Download presentation
Presentation is loading. Please wait.
Published byBerenice Palmer Modified over 9 years ago
1
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY
2
THE AUTHORS Phd, Information Systems from New York University Management information systems, University of Arizona Research: intelligence analysis Web mining Hsinchun chen
3
THE AUTHORS FEI-YUE WANG PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS RESEARCH: INTELLIGENCE CONTROL COMPUTATIONAL INTELLIGENCE
4
MAIN SECURITY OBJECTIVES FEDERAL AUTHORITIES OBJECTIVES: –P–PREVENT FUTURE TERRORIST ATTACKS –R–REDUCE NATIONAL VULNERABILITY –M–MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS
5
IT role and support IT supports intelligence and knowledge discovery IT can help in collecting, processing, and developing applications for terrorism Federal authorities can use results for timely decisions, select tactics and allocate resources Detect, prevent and respond to future attacks
6
Critical mission areas US Department of homeland security (DHS) identifies 6 critical mission areas –Intelligence and warningIntelligence and warning –Border and transportation securityBorder and transportation security –Domestic counterterrorismDomestic counterterrorism –Protecting infrastructure and assetsProtecting infrastructure and assets –Defending against catastrophesDefending against catastrophes –Emergency preparedness and responsesEmergency preparedness and responses
7
Intelligence and warning IT can detect the identities IT can monitor and provide alerts through intelligence and warning systems to prevent crimes {DHS}
8
Border and transportation security Creat smart borders that improves counterterrorism and crime fighting capabilites Smart borders depends on information sharing and integration, collaboration and communication {DHS}
9
Domestic counterterrorism IT can find interactive patterns among criminals IT can help in analyzing terrorism IT can help in public safety {DHS}
10
Protecting infrastructure and assets Sensors and detectors are not enough Advanced IT devices that model the normal use and detect the abnormal use of the infrastructure {DHS}
11
Defending against catastrophes IT collect, access, analyze and report data relevant to catastrophes IT can be helpful in prevent, detect and manage the future attacks {DHS}
12
Emergency preparedness and responses Train professionals Facilitate social and psychological support for victims {DHS}
13
Security challenges Distributed criminal enterprises Diverse sources and formats Crime and intelligence analysis techniques
14
ISI Emergence of a discipline –Intelligence and security informatics Objectives: Develop advanced information technology, system and data bases for national security throught an integrated technological, organizational and policy based approach
15
ISI vs. biomedical informatics Data: overload problem Technolongy: new approaches Scientific contribution: add insight and knowledge Research frame work based on data mining
16
Design and implementation of ISI Emergency: PDA, handheld for police and ambulance through wirless network Problem solving: Knowledge based data integration of disease, health problems and some other problems
17
Design and implementation of ISI Detection: Information about hand and head movements and behaviors Classification: Developing and organizing website data about extremists and analyze its content
18
Design and implementation of ISI Data mining: Based on the (rule + exception) methodology Infrastructure: multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis Anonymity: Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.