic areas in relation to crime. Researchers and theorists examine the occurrence of hotspots in certain areas and why they happen, and analysts examine the techniques used to perform the research. Developing maps that contain hotspots are becoming a critical and influential tool for policing; they help develop knowledge and understanding of different areas in a city and possibly why crime occurs there.

A Crime concentration is a spatial area to which high levels of crime incidents are attributed. A crime concentration can be the result of homogeneous or heterogeneous crime incidents. Hotspots are the result of various crimes occurring in relative proximity to each other within predefined human geopolitical or social boundaries. Crime concentrations are smaller units or set of crime targets within a hotspot. A single or a conjunction of crime concentrations within a study area can make up a crime hotspot.

Global Terrorism Index Indicator for impact of terrorism

The Global Terrorism Index (GTI) is a report published annually by the Institute for Economics and Peace (IEP), and was developed by IT entrepreneur and IEP's founder Steve Killelea. The index provides a comprehensive summary of the key global trends and patterns in terrorism since 2000. It is an attempt to systematically rank the nations of the world according to terrorist activity. The index combines a number of factors associated with terrorist attacks to build an explicit picture of the impact of terrorism, illustrating trends, and providing a data series for analysis by researchers and policymakers. It produces a composite score in order to provide an ordinal ranking of countries on the impact of terrorism.

Global Terrorism Database Post-1970 terrorist incident database by the University of Maryland, College Park

The Global Terrorism Database (GTD) is a database of terrorist incidents from 1970 onward. As of May 2021, the list extended through 2019 recording over 200,000 incidents, although data from 1993 is excluded. The database is maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) at the University of Maryland, College Park in the United States. It is also the basis for other terrorism-related measures, such as the Global Terrorism Index (GTI) published by the Institute for Economics and Peace.

Rare or extreme events are events that occur with low frequency, and often refers to infrequent events that have widespread impact and which might destabilize systems. Rare events encompass natural phenomena, anthropogenic hazards, as well as phenomena for which natural and anthropogenic factors interact in complex ways.

The Aid Worker Security Database (AWSD) is a project of the international research group, Humanitarian Outcomes. Funded by USAID, it records major incidents from 1997 to present, of attacks on humanitarian workers worldwide. As cited in the New York Times, “it is widely regarded as an authoritative reference for aid organisations and governments in assessing trends in security threats.” Since its inception in 2005 as the first fully comprehensive compilation of this data, the AWSD has been a source of quantitative evidence on matters related to the security of humanitarian operations in conflict, referenced in policy debates and cited in official United Nations statements, United Nations General Assembly resolutions, United Nations Security Council documents, and reports of the Secretary-General of the United Nations.

The International Terrorism: Attributes of Terrorist Events project, commonly known as ITERATE, records data regarding transnational terrorist groups and their activities. It is one of the most comprehensive databases of its type; most academic research in the field stems from either ITERATE or the Global Terrorism Database. Published by Vinyard Software, it is available as a qualitative textual chronology from 1960-present and a quantitative numerically coded database from 1968-present.

References

  1. 1 2 3 4 5 6 7 8 Wigle, John (2010-11-29). "Introducing the Worldwide Incidents Tracking System (WITS)". Perspectives on Terrorism. 4 (1). ISSN   2334-3745. CC BY-SA icon.svg Material was copied from this source, which is available under a Creative Commons Attribution-ShareAlike 3.0 Unported license.