1 / 27

North Central Texas Fusion System

North Central Texas Fusion System. Arlington Homeland Security / Special Events Unit. March 2, 2009. How We Can Help You. North Central Texas Fusion System Access Regional Analysts and Analysis Reports Advanced Tools Access Intelligence Analyst Training Analyst Notebook Training

Download Presentation

North Central Texas Fusion System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. North Central Texas Fusion System Arlington Homeland Security / Special Events Unit March 2, 2009

  2. How We Can Help You • North Central Texas Fusion System Access • Regional Analysts and Analysis Reports • Advanced Tools Access • Intelligence Analyst Training • Analyst Notebook Training • Threat Models • Special Event Models • Tactical Dashboards • Lessons Learned Sharing

  3. Law Enforcement Website High regional participation 950 users from 140 jurisdictions. 2500 receive bulletins and alerts. 94 agencies sharing data. Secure remote access to massive amount of data >90 million databases records searchable by single query. Examples include incidents, jail management system, calls for service, field interviews. >2 terabytes free text searchable by single query. Examples include news, blogs, alerts, bulletins, crime analyst reports, documents , social sites. Easy-to-use website for access to tools, information, heads-up Alerts, crime analyst messages, news, contacts, references All-hazards threat models for region – terrorism, crime, weather, health Powerful visualization tools for investigations Help desk, advanced tools, setup of restricted access libraries, consultation and specialized training for investigations

  4. User Status950 users from 16-County Region

  5. Law Enforcement Home Page Query and Visualization, Share Documents, Search Contacts, etc. Threat Model Dashboards Listserve Crime Analyst Messages Hourly Law Enforcement News

  6. Query and Visualization Functions Automatic display of query result locations on maps Automatic display of query result linkages (incident, address, person, vehicle) Automatic display of query result timelines and locations

  7. Query Click for Links, Maps, Timelines Enter what you know Form with pop-up help for common fields Query any words (gang, tattoo, drug, weapon, etc.) Officer safety information Previous arrests Query results from many agencies and databases. Click to view details. Select specific or all libraries

  8. Automated Link Diagram (1 of 2) • Automated links generated for query results • Shows linkages of incidents, people, addresses and vehicles • Hover over line for description of the link • Left click to see metadata about a node Query any node to expand chart

  9. Automated Link Diagram (2 of 2) • Filter links by • Offense • Agency • Type (person, incident, address, vehicle) • Incident report • Date range • Save to Powerpoint for annotation and records • Export to Analyst Notebook for large-scale, on-going analysis

  10. Automated Map Display • Over 300 million addresses geo-coded • Icons show locations of people and incidents • Hover over icon to see metadata details • Filter by • Offense type • Incident report • Date range

  11. Open Source Summarization 5. Security – Law Enforcement (with modes 1,7)

  12. New Projects in Progress • Inmate phone query pilot • Part of radicalization and gang monitoring • Currently one jail to be expanded to other jails and prisons • Automated transcription of speech to text so can query from office • Translation from Spanish to English (future Chinese, Arabic, Vietnamese) • Private security pilot • Sharing of suspicious activity reports between companies and to law enforcement • Models detect threats to private partner facilities and senior personnel • Ability to visualize unstructured data links and maps • Identifying top 10 threats to region and threat analyses • Analyst Notebook training • Advanced intelligence analyst training • Adding at least 20 new datasets in 2009

  13. Registration Instructions • Send list of email addresses to kstone@co.collin.tx.us • Registrants will be • directed to http://register.ofcc.us:9955to register • provided several options for 1-hour training webinars from their office • given access to help desk/support

  14. Regional Analysts and Reports Oscar Martinez Intelligence Analyst North Central Texas Fusion System Alicia Alexander Crime Analyst DPS/North Central Texas Fusion System David Tractenberg Intelligence Analyst DHS / North Central Texas Fusion System Tony Bryson Intelligence Analyst DHS /North Central Texas Fusion System James R. (Bob) Johnson Architect and Analyst Support North Central Texas Fusion System

  15. Advanced Tool Access • Starlight • Handle many dimensions • Inserts maps • Temporal analysis visualization • Analyst Notebook • Large-scale link visualization • Useful for complex cases and intelligence monitoring

  16. Intelligence Analyst Training • Interfacing with decision makers • Recognizing and handling of perceptions and deceptions • Recognizing and handling of biases • Gathering information • Proposing and handling competing hypotheses • Monitoring of topics and situations • Intelligence reporting • Training on advanced tools

  17. Analyst Notebook Training • NCTFS is planning to host Analyst Notebook training (4 days) • HIDTA provides training on software • NCTFS provides training on using NCTFS link visualization to get data into Analyst Notebook • Date and time to be determined

  18. Threat Models • Threat models are computer models that run continuously in the Fusion System to detect pre-incident indicators, to recognize emerging threats, and to notify analysts to evaluate detected information. • Example Data Sources • News, blogs, suspicious activity reports, incident reports, websites, submitted emails • Example Factors Evaluated • Sequences of events (stolen uniforms, smuggling, surveillance, recruitment, etc) consistent with potential terrorism planning and preparation activities • Threatening words (bomb, protest, nuclear materials, crimes, hatred, etc) associated with the North Central Texas region or with specific individuals, methods, events, and facilities • Analysis of links and threads connecting entities • Global, US, and Texas threats that could effect the North Central Texas region • Example Benefits • NCTFS Dashboards give all users insight into emerging regional and local threats from weather, health hazards, terrorism, and major crimes • Fort Worth Police Department models notify officials when there are potential threats to critical infrastructure, dignitaries and events • North Central Texas analysts issue alerts and notify officials based on tip-offs from models

  19. Models Types in the NCTFS

  20. Special Event Models • Example Models • NASCO Conference (2007) • Armed Forces Bowl Game (2007, 2008) • Texas Motor Speedway (2007, 2008) • Republican Straw Poll Conference (2008) • Threat assessment prior to each event used to set models parameters • Data sources unique to each event • Lt Dixon, James Janning notified via email of important findings

  21. Preparing for Event Model • Agency provides description of event, known threats and concerns • NCTFS Threat assessment using all available sources • Terrorism, gangs, hate groups, extremist groups, activist groups, etc. • Impacts to surrounding facilities and government buildings • Agency fills out facility and high level official threat questionnaire • Identify additional data sources joint effort • NCTFS sets up model and test prior to event • Accuracy • Notifications

  22. Tactical Dashboard ExampleFort Worth Police Dept Dashboards Computer model-driven, Fort Worth-specific tactical dashboards Fort Worth Police Department Facility Threats Method Threats Repeat Offenders Offenses by PRA Dignitary Threats Individual/Group Threats Fort Worth All-Hazards Dashboard

  23. Repeat Offenders Example BUTTON TURNS RED WHEN NEW DATA. DRAWS ATTENTION TO ACTIVITIES BY DESIGNATED REPEAT OFFENDERS. Fort Worth Police Department Repeat Offenders Facility Threats Method Threats Repeat Offenders Offenses by PRA Dignitary Threats Individual/Group Threats Repeat Offenders [more] [more] [more] [more] [more] [more] [more] [more] [more]

  24. Lessons Learned • Happy to share experiences and materials: • Lessons Learned Document • Policies & CFR Compliance • Job Descriptions • Analysis Tool Advice • Technical Advice • Etc.

  25. Contact Information Kelley Stone Chief, North Central Texas Fusion System kstone@co.collin.tx.us (972) 548-5537 Oscar Martinez North Central Texas Fusion System omartinez@co.collin.tx.us (972)548-4395, (214)803-0931 cell James R. (Bob) Johnson Architect, North Central Texas Fusion System James_r_johnson@earthlink.net 575-741-0699 cell Anita Miller Manager, North Central Texas Fusion System anita_miller@earthlink.net 575-741-0699 cell

  26. Backup Charts

  27. Example Data90M Database Records, >2 Terabytes Unstructured Data Arlington RMS Collin County RMS, JMS, CFS Dallas RMS Erath County RMS, JMS Euless RMS Fort Worth RMS, CFS, Gang, Field Interview, Narcotics Frisco RMS, JMS, CFS Garland RMS, JMS Haltom City RMS Hudson Oaks RMS Hunt County RMS, JMS Hurst RMS, Crime Analysis, Criminal Records, Statistics Johnson County RMS, JMS Keller RMS Lake Worth RMS Lewisville RMS, JMS Mesquite RMS Murphy RMS North Richland Hills RMS Parker County JMS Princeton RMS Richardson RMS, JMS Roanoke RMS Rowlett RMS, JMS Somervell County RMS, JMS Sulphur Springs RMS Tarrant County RMS, JMS White Settlement RMS Wise County RMS, JMS Wylie RMS Crime Analysts Listserve DHS Fusion Center Reports Law Enforcement Reports Operation Rio Grande TDCJ Scanned Letters Texas Fusion Center ATM Burglaries Environmental Crimes Gangs NASCO-NAFTA Southwest Border Security Threats to High-Profile Individuals After Action Reports American Journal of Public Health Best Practices Dallas ISD Publications Defense News Fusion System Reports Fusion System Source Materials HAZMAT Locations & References DHS Advisory Committee Intelligence Analysis & Info Sharing Lessons Learned MySpace Excerpts News Feeds Private Security Materials Terrorism US Government Publications Website Pulls and Website Research Burlington Northern Incidents Listserve Historical Data Dallas Narratives DART Incidents Fort Worth ADMS Inmate Phone Calls McKinney RMS Regional Citation Data Regional Inmate Rowlett CFS Sherman RMS, CFS Suspicious Activity Reports TDCJ Gang Data Wortham RMS Agency Databases, Unstructured Datasets, Cases/Special Interests (some restricted), Open Source Unstructured Data, Upcoming

More Related