CrimeFighter: A Toolbox for Counterterrorism. Uffe Kock Wiil



Similar documents
Knowledge Management

WHITE PAPER: THREAT INTELLIGENCE RANKING

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Enterprise Capabilities Descriptions

A Tool for Analysis and Visualization of Criminal Networks

Scalable End-User Access to Big Data HELLENIC REPUBLIC National and Kapodistrian University of Athens

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

IC05 Introduction on Networks &Visualization Nov

Delivering Smart Answers!

Business Process Management In An Application Development Environment

A Knowledge Management Framework Using Business Intelligence Solutions

Threat Intelligence: Friend of the Enterprise

School of Management and Information Systems

Threat Intelligence Buyer s Guide

IAF Business Intelligence Solutions Make the Most of Your Business Intelligence. White Paper November 2002

Use of a Web-Based GIS for Real-Time Traffic Information Fusion and Presentation over the Internet

Chapter 13: Knowledge Management In Nutshell. Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc.

The Value of Taxonomy Management Research Results

DIABLO VALLEY COLLEGE CATALOG

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

NATIONAL SECURITY CRITICAL MISSION AREAS AND CASE STUDIES

Unstructured Threat Intelligence Processing using NLP

Engineering Information Management

Data Mining with Qualitative and Quantitative Data

Ty Miller. Director, Threat Intelligence Pty Ltd

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

A Biologically Inspired Approach to Network Vulnerability Identification

KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE

BPM for Structural Integrity Management in Oil and Gas Industry

Analytics In the Cloud

Information Schools: Traditions Growing, Morphing and Expanding. David Fenske

How To Find Out What A Web Log Data Is Worth On A Blog

CHAPTER 1 INTRODUCTION

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

Sanjeev Kumar. contribute

Maintenance Performance Toolbox

Abdullah Mohammed Abdullah Khamis

UNIFY YOUR (BIG) DATA

THE e-knowledge BASED INNOVATION SEMINAR

Improvised Explosive Device Network Analysis

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Visionet IT Modernization Empowering Change

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

One LAR Course Credits: 3. Page 4

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

The Open Source Knowledge Discovery and Document Analysis Platform

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

Bentley Systems Launches AssetWise Initiative for Operating and Sustaining Infrastructure Assets

Creating Business Value with Mature QA Practices

Service-Oriented Architecture Concept for Intelligence Information System Development

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 3 August 2015.

Sharing the experiences of teaching business analytics in a University course

Personal Cognitive Assistants for Military Intelligence Analysis: Mixed-Initiative Learning, Tutoring, and Problem Solving

Patterns to Introduce Continuous Integration to Organizations

Real World Application and Usage of IBM Advanced Analytics Technology

Integrated System Modeling for Handling Big Data in Electric Utility Systems

XML and the College Website A Practical Look at the Use of XML and XSL

Business Intelligence and Big Data Analytics: Speeding the Cycle from Insights to Action Four Steps to More Profitable Customer Engagement

Mission-Critical Database with Real-Time Search for Big Data

Project Knowledge Management Based on Social Networks

Preliminary Syllabus for the course of Data Science for Business Analytics

Decision Matrix: selecting a speech analytics vendor

Class 2. Learning Objectives

KNOWLEDGE NETWORK SYSTEM APPROACH TO THE KNOWLEDGE MANAGEMENT

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION

COURSE TITLE COURSE DESCRIPTION

Building an Industrial Design Doctoral Degree in an Umbrella Ph.D. Program: the Problems and Benefits

Chris Gates

datatrac Want to maximize your online ROI? ABOUT datatrac you ve come to the right place.

Parametric Attack Graph Construction and Analysis

Course DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Rapid software development. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 17 Slide 1

Social Network Analysis and Simulation of the Development of Adversarial Networks

Taking the Open Source Road

Total Exploration & Production: Field Monitoring Case Study

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:

Software Engineering of NLP-based Computer-assisted Coding Applications

Improving Decision Making and Managing Knowledge

DM810 Computer Game Programming II: AI. Lecture 11. Decision Making. Marco Chiarandini

Do you know how your TSM environment is evolving?

TOPOLOGIES NETWORK SECURITY SERVICES

Transcription:

CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil

Counterterrorism Research Lab Established in the Spring of 2009 Research goes back to 2003 Research & Development Mathematical models Processes, tools, techniques, and algorithms Robust prototypes End-user involvement Focus Open source intelligence Destabilizing terrorist networks 10 researchers 2

Counterterrorism Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorist attacks Theory from the knowledge management field plays an important role in dealing with terrorist information 3

Open source intelligence Open Source Information (OSINF) is data which is available publicly not necessarily free OSINF Collection is monitoring, selecting, retrieving, tagging, cataloging, visualizing & disseminating data Open Source Intelligence (OSINT) is proprietary intelligence recursively derived from OSINF OSINT is the result of expert analysis of OSINF 4

Secret Intelligence Misses 80% of the Relevant Information! ALL-SOURCE ANALYSIS HUMINT SIGINT IMINT MASINT 95% of cost 20% of value 5% of cost 80% of value OPEN SOURCE INTELLIGENCE OPEN SOURCE INFORMATION 5

KM for intelligence analysis Knowledge management processes, tools, and techniques can help intelligence analysts in various ways when trying to make sense of the vast amount of data being collected Several manual knowledge management processes can either be semi-automated or supported by software tools 6

KM for intelligence analysis Data Acquisition Information Processing Knowledge Management Knowledge Information Data 7

CrimeFighter CrimeFighter Toolbox for counterterrorism Outline KM processes in more detail Related work Research objectives Tool categories Toolbox overview Previous work Ongoing work Contributions 8

Knowledge Management Processes Data Information Knowledge Acquiring Data from Open Source Databases Visualizing Harvesting Data from the Web Processing Data Mining Data Interpreting Other Sources Defining Patterns Analyzing Evaluating Knowledge 9

Related work Counterterrorism research approaches can be divided into two overall categories data collection and data modelling The Dark Web Project conducted at the AI Lab, University of Arizona (Professor Chen) is a prominent example relating to the data collection approach The Networks and Terrorism Project conducted at the CASOS Lab, Carnegie Mellon University (Professor Carley) is a prominent example relating to the data modelling approach 10

Related work CrimeFighter combines the data collection and data modelling approaches into holistic prototypes for open source intelligence The research is inter-disciplinary involving techniques from disciplines such as data mining, social network analysis, hypertext, visualization, and many others To our knowledge, no other approaches provide a similar comprehensive coverage of tools and techniques for counterterrorism 11

Research objectives To specify, develop, and evaluate novel models, algorithms, tools, and techniques for open source intelligence in close collaboration with end-users The tool philosophy is that the intelligence analysts are in charge and the tools are there to assist them The purpose of the tools is to support as many of the knowledge management processes as possible to assist the intelligence analysts in performing their work more efficiently Efficient means that the analysts arrive at better analysis results much faster 12

Tool categories Semi-automatic tools that need to be configured by the intelligence analysts to perform the dedicated task. After configuration, the tool will automatically perform the dedicated task Manual tools that support the intelligence analysts in performing specific tasks by providing dedicated features that enhance the work efficiency when performing manual intelligence analysis work 13

Web Content Other Sources Web Harvesting Toolbox overview Data Mining Social Network Analysis Open Source Databases Data Conversion Knowledge Base Visualization Toolbox Knowledge Base Structure Analysis Storage Tool Data flow 14

Previous work The work on CrimeFighter builds on previous work on iminer iminer includes tools for data conversion, data mining, social network analysis, visualization, and for the knowledge base. iminer incorporates several advanced and novel models and techniques useful for counterterrorism like subgroup detection, network efficiency estimation, and destabilization strategies for terrorist networks including detection of hidden hierarchies 15

Previous work Work has also been conducted on the ASAP tool to assist software developers to perform structural analysis of software planning data Many of the spatial hypertext concepts and techniques that supports working with emergent and evolving structures used in ASAP are domain independent and can be re-used in a tool that supports intelligence analysts working with terrorist information Several prototypes have been constructed to harvest terrorist information from the Web Regular web pages RSS feeds Blogs 16

Web Content Previous work Other Sources Web Harvesting Data Mining Social Network Analysis Open Source Databases Data Conversion Knowledge Base Visualization iminer tools Other tools Knowledge Base Structure Analysis 17

Ongoing work Domain model Web harvesting tool Structure analysis tool Software architecture 18

Domain model Links as first class New domain model for terrorist networks Nodes and links in the graph Knowledge base Global Terrorism Database (GTD) New social network analysis algorithms Finding missing links Using link weights Identifying key links Terrorist network visualization Both nodes and links 19

Web harvesting tool Web pages Web harvester Knowledge Base RSS feeds Blogs - - - - - TOOL parameters INFORMATION xml ----------- ----------- ---------- ---------- ---------- ---------- --------- --------- Forms & other sources Configurable GUI Feedback 20

Structure analysis tool Web harvested intelligence Open Source Database intelligence Knowledge Base Undercover agent intelligence etc.? Info 44: adfkdsfjsd fsjdf skdfjsk dfks jf Info 454 Intelligence Analyst Info 22 Info 99 Info 111 Case: ###, Session 2311, Time: ##:##:## Person1: %# %# %&% Person2: %# 234 #4 534 Person 1: # %%% & #%3 Person 2: # #% #%&# %# % Intelligence Analyst 21

Structure analysis tool Analysis tool for emergent and evolving structure of terrorist information Spatial metaphor Whiteboard History feature Session feature Parser feature Grouping feature 22

Software architecture Levels of integration between tools Common knowledge base Common domain model Re-use of services EWaS tool SNA tool Analysis tool Domain model Domain model Domain model Knowledge base Knowledge base Knowledge base 23

Contributions We have identified and described knowledge management processes, tools, and techniques that are central to the counterterrorism domain We have developed and implemented advanced mathematical models and software tools that help automate and support knowledge processes for counterterrorism to assist intelligence analysts in their work We have presented past, ongoing, and future work on CrimeFighter a novel toolbox for counterterrorism that provides advanced support for the counterterrorism domain 24