artificial intelligence for home land security. the authors phd, information systems from new york...
TRANSCRIPT
![Page 1: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/1.jpg)
ARTIFICIAL INTELLIGENCE
FORHOME LAND SECURITY
![Page 2: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/2.jpg)
THE AUTHORSPhd, Information Systems from New York University
Management information systems, University of Arizona
Research: •intelligence analysis•Web mining
Hsinchun chen
![Page 3: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/3.jpg)
THE AUTHORS
FEI-YUE WANG
PHD, COMPUTER AND SYSTEM ANALYSIS ENGINEERING FROM RENSSELAER POLYTECHNIC INSTITUTE
UNIVERSITY OF ARIZONA SYSTEM AND INDUSTRIAL ENGINEERING
DIRECTOR OF RESEARCH FOR COMPLEX SYSTEMS
RESEARCH:INTELLIGENCE CONTROLCOMPUTATIONAL INTELLIGENCE
![Page 4: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/4.jpg)
MAIN SECURITY OBJECTIVES
•FEDERAL AUTHORITIES OBJECTIVES:–PREVENT FUTURE TERRORIST ATTACKS
–REDUCE NATIONAL VULNERABILITY
–MINIMIZE DAMAGE AND RECOVERY FROM ATTACKS
![Page 5: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/5.jpg)
IT role and support
• IT supports intelligence and knowledge discovery
• IT can help in collecting, processing, and developing applications for terrorism
• Federal authorities can use results for timely decisions, select tactics and allocate resources
• Detect, prevent and respond to future attacks
![Page 6: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/6.jpg)
Critical mission areas
• US Department of homeland security (DHS) identifies 6 critical mission areas
– Intelligence and warning– Border and transportation security– Domestic counterterrorism– Protecting infrastructure and assets– Defending against catastrophes– Emergency preparedness and responses
![Page 7: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/7.jpg)
Intelligence and warning
• IT can detect the identities • IT can monitor and provide alerts
through intelligence and warning systems to prevent crimes
{DHS}
![Page 8: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/8.jpg)
Border and transportation security
• Creat smart borders that improves counterterrorism and crime fighting capabilites
• Smart borders depends on information sharing and integration, collaboration and communication
{DHS}
![Page 9: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/9.jpg)
Domestic counterterrorism
• IT can find interactive patterns among criminals
• IT can help in analyzing terrorism• IT can help in public safety
{DHS}
![Page 10: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/10.jpg)
Protecting infrastructure and assets
• Sensors and detectors are not enough• Advanced IT devices that model the
normal use and detect the abnormal use of the infrastructure
{DHS}
![Page 11: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/11.jpg)
Defending against catastrophes
• IT collect, access, analyze and report data relevant to catastrophes
• IT can be helpful in prevent, detect and manage the future attacks
{DHS}
![Page 12: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/12.jpg)
Emergency preparedness and responses
• Train professionals• Facilitate social and psychological
support for victims
{DHS}
![Page 13: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/13.jpg)
Security challenges
• Distributed criminal enterprises• Diverse sources and formats• Crime and intelligence analysis
techniques
![Page 14: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/14.jpg)
ISI
• Emergence of a discipline– Intelligence and security informaticsObjectives:Develop advanced information
technology, system and data bases for national security throught an integrated technological, organizational and policy based approach
![Page 15: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/15.jpg)
ISI vs. biomedical informatics
• Data:overload problem
• Technolongy:new approaches
• Scientific contribution:add insight and knowledge
• Research frame work based on data mining
![Page 16: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/16.jpg)
Design and implementation of ISI
• Emergency:PDA, handheld for police and ambulance through wirless network
• Problem solving:Knowledge based data integration of
disease, health problems and some other problems
![Page 17: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/17.jpg)
Design and implementation of ISI
• Detection:Information about hand and head
movements and behaviors• Classification:Developing and organizing website
data about extremists and analyze its content
![Page 18: ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University](https://reader036.vdocuments.mx/reader036/viewer/2022082711/56649edb5503460f94bea4b0/html5/thumbnails/18.jpg)
Design and implementation of ISI
• Data mining:Based on the (rule + exception) methodology • Infrastructure:
multicamera video (DIVA) for vehicle and bridge monitoring, tracking and analysis
• Anonymity:Use literary analysis techniques to unveil the annonymity of arabic extriemist groups.