270 likes | 433 Views
North Central Texas Fusion System. Arlington Homeland Security / Special Events Unit. March 2, 2009. How We Can Help You. North Central Texas Fusion System Access Regional Analysts and Analysis Reports Advanced Tools Access Intelligence Analyst Training Analyst Notebook Training
E N D
North Central Texas Fusion System Arlington Homeland Security / Special Events Unit March 2, 2009
How We Can Help You • North Central Texas Fusion System Access • Regional Analysts and Analysis Reports • Advanced Tools Access • Intelligence Analyst Training • Analyst Notebook Training • Threat Models • Special Event Models • Tactical Dashboards • Lessons Learned Sharing
Law Enforcement Website High regional participation 950 users from 140 jurisdictions. 2500 receive bulletins and alerts. 94 agencies sharing data. Secure remote access to massive amount of data >90 million databases records searchable by single query. Examples include incidents, jail management system, calls for service, field interviews. >2 terabytes free text searchable by single query. Examples include news, blogs, alerts, bulletins, crime analyst reports, documents , social sites. Easy-to-use website for access to tools, information, heads-up Alerts, crime analyst messages, news, contacts, references All-hazards threat models for region – terrorism, crime, weather, health Powerful visualization tools for investigations Help desk, advanced tools, setup of restricted access libraries, consultation and specialized training for investigations
Law Enforcement Home Page Query and Visualization, Share Documents, Search Contacts, etc. Threat Model Dashboards Listserve Crime Analyst Messages Hourly Law Enforcement News
Query and Visualization Functions Automatic display of query result locations on maps Automatic display of query result linkages (incident, address, person, vehicle) Automatic display of query result timelines and locations
Query Click for Links, Maps, Timelines Enter what you know Form with pop-up help for common fields Query any words (gang, tattoo, drug, weapon, etc.) Officer safety information Previous arrests Query results from many agencies and databases. Click to view details. Select specific or all libraries
Automated Link Diagram (1 of 2) • Automated links generated for query results • Shows linkages of incidents, people, addresses and vehicles • Hover over line for description of the link • Left click to see metadata about a node Query any node to expand chart
Automated Link Diagram (2 of 2) • Filter links by • Offense • Agency • Type (person, incident, address, vehicle) • Incident report • Date range • Save to Powerpoint for annotation and records • Export to Analyst Notebook for large-scale, on-going analysis
Automated Map Display • Over 300 million addresses geo-coded • Icons show locations of people and incidents • Hover over icon to see metadata details • Filter by • Offense type • Incident report • Date range
Open Source Summarization 5. Security – Law Enforcement (with modes 1,7)
New Projects in Progress • Inmate phone query pilot • Part of radicalization and gang monitoring • Currently one jail to be expanded to other jails and prisons • Automated transcription of speech to text so can query from office • Translation from Spanish to English (future Chinese, Arabic, Vietnamese) • Private security pilot • Sharing of suspicious activity reports between companies and to law enforcement • Models detect threats to private partner facilities and senior personnel • Ability to visualize unstructured data links and maps • Identifying top 10 threats to region and threat analyses • Analyst Notebook training • Advanced intelligence analyst training • Adding at least 20 new datasets in 2009
Registration Instructions • Send list of email addresses to kstone@co.collin.tx.us • Registrants will be • directed to http://register.ofcc.us:9955to register • provided several options for 1-hour training webinars from their office • given access to help desk/support
Regional Analysts and Reports Oscar Martinez Intelligence Analyst North Central Texas Fusion System Alicia Alexander Crime Analyst DPS/North Central Texas Fusion System David Tractenberg Intelligence Analyst DHS / North Central Texas Fusion System Tony Bryson Intelligence Analyst DHS /North Central Texas Fusion System James R. (Bob) Johnson Architect and Analyst Support North Central Texas Fusion System
Advanced Tool Access • Starlight • Handle many dimensions • Inserts maps • Temporal analysis visualization • Analyst Notebook • Large-scale link visualization • Useful for complex cases and intelligence monitoring
Intelligence Analyst Training • Interfacing with decision makers • Recognizing and handling of perceptions and deceptions • Recognizing and handling of biases • Gathering information • Proposing and handling competing hypotheses • Monitoring of topics and situations • Intelligence reporting • Training on advanced tools
Analyst Notebook Training • NCTFS is planning to host Analyst Notebook training (4 days) • HIDTA provides training on software • NCTFS provides training on using NCTFS link visualization to get data into Analyst Notebook • Date and time to be determined
Threat Models • Threat models are computer models that run continuously in the Fusion System to detect pre-incident indicators, to recognize emerging threats, and to notify analysts to evaluate detected information. • Example Data Sources • News, blogs, suspicious activity reports, incident reports, websites, submitted emails • Example Factors Evaluated • Sequences of events (stolen uniforms, smuggling, surveillance, recruitment, etc) consistent with potential terrorism planning and preparation activities • Threatening words (bomb, protest, nuclear materials, crimes, hatred, etc) associated with the North Central Texas region or with specific individuals, methods, events, and facilities • Analysis of links and threads connecting entities • Global, US, and Texas threats that could effect the North Central Texas region • Example Benefits • NCTFS Dashboards give all users insight into emerging regional and local threats from weather, health hazards, terrorism, and major crimes • Fort Worth Police Department models notify officials when there are potential threats to critical infrastructure, dignitaries and events • North Central Texas analysts issue alerts and notify officials based on tip-offs from models
Special Event Models • Example Models • NASCO Conference (2007) • Armed Forces Bowl Game (2007, 2008) • Texas Motor Speedway (2007, 2008) • Republican Straw Poll Conference (2008) • Threat assessment prior to each event used to set models parameters • Data sources unique to each event • Lt Dixon, James Janning notified via email of important findings
Preparing for Event Model • Agency provides description of event, known threats and concerns • NCTFS Threat assessment using all available sources • Terrorism, gangs, hate groups, extremist groups, activist groups, etc. • Impacts to surrounding facilities and government buildings • Agency fills out facility and high level official threat questionnaire • Identify additional data sources joint effort • NCTFS sets up model and test prior to event • Accuracy • Notifications
Tactical Dashboard ExampleFort Worth Police Dept Dashboards Computer model-driven, Fort Worth-specific tactical dashboards Fort Worth Police Department Facility Threats Method Threats Repeat Offenders Offenses by PRA Dignitary Threats Individual/Group Threats Fort Worth All-Hazards Dashboard
Repeat Offenders Example BUTTON TURNS RED WHEN NEW DATA. DRAWS ATTENTION TO ACTIVITIES BY DESIGNATED REPEAT OFFENDERS. Fort Worth Police Department Repeat Offenders Facility Threats Method Threats Repeat Offenders Offenses by PRA Dignitary Threats Individual/Group Threats Repeat Offenders [more] [more] [more] [more] [more] [more] [more] [more] [more]
Lessons Learned • Happy to share experiences and materials: • Lessons Learned Document • Policies & CFR Compliance • Job Descriptions • Analysis Tool Advice • Technical Advice • Etc.
Contact Information Kelley Stone Chief, North Central Texas Fusion System kstone@co.collin.tx.us (972) 548-5537 Oscar Martinez North Central Texas Fusion System omartinez@co.collin.tx.us (972)548-4395, (214)803-0931 cell James R. (Bob) Johnson Architect, North Central Texas Fusion System James_r_johnson@earthlink.net 575-741-0699 cell Anita Miller Manager, North Central Texas Fusion System anita_miller@earthlink.net 575-741-0699 cell
Example Data90M Database Records, >2 Terabytes Unstructured Data Arlington RMS Collin County RMS, JMS, CFS Dallas RMS Erath County RMS, JMS Euless RMS Fort Worth RMS, CFS, Gang, Field Interview, Narcotics Frisco RMS, JMS, CFS Garland RMS, JMS Haltom City RMS Hudson Oaks RMS Hunt County RMS, JMS Hurst RMS, Crime Analysis, Criminal Records, Statistics Johnson County RMS, JMS Keller RMS Lake Worth RMS Lewisville RMS, JMS Mesquite RMS Murphy RMS North Richland Hills RMS Parker County JMS Princeton RMS Richardson RMS, JMS Roanoke RMS Rowlett RMS, JMS Somervell County RMS, JMS Sulphur Springs RMS Tarrant County RMS, JMS White Settlement RMS Wise County RMS, JMS Wylie RMS Crime Analysts Listserve DHS Fusion Center Reports Law Enforcement Reports Operation Rio Grande TDCJ Scanned Letters Texas Fusion Center ATM Burglaries Environmental Crimes Gangs NASCO-NAFTA Southwest Border Security Threats to High-Profile Individuals After Action Reports American Journal of Public Health Best Practices Dallas ISD Publications Defense News Fusion System Reports Fusion System Source Materials HAZMAT Locations & References DHS Advisory Committee Intelligence Analysis & Info Sharing Lessons Learned MySpace Excerpts News Feeds Private Security Materials Terrorism US Government Publications Website Pulls and Website Research Burlington Northern Incidents Listserve Historical Data Dallas Narratives DART Incidents Fort Worth ADMS Inmate Phone Calls McKinney RMS Regional Citation Data Regional Inmate Rowlett CFS Sherman RMS, CFS Suspicious Activity Reports TDCJ Gang Data Wortham RMS Agency Databases, Unstructured Datasets, Cases/Special Interests (some restricted), Open Source Unstructured Data, Upcoming