10/8/2015 Sensing and Responding Knowledge Discovery and Alerting in the Information Age Knowledge Discovery and Alerting in the Information Age.

Slides:



Advertisements
Similar presentations
Copyright © 2005 – Clickshare Service Corp. All rights reserved. Payment Aggregation & Affinity Management Clickshare for the Media Industry For more information.
Advertisements

© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Database Management3-1 L3 Database Management Santa R. Susarapu Ph.D. Student Virginia Commonwealth University.
Test Automation Success: Choosing the Right People & Process
The Engine Driving Business Management in Project Centric Environments MAGSOFT INTERNATIONAL LLC.
 Corporate Profile  BOSS Overview  Current Solutions  BOSS Modules  COLORS - New BOSS Web Module  BOSS Benefits  Supplier XML Services and BOSS.
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
1.Data categorization 2.Information 3.Knowledge 4.Wisdom 5.Social understanding Which of the following requires a firm to expend resources to organize.
Systems Engineering in a System of Systems Context
Oklahoma Supercomputing Symposium 2008 Oct 7 th 2008 Mining for Science and Engineering Presented by: Kenji Yoshigoe.
Amit, Keyur, Sabhay and Saleh Model Driven Architecture in the Enterprise.
Adopt & Adapt Tips on Enterprise Data Management Annette Pence September 10, 2009 MITRE.
Today’s Goals Concepts  I want you to understand the difference between  Data  Information  Knowledge  Intelligence.
AceMedia Personal content management in a mobile environment Jonathan Teh Motorola Labs.
Copyright © 2007 Advantica Inc. (USA Only) and Advantica Ltd. (Outside USA). All rights reserved by the respective owner. Benefits of an Integrated Compliance.
Data Warehouse success depends on metadata
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Major Communications Cables - Points of Convergence - ATT Verizon British Telecom T-Mobile New York New York New York New York Chicago Chicago Chicago.
Key Management in Cryptography
Ravi Sankar Technology Evangelist | Microsoft Corporation
1 Data Strategy Overview Keith Wilson Session 15.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
How Will Continuous Auditing and XBRL-GL Work Together to Provide Improved Business Value? Nigel J. R. Matthews, BASc, CA ACL Services Ltd.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
® IBM Software Group © IBM Corporation IBM Information Server Understand - Information Analyzer.
Requirements for Epidemic Information Management Farrukh Najmi XML Standards Architect Sun Microsystems
Hosted on the Powerful Microsoft Azure Platform, Advent Countdown Lets Companies Run Reliable and Scalable Holiday Marketing Campaigns MICROSOFT AZURE.
Database Design - Lecture 1
MAJOR BUSINESS INITIATIVES Gaining Competitive Advantage with IT
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
The Engine Driving Purchasing Management in Complex Environments MAGSOFT INTERNATIONAL LLC.
Business Analysis and Essential Competencies
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
@ ?!.
Using the Open Metadata Registry (openMDR) to create Data Sharing Interfaces October 14 th, 2010 David Ervin & Rakesh Dhaval, Center for IT Innovations.
Ohio Digital Government Summit Disease Surveillance (Homeland Security session) October 5, 2004 Rana Sen Deloitte Consulting LLP.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
© 2008 IBM Corporation ® IBM Cognos Business Viewpoint Miguel Garcia - Solutions Architect.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
83 years of excellence The Association of Electrical and Medical Imaging Equipment Manufacturers 1 Development of DICOS: Data Format and Transmission Standard.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Enterprise Solutions Chapter 10 – Enterprise Content Management.
OpenField Consolidates Stadium Data, Provides CRM and Analysis Functions for an Intelligent, End-to-End Solution COMPANY PROFILE : OPENFIELD Founded by.
Datalayer Notebook Allows Data Scientists to Play with Big Data, Build Innovative Models, and Share Results Easily on Microsoft Azure MICROSOFT AZURE ISV.
Revolutionized, Automated Cash and Gratuity Management for the Hospitality Industry, Thanks to Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: Evention.
The Promise of Analysis of Open Source Information.
Data Management Managing Big Data Briefing 10/2012 Will Graves US-VISIT Chief Biometric engineer Chair of Biometric Domain.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Information Integration 15 th Meeting Course Name: Business Intelligence Year: 2009.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Data Warehousing Data Mining Privacy. Reading FarkasCSCE Spring
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Hybrid Management and Security
Public Key Infrastructure (PKI)
Major Communications Cables - Points of Convergence -
FACTON Provides Businesses with a Cloud Solution That Elevates Enterprise Product Cost Management to a New Level Using the Power of Microsoft Azure MICROSOFT.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chapter 1 Database Systems
Data Warehousing and Data Mining
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
Database Design Hacettepe University
Capture and Publish Knowledge
Presentation transcript:

10/8/2015 Sensing and Responding Knowledge Discovery and Alerting in the Information Age Knowledge Discovery and Alerting in the Information Age

Slide 2 10/8/2015 Experience More than 35 years of experience in various aspects of information management and time-sensitive intelligence production activities, including:  Access and collection  Target analysis  Data processing  Content exploitation  Encryption  Software design and dev.  Business process redesign  Automation of Analysis  Spiral development  Operational prototyping  Collaboration (technical)  Systems analysis

Slide 3 10/8/2015 Entity Mapping Analysis Business Process ( EMABP) - An Enterprise Business Solution - Producing Actionable Intelligence Within Massive Information Environments

Slide 4 10/8/2015 The World-Wide Web: Challenge….and Opportunity

Slide 5 10/8/2015 Intelligence from Data: Today’s Barriers  Rapid knowledge discovery is virtually non-existent  Lack of sharing and collaborative processes  Massive information flows choke IT infrastructures  Analysts waste time “prepping” information systems  Inability to prioritize information  Intelligence production is stove-piped and not seamless  Data is typically corrupt or not ‘normalized’

Slide 6 10/8/2015 Knowledge – Building in Massive Information Environments From noise (data)… Issue: Estimate 20 terabytes of unique multi-media information generated every minute world-wide Challenge: Finding the ‘X’ Kb that answers the crucial question …To Actionable Intelligence: To Significance… Terrorist group Alpha is shipping explosives from Yemen to New Orleans

Slide 7 Lessons Learned Long Ago… It must be remembered that there is nothing more difficult to plan, more uncertain of success, nor more dangerous to manage than the creation of a new order of things. For the initiator has the enmity of all who would profit by the preservation of the old institutions, and merely lukewarm defenders in those who would gain by the new order. —Machiavelli, The Prince (1513) 10/8/2015

Slide 8 10/8/2015 Knowledge Superiority Intentions and Capabilities Status and Disposition Alerting & Tasking HIGH - INTEGRITY DATA (streaming or stored) EVENT RECOGNITION ACTIVITY RECOGNITION INFERENCING

Slide 9 10/8/2015 Data Attributes - Examples - Address (business, home, organization)Credit card number Travel reservation numberPin number (bank, entry) Personal name Place name Domain tag(s) Bank Account number Telephone number(s) FAX number(s) Address(s) Cover term(s) DateTime

Slide 10 10/8/2015 Event Recognition  Verify data (complete and accurate)  Validate data (confirm relationship/entity)  Identify entities (correlate to knowledge or by domain relationship such as time, proximity, etc.)

Slide 11 10/8/2015 Activity Recognition - Mapping Event Relationships - Entity event C Entity event B Entity event A Entity event D

Slide 12 10/8/2015 Inferencing - Establishing Meaning -  Develop target profiles  Map profiles to historical outcomes  Map profiles to postulated conditions  Formulate intentions and capabilities  Test for validity  Update profile(s) as necessary

Slide 13 10/8/2015 Target Development and Discovery Zone of “Suspects” - 2º of separation from “Knowns” Known Unknown Suspect

Slide 14 10/8/2015 ?<|{ Hollywood, FL Mohamed Atta Hollywood, FL Majed Moqed Daytona Beach, FL Marwan Alshehhi Hollywood, FL Hani Hanjour Hollywood, FL Discovering and Protecting - Guarding Privacy While Finding the Threat - WANTED U.S. WANTED UNKNOWN U.S. PROTECTED Nawaf Alhazmi San Diego, CA Khalid Almihdhar San Diego, CA Mustafa Alhawsawi Dubai, UAE Ramzi Binalshibh Hamburg, Germany E Mullah Omar Kandahar, Afghanistan +^#* Hollywood, FL Hollywood, FL ){;?] %)/’| Daytona Beach, FL Ramzi Binalshibh Hamburg, Germany Mustafa Alhawsawi Dubai, UAE

Slide 15 10/8/2015

Slide 16 10/8/2015 1)ORG 1 Core Line of Business ‘A’ Core Line of Business ‘B’ 2)ORG 2 Core Line of Business ‘A’ Core Line of Business ‘B’ 3) ORG 3 Core Line of Business ‘A’ Core Line of Business ‘B’ 4) ORG 4 Core Line of Business ‘A’ Core Line of Business ‘B’ Organization-specific Multi-Source Entity Maps (MSEMs) Multi-Source Entity Map VISION: A Coherent National Security Business Process Based on Merged Multi-Source Data

Slide 17 10/8/2015 Mapping Entities Across Multiple Sources Metadata repositories for sources A ~ N… Entity ID AEntity ID BEntity ID CEntity ID D Other Metadata Domains

Slide 18 10/8/2015 IMPACT Handles “All the data, all the time” Builds relationships on world-wide scale Provides analytic focus to target development Provides manageable, relevant content Enables detection of network changes Automatically compiles target activities Captures the information needed to build behavior profiles for inferencing Forms basis for analysis across a number of variables, including proximity, frequency of comms, time, etc.

Slide 19 10/8/2015 IMPACT (cont.) Estimate orders of magnitude increase in analyst productivity with manual 1 and 2 degree displays of associations – even greater increase with automation of same Speed of discovery in massive information environments reduced from 6 months to 2 seconds Keeps analysis focused on relevant information Near real-time tasking and networking results Provides basis for true data integration, knowledge- creation, plus knowledge capture, maintenance, and sharing

Slide 20 10/8/2015

Slide 21 10/8/2015 BACK-UP SLIDES

Slide 22 10/8/2015 How EMABP is Different EMABP ensures data integrity through automation of data correction using EM-developed algorithms that address both machine and human-induced errors. EMABP employs techniques that automatically validate data at every step of the business process. EMABP automatically maps entities, their attributes, and relationships in order to correctly identify them. EMABP automatically maps all entity relationships (the global graph) which define all possible communities to N degrees of separation. EMABP automatically captures Communities of Interest (COIs) and, at the same time, develops new Entities of Interest (EOIs) across multiple media and multiple data sources. EMABP automatically nominates EOI and COI, forming the basis for rapid identification of relevant content, independent of content knowledge or language; EMABP makes content analysis truly manageable for the first time.

Slide 23 10/8/2015 EMABP automatically builds target (EOI and COI) profiles. EMABP provides the basis for behavior-based rules development for automated alerting and for the production of actionable intelligence, independent of content analysis. EMABP embraces a knowledge management process that captures knowledge, stores, and maintains it, and leverages it throughout EMABP and across the greater enterprise. EMABP automatically audits every EMABP process as a basis for systems management and as a basis for calculating and measuring performance, as well as ROIs. The EMABP-produced graph is continuously updated in the background, thereby enabling automated changes in emphasis. EMABP is a core enterprise business process, not a spot technology solution; unique technology comes with it, and it enables complimentary technologies through effective volume, variety, and velocity management processes. How EMABP is Different (cont.)

Slide 24 10/8/2015 New Domain Access and Relationship Mapping Validate Data High Rate Scoring Event Recognition Distributed Storage Privacy Protection Analyst Auto knowledge-based selection Manual queries Auto actions & alerts Build Activity Graph Cross-Domain Graph Mapping Other Domain Graphs Emphasis Indexed Content

Slide 25 Opportunities in Open Sources “The Internet is now the default C4I architecture for virtually the entire world. The principle exceptions are most militaries and intelligence organizations. The Internet facilitates commerce, provides entertainment and supports ever increasing amounts of human interaction. To exclude the information flow carried by the Internet is to exclude the greatest emerging data source available. While the Internet is a source of much knowledge, all information gleaned from it must be assessed for its source, bias and reliability.” -- W. F. KERNAN, General, U.S. Army Supreme Allied Commander, Atlantic NATO Open Source Intelligence Handbook, November Department of Defense Architecture Framework (DoDAF, formerly C4ISR)

Slide 26 Real-World Open-Source Example COMPANY P.O. BOX ADDRESS Mayrow General Trading & A&B&C Micatic General Trading A&B Majidco Micro Electronics A&B Atlinx Electronics A&B Narinco A&B Micro Middle East Electronics 42340A&B Date: June, 2006 Source: Department of Commerce, Bureau of Industry and Security (BIS) po.gov/2006/ htm

Slide 27 Open-Source Example (Cont.) Associated Personal Names F.N. Yaghmaei H. Ghasir Business Locations Address “A” = Bin Yas Center -- Al Maktum Road, Dubai, UAE Address “B” = Shops 3-4, Sharafia Ahmed Ali Building, al-Nakheel, Deira, Dubai, UAE Address “C” = Deira, Dubai, UAE

Slide 28 Open-Source Example (Cont.) Company Name PO Box Address Phone/Fax Nr Mayrow General Trading ABC Micatic General Trading AB Majidco Micro Electronics AB&D Atlinx Electronics AB Narinco AB Micro Middle East Electronics AB (MME Middle East, LLC ) )

Slide 29 Open-Source Example (Cont.) Associated Personal Names ________________________________________________________ F.N. Yaghmaei H. Ghasir Locations __________________________ Address “A” = Bani Yas Center -- Al Maktum Road, Dubai, UAE Address “B” = Shops 3-4, Sharafia Ahmed Ali Building, al-Nakheel, Deira, Dubai, UAE Address “C” = Deira, Dubayy, UAE Address “D” = Mohamad Abdulla Alqaz Bldg, Bani Yas Square, Al Rigga, Dubai, UAE