ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.

Slides:



Advertisements
Similar presentations
The U.S. Merchant Marine and America’s Maritime Security
Advertisements

SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
2.3.3 MAD SAMBA (Multicamera and distributed Surveillance and multisensor-based surveillance) Contact: Alessandro ZANASI zanasi-alessandro.eu.
Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
DHS, National Cyber Security Division Overview
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
William A. Wallace  Rensselaer Polytechnic Institute CHC-R 5 th Annual Meeting January 31-February 1, Infrastructure Modeling: Decision Technologies.
Technologies for Homeland Security Shana Dale Chief of Staff and General Counsel Office of Science and Technology Policy October 29, 2004.
Closing the CIP Technology Gap in the Banking and Finance Sector Treasury Department Office of Critical Infrastructure Protection and Compliance Policy.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
FSIS’ Innovative Food Security Initiatives Carol Maczka, Ph.D. Assistant Administrator USDA Food Safety and Inspection Service Office of Food Security.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
SEPRI University of Massachusetts Amherst Security, Emergency Preparedness, and Response Institute SEPRI “Integrating Solutions Providing Real Time Connectivity”
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Foreign Policy and National Defense Chapter 17. NATIONAL SECURITY Section 2.
Information Sharing Challenges, Trends and Opportunities
Olga E. SegouDr. Stelios C.A. Thomopoulos Integrated Systems.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
The National Center for School- Based Law Enforcement and Campus Safety Raising the Bar.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Public Safety & Electric Utility Coordination Round Table Discussion Scott Mount.
TM Emerging Health Threats and Health Information Systems: Getting Public Health and Clinical Medicine to Real Time Response John W. Loonsk, M.D. Associate.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
® The importance of international standards for data exchange Denise McKenzie Executive Director, Communications & Outreach Open Geospatial Consortium.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
TM Coordinating the Functions, Uses and Activities of Systems and Organizations Involved in Public Health Surveillance John W. Loonsk, M.D. Director Information.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
1 Literature Review Digital government and Bio- defense: what they are, major issues, major IT issues, and who work on those issues Dai Cui.
___________________________________________________ ___________________________________________________ ___________________________________________________.
9-11 Commission Report: Implications for Transportation Security in the NY/NJ Region Eva Lerner-Lam and David Gaier Transportation Security Committee Transportation.
Chapter 17: Foreign Policy and National Defense Section 2.
Disaster and Emergency Management Security Services.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Homeland Security Grants. Presidential Decision Directive 1998 – PDD 62 –Fight against Terrorism a top national priority Counter Terrorism tools Improve.
Chapter 13: Police Strategies and Tactics Seminar 8.
6/24/2016Financial Services Sector Coordinating Council For Critical Infrastructure Protection R&D Committee 1 Financial Cybersecurity in Complex, Heterogeneous.
ARMIES in HOMELAND SECURITY The European Experience Dr. John L. Clarke Professor
1 Homeland Security/Defense Education Consortium Recommendations Current and Emerging Threats Context and Organizations Policies, Strategies,
Homeland Security Grants. Presidential Decision Directive 1998 – PDD 62 –Fight against Terrorism a top national priority Counter Terrorism tools Improve.
Surveillance and Security Systems Cyber Security Integration.
Disaster and Emergency Management
and Security Management: ISO 28000
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Terrorism Training for Law Enforcement
Computers and Homeland Security
Purpose Statement Kirsten Gantenbein 10/26/05
Trends and developments in eGOVwork – a resesearch perspective
HUMAN AND SYSTEMS ENGINEERING:
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Sachiko A. Kuwabara, PhD, MA
Role of US Security and Intelligence Agencies
Presentation transcript:

ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY

THE AUTHORS Phd, Information Systems from New York University Management information systems, University of Arizona Research: intelligence analysis Web mining Hsinchun chen

THE AUTHORS FEI-YUE WANG PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS RESEARCH: INTELLIGENCE CONTROL COMPUTATIONAL INTELLIGENCE

MAIN SECURITY OBJECTIVES FEDERAL AUTHORITIES OBJECTIVES: –P–PREVENT FUTURE TERRORIST ATTACKS –R–REDUCE NATIONAL VULNERABILITY –M–MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS

IT role and support IT supports intelligence and knowledge discovery IT can help in collecting, processing, and developing applications for terrorism Federal authorities can use results for timely decisions, select tactics and allocate resources Detect, prevent and respond to future attacks

Critical mission areas US Department of homeland security (DHS) identifies 6 critical mission areas –Intelligence and warningIntelligence and warning –Border and transportation securityBorder and transportation security –Domestic counterterrorismDomestic counterterrorism –Protecting infrastructure and assetsProtecting infrastructure and assets –Defending against catastrophesDefending against catastrophes –Emergency preparedness and responsesEmergency preparedness and responses

Intelligence and warning IT can detect the identities IT can monitor and provide alerts through intelligence and warning systems to prevent crimes {DHS}

Border and transportation security Creat smart borders that improves counterterrorism and crime fighting capabilites Smart borders depends on information sharing and integration, collaboration and communication {DHS}

Domestic counterterrorism IT can find interactive patterns among criminals IT can help in analyzing terrorism IT can help in public safety {DHS}

Protecting infrastructure and assets Sensors and detectors are not enough Advanced IT devices that model the normal use and detect the abnormal use of the infrastructure {DHS}

Defending against catastrophes IT collect, access, analyze and report data relevant to catastrophes IT can be helpful in prevent, detect and manage the future attacks {DHS}

Emergency preparedness and responses Train professionals Facilitate social and psychological support for victims {DHS}

Security challenges Distributed criminal enterprises Diverse sources and formats Crime and intelligence analysis techniques

ISI Emergence of a discipline –Intelligence and security informatics Objectives: Develop advanced information technology, system and data bases for national security throught an integrated technological, organizational and policy based approach

ISI vs. biomedical informatics Data: overload problem Technolongy: new approaches Scientific contribution: add insight and knowledge Research frame work based on data mining

Design and implementation of ISI Emergency: PDA, handheld for police and ambulance through wirless network Problem solving: Knowledge based data integration of disease, health problems and some other problems

Design and implementation of ISI Detection: Information about hand and head movements and behaviors Classification: Developing and organizing website data about extremists and analyze its content

Design and implementation of ISI Data mining: Based on the (rule + exception) methodology Infrastructure: multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis Anonymity: Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.