Advanced Information Technology in Law Enforcement: Challenges and Barriers to Implementation Andreas M. Olligschlaeger, Ph.D. President, TruNorth Data.

Slides:



Advertisements
Similar presentations
City Innovation Lab : Manchester Computer Science 30 th June 2010.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
Machine Learning and Data Mining Course Summary. 2 Outline  Data Mining and Society  Discrimination, Privacy, and Security  Hype Curve  Future Directions.
DHS, National Cyber Security Division Overview
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
Data warehouse example
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
Information Visualization Solutions March 15-16, 2007 Information Visualization Solutions Team Overview & Analysis ~ Michael Hardy.
Chapter 3 Database Management
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
Chapter 4: Database Management. Databases Before the Use of Computers Data kept in books, ledgers, card files, folders, and file cabinets Long response.
Mobile Commerce and Ubiquitous Computing
1 Emerging Technology Chapter Four. 2 Chapter 4: Goal Present and discuss emerging technologies that impact the criminal justice field and the management.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Executive Cabinet.  Cabinet – group of advisors to the President that includes all of the heads of the 15 top-level executive departments  First Lady.
DASHBOARDS Dashboard provides the managers with exactly the information they need in the correct format at the correct time. BI systems are the foundation.
Innovations in Justice Information Sharing Strategies and Best Practices February 2007 Melissa R. Johnson, CCA Communications Director, International Association.
Microsoft Business Intelligence Gustavo Santade Business Intelligence Project Manager Improving Business Insight Building a cube using Analysis Services.
Retail and Consumer Roadmap to Retailing in the Digital Era Strictly Private and Confidential 17 June 2015.
Police Technology Chapter Eight
The Social Effect of Information System
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Management Information Systems
Smart Grid Technologies Damon Dougherty – Industry Manager.
NYMTC Strategic Data Management Kuo-Ann Chiao Technical Group Director.
1 Data Mining Books: 1.Data Mining, 1996 Pieter Adriaans and Dolf Zantinge Addison-Wesley 2.Discovering Data Mining, 1997 From Concept to Implementation.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
SBR Concept, Approach & Progress Meeting Austrian Delegation February 1, 2012.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
DECISION SUPPORT SYSTEM ARCHITECTURE: The data management component.
© 2006 Cisco All rights reserved.1 Transforming Emergency Preparedness and Response JC Hemmerechts Public Safety / Homeland Security European Market
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
The Nationwide SAR Initiative Briefing for the National Maritime Security Advisory Committee April 2, 2013.
Innovations in Justice Information Sharing Strategies and Best Practices November 30, 2006 Lisa M. Palmieri, CCA-Supervisory Intelligence Analyst President,
Protecting Emergency Responders Volume 3: Safety Management in Disaster and Terrorism Response Brian A. Jackson John C. Baker M. Susan Ridgely James T.
1 Controversial Issues  Data mining (or simple analysis) on people may come with a profile that would raise controversial issues of  Discrimination 
Law Enforcement Sensitive 1 Law Enforcement Roles in the Shadow War on Terrorism.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
Recent Cyber Attacks and Countermeasures September 2006.
New River Valley Emergency Communications Regional Authority
Ihr Logo Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Turban, Aronson, and Liang.
MARKETING RESEARCH ESSENTIALS WITH DATA ANALYSIS IN EXCEL AND SPAA McDaniel │ Gates │ Sivaramakrishnan │ Main Chapter Three: Secondary Data Collection.
Guest Lecture Introduction to Data Mining Dr. Bhavani Thuraisingham September 17, 2010.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Enhancing Institutional Capacities for Urban Management Vinod Tewari Director National Institute of Urban Affairs
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Biometrics and Other Emerging Technologies in Applications.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
An inside look into Retail Sales & Purchases. Refresh: (About US Census Bureau) Agency of the Federal Statistical System Accumulates and reports on American.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
© 2003 Prentice Hall, Inc.3-1 Chapter 3 Database Management Information Systems Today Leonard Jessup and Joseph Valacich.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Smart Grid Big Data: Automating Analysis of Distribution Systems Steve Pascoe Manager Business Development E&O - NISC.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Atlantic Coast Operations Business Intelligence Mobility Project.
Operator security, the right to know and the need to know. Essentially, the purposes of these concepts are to maintain data security and individual privacy.
The Power of Analytics Applying and Implementing Analytics – How to, When to, and Why May 23, 2016 Session 2 Presented by Kelly Jin Citywide Analytics.
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
Data and Applications Security Introduction to Data Mining
GLOBAL STREAMING ANALYTICS MARKET - SIZE, TREND, SHARE, OPPORTUNITY ANALYSIS & FORECAST,
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Analytics, BI & Data Integration
Presentation transcript:

Advanced Information Technology in Law Enforcement: Challenges and Barriers to Implementation Andreas M. Olligschlaeger, Ph.D. President, TruNorth Data Systems, Inc. (724)

Overview What are some of the key IT challenges to law enforcement? Current state of the art in technology Barriers to the implementation of new technologies

IT Challenges Information sharing Sharing information can help prevent crime and terrorism before it occurs Proactive law enforcement requires putting together many pieces of a puzzle; private industry owns a large part of the puzzle While there is no guarantee that information sharing will prevent all attacks or crimes, failure to do so will almost certainly guarantee future attacks and crime

IT Challenges Proactive analytical capabilities – Forecasting – Real-time monitoring of large data sets – Space/Time Pattern analysis – Data Mining Multi-Modal Query and Display – Query and visualize data in multiple ways Ubiquitous Access to Information – Handheld computers, laptops, etc.; more than simple query interfaces Secure Communications – Currently almost non-existent for broadband Data Standards – Crucial to information sharing

Homeland Security Merges 22 agencies Over 55 U.S. government databases containing information on terrorists Hundreds of other databases, varying by: – Type – Platform – Operating system – Database schema

Homeland Security “The Mother of all Information Integration Programs” - Bob Shepherd, Director of Information Integration, Office of Homeland Security

Example: Australia Centrelink project consolidates 19 million citizens’ access to government information – 14 agencies – 40 databases Integrated warehouse is growing at the rate of 2.5 Terabytes per week Source: US Chamber of Commerce, 2002

Extrapolation: United States Assuming the amount of information per citizen and the number of systems are the same, merging Homeland Security systems would result in a weekly growth rate of 36.6 Terabytes

How Much Information is 36.6TB? 7,320 DVDs 58,560 CDs 73,200 filing cabinets containing single spaced, double sided typed pages of text 36,600,000 books Assuming the Homeland Security Warehouse starts with zero information, it’s size would be 1,903.2 Terabytes after one year At 165,000 employees, each Homeland Security staff member would have to read books a week to digest it all! In 2003 the largest known database in the world contained 500 terabytes of information (Stanford Linear Accelerator Center)

Current State of the Art in LE Data Sharing/Integration: – Most recent efforts have concentrated in this area – Examples of current efforts: Organization for Structured Information Standards LegalXML Lawful Intercept Standard IACP Information Integration Planning Model RISSNet – No major integration efforts implemented yet at the national level

Current State of the Art in LE Data Processing/Analysis: – Least amount of effort spent in this area – Lots of analytical tools, but very few databases are integrated enough to allow multi-modal analysis Integrated databases tend to be specialized for one or two purposes (GIS, link analysis, etc.) – Some data mining

Current State of the Art in LE Analytical tools: – Crime Mapping – Link Analysis – Toll analysis – Geographic Profiling – Case Management – Crime Forecasting – Multimedia Databases – Facial Recognition – Biometrics Many advances have been made in integration and analysis, but they have not yet been applied in law enforcement

Current State of the Art in LE Many analytical/integration tools are based on old technology Some tools don’t work as advertised Implemented before the technology is mature Many tools inadequate for modern law enforcement needs Some modern tools, but outdated databases

Current State of the Art in LE Data Mining SQL Queries based on expert opinion Pattern Recognition and detection algorithms Known patterns – Facial recognition Unknown patterns – Space/Time patterns Fractal algorithms Associative and predictive artificial neural networks Goal: provide automatic detection of potential new cases

Barriers – Law enforcement has limited resources Not enough manpower/computing power to assess all available information – Private industry has greater technical expertise FBI Trilogy project – Law Enforcement is a niche market Projects cost much more to implement than in private industry – Technical infrastructure Outdated technology, networks

Barriers Poor marketing on part of the government – Examples: Total Information Awareness project (TIA) Matrix Game theoretic approaches Various TSA efforts – Projects started without public input or awareness until after the fact – Damage not limited to federal government projects Private industry and state/local agencies more reluctant to take part in controversial projects

Barriers – FOIA (Freedom of Information Act) – Concerns about liability with regards to false positives – Uncertainty about constantly changing federal laws – Concerns about technical life cycle in government Government lifecycles tend to be longer Over time technology gap will continue to widen

Barriers Privacy Concerns: – Lack of safeguards – Currently no guarantee to privacy – EU laws very different; allow for more effective law enforcement Public misconception of what privacy is – Anonymity not the same as privacy – Anonymity reduces responsibility

The End