ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York...

Preview:

Citation preview

ARTIFICIAL INTELLIGENCE

FORHOME LAND SECURITY

THE AUTHORSPhd, Information Systems from New York University

Management information systems, University of Arizona

Research: •intelligence analysis•Web mining

Hsinchun chen

THE AUTHORS

FEI-YUE WANG

PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE

UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING

DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS

RESEARCH:INTELLIGENCE CONTROLCOMPUTATIONAL INTELLIGENCE

MAIN SECURITY OBJECTIVES

•FEDERAL AUTHORITIES OBJECTIVES:–PREVENT FUTURE TERRORIST ATTACKS

–REDUCE NATIONAL VULNERABILITY

–MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS

IT role and support

• IT supports intelligence and knowledge discovery

• IT can help in collecting, processing, and developing applications for terrorism

• Federal authorities can use results for timely decisions, select tactics and allocate resources

• Detect, prevent and respond to future attacks

Critical mission areas

• US Department of homeland security (DHS) identifies 6 critical mission areas

– Intelligence and warning– Border and transportation security– Domestic counterterrorism– Protecting infrastructure and assets– Defending against catastrophes– Emergency preparedness and responses

Intelligence and warning

• IT can detect the identities • IT can monitor and provide alerts

through intelligence and warning systems to prevent crimes

{DHS}

Border and transportation security

• Creat smart borders that improves counterterrorism and crime fighting capabilites

• Smart borders depends on information sharing and integration, collaboration and communication

{DHS}

Domestic counterterrorism

• IT can find interactive patterns among criminals

• IT can help in analyzing terrorism• IT can help in public safety

{DHS}

Protecting infrastructure and assets

• Sensors and detectors are not enough• Advanced IT devices that model the

normal use and detect the abnormal use of the infrastructure

{DHS}

Defending against catastrophes

• IT collect, access, analyze and report data relevant to catastrophes

• IT can be helpful in prevent, detect and manage the future attacks

{DHS}

Emergency preparedness and responses

• Train professionals• Facilitate social and psychological

support for victims

{DHS}

Security challenges

• Distributed criminal enterprises• Diverse sources and formats• Crime and intelligence analysis

techniques

ISI

• Emergence of a discipline– Intelligence and security informaticsObjectives:Develop advanced information

technology, system and data bases for national security throught an integrated technological, organizational and policy based approach

ISI vs. biomedical informatics

• Data:overload problem

• Technolongy:new approaches

• Scientific contribution:add insight and knowledge

• Research frame work based on data mining

Design and implementation of ISI

• Emergency:PDA, handheld for police and ambulance through wirless network

• Problem solving:Knowledge based data integration of

disease, health problems and some other problems

Design and implementation of ISI

• Detection:Information about hand and head

movements and behaviors• Classification:Developing and organizing website

data about extremists and analyze its content

Design and implementation of ISI

• Data mining:Based on the (rule + exception) methodology • Infrastructure:

multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis

• Anonymity:Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.

Recommended