ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY
Download
Report
Transcript ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY
ARTIFICIAL INTELLIGENCE
FOR
HOME LAND SECURITY
THE AUTHORS
Phd, Information Systems from New York
University
Management information systems,
University of Arizona
Research:
•intelligence analysis
•Web mining
Hsinchun chen
THE AUTHORS
PHD, COMPUTER AND SYSTEM ANALYSIS
ENGINEERING FROM RENSSELAER
POLYTECHNIC INSTITUTE
UNIVERSITY OF ARIZONA SYSTEM AND
INDUSTRIAL ENGINEERING
DIRECTOR OF RESEARCH FOR COMPLEX
SYSTEMS
FEI-YUE WANG
RESEARCH:
INTELLIGENCE CONTROL
COMPUTATIONAL INTELLIGENCE
MAIN SECURITY OBJECTIVES
• FEDERAL AUTHORITIES OBJECTIVES:
– PREVENT FUTURE TERRORIST ATTACKS
– REDUCE NATIONAL VULNERABILITY
– MINIMIZE DAMAGE AND RECOVERY FROM
ATTACKS
IT role and support
• IT supports intelligence and knowledge discovery
• IT can help in collecting, processing, and developing applications for
terrorism
• Federal authorities can use results for timely decisions, select tactics
and allocate resources
• Detect, prevent and respond to future attacks
Critical mission areas
• US Department of homeland security (DHS) identifies 6 critical
mission areas
– Intelligence and warning
– Border and transportation security
– Domestic counterterrorism
– Protecting infrastructure and assets
– Defending against catastrophes
– Emergency preparedness and responses
Intelligence and warning
• IT can detect the identities
• IT can monitor and provide alerts through intelligence and
warning systems to prevent crimes
{DHS}
Border and transportation security
• Creat smart borders that improves counterterrorism and
crime fighting capabilites
• Smart borders depends on information sharing and
integration, collaboration and communication
{DHS}
Domestic counterterrorism
• IT can find interactive patterns among criminals
• IT can help in analyzing terrorism
• IT can help in public safety
{DHS}
Protecting infrastructure and assets
• Sensors and detectors are not enough
• Advanced IT devices that model the normal use and detect the
abnormal use of the infrastructure
{DHS}
Defending against catastrophes
• IT collect, access, analyze and report data relevant to
catastrophes
• IT can be helpful in prevent, detect and manage the future
attacks
{DHS}
Emergency preparedness and responses
• Train professionals
• Facilitate social and psychological support for victims
{DHS}
Security challenges
• Distributed criminal enterprises
• Diverse sources and formats
• Crime and intelligence analysis techniques
ISI
• Emergence of a discipline
– Intelligence and security informatics
Objectives:
Develop advanced information technology, system and data bases for
national security throught an integrated technological,
organizational and policy based approach
ISI vs. biomedical informatics
• Data:
overload problem
• Technolongy:
new approaches
• Scientific contribution:
add insight and knowledge
• Research frame work based on data mining
Design and implementation
of ISI
• Emergency:
PDA, handheld for police and ambulance through wirless
network
• Problem solving:
Knowledge based data integration of disease, health problems
and some other problems
Design and implementation
of ISI
• Detection:
Information about hand and head movements and behaviors
• Classification:
Developing and organizing website data about extremists and
analyze its content
Design and implementation
of ISI
• Data mining:
Based on the (rule + exception) methodology
• Infrastructure:
multicamera video (DIVA) for vehicle and bridge monitoring, tracking
and analysis
• Anonymity:
Use literary analysis techniques to unveil the annonymity of arabic
extriemist groups.