180 likes | 248 Views
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS. Phd, Information Systems from New York University Management information systems, University of Arizona Research: intelligence analysis Web mining. Hsinchun chen. THE AUTHORS.
E N D
THE AUTHORS • Phd, Information Systems from New York University • Management information systems, University of Arizona • Research: • intelligence analysis • Web mining Hsinchun chen
THE AUTHORS PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS RESEARCH: INTELLIGENCE CONTROL COMPUTATIONAL INTELLIGENCE FEI-YUE WANG
MAIN SECURITY OBJECTIVES • FEDERAL AUTHORITIES OBJECTIVES: • PREVENT FUTURE TERRORIST ATTACKS • REDUCE NATIONAL VULNERABILITY • MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS
IT role and support • IT supports intelligence and knowledge discovery • IT can help in collecting, processing, and developing applications for terrorism • Federal authorities can use results for timely decisions, select tactics and allocate resources • Detect, prevent and respond to future attacks
Critical mission areas • US Department of homeland security (DHS) identifies 6 critical mission areas • Intelligence and warning • Border and transportation security • Domestic counterterrorism • Protecting infrastructure and assets • Defending against catastrophes • Emergency preparedness and responses
Intelligence and warning • IT can detect the identities • IT can monitor and provide alerts through intelligence and warning systems to prevent crimes {DHS}
Border and transportation security • Creat smart borders that improves counterterrorism and crime fighting capabilites • Smart borders depends on information sharing and integration, collaboration and communication {DHS}
Domestic counterterrorism • IT can find interactive patterns among criminals • IT can help in analyzing terrorism • IT can help in public safety {DHS}
Protecting infrastructure and assets • Sensors and detectors are not enough • Advanced IT devices that model the normal use and detect the abnormal use of the infrastructure {DHS}
Defending against catastrophes • IT collect, access, analyze and report data relevant to catastrophes • IT can be helpful in prevent, detect and manage the future attacks {DHS}
Emergency preparedness and responses • Train professionals • Facilitate social and psychological support for victims {DHS}
Security challenges • Distributed criminal enterprises • Diverse sources and formats • Crime and intelligence analysis techniques
ISI • Emergence of a discipline • Intelligence and security informatics Objectives: Develop advanced information technology, system and data bases for national security throught an integrated technological, organizational and policy based approach
ISI vs. biomedical informatics • Data: overload problem • Technolongy: new approaches • Scientific contribution: add insight and knowledge • Research frame work based on data mining
Design and implementation of ISI • Emergency: PDA, handheld for police and ambulance through wirless network • Problem solving: Knowledge based data integration of disease, health problems and some other problems
Design and implementation of ISI • Detection: Information about hand and head movements and behaviors • Classification: Developing and organizing website data about extremists and analyze its content
Design and implementation of ISI • Data mining: Based on the (rule + exception) methodology • Infrastructure: multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis • Anonymity: Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.