Who A Multidisciplinary Approach to Threat Analysis Deciphering Terrorism A multidisciplinary approach to threat analysis Dina Subkhankulova, Kira Kowalska,

Slides:



Advertisements
Similar presentations
Objectives to improve citizens awareness and comfort industrial competitiveness efficiency of public administrations by enhancing and supporting the use,
Advertisements

1 Defence Engineering Group - University College London - 6/6/2014 UCLs Support to System Engineering by Professor David Kirkpatrick Defence Engineering.
The Jill Dando Institute of Crime Science Agenda –What we do –Who we are –What research money we have attracted –Our publications and profile –Our international.
Avon and Somerset Police and Crime Needs Assessment October 2013.
Forensic Science Research and Practice Professor Jim Fraser The Centre for Forensic Science University of Strathclyde © Centre for Forensic Science University.
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
Highway E30 crime Corridor International causes with national consequences?
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
The Area of Liberty, Security and Justice. Objectives Free movement for EU citizens Security and safety in a Europe without borders Figth against international.
Who pays? Prioritising Prevention Through Collaboration in Austere Times Alan Dobie, Executive Director, SBCC.
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
Terrorism and Security Matrix Inspired by the Haddon Matrix Kent Roach Anti-Terrorism and Privacy, One Year After Privacy and Security: Totally Committed.
© 2010 Artur Dubrawski 1 T-Cube Web Interface in RTBP: A Review of R&D Challenges Artur Dubrawski, Ph.D, M.Eng. Director, Auton Lab Senior Systems Scientist,
SOCA and Beyond- The Role of Science and Technology
Instrument for Stability Long-term component 2013 Draft Annual Action Programme Civil Society Dialogue Network Meeting Brussels, 6 December 2012 Adriaan.
MIcro-NanOSystems ECAD Laboratory GOSPEL : General Olfaction and Sensing Projects on a European Level Projects on a European Level A Network.
F UTURE T RENDS IN GIS. Compared to 10 Years Ago  acquiring data for a new GIS is no longer a major problem.  GPS has become a major sources of new.
Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.
A project implemented by the HTSPE consortium This project is funded by the European Union GLOBAL EUROPE INSTRUMENT FOR STABILITY
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Analytics, Decision Support, and Artificial Intelligence:
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Multidimensional Security in the Americas. INTRODUCTION 1.Where are we today? 2.Achievements (How and where?) 3.Our future 4.Realities.
DATA COLLECTION, INFORMATION SHARING & INTER-AGENCY COOPERATION: EXPERIENCES IN NEPAL ALEXANDRA ROBINSON UNIVERSITY OF EDINBURGH TINY HANDS INTERNATIONAL.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Analysis of GPS traces of police vehicles Leto Peel Department of Computer Science, UCL.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Local Police- local jurisdiction 3 Main responsibilities: 1.Law Enforcement- investigate crimes, make arrests, appear in court 2.Community Patrol- traffic,
Computer Science School of Mathematical and Computer Sciences Professor Andrew Ireland.
The impact of Technology on levels of crime 19 February 2003.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
CIVILIAN SECRETARIAT FOR POLICE1 DRAFT POLICY GUIDELINES CIVILIAN SECRETARIAT FOR POLICE BY MINISTER OF POLICE TO BE APPROVED BY PARLIAMENT FOR THE DIRECTORATE.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
ORGANİZED CRİME AND BORDER SECURİTY İskender Güray KESKİN Turkish National Police Role: End User Proposal activity: SEC-07-FCT
Regional Cyber Crime Unit
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Horizon 2020 Secure Societies Secure Societies Briefing Day 21 January /06/2016.
”Research intelligence led community policing” - a swedish development of ILP to manage and prevent the impact of social risks, organized crime and radicalization.
Surveillance and Security Systems Cyber Security Integration.
Models of Models: Digital Forensics and Domain-Specific Languages
Horizon 2020 Secure Societies European Info Day and Brokerage Event
ASEAN v Transnational Crime and Terrorism…..an Introduction
INSTITUTE FOR RISK AND DISASTER REDUCTION
Dark Web – the modern threat for the Internet Security
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
UQ Resources Forum University of Queensland’s Sustainable Minerals Institute Professor Neville Plint Director.
General information Organisation logo Targeted topics
THE POLICE AS AN ACTOR WITHIN INTERNATIONAL SECURITY POLICY
Integrating Deep Learning with Cyber Forensics
Role of US Security and Intelligence Agencies
Albeado - Enabling Smart Energy
Security intelligence: solving the puzzle for actionable insight
Conclusions of the International Conference on Migrant Smuggling:
Nathan Vargoshe What is Artificial Intelligence?
Presentation transcript:

Who A Multidisciplinary Approach to Threat Analysis Deciphering Terrorism A multidisciplinary approach to threat analysis Dina Subkhankulova, Kira Kowalska, David P. Esparza & Nilufer Tuptuk

Greedland – Fairbourne conflict

Kira Kowalska MEng Engineering Mathematics (University of Bristol) Kira Kowalska MEng Engineering Mathematics (University of Bristol) Previous Research: BAE Systems – machine learning, maritime anomaly detection Bristol Centre for Complexity Sciences – agent based modelling University of Bristol – spatial pattern analysis, geo- demographics Research Interest: Pattern analysis in networks and spatio-temporal data Agent-based modelling, modelling city complexity Geo-demographics, geographic profiling

Nilufer Tuptuk MSc Advanced Computing (Imperial College) BSc (Hons) Computer Science (QMUL) Nilufer Tuptuk MSc Advanced Computing (Imperial College) BSc (Hons) Computer Science (QMUL) Previous Research: CPD in Cybersecurity & Resilience, UCL Secure Routing in Mobile Ad Hoc Networks, Imperial College Trust, security and contract management in Virtual Organisations, Imperial College Research Interest: Threats against Industrial Control Systems Intelligent Anomaly Detection Systems

Previous Research: Imperial College – Analysing Quantum systems to determine conditions of emergence of classical behaviour Duvas Technologies– UV differential absorption spectroscopy. Project – designing sensor network to monitor air quality around Brighton primary schools Research Interest: Energy distribution network modelling (ABM, supply-demand) Potential impact of extending SuperGrid to Russia and Africa Potential application to other networks Dina Subkhankulova MSci Physics with Theoretical Physics (Imperial College) Dina Subkhankulova MSci Physics with Theoretical Physics (Imperial College)

David Perez Esparza MRes in Public Policy (EGAP-HKSG) MA in Gov - Conflict Resolution (University of Essex) David Perez Esparza MRes in Public Policy (EGAP-HKSG) MA in Gov - Conflict Resolution (University of Essex) Previous Research: Drug policy reform Organised crime and terrorism Police and judicial reform Research Interest: Pattern analysis and crime mapping Anti firearms trafficking policy Anti money laundering policy Situational crime prevention

Scanning Sensor network design for air quality monitoring (Dina) Sensor network behaviour analysis (Nilufer) Anomaly detection in air quality data (Kira)

Scanning Border control: Supply-demand modelling of imported & exported goods (Dina) Statistical analysis & control of imported chemicals (David) Digital forensics: Investigation of the video attack (Nilufer)

Findings from the Analysis Attackers behind the video (Nilufer) Damaged sensors along the mountains (Nilufer) Anomalous increase in ammonium nitrate levels in sensor data along the mountains (Kira) Spike in legal and illegal supply of ammonium nitrate (David & Dina)

Attack will most likely take place in the mountains Explosion will be massive (capable of separating the island) Terrorist group identified: SGL Leader: Chemistry Professor at Fairbourne University Conclusion

Short term: – Increase policing of the mountains – Explosive confiscation – Arrest terrorists involved Long term: – Dissolve the terrorist network – Improve anti-terrorism intelligence – Implement anti-trafficking policies Response

Who A Multidisciplinary Approach to Threat Analysis Deciphering Terrorism A multidisciplinary approach to threat analysis Dina Subkhankulova, Kira Kowalska, David P. Esparza & Nilufer Tuptuk