ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.

Slides:



Advertisements
Similar presentations
Department of Homeland Security Site Assistance Visit (SAV)
Advertisements

Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Sensors and location technologies – the front end of ISR
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Management of Emergency Response to Subway Accidents Stephan A. Parker Transportation Research Board Of The National Academies.
M.A. in Homeland Security and Emergency Preparedness (HSEP) L. Douglas Wilder School of Government and Public Affairs, Virginia Commonwealth University.
Exploring American History Unit X – Modern America Chapter 31– America Looks to the Future Section 2 – George W. Bush in Office.
Civilian Intelligence Organizations
The Role of ITS Technology for Homeland Security Kentucky’s Experience.
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Technologies for Homeland Security Shana Dale Chief of Staff and General Counsel Office of Science and Technology Policy October 29, 2004.
Risk and Economic Analysis of Terrorism Events Detlof von Winterfeldt Professor of Public Policy and Management Director, Center for Risk and Economic.
PPA 573 – Emergency Management and Homeland Security Lecture 9a. 9/11 Commission Report: Terrorism and Organizational Recommendations.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
PPA 573 – Emergency Management and Homeland Security Lecture 5a- What is Homeland Security?
Information on Agro/Bio terrorism Potential Occurrences and Emergency Management of Animal Diseases.
Security of Public Transport in the United States Chief Michael Taborn Metro Transit Police Department January 28, 2011 Metro Transit Police Department.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Game Theory and ILP in Transit Policing: From Analog to Digital Sullivan JP; Los Angeles County Sheriff's Department Los Angeles County.
CUSTOMER RELATIONS IN THE TRAVEL INDUSTRY 6.06 Recognize the importance of safety and security in the travel industry.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
BART 2007 Security Presentation Slide 1 BART Security Programs th Annual Technologies for Critical Incident Preparedness Conference and Exposition.
Foreign Policy and National Defense Chapter 17. NATIONAL SECURITY Section 2.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Proposed Task-Based VQEG Project Carolyn Ford, Mikołaj Leszczuk.
1 The U. S. Coast Guard Maritime Strategy for Homeland Security Captain Dan Deputy Chief of Cutter Forces, U.S. Coast Guard Headquarters Captain Dan Deputy.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
The Homeland Security Act of 2002 During the second session of the 107th Congress, the primary focus was on how best to tackle the development of a viable,
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
2008 UASI Grants Regional Preparedness via I/O Technology and Geospatial Data.
Chris Lee MIS 304 9/30/08. What is FAST: A system designed to detect “hostile thoughts” in people walking through border posts, airports, and public places.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Building Smarter Borders To Increase Security and Facilitate Trade International Visitors Program April 26, 2004.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Chapter 17: Foreign Policy and National Defense Section 2.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Disaster and Emergency Management Security Services.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Chapter 13: Police Strategies and Tactics Seminar 8.
ARMIES in HOMELAND SECURITY The European Experience Dr. John L. Clarke Professor
SEC 470 OUTLET The learning interface/sec470outletdotcom.
Disaster and Emergency Management
and Security Management: ISO 28000
Computers and Homeland Security
The U.S. Department of Homeland Security
FY 2014 SHSP and UASI Risk Formula
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Chapter 17: Foreign Policy and National Defense Section 2
Prevention, Intelligence
Role of US Security and Intelligence Agencies
Presentation transcript:

ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence

BACKGROUND Since the events of September 11 th, 2001, preventing terrorism has been a top issue in the US and the world. Homeland security has focused on three objectives –Prevent Future Terrorist Attacks –Reduce National Vulnerability –Minimize Damage and Recovery from Attacks

APPROACH The solutions to these problems are multi- faceted. Researchers from several fields have come together to develop technologies and programs. Research fields include: –Natural, Computational and Social Science –Engineering –Medicine

CRITICAL MISSION AREAS In a report written by the US Department of Homeland Security, the DHS identified six areas where AI can be used to accomplish objectives. –Intelligence and Warning –Border and Transportation Security –Domestic Counterterrorism –Critical Infrastructure and Assets –Defending Against Catastrophic Terrorism –Emergency Preparedness and Responses

INTELLIGENCE AND WARNING Terrorism depends on an element of surprise during an attack. –Terrorist activities are not random. Analyzing communication and activity through the use of AI could make it possible to detect and prevent attacks.

BORDER AND TRANSPORTATION SECURITY Foreign terrorists must enter a country by through land, air or sea. Personally Identifiable Information is collected at these locations, including: –Identification –Images –Fingerprints

DOMESTIC COUNTERTERRORISM Most terrorists that commit the large scale attacks are also involved in smaller local crime. Local law enforcement agencies can contribute to homeland security by building relationships and contributing data on the national level.

CRITICAL INFRASTRUCTURE AND KEY ASSETS Roads, bridges, water supplies and many other service systems are vulnerable targets for terrorist attacks. Virtual infrastructures are also vulnerable to intrusions and other threats.

DEFENDING AGAINST CATASTROPHIC TERRORISM More organized terrorist organizations are capable of using more advanced weaponry or commandeering larger vehicles.

EMERGENCY PREPAREDNESS AND RESPONSE Not all terrorist attacks can be identified and thwarted before they happen. In the event an attack does take place, AI can help to design and optimize response plans, ensuring that the consequences of the attack are minimized.

WHAT ARE WE GOING TO DO ABOUT IT?

FACIAL RECOGNITION In large groups of people, it is impossible for a human to identify every face in the crowd. Facial recognition software can be used in high security places (airports, subways, bus terminals, ect..) to help security identify potentially dangerous people from entering or boarding.

AUTONOMOUS VEHICLES Going after a terrorist group in their native environment can be dangerous. The enemy knows the terrain better, and may have a relationship with the local population. Autonomous vehicles can be used to identify targets and eliminate threats without putting our troops or civilians at risk.

DATA ANALYSIS Computers are capable of analyzing data much faster than a human. And given the proper set of parameters, computers can detect patterns in behavior and identify abnormalities.