Comprehensive Intelligence Analysis and Alert System (CIAAS)

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

Corporate Administration Management System CAMS-ITech: Vertical CRM for the Administration/Finance Area CAMS-iTech™ is the technological answer developed.
Gordion Business Consulting Ltd. Tel Boost your business performance and Finance department´s productivity PRIMAVISTA.
1.Data categorization 2.Information 3.Knowledge 4.Wisdom 5.Social understanding Which of the following requires a firm to expend resources to organize.
Managing Data Resources
Chapter 3 Database Management
1 SYS366 Week 1 - Lecture 2 How Businesses Work. 2 Today How Businesses Work What is a System Types of Systems The Role of the Systems Analyst The Programmer/Analyst.
MARKET IN TRAFFIC LIGHTS Designed for the next Users Private Investors Professional investors in Broker companies Run mode: Real Time combined with the.
DECISION SUPPORT SYSTEM DEVELOPMENT
Chapter 8 Management Support and Coordination Systems.
Building Knowledge-Driven DSS and Mining Data
Orion Overview. We build an internal model of the world, so we can predict future behaviour - we make the model out of active structure so it is interoperable.
Knowledge is Power Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Sharif University of Technology Session # 7.  Contents  Systems Analysis and Design  Planning the approach  Asking questions and collecting data 
Program Management Satisfy requirements of all individual projects with minimal resources Human resource is the most expensive Leadership Methods of documenting.
Module 1: Overview of Information System in Organizations Chapter 2: How Organizations use IS.
Chapter 11 Management Decision Making
Objectives Know why companies use distribution channels and understand the functions that these channels perform. Learn how channel members interact and.
Correlations, Alarms and Policies
Week 6 Lecture The Data Warehouse Samuel Conn, Asst. Professor
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
operational-level system. management-level system.
Fishing In an Ocean of Information
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
1.eCognition Overview. 1 eCognition eCognition is a knowledge utilisation platform based on Active Knowledge Network technology eCognition covers the.
Learning Goals Know why companies use distribution channels and understand the functions that these channels perform. Learn how channel members interact.
Active Structure A + B = C. Logic and Numbers IF A + B = C THEN D + E = F.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
INTRODUCTION TO DATA MINING MIS2502 Data Analytics.
Data Warehouse Overview September 28, 2012 presented by Terry Bilskie.
Goals  Correlation/dependency: The storing of correlations and dependencies  Integration: Methodology for integrating correlated risk distributions into.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Right In Time Presented By: Maria Baron Written By: Rajesh Gadodia
Chapter 3 DECISION SUPPORT SYSTEMS CONCEPTS, METHODOLOGIES, AND TECHNOLOGIES: AN OVERVIEW Study sub-sections: , 3.12(p )
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Introduction – Addressing Business Challenges Microsoft® Business Intelligence Solutions.
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 9 Enabling the Organization – Decision Making.
Systems Analysis and Design in a Changing World, Fourth Edition
Systems Analysis and Design in a Changing World, 6th Edition
Requirements Engineering Southern Methodist University CSE 7316 – Chapter 3.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Performance evaluation on grid Zsolt Németh MTA SZTAKI Computer and Automation Research Institute.
Enterprise Integration Patterns CS3300 Fall 2015.
1 Chapter 5 Modeling System Requirements Finding the Use Cases Page
+ Big Data IST210 Class Lecture. + Big Data Summary by EMC Corporation ( More videos that.
Software Prototyping Rapid software development to validate requirements.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
Lesson 9: Types of information system. Introduction  An MIS is a decision support system in which the form of input query and response is predetermined.
© 2003 Prentice Hall, Inc.3-1 Chapter 3 Database Management Information Systems Today Leonard Jessup and Joseph Valacich.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Academic Year 2014 Spring Academic Year 2014 Spring.
Types of Information Systems Basic Computer Concepts Types of Information Systems  Knowledge-based system  uses knowledge-based techniques that supports.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Managing Data Resources File Organization and databases for business information systems.
Design for usability E6: Human Factors Design IB Technology.
01-Business intelligence
Module 1: Overview of Information System in Organizations
Application Software Chapter 6.
MIS2502: Data Analytics Advanced Analytics - Introduction
Chapter 13 The Data Warehouse
DSS: Decision Support Systems and AI: Artificial Intelligence
Data Warehouse.
4.1.
World-Views of Simulation
Presentation transcript:

Comprehensive Intelligence Analysis and Alert System (CIAAS)

Intelligence analysis is based on existing knowledge and gathered experience Characteristics Continuously expanded and updated by a massive flow of diverse new information Data, details, messages Information plus "meaning" – relations between pieces of information Information Knowledge

Sources of Information Bank Transactions Intelligence data bases Public domain information Government data bases Internet Comint Sigint Humint

The Problems Too many holes in the cheese - needs powerful inferencing Event information comes in randomly Uncertainty imposes multiple scenarios Speed of analysis is critical

Human Analysts Inflation of information Combining many disciplines Limited memory and attention span Long duration of analysis Experience goes with the person How to support with a computerized system ? Limitations… They carry most of the burden

Human Analysts Limitations… They carry most of the burden

Effectively integrate knowledge and information from diverse sources Continuously accumulate knowledge Provide automatic alerts Provide answers to the analysts' queries Construct different threat scenarios Requirements

The Approach Take some of the burden off analysts… By emulating the analyst in an automated process – Use existing knowledge to analyze incoming information and update/augment the knowledge

Challenges Cannot know in advance which information will arrive, in what order, and what will be its meaning The entire existing knowledge should be brought to bear in the analysis The analysis may generate several different scenarios Requires coherent integration of diversified computing disciplines, typically implemented using different technologies

eCognition™ - Active Knowledge Network Technology Note: Actual GUI New software paradigm The system handles complex tasks, by distributed cooperation among simple pieces of structure

The information is fed into the system React Analyze Support decision Active Knowledge System eCognition™ - Emulating the Cognitive Model

Qualitative, quantitative Timing & frequency analysis Databases Experiential Free text Unified Knowledge System Extract Knowledge in Diversified Forms Tupai's Data Mining

Intelligent Decision Support Intelligent Knowledge Discovery Forensic accounting Contact analysis Simulations, Forecasting, analysis Multi-purpose virtual reasoning machine Use It For Diversified Purposes

Infrastructure Finance Operations Integrated, holistic Integrate Knowledge Domains

Diversified Disciplines Inherent simulation capabilities Modeling Data miner Analyzer Simulator Network inferencing Aggregates new pieces of information to existing knowledge Automatically draws inferences Integrates information from diverse sources and formats Performs Analysis (including temporal)

 Queries  Charts  Reports  Lists  Linkages  Alerts Diversified Interfaces

Advantages Unmatched - Complexity handling Responsiveness Usability Extensibility Flexibility/Maintainability

Solution – The Concept

Profiles Organizations Individuals Humint Events Database Bank Transactions Other Sources Government Database Sigint Visint Feed Humint Ask Check Simulate Linkages Events generator Events: Meeting (What, Who, Where, When, Frequency) Travel (Who, How, Where, When, Length) Phone call (Who, When, Length, Content, Frequency) Delivery (Who, When, How, Size, What, Frequent, Payment) Other (What, Who, When, Where) Crime (What, When, Where, Who, How)

Example – Crime Analysis Automation

The Scene Criminals – skills (bomb-maker, murderer, driver, etc.), membership and role in gangs (planner, driver, boss, muscle, etc.), home base, jail time Gangs – members, roles Potential targets – people/institutions/businesses, their locations Knowledge and experience – how all these interact – both explicit (people) and experiential (past events) New pieces of Information are arriving …

New Information - Palermo, 4/4/03 : "Corradi arrested Don Marcello" (Public Information) Understand message Corradi is chief detective of Palermo police Don Marcello is the boss of the Marcello gang The Marcello gang is vindictive Expect reprisal against Palermo police Text understanding / NLP External data access Data Mining / prior knowledge Reasoning, alerts

New Information Understand message Bolivar is a member of the Marcello gang Bolivar is a Planner and a Negotiator The Marcello territory is Palermo Negotiators go outside territory to find skills gang members don't possess Bomb-making is a skill the Marcello gang members don't possess, and Particino based criminals do Perugia is a Particino based Bomb Maker Criminals served time together are likely to work together Perugia and Bolivar served time together The Marcello gang reprisal to Don Marcello's arrest could be a bomb attack Bolivar could be planning a bomb attack on Palermo Police -Palermo, 4/4/03 : "Corradi arrested Don Marcello" (Public Information) -Palermo, 5/5/03 : "Bolivar seen in Particino" (Police Intelligence) Text understanding / NLP External data access Prior knowledge / data mining External data access Prior knowledge / data mining Reasoning, alerts External data access

New Information -Palermo, 4/4/03 : "Corradi arrested Don Marcello" (Public Information) -Palermo, 5/5/03 : "Bolivar seen in Particino" (Police Intelligence) -Roma, 5/5/03 : "Fabrizzi is sentencing Don Marcello on 29th in Palermo courthouse" (Public Information) -Palermo, 7/5/03 : "Something will happen in Palermo this month" (Criminal Intelligence) … … Expect reprisal against Palermo police – possibly a bomb attack Expect reprisal against Judge Fabrizzi - possibly Assault, Murder or a Bomb attack Temporal Analysis, TSA (all analysis is time sensitive)

New Information -Palermo, 4/4/03 : "Corradi arrested Don Marcello" (Public Information) -Palermo, 5/5/03 : "Bolivar seen in Particino" (Police Intelligence) -Roma, 5/5/03 : "Fabrizzi is sentencing Don Marcello on 29th in Palermo courthouse" (Public Information) -Palermo, 7/5/03 : "Something will happen in Palermo this month" (Police Intelligence) What if we detain Perugia? Threat of bomb attack reduced, but not gone – there are other bomb makers Marcello negotiators know, etc… What if we detain Perugia and Bolivar? Reasoning, Simulation

The Demo System contains prior knowledge Free-text messages are read in to create events Events are connected by logic, triggering reasoning, alerts, generation of additional events, etc. Combines Free Text Understanding Reasoning Data Mining Linkage to external resources

The problem is dynamic in many dimensions - protagonists, communication channels, locations, types of threat.... So is the active structure used to continuously track and analyze it Searching In an Ocean of Information

Some Details Data Mining Information Extraction Risk Analysis

Data Mining Phone Records The Data Miner, together with probable gang structure, is used on the records to generate call patterns Administrator: The miner can be run manually or automatically, and several databases can be joined together during the mining. Administrator: The miner can be run manually or automatically, and several databases can be joined together during the mining.

Using Probabilities We can use probability distributions and correlations on contacts - who instigated it, probable use from how long the call lasted Administrator: Deriving call patterns over time allows us to detect changes in activity - trouble is, communication activity might increase or decrease when something is up and we need to have figured that out from previous incidents. Administrator: Deriving call patterns over time allows us to detect changes in activity - trouble is, communication activity might increase or decrease when something is up and we need to have figured that out from previous incidents.

Time Series Analysis Transaction records are turned into a time- based view of the business. Administrator: Businesses aren ’ t static, so it can be quite hard to see what is happening just from statements or spreadsheets, particularly when there may be several seasonal cycles -monthly, yearly -at work Administrator: Businesses aren ’ t static, so it can be quite hard to see what is happening just from statements or spreadsheets, particularly when there may be several seasonal cycles -monthly, yearly -at work

Reversing the Use Time Series Analysis is usually used to find the normal operation of a cyclic business by eliminating the extraordinary events. Here we are using it to find the extraordinary events that may be hidden away in normal business operations.

How It Works A smoothly operating business is extracted from the time-based view, leaving the extraordinary events Administrator: Some idea of the sort of business is required - construction, tourism, retail Administrator: Some idea of the sort of business is required - construction, tourism, retail

Risk Analysis based on Coincidence of Real and Potential Events “Don Marcello arrested” “Bolivar seen in Teracino”

Risk Analysis Model Real events spawn hypothetical events which spawn... The logical and time interaction of these event chains determines the risk of a catastrophic event

Events Colliding Something (bad) in Palermo this month Fabrizzi will sentence Don Marcello on 29th Bolivar sighted in Teracino Use database of possible Teracino contacts and skills to produce Bomb may be under construction (hypothetical event connected to Marcello gang- alert effective for 3 months) The red and blue indicate criminal and police events. Criminal humint says “ something will happen ”, so we assume something bad. The importance of handling time intervals such as “ this month ” or “ next week ” should be emphasised. The system handles alternatives for people, places, times, actions - so it can easily see where events may collide. The red and blue indicate criminal and police events. Criminal humint says “ something will happen ”, so we assume something bad. The importance of handling time intervals such as “ this month ” or “ next week ” should be emphasised. The system handles alternatives for people, places, times, actions - so it can easily see where events may collide. Possible reprisals Don Marcello incarcerated Don Marcello arrested