Upload
berenice-palmer
View
216
Download
1
Embed Size (px)
Citation preview
ARTIFICIAL INTELLIGENCE
FORHOME LAND SECURITY
THE AUTHORSPhd, Information Systems from New York University
Management information systems, University of Arizona
Research: •intelligence analysis•Web mining
Hsinchun chen
THE AUTHORS
FEI-YUE WANG
PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE
UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING
DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS
RESEARCH:INTELLIGENCE CONTROLCOMPUTATIONAL INTELLIGENCE
MAIN SECURITY OBJECTIVES
•FEDERAL AUTHORITIES OBJECTIVES:–PREVENT FUTURE TERRORIST ATTACKS
–REDUCE NATIONAL VULNERABILITY
–MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS
IT role and support
• IT supports intelligence and knowledge discovery
• IT can help in collecting, processing, and developing applications for terrorism
• Federal authorities can use results for timely decisions, select tactics and allocate resources
• Detect, prevent and respond to future attacks
Critical mission areas
• US Department of homeland security (DHS) identifies 6 critical mission areas
– Intelligence and warning– Border and transportation security– Domestic counterterrorism– Protecting infrastructure and assets– Defending against catastrophes– Emergency preparedness and responses
Intelligence and warning
• IT can detect the identities • IT can monitor and provide alerts
through intelligence and warning systems to prevent crimes
{DHS}
Border and transportation security
• Creat smart borders that improves counterterrorism and crime fighting capabilites
• Smart borders depends on information sharing and integration, collaboration and communication
{DHS}
Domestic counterterrorism
• IT can find interactive patterns among criminals
• IT can help in analyzing terrorism• IT can help in public safety
{DHS}
Protecting infrastructure and assets
• Sensors and detectors are not enough• Advanced IT devices that model the
normal use and detect the abnormal use of the infrastructure
{DHS}
Defending against catastrophes
• IT collect, access, analyze and report data relevant to catastrophes
• IT can be helpful in prevent, detect and manage the future attacks
{DHS}
Emergency preparedness and responses
• Train professionals• Facilitate social and psychological
support for victims
{DHS}
Security challenges
• Distributed criminal enterprises• Diverse sources and formats• Crime and intelligence analysis
techniques
ISI
• Emergence of a discipline– Intelligence and security informaticsObjectives:Develop advanced information
technology, system and data bases for national security throught an integrated technological, organizational and policy based approach
ISI vs. biomedical informatics
• Data:overload problem
• Technolongy:new approaches
• Scientific contribution:add insight and knowledge
• Research frame work based on data mining
Design and implementation of ISI
• Emergency:PDA, handheld for police and ambulance through wirless network
• Problem solving:Knowledge based data integration of
disease, health problems and some other problems
Design and implementation of ISI
• Detection:Information about hand and head
movements and behaviors• Classification:Developing and organizing website
data about extremists and analyze its content
Design and implementation of ISI
• Data mining:Based on the (rule + exception) methodology • Infrastructure:
multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis
• Anonymity:Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.