Noblis
Team - Multiviz
VAST
2010
Challenge
Text
Records - Investigations into Arms Dealing
Authors
and Affiliations:
Katharine Jennings,
PhD, Noblis, Team Lead, Katharine.Jennings@noblis.org
Daniel
Whitford, Noblis, Team Lead, Daniel.Whitford@noblis.org
Seth
Blanchard, Noblis, Seth.Blanchard@noblis.org
Shin
Chin, PhD, Noblis, Shin.Chin@noblis.org
Casey
Henderson, Centrifuge Systems, chenderson@centrifugesystems.com
Mitchell
Holland, Noblis, Mitchell.Holland@noblis.org
Matthew
McCoy, Noblis, Matthew.McCoy@noblis.org
Jill
McCracken, PhD, Noblis, Jill.McCracken@noblis.org
Benjamin
Pecheux, Noblis, Benjamin.Pecheux@noblis.org
Mark
Sanders, Future Point Systems, msanders@futurepointystems.com
Karen
Taylor, Noblis, Karen.Taylor@noblis.org
Harry
Cummins, Noblis, graphic
artist, hcummins@noblis.org
Richard
P. DiMassimo, Noblis, video
producer, rdimassimo@noblis.org
Austin
Blanton, Noblis Intern, austin.blanton@noblis.org
Catherine
Campbell, PhD, Noblis, Catherine.Campbell@noblis.org
[PRIMARY contact]
Noblis VAST Webpage: http://www.noblis.org/VAST
Tool(s):
1) Copernic Desktop
Search by
Copernic Inc. (http://www.copernic.com),
allowed for indexed searching of files, e-mails (and attachments)
stored anywhere on the analyst’s drive.
2)
IN-SPIRE from Pacific Northwest
National Laboratory, (http://in-spire.pnl.gov/)
was used to integrate information visualization with query to analyze
unstructured text documents.
3)
Centrifuge, a partner in this
challenge (http://www.centrifugesystems.com/),
was used with Internet Explorer on Windows to perform
“Interactive Analytics,” analyzing data using
visuals such
as relationship graphs, timelines and charts.
4)
The free application Protovis (http://vis.stanford.edu/protovis/),
a Javascript API, was used for custom visualization. Datasets were
organized into natural hierarchies for performing graph visualizations
and statistical data analysis.
5)
Sentinal Visualizer from FMS
Advanced Systems Group (http://www.fmsasg.com/),
is an automated link analysis software for visualizing, analyzing and
managing complex data.
6)
Google Earth (http://earth.google.com/),
was
used to render user data onto maps and satellite imagery, and
to
explore geographical content.
7)
Starlight from Future Point
Systems (http://www.futurepointsystems.com/),
another partner in this project, was used as a comprehensive visual
analytics platform. It performed social network analysis, hierarchical
organizations, geospatial and temporal relationships, category
memberships and link charting.
8) Starlight’s XML Engineering
Environment (XEE) simplified the process of retrieving and
restructuring information prior to visualization.
Video:
Noblis_Multiviz_MC1.mp4
ANSWERS:
MC1.1:
Summarize
the activities that happened in each country with respect to illegal
arms deals based on a synthesis of the information from the different
report types and sources. State the situation in each country at the
end of the period (i.e. the end of the information you have been given)
with respect to illegal arms deals being pursued. Present a
hypothesis about the next activities you expect to take place, with
respect to the people, groups, and countries.
In this challenge we investigated a series of intelligence reports
(phone and wire intercepts; email and message board intercepts; news
reports; US Government intelligence reports; and blog postings)
spanning January 2008 to May 2009. Through this process, we discovered
a Ukrainian-centered global arms network.
Our
overall analytical approach
involved data pre-processing followed by parallel analysis using manual
techniques and visual analytics (Figure 1.1.1). The dataset was
converted to a standard text format and subsequently to XML. Using
automated and manual extraction processes, we developed entity lists
for people, events, dates, places, transactions, aliases and objects.
These lists were ingested into Starlight and Centrifuge, resulting in
visualizations that drove hypothesis development and further analysis.

Figure
1.1.1. Analytical Process.
Country
summary
During the initial
analysis,
we created a Master View of all the networks in Starlight. From this we
identified 17 countries (or country nationals) involved in this global
arms network: Bosnia, Burma, Columbia, Iran, Kenya, Nigeria, North
Korea, Pakistan, Palestine, Saudi Arabia, Sudan, Syria, Thailand,
Turkey, Ukraine, Venezuela, and Yemen. Using Starlight’s
Geographic View and Temporal Filter, we mapped the activities occurring
in the dataset (Figure 1.1.2). This visualization helped us identify
key events in each country and required approximately 4 hours to
complete.

Figure
1.1.2. Interactive Map of
International Networks
We used the Starlight
networks
to create a summary graphic using Microsoft Visio (Figure 1.1.3) to
better view the links among countries. From this illustration we can
see three core roles: arms sellers (Kenya, North Korea, and Ukraine),
intermediaries—financiers, and brokers—(Bosnia,
Columbia,
Kenya, Thailand, Ukraine, and Yemen), and buyers (Burma, Iran, Nigeria,
Pakistan, Palestine, Saudi Arabia, Sudan, Syria, Turkey, Venezuela, and
Yemen). Some countries such as the Ukraine, Kenya, and Yemen play
multiple roles. At the core of this network, the Ukrainians act as both
direct sellers of arms and brokers for other deals (such as the North
Korean sale of arms to Iran). The Kenyans try to sell arms directly to
Sudan, and try to broker a deal between the Ukrainians and Sudan. The
Yemenis buy arms from the Ukrainians, and broker the sale of arms to
Saudi Arabia. This network analysis was completed in approximately 4
hours.

Figure
1.1.3. Summary of Arms Deals
by Country (dotted lines represent unverified links).
Our analyses led us to
conclude that most of the countries in this network are discussing
future arms deals and are moving money and payments within their
networks during this reporting period, often brokered by the Ukrainians
(blue lines). The Ukrainian network (initially led by Leonid Minsky,
who was murdered in February 2009) is led by Mikhail Dombrovski and
Nicolai Kuryakin. Also during this period, Iran, Kenya, Pakistan,
Palestine, Saudi Arabia, Venezuela, and Yemen have key stores of
weapons seized or stolen. They need to replace these caches and are in
contact with the Ukrainians to do so (either directly or through
intermediaries). Additionally, the intelligence suggests that one
separate key shipment was completed before the end of the reporting
period. In October 2008, a ship is seized by Somali pirates carrying
Soviet weapons thought to be intended for Sudan. This deal is brokered
by the Kenyans, connecting the Ukrainians to Sudan.
Spring
2009
Events
Most
of the identified deals and
discussions culminated in a meeting in Dubai from April 15-23, 2009 to
finalize payments and key arms deals. We used Starlight to investigate
known Dubai attendees, starting with the Master View and including
entities up to two relationships away. This allowed us to observe the
main Ukrainian dealer network and three “orphan
networks”
(Turkey-Syria, Gaza, and Pakistan not directly connected to the
Ukrainians) going to Dubai . We looked for integration points among the
networks, focusing on Pakistan because it had links to international
banking transactions.
We used Centrifuge
(Figure
1.1.4) to view transactions linking Pakistan to a Saudi bank account
(yellow circles). We then iteratively used Copernic keyword searches
(e.g. “Saudi”) and linked both Turkey-Syria and
Gaza to a
Saudi bank account. There is only one Saudi arms dealer, Saleh Ahmed,
in the dataset (associated with Dombrovski and Minsky) closing the link
between the networks. This process required approximately 6 hours for
analysis and less than 1 hour for visualization.

Figure
1.1.4. Banking Transactions in
Centrifuge
We next visualized these
Dubai
attendee network assumptions in Starlight by drawing dotted links
between Ahmed, the Saudi account, and individuals in the orphan
networks (Figure 1.1.5, yellow circles). Significantly, this created an
integrated network connecting the buyers going to Dubai to the
Ukrainian arms network. Analysis and visualization of the integrated
network required approximately 5 hours.
From
this network analysis we
concluded that all of the deals were closed in Dubai, and that
subsequently arms moved to the purchasing countries (Burma, Iran,
Nigeria, Pakistan, Palestine, Saudi Arabia, Sudan, Syria, Turkey,
Venezuela, and Yemen). Additionally in March, the ransom was paid to
the pirates and Sudan received arms in April (according to a Kenyan
blog). Finally, there were reports that three of the arms dealers
(Owiti and Otieno of Kenya;Ahmed of Yemen) died or were near death in
early May.

Figure
1.1.5. Assumptions-linked
Network of Arms Deals with Assumed Saudi Links (dashed red lines).
Future
Activities - Hypotheses
At
the conclusion of our analysis, we
hypothesized the following future events based on information
synthesized from the intelligence records. It is surmised that all of
the buyers will receive their weapons and this will lead to the
following:
1)
MFJ in Palestine launches a revenge attack in May 2009.
2)
LeJ attacks a public place on a
religious holiday in Pakistan.
3)
Aden-as-Sallal becomes the new
Saudi link between Yemen and the Ukrainian network following
Ahmed’s death.
4)
The Burmese Shan State Army-South
rebels launch local uprisings with their weapons.
5)
The Yemenis stage Al-Houthi
uprisings.
The intentions of the
other
countries who received arms (Iran, Nigeria, Sudan, Syria, Turkey, and
Venezuela) are not apparent from the intelligence documents and would
warrant future targeting efforts.
MC1.2:
Illustrate the associations among the players in the arms dealing
through a social network. If there are linkages among
countries,
please highlight these as well in the social network. Our
analysts are interested in seeing different views of the social network
that might help them in counterintelligence activities (people, places,
activities, communication patterns that are key to the network).
The Ukrainian centered
arms
network involves 17 countries, several rebel groups and over three
dozen individuals associated through communications networks, financial
transactions and personal contact. To create a Master View of all
possible relationships in our dataset and to identify the key entities
in the network for counterintelligence targeting, we utilized
customized entity lists imported into Starlight. Figure 1.2.1 shows
this Master View which is very large and cumbersome to analyze.

Figure
1.2.1. Starlight Master View
To begin identifying key
individuals - and to simplify the visualization - a sub-network was
created for each major group identified in the data, requiring
approximately 3 hours of analysis and visualization. User-selected
icons helped to navigate this complex data (e.g., “bad
guy”
icons represent arms dealers). Figure 1.2.2 illustrates the Thai
sub-network as an example. This same analytic process was used for the
other sub-networks, visible in tabs across the Knowledge Manager
workspace in Figure 1.2.1. Almost all sub-networks included more than
one country, as can be seen in the Thai network. From these detailed
views we identified Leonid Minsky as a principal for a large Ukrainian
criminal organization selling arms from former Soviet stockpiles. We
can also see that Ukrainians Nicolai Kuryakin, Mikhail Dombrovski,
Arkadi Borodinski, and likely the Yemeni, Saleh Ahmed, are key players
in this international arms network. During the reporting period Minsky
is killed and Dombrovski and Kuryakin take over his business deals.
These views and networks allowed us to generate hypotheses about key
individuals, and in this particular view we identified a possible
relationship between Minsky’s network (Borodinski) and North
Korea as an arms supplier.

Figure 1.2.2. Thai
Sub-Network
The various sub-networks
were
further analyzed for communications patterns, people movements, arms
movements, and payments. We created a novel diagram using Protovis
(Figure 1.2.3) to display the magnitude of communications between
individuals and their relative centrality. Larger bubbles represent
more communications from an individual, while thicker lines indicate
frequent communications between individuals. This visualization helped
identify key people and confirmed the sub-networks identified in our
Starlight network diagrams. Approximately 5 hours were used to script
and conduct the visual analysis. Future analyses would be faster since
scripts and formatting are established and future plots could be
animated to show communications over time.

Figure 1.2.3. Protovis
View of
Communications
The Starlight Geographic
View
and Temporal Filter maps complement the Starlight network and Protovis
views by displaying communications over space and time; however they
lack the detailed interactions shown in the other two views. We used
these interactive maps to visualize arms movements, people movements,
and financial transactions. People movements, shown in Figure 1.2.4,
illustrate that key players converged in Dubai in April 2009.

Figure
1.2.4. People Movements, April
2009
This observation led us
to
analyze the social networks of ONLY Dubai meeting attendees. We created
a new view of Dubai meeting attendees and all their associations up to
2 “hops” (relationships) away (Figure 1.2.5) Using
this
network diagram we could see that Kuryakin, Dombrovski, and Ahmed
(yellow circles) form a “backbone” of purchases
involving
buyers in eleven countries: Burma, Iran, Nigeria, Pakistan, Palestine,
Saudi Arabia, Sudan, Syria, Turkey, Venezuela, and Yemen. The backbone
is obvious in this integrated view, but was not apparent when we were
looking at the sub-networks individually. Analysis took approximately 4
hours.

Figure
1.2.5. Dubai Meeting Social
Networks
From
these views we established the
following associations between key individuals which could be exploited
for future counterintelligence targeting efforts:
1) Africa:
Kenyans Nahid Owiti, his
wife Thabiti Otieno, and Wanohi Onyango are working with Minsky to
broker the sale of arms to Sudan. Owiti and Otieno meet with Kuryakin
in Dubai and subsequently die. Onyango could be targeted for
intelligence gathering. Additionally, Dr. George Ngoki of Nigeria has
purchased arms from Dombrovski and he, his email accounts, or bank
accounts are potential targets for the Ukranian-Nigerian connection.
2)
Burma:
Lim Chanarong is connected through Boonmee Khemkhaengare to the
Ukranian dealers. He or his financial transactions could be exploited.
The Shan State Army South could be another access point to Chanarong.
3)
Columbia/
Venezuela: In this network
true names are unknown. The aliases
Jhon, Pillo and Hombre are identified in message boards which could be
monitored. Additionally, known bank accounts in this network could also
be monitored for large transactions.
4)
Iran: Someone, likely Sattari
Khurshid arranges to purchase arms
from North Korea through the Ukrainian network. After they are seized
in Bangkok he agrees to meet Kuryakin in Dubai. Khurshid, through phone
records, would be a likely target for this Iranian-Ukrainian-North
Korean connection.
5)
Pakistan:
The Lashkar-e-Jhangvi terrorist group and key individuals Azeem
Bhutani, Akram Basra, Mohammed Mengal, and Mudassar Mausherwani
(Bhutani’s driver) could be exploited for their dealings with
the
Ukrainians. Maulana Haq Bukhari may be the financier. He and his known
accounts are also potential targets.
6)
Palestine:
Muhammed Kasem, Abdullah Khouri, and Mohammed Anka are known members of
the Martyrs Front of Judea. Their telephone numbers could be targeted
for intercepts.
7)
Saudi
Arabia/Yemen: Saleh Ahmed
likely dies at the end of the
reporting period, leaving, Aden-as-Sallal as a potential target for the
Yemeni and Saudi-Ukrainian connection. Ahmed’s Saudi account
is
another target, but could change following his death. Georgiy Giunter,
who moves diamonds between the groups, is another potential asset.
8)
Syria/Turkey:
Syria and Turkey (Baltasar, Celik and Hakan) connect to the Ukrainian
network through an unknown Bosnian by telephone records. These
communications could also be targeted for future intelligence efforts.
9)
Ukraine/Thailand:
Khemkhaengare, Dombrovski, Kuryakin, and Borodinski are the keys to
this entire network. They could be targeted directly through email,
phone, or banking transactions, or indirectly through their
interactions with most other individuals in this network.
Our
combination of visual analytics
and manual analysis is scalable for future counterintelligence
activities involving increasingly large datasets. Automated text
processing tools can be added or removed as needed. The most
labor-intensive aspects are inherently human activities: characterizing
the nature of network relationships created by the visualization tools,
and developing hypotheses.