Computational Theory and Cognitive Assistant for Intelligence Analysis
|
|
- Shawn Erik Barber
- 6 years ago
- Views:
Transcription
1 Computational Theory and Cognitive Assistant for Intelligence Analysis Gheorghe Tecuci, David Schum, Mihai Boicu, Dorin Marcu, Katherine Russell Learning Agents Center, George Mason University The Sixth International Conference on Semantic Technologies for Intelligence, Defense, and Security STIDS Fairfax, VA, 17 November 2011
2 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 2
3 Computational Theory of Intelligence Analysis Aristotle Galileo Newton Locke Whewell Peirce Wigmore Hypothesis Likelihood of Hypothesis Evidence marshaling What hypothesis would explain these observations? (Abduction: O possibly H) Hypothesis-driven collection What evidence is entailed by this hypothesis? (Deduction: H necessarily E) Multi-INT fusion What is the likelihood of the hypothesis? (Induction: E probably H) Observations Evidence in search of hypotheses Hypotheses in search of evidence New Evidence Evidentiary tests of hypotheses Implemented in TIACRITIS, a Disciple and web-based cognitive assistant that supports analysts in coping with the astonishing complexity of intelligence analysis. 3
4 Discovery of Evidence, Hypotheses, and Arguments H 5 : A dirty bomb will be set off in the Washington DC area H 4 : build dirty bomb Abduction H 3 : stolen by terrorist organization H 2 : stolen with truck H 3 : stolen by competitor H 2 :misplaced H 3 : stolen by employee H 2 : used in project TIACRITIS Hypothesis-driven collection H 11 : was in warehouse Deduction H 1 : cesium-137 canister is missing from warehouse H 12 : is not in warehouse H 13 : was not checked-out from warehouse H 11 : almost certain Multi-INT fusion H 1 Induction H 12 : very E very H 13 : very H 1 : missing H 1 : not missing E: Article on cesium-137 canister missing What hypothesis would explain this observation? Evidence in search of hypotheses P Possibly Q Security camera showing a person loading a container into an U-Haul panel truck. Ralph, the supervisor of the warehouse, reports that the cesium-137 canister is registered as being in the warehouse, that no one at the XYZ Company had checked it out, but it is not located anywhere in the hazardous materials locker. He also indicates that the lock on the hazardous materials locker appears to have been forced. Assuming that this hypothesis is true, what other things should be observable? Hypotheses in search of evidence P Necessarily Q What is the likelihood of the hypothesis based on the available evidence? Evidentiary tests of hypotheses P Probably Q 4
5 H 5 : A dirty bomb will be set off in the Washington DC area H 4 : build dirty bomb H 3 : stolen by terrorist organization H 2 : stolen with truck very H 1 : missing very E: Article on cesium-137 canister missing H 2 :misplaced H 3 : stolen by competitor H 2 : used in project TIACRITIS H 21 : cesium-137 canister missing from warehouse H 3 : stolen by employee Truck entered company H 2 : cesium-137 canister stolen with truck very The record, made by Sam, security guard at the XYZ Company, that a panel truck bearing Maryland license plate number MDC-578 was in thexyzparkingareaon the day before the discovery of the missing cesium-137 canister. almost certain H 22 : missing canister stolen with truck Cesium-137 canister stolen from locker very Scenario: Truck entered company, canister stolen from locker, canister loaded into truck, truck left with canister. almost certain The lock appears to have been forced. Locksmith Clyde s reports that the lock was forced. Multi-INT fusion Hybrid spiral reasoning Learning analytic expertise Hypothesis-driven collection very Cesium-137 canister loaded in truck Heuristic power of evidence-suggested scenarios Truck left with canister very very Security camera showing a person loading a container into an U-Haul panel truck. 5
6 Analyst s Cognitive Assistant: Disciple/TIACRITIS Analytic Assistance Supports intelligence analysts with evidence marshaling and hypotheses generation, hypothesis-driven evidence collection, multi-int hypotheses testing, collaboration with other analysts and experts, and intelligence sharing. Learning Rapidly acquires and maintains analytic expertise which currently takes years to establish, is lost when experts separate from service, and is costly to replace. Textbooks, Courses, Case Studies Tutoring Helps new student analysts learn the critical thinking skills for evidence-based hypotheses generation and analysis, through a hands-on approach Introduction to Intelligence Analysis: A Hands-on Approach 13 case studies 4 course versions A Practicum in Evidence Marshaling and Argument Construction In preparation complex case studies Modeling the Behavior of Violent Extremists 24 case studies 5 course versions 6
7 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 7
8 Illustration of the Use of TIACRITIS Hypothesis Formulation 1. Analyst formulates the hypothesis analysis problem in English 2. Analyst the selects objects and actors 3. TIACRITIS learns reusable patterns Assess whether a?o1 was stolen from the?o2 with the?o3. 4. Learned patterns speed-up future analyses
9 Hypothesis Decomposition 1. Analyst and TIACRITIS decompose the initial problem down to the level of elementary hypotheses to be evaluated based on evidence H 2 : cesium-137 canister stolen with truck H 21 : cesium-137 canister missing from warehouse Truck entered company H 22 : missing canister stolen with truck Scenario: Truck entered company, canister stolen from locker, canister loaded into truck, truck left with canister. Cesium-137 canister stolen from locker Cesium-137 canister loaded in truck Truck left with canister 2. TIACRITIS learns reasoning patterns from decompositions defined by analyst 3. TIACRITIS may suggest reformulations to reuse reasoning patterns 4. TIACRITIS may suggest decompositions
10 Evidence Collection 2. Analyst associates search criteria with elementary hypotheses 1. Elementary hypotheses to be evaluated based on evidence 3. Search engines are invoked to identify relevant evidence 10
11 Evidence Representation and Use Analyst collects evidence items and associates them to hypotheses 11
12 Automatic Analysis of Elementary Hypotheses TIACRITIS automatically generates the evidence-based analysis 12
13 Drill-down Assessment 2. TIACRITIS computes the inferential force on elementary hypotheses 1. Analyst assesses the relevance of evidence and the believability credentials, at the desired level of detail
14 Hypothesis Testing 3. Final result H 2 : cesium-137 canister stolen with truck very 2. TIACRITIS computes the inferential force on hypotheses H 21 : cesium-137 canister missing from warehouse Truck entered company very almost certain Cesium-137 canister stolen from locker H 22 : missing canister stolen with truck very Scenario: Truck entered company, canister stolen from locker, canister loaded into truck, truck left with canister. almost certain Cesium- 137 canister loaded in truck Truck left with canister very very 1. Analyst selects composition functions (min, max, average, weighted sum) 14
15 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 15
16 Cyber Insider Threat Discovery and Analysis H 51 : Covert reconnaissance, collection, and exfiltration H 41 : Non-account owner on IP 1 performed covered reconnaissance around T 1 H 31 : Non-account owner on IP 1 scanned network for shared files around T 1 H 21 : Network scan for shared files from IP 1, around T 1 H 11 : Sequence of denied accesses to network services for several systems from IP 1, around T 1 E: Log record of denied access to network service from IP 1 to IP 2 at time T 1. H 5p : Covert reconnaissance for remote vulnerabilities H 4n : Use for covert exfiltration using stepping stone H 3k : Account owner scan for files H 2j : Recent policy changes that affected user s access to specific services H 1i : Single isolated attempt Cyber Insider Threats are persons who operate inside an organization and use legitimate access and normal tactics to accomplish abnormal and malicious missions, such as, data reconnaissance, collection and exfiltration, or creating vulnerabilities for attacks by outsiders. Major national security concern. Major concern for businesses that need to protect their intellectual property. Major privacy concern. Subject Matter Expert: Angelos Stavrou What insider mission might explain this observation? Abductive reasoning (P possibly Q)
17 Cyber Insider Threat Discovery and Analysis H 41 : P 1, non-account owner on IP 1 performed reconnaissance between T 1 and T 2. H 21 : Network scan for shared files from IP 1, between T 1 and T 2 (very ). H 11 : Sequence of denied accesses to network services for several systems from IP 1, between T 1 and T 2 (certain). H 31 : Non-account owner on IP 1 scanned network for shared files between T 1 and T 2. (very ). H 4n : P n, non-account owner on IP 1 performed reconnaissance between T 1 and T 2. H 32 : Account owner on IP 1 scanned network for shared files between T 1 and T 2. (very un). E: Log record of denied access to network service from IP 1 to IP 2 at time T 1. H 22 : Recent policy changes (very un). H 12 : Single isolated attempt H: Non-account owner accessed an account on computer C 1 between T 1 and T 2. Scenario: Physical access of C 1 in conference room CR 1 A person from CR 1, accessed someone s account on computer C 1, between T 1 and T 2. Search for persons present in conference room CR 1 between T 1 and T 2. Search for persons who entered conference room CR 1 before T 2. (no possibility) Search for persons who entered CR 1 before T 2, based on door logs. Computer C 1 has IP 1 address CR 1 is a conference room Search for persons who entered CR 1 before T 2, based on scheduled meetings participants. H 31 : Non-account owner on IP 1 scanned the network for shared files, between T 1 and T 2. Search for user activity between T 1 and T 2 for the user(s) assigned to IP 1. H: almost certain Search for persons who entered CR 1 before T 2, based on outside surveillance video camera VC 1. H 21 : Network scan for shared files from IP 1, between T 1 and T 2. Search for logs of network scan for shared files, from IP 1, between T 1 and T 2. Search for Search for host machine logs with file sharing request from IP 1. H 21 : very H: very
18 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 18
19 TIACRITIS Development of the agent shell 1 Developer and knowledge engineer Future Work Agent teaching by expert analyst TIACRITIS 2 Knowledge base integration and optimization TIACRITIS 6 TIACRITIS TIACRITIS Expert analyst and knowledge engineer Training of analyst Analyst TIACRITIS Evidence marshaling and hypotheses generation 3 New capabilities for training Collaborating analysts P 1 1 S 1 1 Capturing analytic expertise P 1 4 S 1 Collaborative analysis P 1n 5 TIACRITIS Knowledge engineer and expert analyst After action review and learning Continuous evidence monitoring S 1n P 1 1 Analyst S 1 Question Answer Question Answer S 1 1 P 1 Question Answer Question Answer P 1 n S 1 n Search criteria Automatic report generation P 2 m S 2 m P 2 S Search criteria Agent use and non-disruptive learning Pm 2 Sm 2 Search criteria 19
20 Discussion 20
21 Acknowledgements This research was partially supported by the National Geospatial- Intelligence Agency (PM Phillip Hwang), by the Department of Defense (PMs Erin Gibbens and Benjamin Hamilton), and by George Mason University. It was also guided by the following Advisory Board: Donald Kerr (chair), Kelcy Allwein, Keith Anthony, Cindy Ayers, Sharon Hamilton, Jim Homer, Joan McIntyre, William Nolte, George Stemler, and Benjamin Wible. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. 21
"SAFETY IN THE SEA PORTS
"SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY
More informationEmpowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper
Empowering Customer Analytics, Fraud Detection, and Threat Assessment Whitepaper EMPOWERING CUSTOMER ANALYTICS, FRAUD DETECTION, AND THREAT ASSESSMENT October 2015 novetta.com 2015, Novetta Most organizations
More informationOperationally Focused Pentesting
SESSION ID: CIN-W05 Greg Anderson Operationally Focused Pentesting Technical Account Manager Qualys, Inc. @pghsec Mike Cook Cyber Security Researcher and Pentester CERT Division of the Software Engineering
More informationPREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm
PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm WELCOME Audio is streamed over your computer Dial in numbers and codes are
More informationSECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS
SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS PACOM is quickly developing a distinguished reputation as a global leader in the field of remote security management for utilities and telecommunications
More informationCollaborative Workspace
Introduction Scenario 1 Scenario 2 Scenario 3 Collaborative Workspace Stoney Trent Martin Voshell Justin Grossman Introduction Scenario 1 Scenario 2 Scenario 3 Findings concerning Intelligence Analysis
More informationSecurity intelligence for service providers
Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security
More informationFraud Controls to Tackle the Mobile Revolution
Fraud Controls to Tackle the Mobile Revolution TABLE OF CONTENTS Overview... 3 Today s Challenges for Financial Institutions... 3 Mobile-Enabled Fraud Mitigation... 5 Identify & Combat Mobile-Enabled Fraud
More informationStrategic Plan
Information Technology Strategic Plan 2019-2021 Presented by Darin King Vice Chancellor for Information Technology/CIO Strategic Plan 2019-2021 Contents Executive Summary... 3 Goals...4 GOAL ONE...4 GOAL
More informationWE THRIVE ON YOUR SUCCESS
P H Y S I C A L S E C U R I T Y INTRODUCTION Comm-Works, your partner for life. As a single source provider of technology integration and project management services, we have the ability to meet your most
More informationReal-Time Scene Understanding
Real-Time Scene Understanding Dynamic Data Driven Applications Systems Dr. Frederica Darema Dr. Alex Aved Research Computer Scientist Analytical Systems Branch alexander.aved@us.af.mil 1 Problem Statement
More informationContent Specification Outline
Content Specification Outline Copyright 2017 Institute of Certified Management Accountants Updated 8/25/17 Institute of Certified Management Accountants Content Specification Outline Certified in Strategy
More informationReady for takeoff? Overcoming the practical and legal difficulties in identifying and realizing the value of data. Self-assessment guide
Ready for takeoff? Overcoming the practical and legal difficulties in identifying and realizing the value of data Self-assessment guide Heatmap Life sciences Barriers Maturity Consumer products Barriers
More informationIBM i2 Enterprise Insight Analysis
IBM i2 Enterprise Insight Analysis Accelerate the data-to-decision process by rapidly transforming overwhelming data into actionable insight Highlights Uncover hidden connections and insights across massive
More informationAssisted Crowd Management, from data to mobility insight
Assisted Crowd Management, from data to mobility insight UNDERSTAND THE JOURNEY PATTERNS TO ENHANCE THE PASSENGER EXPERIENCE Ludovic LANG Sales & Bids Director Head of Innovation 20 April 2017 www.thalesgroup.com
More informationLogistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes
Logistics SOLUTION ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT Secure the flow of goods, and optimize the operation processes - Security As a fast growing solution provider, ACTi is dedicated
More informationTHE SIMPLE TRUTHS OF ACCESS CONTROL
THE SIMPLE TRUTHS OF ACCESS CONTROL Access control is... the process of managing the entry or access to specific buildings or locations for individuals who have authorization to be there. Access control
More informationIndustrial Internet of Things
Industrial Internet of Things - The New Frontier - ARC Industry Forum February 2015 Greg Gorbach Vice President ARC Advisory Group ggorbach@arcweb.com Think Different To tap the potential of IIoT New Service
More informationTechnicalPitch Cibersegurança. Rui Barata Ribeiro Security Software Sales da IBM Portugal
TechnicalPitch Cibersegurança Rui Barata Ribeiro Security Software Sales da IBM Portugal IBM SECURITY STRATEGY SECURING THE THREATS OF TOMORROW, TODAY Rui Barata Ribeiro IBM Security June 2018 We exist
More informationThis unit standard is expiring
Page 1 of 5 Title Apply intelligence analysis techniques to complete an intelligence product Level 5 Credits 15 Purpose People credited with this unit standard are able to: define the intelligence problem
More information23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION
MARITIME DRIVING DIGITAL INNOVATION FOR FUTURE GROWTH Enhancing Security and Connectivity 24 Ang Mo Kio Street 65, Singapore 569061 mktg.elect@stengg.com www.stengg.com CHALLENGES AND OPPORTUNITIES ENHANCING
More informationRisk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness. Duane Boniface ABS Consulting
Risk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness Duane Boniface ABS Consulting dboniface@absconsulting.com 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public
More informationRESS. WATCH OVER YOUR ASSETS, WHENEVER YOU WANT, WHEREVER YOU ARE. RUSSELL ELECTRONIC SECURITY SYSTEMS YOUR NUMBER ONE SECURITY PROVIDER
RUSSELL ELECTRONIC SECURITY SYSTEMS YOUR NUMBER ONE SECURITY PROVIDER WATCH OVER YOUR ASSETS, WHENEVER YOU WANT, WHEREVER YOU ARE. ALARM INSTALLATION CCTV SPECIALISTS ACCESS CONTROL PROTECTING PEOPLE,
More informationActivity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration. Presented by: Ken Mitchell / Kyle Talbot
Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration Presented by: Ken Mitchell / Kyle Talbot Activity Based Intelligence A Perilous Journey to Intelligence Integration Leverage
More informationIARPA Cloud Computing. IARPA Overview
IARPA Cloud Computing IARPA Overview Kerry Name Long Job Program Title Manager Date The United States Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of State
More informationCatching malicious insiders through behavioral analytics
Catching malicious insiders through behavioral analytics Jesse Hughes, Managing Principal Agenda 8 Understanding bad guys Recognizing what it takes to be a good guy 2 Heads up: This is going to get fluffy
More informationAccelerating innovation with IBM Cloud
Accelerating innovation with IBM Cloud Anthony Butler, CTO, IBM Cloud MEA 26 April, 2017 Viceroy Hotel, Palm Jumeirah Why innovate? and it s a trend that continues till this day. Since 2000, 52% of
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base Applied OCO ## Total FY 2015 FY 2016 FY
More informationFood Defense Supplier Guidelines
Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments
More informationChapter 9. Business Intelligence Systems
Chapter 9 Business Intelligence Systems We Can Make the Bits Produce Any Report You Want, But You ve Got to Pay for It. Need to monitor patient workout data. Spending too many hours each day looking at
More informationIBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights
IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the
More informationSoftware Assurance Ecosystem
Software Assurance Ecosystem Djenana Campara Chief Executive Officer, KDM Analytics Board Director, Object Management Group (OMG) Co-Chair Software Assurance and Architecture Driven Modernization, OMG
More informationDigital & Technology Solutions Specialist Integrated Degree Apprenticeship (Level 7)
Digital & Technology Solutions Specialist Integrated Degree Apprenticeship (Level 7) Role Profile A Digital & Technology Solutions Specialist maintains digital and technology strategies through technology
More informationThe SWRLing Future of OWL. Mark Greaves DARPA / IXO
The SWRLing Future of OWL Mark Greaves DARPA / IXO In the Beginning DARPA Agent Mark Up Language (DAML) PE/Project Number: 62301E/ST-11 PAD ID NUMBER: 010033 PGM NUMBER: XAM8E DIRO APPROVAL: PGM MANAGER:
More informationSAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts
SAP Configuration Validation Solution Brief Objectives Solution Benefits Quick Facts Drive your business with confidence Realize the potential of SAP software Develop a robust response to cyber risks SAP
More informationA Visualization and Decision-Support Tool for Homeland Security Risk Prioritization
Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:
More informationGDPR and Microsoft 365: Streamline your path to compliance
Streamline your path to compliance GDPR: an overview The General Data Protection Regulation (GDPR) is a new European Union (EU) privacy law that takes effect on May 25,. It is designed to give individuals
More informationbizsafe Level 2 Ver. 1.0 by MOM/WSH Council. For Authorised Use Only. All Rights Reserved.
bizsafe Level 2 What is? SGSecure is a national movement to sensitise, train and mobilise our community to play a part to prevent and deal with a terrorist attack. It is how the whole of Singapore can
More informationARC VIEW. Owens Corning Goes Mobile with TCS. Keywords. Summary. Improved Visibility Needed. By Ralph Rio
ARC VIEW MAY 10, 2012 Owens Corning Goes Mobile with TCS By Ralph Rio Keywords Owens Corning, Mobility, TCS, Visibility, ios, Android Summary At this early stage in Owen Corning s mobility journey, the
More informationHiren Majmudar Vice President, Intel Capital Austin, TX
Hiren Majmudar Vice President, Intel Capital Austin, TX 4th Industrial Revolution You Are Here 1760 s 1860 s 1960 s 2 the Vortex Effect 3 Intel Capital Investment focus areas fueling the 4 th industrial
More informationYour Trusted Technology Partner
Business Solutions Your Trusted Technology Partner Serving Kansas and Beyond Delivering critical technology applications in an increasingly complex world can be a tremendous challenge for any business
More informationECONOMIC MACHINE LEARNING FOR FRAUD DETECTION
ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION Maytal Saar-Tsechansky 2015 UT CID Report #1511 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE
More informationDesign and Implementation of an ERP System. Reg No: F17/1431/2011 Project Index:PRJ047 Supervisor: Prof. M.K Mang oli Examiner: DR. C.
Design and Implementation of an ERP System Reg No: F17/1431/2011 Project Index:PRJ047 Supervisor: Prof. M.K Mang oli Examiner: DR. C. Wekesa OBJECTIVE To define what a medium office is and to come up with
More informationThe Cognitive Costs and Benefits of Automation
Dr Richard Breton DRDC-RDDC Valcartier 2459 Pie-XI Blvd North Val-Bélair, Québec G3J 1X5 CANADA Tel.: 418-844-4000 (ext.:4753) Fax: 418-844-4538 Richard.Breton@drdc-rddc.gc.ca Dr Éloi Bossé DRDC-RDDC Valcartier
More informationAnnual Big Data for Intelligence Symposium
Defense Strategies Institute professional educational forum: 4th Annual Big Data for Intelligence Symposium ~Leveraging the Big Data Opportunity~ November 29-30, 2016: AUSA Conference and Event Center
More informationA How to Guide to Predictive Analytics
A How to Guide to Predictive Analytics A How to Guide to Predictive Analytics Chapter 1: The Promise of Predictive Analytics Chapter 2: Data End Points Chapter 3: Storing and Managing Data Chapter 4: Policy
More informationThe Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment
The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment Timothy Darr, Richard Mayer and Perakath Benjamin Knowledge-Based Systems, Inc. 1408 University Drive East College
More informationEconomic Machine Learning for Fraud Detection
Economic Machine Learning for Fraud Detection Maytal Saar-Tsechansky 2015 UT CID Report #1518 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE
More informationThe Cognitive Bank: Redefining banks and banking
Sales and Distribution Thought Leadership White Paper Banking The Cognitive Bank: Redefining banks and banking 2 The Cognitive Bank: Redefining banks and banking Bankers have always understood the value
More informationA tool for generating, structuring, and analyzing multiple hypotheses in intelligence work
2013 European Intelligence and Security Informatics Conference A tool for generating, structuring, and analyzing multiple hypotheses in intelligence work Tove Gustavi, Maja Karasalo, Christian Mårtenson
More informationSubsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a
Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a subordinate level are subsumed under a super-ordinate activity.
More informationDestabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University
Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Area:
More informationSecurity & Defense Solutions
intelligent convergence TM Security & Defense Solutions Intelligent Convergence with Augusta Systems EdgeFrontier White Paper The Need for Intelligent Convergence The distributed and evolving nature of
More informationEstablishing Data Fusion Center Baseline Technology Capabilities. Paul Christin ESRI David Stampfli Microsoft
Establishing Data Fusion Center Baseline Technology Capabilities Paul Christin ESRI David Stampfli Microsoft Problem The asymmetrical threat of organized crime, gangs, drug cartels and terrorist organizations
More informationDocument and Media Exploitation (DOMEX)
SOLUTION BRIEF: DOCUMENT AND MEDIA EXPLOITATION (DOMEX)........................................ Document and Media Exploitation (DOMEX) Who should read this paper DOMEX analysts looking to quickly prioritize,
More informationlead the digital transformation
lead the digital transformation bhge.com Digital Drive productivity, up-time, and profitability It s time to write a new energy story, one that will transform the industry from the reservoir to the refinery.
More informationCurrent and Future Uses Of ARES Video Data Intelligence At Maritime Ports
Current and Future Uses Of ARES Video Data Intelligence At Maritime Ports A White Paper Issued by Cyclops Technologies, Inc. October 2014 Copyright 2014 Cyclops Technologies, Inc. This document is available
More informationCATHEXIS. CathexisVision Solutions Beyond Surveillance. Beyond Surveillance. Increase return on investment
CATHEXIS Solutions Beyond Surveillance Increase return on investment The IP Video Management Software suite provides an extensive range of sophisticated solutions to satisfy all security and infrastructure
More informationIntelligence Advanced Research Projects Activity. May 2014
Intelligence Advanced Research Projects Activity May 2014 Office of the Director of National Intelligence Central Intelligence Agency Defense Intelligence Agency Department of State National Security Agency
More informationPresentation by: Meredith A. Lane. Presentation for: CESU Network
Presentation by: Meredith A. Lane Presentation for: CESU Network Presentation date: 11 July 2013 BECS Mission: Science to Manage Environmental and Social Transitions Increase problem focused understanding
More informationCopyright Notice. For reprint permission and information, please direct your inquiry to
Copyright Notice Copyright Notice. All materials contained within this document are protected by United States copyright law and may not be reproduced, distributed, transmitted, displayed, published, or
More informationUsing SysML for model-based vulnerability assessment
Available online at www.sciencedirect.com Scienceirect Procedia Computer Science 00 (2015) 000 000 www.elsevier.com/locate/procedia 2015 Conference on Systems Engineering Research Using SysML for model-based
More informationCopyright 2013 Oracle and/or its affiliates. All rights reserved.
1 The Value of Big Data and Analytics in Government Jan 22, 2014 Wayne Babby, Deputy Director (A), California Department of Corrections & Rehabilitation Tim Dexter, Solution Architect, Analytics Practice,
More informationTowards Better Control of Information Assurance Assessments in Exercise Settings
ITEA Journal 2008; 29: 63 66 Copyright 2008 by the International Test and Evaluation Association Towards Better Control of Information Assurance Assessments in Exercise Settings David J. Aland Wyle, Arlington,
More informationReport of Presidential Ad Hoc Committee for Building Health and Safety under Extraordinary Incidents
Report of Presidential Ad Hoc Committee for Building Health and Safety under Extraordinary Incidents On Risk Management Guidance for Health, Safety and Environmental Security under Extraordinary Incidents
More informationMaxxess to exhibit smart hospitality access control and visitor management solutions at Intersec 2019
Maxxess to exhibit smart hospitality access control and visitor management solutions at Intersec 2019 Published on 11 Jan 2019 Maxxess will be at Intersec 2019 showcasing its latest advances in corporate
More informationE-Plan Implementation Guide for Federal, State, and Local Authorizing Authority
E-Plan Implementation Guide for Federal, State, and Local Authorizing Authority E-Plan Implementation Guide for Federal, State, and Local Authorizing Authority v2.0 Page 1 of 11 Document Change History
More information2015 Research Trainee Program Competition for Post-Doctoral Fellowship Awards EVALUATION CRITERIA FOR REVIEWERS
2015 Research Trainee Program Competition for Post-Doctoral Fellowship Awards EVALUATION CRITERIA FOR REVIEWERS VERSION 1 LAST UPDATED: JANUARY 28, 2015 Note to ALL Reviewers: Read all assigned applications
More informationEMPOWER YOUR ANALYSTS. GO BEYOND BIG DATA. Delivering Unparalleled Clarity of Entity Data. White Paper. September 2015 novetta.com 2015, Novetta, LLC.
EMPOWER YOUR ANALYSTS. GO BEYOND BIG DATA. Delivering Unparalleled Clarity of Entity Data White Paper September 2015 novetta.com 2015, Novetta, LLC. DELIVERING UNPARALLELLED CLARITY OF ENTITY DATA The
More informationAdvancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION
Advancing Information Management and Analysis with Entity Resolution Whitepaper February 2016 novetta.com 2016, Novetta ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information
More informationMicrosoft 365 Business Services
The Partner Financial Opportunity March 2018 Copyright information 2018 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document,
More informationThe Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS
The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation!! 2 For Most Organizations,
More informationSAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016
SAP Enterprise Threat Detection Overview & Roadmap Martin Plummer, SAP SE November 2016 Disclaimer The information in this document is confidential and proprietary to SAP and may not be disclosed without
More informationTHIRD PARTY VS SAP SOLUTION MANAGER FOR SAP CYBERSECURITY PROTECTION
LAYER SEVEN SECURITY THIRD PARTY VS SAP SOLUTION MANAGER FOR SAP CYBERSECURITY PROTECTION COMPARISON CHART Third Party vs. SAP Solution Manager Third Party Solutions Recommended System Inventory Vulnerability
More informationDetect & Investigate Threats. THE ANALYTICS HIGHLIGHTS AFTER DATA COLLECTION, IT'S ALL ABOUT THE ANALYTICS
Detect & Investigate Threats. HIGHLIGHTS The Analytics Proven, patented interactive data-driven investigative session analysis Powerful streaming analytics for incident detection, and alerting Malware
More informationThe App Economy Requires Mainframe Intelligence
The App Economy Requires Mainframe Intelligence Digital Transformation and the Mainframe Today, customer experience is paramount to business survival. Frankly, every interaction whether with a bank or
More informationOracle Knowledge Analytics User Guide
Oracle Knowledge Analytics User Guide Working with Oracle Knowledge Analytics Reports Oracle Knowledge Version 8.4.2.2 April, 2012 Oracle, Inc. COPYRIGHT INFORMATION Copyright 2002, 2011, Oracle and/or
More informationThird-Party Enterprise Software Support: Key Risks and Questions to Ask
-rr.z.-'71., iirritirit w 0 et Arkalyze the Future IDC PERSPECTIVE Third-Party Enterprise Software Support: Key Risks and Questions to Ask Rob Brothers Elaina Stergiades EXECUTIVE SNAPSHOT FIGURE 1 Executive
More information1 P a g e. IT Tailored to Your Needs
1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,
More informationIntelligent Systems. For more information on partnering with the Kansas City Plant, contact:
Intelligent Systems For more information on partnering with the Kansas City Plant, contact: Office of Business Development 1.800.225.8829 customer_inquiry@kcp.com Machine Intelligence Machine intelligence
More informationTask Force on the Role of Autonomy in the DoD Systems
Task Force on the Role of Autonomy in the DoD Systems Dr. Robin Murphy, Co-Chair Mr. James Shields, Co-Chair June 2012 Terms of Reference Review relevant technologies to evaluate readiness for introduction
More informationDestabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University
Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Modeling
More informationDAU-South Acquisition Update February 23, 2017 Session Topics and Descriptions (Presentations will be available for download after the event.
DAU-South Acquisition Update February 23, 2017 Session Topics and Descriptions (Presentations will be available for download after the event.) Session 1: 8:00 9:30 am (CENTRAL) 1.1: Understanding Government:
More informationFraud Investigation & Dispute Services. Forensic analysis and global experience: the intelligent connection
Fraud Investigation & Dispute Services Forensic analysis and global experience: the intelligent connection Protect your company s reputation and reduce financial risk Businesses are always under scrutiny
More informationAdvanced Analytics for High Tech Firms
Advanced Analytics for High Tech Firms AYASDI FOR HIGH TECH: THE BENEFITS OF ADVANCED ANALYTICS 2 Introducing Ayasdi s Advanced Analytics Software As a manufacturer, you look for ways to capitalize on
More informationUsing discrete event simulation in supply chain planning
Using discrete event simulation in supply chain planning Hellström, Daniel; Johnsson, Mats 2002 Link to publication Citation for published version (APA): Hellström, D., & Johnsson, M. (2002). Using discrete
More informationDesigning Optimal Organizational Structures for Combat Information Centers in the Next Generation of Navy Ships
Designing Optimal Organizational Structures for Combat Information Centers in the Next Generation of Navy Ships Michael J. Paley* Yuri N. Levchuk Daniel Serfaty Jean MacMillan Aptima, Inc. 600 West Cummings
More informationUNTANGLING ATTRIBUTION: WHY IT HAS FAILED AND HOW IT SHOULD BE DONE MANOS ANTONAKAKIS SEPTEMBER 27,2017
UNTANGLING ATTRIBUTION: WHY IT HAS FAILED AND HOW IT SHOULD BE DONE MANOS ANTONAKAKIS SEPTEMBER 27,2017 WHAT IS AND WHY SHOULD WE CARE ABOUT ATTRIBUTION? What is attack attribution? It is the process through
More informationHOW TO PREVENT REGISTRATION FRAUD. The ultimate guide to responsibly growing a user base
HOW TO PREVENT REGISTRATION FRAUD The ultimate guide to responsibly growing a user base TABLE OF CONTENTS INTRODUCTION The User Base Is the New Black 3 ONLINE BUSINESSES AND THE EPIDEMIC OF ACCOUNT FRAUD
More informationAGILITY QUOTIENT (AQ) without specifying the nature of the mission or the circumstances under which it will be conducted?
AGILITY QUOTIENT (AQ) David Alberts sponsivenes Progress in designing and developing more rsatility agile entities will depend on our ability to observe exibility appropriate behaviors and outcomes, associate
More informationOn the Radar: Liaison Technologies
On the Radar: Liaison Technologies dpaas-based managed services for complex integration and data management requirements Publication Date: 16 Jun 2015 Product code: IT0022-000386 Saurabh Sharma Summary
More informationTHE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE
THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution
More informationAn Empirical Assessment of Domestic Radicalization *
An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies
More informationTELESTE S-AWARE. Situational awareness and incident management solution
TELESTE S-AWARE Situational awareness and incident management solution TELESTE S-AWARE YOUR KEY TO SHARPER DECISION-MAKING Security and operations control systems, such as video surveillance systems, are
More informationSmart Building. Provide emergency notification and event record
Smart Building Provide emergency notification and event record IP Camera VMS Access Control LPR How GeoVision makes smart building even smarter GeoVision Access Control provides the most advanced full
More informationOCTAVE -S Implementation Guide, Version 1.0. Volume 2: Preparation Guidance. Christoper Alberts Audrey Dorofee James Stevens Carol Woody.
OCTAVE -S Implementation Guide, Version 1.0 Volume 2: Preparation Guidance Christoper Alberts Audrey Dorofee James Stevens Carol Woody January 2005 HANDBOOK CMU/SEI-2003-HB-003 Pittsburgh, PA 15213-3890
More informationManufacturing: Small and Midsize Industrial Machinery and Components Manufacturers Are Using Technology to Make a Difference
Sponsored by: SAP Authors: Raymond Boggs Jeffrey Hojlo August 2016 Manufacturing: Small and Midsize Industrial Machinery and Components Manufacturers Are Using Technology to Make a Difference THE BRIEF
More informationIARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON
IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON 25 October 2016 Intelligence Advanced Research Projects Activity The Intelligence Community Central Intelligence Agency Defense Intelligence
More informationDigitalisation of services in the marine, oil and gas and energy sectors
Digitalisation of services in the marine, oil and gas and energy sectors BUSINESS WHITE PAPER CONTENTS Digitalisation is an opportunity to develop industrial services into deeper partnerships, with a focus
More informationEnsuring progress toward risk management and continuous configuration compliance
IBM Security Thought Leadership White Paper July 2017 Ensuring progress toward risk management and continuous configuration compliance Get continuous compliance, real-time analytics and insight with IBM
More information