180 likes | 248 Views
Explore the utilization of artificial intelligence and information technology in enhancing national security, including intelligence analysis, counterterrorism, infrastructure protection, and emergency responses. Learn about critical mission areas, security challenges, and the role of IT in preventing and responding to security threats.
E N D
THE AUTHORS • Phd, Information Systems from New York University • Management information systems, University of Arizona • Research: • intelligence analysis • Web mining Hsinchun chen
THE AUTHORS PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS RESEARCH: INTELLIGENCE CONTROL COMPUTATIONAL INTELLIGENCE FEI-YUE WANG
MAIN SECURITY OBJECTIVES • FEDERAL AUTHORITIES OBJECTIVES: • PREVENT FUTURE TERRORIST ATTACKS • REDUCE NATIONAL VULNERABILITY • MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS
IT role and support • IT supports intelligence and knowledge discovery • IT can help in collecting, processing, and developing applications for terrorism • Federal authorities can use results for timely decisions, select tactics and allocate resources • Detect, prevent and respond to future attacks
Critical mission areas • US Department of homeland security (DHS) identifies 6 critical mission areas • Intelligence and warning • Border and transportation security • Domestic counterterrorism • Protecting infrastructure and assets • Defending against catastrophes • Emergency preparedness and responses
Intelligence and warning • IT can detect the identities • IT can monitor and provide alerts through intelligence and warning systems to prevent crimes {DHS}
Border and transportation security • Creat smart borders that improves counterterrorism and crime fighting capabilites • Smart borders depends on information sharing and integration, collaboration and communication {DHS}
Domestic counterterrorism • IT can find interactive patterns among criminals • IT can help in analyzing terrorism • IT can help in public safety {DHS}
Protecting infrastructure and assets • Sensors and detectors are not enough • Advanced IT devices that model the normal use and detect the abnormal use of the infrastructure {DHS}
Defending against catastrophes • IT collect, access, analyze and report data relevant to catastrophes • IT can be helpful in prevent, detect and manage the future attacks {DHS}
Emergency preparedness and responses • Train professionals • Facilitate social and psychological support for victims {DHS}
Security challenges • Distributed criminal enterprises • Diverse sources and formats • Crime and intelligence analysis techniques
ISI • Emergence of a discipline • Intelligence and security informatics Objectives: Develop advanced information technology, system and data bases for national security throught an integrated technological, organizational and policy based approach
ISI vs. biomedical informatics • Data: overload problem • Technolongy: new approaches • Scientific contribution: add insight and knowledge • Research frame work based on data mining
Design and implementation of ISI • Emergency: PDA, handheld for police and ambulance through wirless network • Problem solving: Knowledge based data integration of disease, health problems and some other problems
Design and implementation of ISI • Detection: Information about hand and head movements and behaviors • Classification: Developing and organizing website data about extremists and analyze its content
Design and implementation of ISI • Data mining: Based on the (rule + exception) methodology • Infrastructure: multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis • Anonymity: Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.