1 / 18

ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY

ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS. Phd, Information Systems from New York University Management information systems, University of Arizona Research: intelligence analysis Web mining. Hsinchun chen. THE AUTHORS.

Télécharger la présentation

ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ARTIFICIAL INTELLIGENCE FORHOME LAND SECURITY

  2. THE AUTHORS • Phd, Information Systems from New York University • Management information systems, University of Arizona • Research: • intelligence analysis • Web mining Hsinchun chen

  3. THE AUTHORS PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS RESEARCH: INTELLIGENCE CONTROL COMPUTATIONAL INTELLIGENCE FEI-YUE WANG

  4. MAIN SECURITY OBJECTIVES • FEDERAL AUTHORITIES OBJECTIVES: • PREVENT FUTURE TERRORIST ATTACKS • REDUCE NATIONAL VULNERABILITY • MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS

  5. IT role and support • IT supports intelligence and knowledge discovery • IT can help in collecting, processing, and developing applications for terrorism • Federal authorities can use results for timely decisions, select tactics and allocate resources • Detect, prevent and respond to future attacks

  6. Critical mission areas • US Department of homeland security (DHS) identifies 6 critical mission areas • Intelligence and warning • Border and transportation security • Domestic counterterrorism • Protecting infrastructure and assets • Defending against catastrophes • Emergency preparedness and responses

  7. Intelligence and warning • IT can detect the identities • IT can monitor and provide alerts through intelligence and warning systems to prevent crimes {DHS}

  8. Border and transportation security • Creat smart borders that improves counterterrorism and crime fighting capabilites • Smart borders depends on information sharing and integration, collaboration and communication {DHS}

  9. Domestic counterterrorism • IT can find interactive patterns among criminals • IT can help in analyzing terrorism • IT can help in public safety {DHS}

  10. Protecting infrastructure and assets • Sensors and detectors are not enough • Advanced IT devices that model the normal use and detect the abnormal use of the infrastructure {DHS}

  11. Defending against catastrophes • IT collect, access, analyze and report data relevant to catastrophes • IT can be helpful in prevent, detect and manage the future attacks {DHS}

  12. Emergency preparedness and responses • Train professionals • Facilitate social and psychological support for victims {DHS}

  13. Security challenges • Distributed criminal enterprises • Diverse sources and formats • Crime and intelligence analysis techniques

  14. ISI • Emergence of a discipline • Intelligence and security informatics Objectives: Develop advanced information technology, system and data bases for national security throught an integrated technological, organizational and policy based approach

  15. ISI vs. biomedical informatics • Data: overload problem • Technolongy: new approaches • Scientific contribution: add insight and knowledge • Research frame work based on data mining

  16. Design and implementation of ISI • Emergency: PDA, handheld for police and ambulance through wirless network • Problem solving: Knowledge based data integration of disease, health problems and some other problems

  17. Design and implementation of ISI • Detection: Information about hand and head movements and behaviors • Classification: Developing and organizing website data about extremists and analyze its content

  18. Design and implementation of ISI • Data mining: Based on the (rule + exception) methodology • Infrastructure: multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis • Anonymity: Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.

More Related