Computational Theory and Cognitive Assistant for Intelligence Analysis

Size: px
Start display at page:

Download "Computational Theory and Cognitive Assistant for Intelligence Analysis"

Transcription

1 Computational Theory and Cognitive Assistant for Intelligence Analysis Gheorghe Tecuci, David Schum, Mihai Boicu, Dorin Marcu, Katherine Russell Learning Agents Center, George Mason University The Sixth International Conference on Semantic Technologies for Intelligence, Defense, and Security STIDS Fairfax, VA, 17 November 2011

2 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 2

3 Computational Theory of Intelligence Analysis Aristotle Galileo Newton Locke Whewell Peirce Wigmore Hypothesis Likelihood of Hypothesis Evidence marshaling What hypothesis would explain these observations? (Abduction: O possibly H) Hypothesis-driven collection What evidence is entailed by this hypothesis? (Deduction: H necessarily E) Multi-INT fusion What is the likelihood of the hypothesis? (Induction: E probably H) Observations Evidence in search of hypotheses Hypotheses in search of evidence New Evidence Evidentiary tests of hypotheses Implemented in TIACRITIS, a Disciple and web-based cognitive assistant that supports analysts in coping with the astonishing complexity of intelligence analysis. 3

4 Discovery of Evidence, Hypotheses, and Arguments H 5 : A dirty bomb will be set off in the Washington DC area H 4 : build dirty bomb Abduction H 3 : stolen by terrorist organization H 2 : stolen with truck H 3 : stolen by competitor H 2 :misplaced H 3 : stolen by employee H 2 : used in project TIACRITIS Hypothesis-driven collection H 11 : was in warehouse Deduction H 1 : cesium-137 canister is missing from warehouse H 12 : is not in warehouse H 13 : was not checked-out from warehouse H 11 : almost certain Multi-INT fusion H 1 Induction H 12 : very E very H 13 : very H 1 : missing H 1 : not missing E: Article on cesium-137 canister missing What hypothesis would explain this observation? Evidence in search of hypotheses P Possibly Q Security camera showing a person loading a container into an U-Haul panel truck. Ralph, the supervisor of the warehouse, reports that the cesium-137 canister is registered as being in the warehouse, that no one at the XYZ Company had checked it out, but it is not located anywhere in the hazardous materials locker. He also indicates that the lock on the hazardous materials locker appears to have been forced. Assuming that this hypothesis is true, what other things should be observable? Hypotheses in search of evidence P Necessarily Q What is the likelihood of the hypothesis based on the available evidence? Evidentiary tests of hypotheses P Probably Q 4

5 H 5 : A dirty bomb will be set off in the Washington DC area H 4 : build dirty bomb H 3 : stolen by terrorist organization H 2 : stolen with truck very H 1 : missing very E: Article on cesium-137 canister missing H 2 :misplaced H 3 : stolen by competitor H 2 : used in project TIACRITIS H 21 : cesium-137 canister missing from warehouse H 3 : stolen by employee Truck entered company H 2 : cesium-137 canister stolen with truck very The record, made by Sam, security guard at the XYZ Company, that a panel truck bearing Maryland license plate number MDC-578 was in thexyzparkingareaon the day before the discovery of the missing cesium-137 canister. almost certain H 22 : missing canister stolen with truck Cesium-137 canister stolen from locker very Scenario: Truck entered company, canister stolen from locker, canister loaded into truck, truck left with canister. almost certain The lock appears to have been forced. Locksmith Clyde s reports that the lock was forced. Multi-INT fusion Hybrid spiral reasoning Learning analytic expertise Hypothesis-driven collection very Cesium-137 canister loaded in truck Heuristic power of evidence-suggested scenarios Truck left with canister very very Security camera showing a person loading a container into an U-Haul panel truck. 5

6 Analyst s Cognitive Assistant: Disciple/TIACRITIS Analytic Assistance Supports intelligence analysts with evidence marshaling and hypotheses generation, hypothesis-driven evidence collection, multi-int hypotheses testing, collaboration with other analysts and experts, and intelligence sharing. Learning Rapidly acquires and maintains analytic expertise which currently takes years to establish, is lost when experts separate from service, and is costly to replace. Textbooks, Courses, Case Studies Tutoring Helps new student analysts learn the critical thinking skills for evidence-based hypotheses generation and analysis, through a hands-on approach Introduction to Intelligence Analysis: A Hands-on Approach 13 case studies 4 course versions A Practicum in Evidence Marshaling and Argument Construction In preparation complex case studies Modeling the Behavior of Violent Extremists 24 case studies 5 course versions 6

7 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 7

8 Illustration of the Use of TIACRITIS Hypothesis Formulation 1. Analyst formulates the hypothesis analysis problem in English 2. Analyst the selects objects and actors 3. TIACRITIS learns reusable patterns Assess whether a?o1 was stolen from the?o2 with the?o3. 4. Learned patterns speed-up future analyses

9 Hypothesis Decomposition 1. Analyst and TIACRITIS decompose the initial problem down to the level of elementary hypotheses to be evaluated based on evidence H 2 : cesium-137 canister stolen with truck H 21 : cesium-137 canister missing from warehouse Truck entered company H 22 : missing canister stolen with truck Scenario: Truck entered company, canister stolen from locker, canister loaded into truck, truck left with canister. Cesium-137 canister stolen from locker Cesium-137 canister loaded in truck Truck left with canister 2. TIACRITIS learns reasoning patterns from decompositions defined by analyst 3. TIACRITIS may suggest reformulations to reuse reasoning patterns 4. TIACRITIS may suggest decompositions

10 Evidence Collection 2. Analyst associates search criteria with elementary hypotheses 1. Elementary hypotheses to be evaluated based on evidence 3. Search engines are invoked to identify relevant evidence 10

11 Evidence Representation and Use Analyst collects evidence items and associates them to hypotheses 11

12 Automatic Analysis of Elementary Hypotheses TIACRITIS automatically generates the evidence-based analysis 12

13 Drill-down Assessment 2. TIACRITIS computes the inferential force on elementary hypotheses 1. Analyst assesses the relevance of evidence and the believability credentials, at the desired level of detail

14 Hypothesis Testing 3. Final result H 2 : cesium-137 canister stolen with truck very 2. TIACRITIS computes the inferential force on hypotheses H 21 : cesium-137 canister missing from warehouse Truck entered company very almost certain Cesium-137 canister stolen from locker H 22 : missing canister stolen with truck very Scenario: Truck entered company, canister stolen from locker, canister loaded into truck, truck left with canister. almost certain Cesium- 137 canister loaded in truck Truck left with canister very very 1. Analyst selects composition functions (min, max, average, weighted sum) 14

15 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 15

16 Cyber Insider Threat Discovery and Analysis H 51 : Covert reconnaissance, collection, and exfiltration H 41 : Non-account owner on IP 1 performed covered reconnaissance around T 1 H 31 : Non-account owner on IP 1 scanned network for shared files around T 1 H 21 : Network scan for shared files from IP 1, around T 1 H 11 : Sequence of denied accesses to network services for several systems from IP 1, around T 1 E: Log record of denied access to network service from IP 1 to IP 2 at time T 1. H 5p : Covert reconnaissance for remote vulnerabilities H 4n : Use for covert exfiltration using stepping stone H 3k : Account owner scan for files H 2j : Recent policy changes that affected user s access to specific services H 1i : Single isolated attempt Cyber Insider Threats are persons who operate inside an organization and use legitimate access and normal tactics to accomplish abnormal and malicious missions, such as, data reconnaissance, collection and exfiltration, or creating vulnerabilities for attacks by outsiders. Major national security concern. Major concern for businesses that need to protect their intellectual property. Major privacy concern. Subject Matter Expert: Angelos Stavrou What insider mission might explain this observation? Abductive reasoning (P possibly Q)

17 Cyber Insider Threat Discovery and Analysis H 41 : P 1, non-account owner on IP 1 performed reconnaissance between T 1 and T 2. H 21 : Network scan for shared files from IP 1, between T 1 and T 2 (very ). H 11 : Sequence of denied accesses to network services for several systems from IP 1, between T 1 and T 2 (certain). H 31 : Non-account owner on IP 1 scanned network for shared files between T 1 and T 2. (very ). H 4n : P n, non-account owner on IP 1 performed reconnaissance between T 1 and T 2. H 32 : Account owner on IP 1 scanned network for shared files between T 1 and T 2. (very un). E: Log record of denied access to network service from IP 1 to IP 2 at time T 1. H 22 : Recent policy changes (very un). H 12 : Single isolated attempt H: Non-account owner accessed an account on computer C 1 between T 1 and T 2. Scenario: Physical access of C 1 in conference room CR 1 A person from CR 1, accessed someone s account on computer C 1, between T 1 and T 2. Search for persons present in conference room CR 1 between T 1 and T 2. Search for persons who entered conference room CR 1 before T 2. (no possibility) Search for persons who entered CR 1 before T 2, based on door logs. Computer C 1 has IP 1 address CR 1 is a conference room Search for persons who entered CR 1 before T 2, based on scheduled meetings participants. H 31 : Non-account owner on IP 1 scanned the network for shared files, between T 1 and T 2. Search for user activity between T 1 and T 2 for the user(s) assigned to IP 1. H: almost certain Search for persons who entered CR 1 before T 2, based on outside surveillance video camera VC 1. H 21 : Network scan for shared files from IP 1, between T 1 and T 2. Search for logs of network scan for shared files, from IP 1, between T 1 and T 2. Search for Search for host machine logs with file sharing request from IP 1. H 21 : very H: very

18 Overview Computational Theory of Intelligence Analysis Hypotheses Analysis with TIACRITIS Cyber Insider Threat Discovery and Analysis Future Research and Development Discussion 18

19 TIACRITIS Development of the agent shell 1 Developer and knowledge engineer Future Work Agent teaching by expert analyst TIACRITIS 2 Knowledge base integration and optimization TIACRITIS 6 TIACRITIS TIACRITIS Expert analyst and knowledge engineer Training of analyst Analyst TIACRITIS Evidence marshaling and hypotheses generation 3 New capabilities for training Collaborating analysts P 1 1 S 1 1 Capturing analytic expertise P 1 4 S 1 Collaborative analysis P 1n 5 TIACRITIS Knowledge engineer and expert analyst After action review and learning Continuous evidence monitoring S 1n P 1 1 Analyst S 1 Question Answer Question Answer S 1 1 P 1 Question Answer Question Answer P 1 n S 1 n Search criteria Automatic report generation P 2 m S 2 m P 2 S Search criteria Agent use and non-disruptive learning Pm 2 Sm 2 Search criteria 19

20 Discussion 20

21 Acknowledgements This research was partially supported by the National Geospatial- Intelligence Agency (PM Phillip Hwang), by the Department of Defense (PMs Erin Gibbens and Benjamin Hamilton), and by George Mason University. It was also guided by the following Advisory Board: Donald Kerr (chair), Kelcy Allwein, Keith Anthony, Cindy Ayers, Sharon Hamilton, Jim Homer, Joan McIntyre, William Nolte, George Stemler, and Benjamin Wible. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. 21

"SAFETY IN THE SEA PORTS

SAFETY IN THE SEA PORTS "SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY

More information

Empowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper

Empowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper Empowering Customer Analytics, Fraud Detection, and Threat Assessment Whitepaper EMPOWERING CUSTOMER ANALYTICS, FRAUD DETECTION, AND THREAT ASSESSMENT October 2015 novetta.com 2015, Novetta Most organizations

More information

Operationally Focused Pentesting

Operationally Focused Pentesting SESSION ID: CIN-W05 Greg Anderson Operationally Focused Pentesting Technical Account Manager Qualys, Inc. @pghsec Mike Cook Cyber Security Researcher and Pentester CERT Division of the Software Engineering

More information

PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm

PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm WELCOME Audio is streamed over your computer Dial in numbers and codes are

More information

SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS

SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS PACOM is quickly developing a distinguished reputation as a global leader in the field of remote security management for utilities and telecommunications

More information

Collaborative Workspace

Collaborative Workspace Introduction Scenario 1 Scenario 2 Scenario 3 Collaborative Workspace Stoney Trent Martin Voshell Justin Grossman Introduction Scenario 1 Scenario 2 Scenario 3 Findings concerning Intelligence Analysis

More information

Security intelligence for service providers

Security intelligence for service providers Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security

More information

Fraud Controls to Tackle the Mobile Revolution

Fraud Controls to Tackle the Mobile Revolution Fraud Controls to Tackle the Mobile Revolution TABLE OF CONTENTS Overview... 3 Today s Challenges for Financial Institutions... 3 Mobile-Enabled Fraud Mitigation... 5 Identify & Combat Mobile-Enabled Fraud

More information

Strategic Plan

Strategic Plan Information Technology Strategic Plan 2019-2021 Presented by Darin King Vice Chancellor for Information Technology/CIO Strategic Plan 2019-2021 Contents Executive Summary... 3 Goals...4 GOAL ONE...4 GOAL

More information

WE THRIVE ON YOUR SUCCESS

WE THRIVE ON YOUR SUCCESS P H Y S I C A L S E C U R I T Y INTRODUCTION Comm-Works, your partner for life. As a single source provider of technology integration and project management services, we have the ability to meet your most

More information

Real-Time Scene Understanding

Real-Time Scene Understanding Real-Time Scene Understanding Dynamic Data Driven Applications Systems Dr. Frederica Darema Dr. Alex Aved Research Computer Scientist Analytical Systems Branch alexander.aved@us.af.mil 1 Problem Statement

More information

Content Specification Outline

Content Specification Outline Content Specification Outline Copyright 2017 Institute of Certified Management Accountants Updated 8/25/17 Institute of Certified Management Accountants Content Specification Outline Certified in Strategy

More information

Ready for takeoff? Overcoming the practical and legal difficulties in identifying and realizing the value of data. Self-assessment guide

Ready for takeoff? Overcoming the practical and legal difficulties in identifying and realizing the value of data. Self-assessment guide Ready for takeoff? Overcoming the practical and legal difficulties in identifying and realizing the value of data Self-assessment guide Heatmap Life sciences Barriers Maturity Consumer products Barriers

More information

IBM i2 Enterprise Insight Analysis

IBM i2 Enterprise Insight Analysis IBM i2 Enterprise Insight Analysis Accelerate the data-to-decision process by rapidly transforming overwhelming data into actionable insight Highlights Uncover hidden connections and insights across massive

More information

Assisted Crowd Management, from data to mobility insight

Assisted Crowd Management, from data to mobility insight Assisted Crowd Management, from data to mobility insight UNDERSTAND THE JOURNEY PATTERNS TO ENHANCE THE PASSENGER EXPERIENCE Ludovic LANG Sales & Bids Director Head of Innovation 20 April 2017 www.thalesgroup.com

More information

Logistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes

Logistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes Logistics SOLUTION ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT Secure the flow of goods, and optimize the operation processes - Security As a fast growing solution provider, ACTi is dedicated

More information

THE SIMPLE TRUTHS OF ACCESS CONTROL

THE SIMPLE TRUTHS OF ACCESS CONTROL THE SIMPLE TRUTHS OF ACCESS CONTROL Access control is... the process of managing the entry or access to specific buildings or locations for individuals who have authorization to be there. Access control

More information

Industrial Internet of Things

Industrial Internet of Things Industrial Internet of Things - The New Frontier - ARC Industry Forum February 2015 Greg Gorbach Vice President ARC Advisory Group ggorbach@arcweb.com Think Different To tap the potential of IIoT New Service

More information

TechnicalPitch Cibersegurança. Rui Barata Ribeiro Security Software Sales da IBM Portugal

TechnicalPitch Cibersegurança. Rui Barata Ribeiro Security Software Sales da IBM Portugal TechnicalPitch Cibersegurança Rui Barata Ribeiro Security Software Sales da IBM Portugal IBM SECURITY STRATEGY SECURING THE THREATS OF TOMORROW, TODAY Rui Barata Ribeiro IBM Security June 2018 We exist

More information

This unit standard is expiring

This unit standard is expiring Page 1 of 5 Title Apply intelligence analysis techniques to complete an intelligence product Level 5 Credits 15 Purpose People credited with this unit standard are able to: define the intelligence problem

More information

23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION

23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION MARITIME DRIVING DIGITAL INNOVATION FOR FUTURE GROWTH Enhancing Security and Connectivity 24 Ang Mo Kio Street 65, Singapore 569061 mktg.elect@stengg.com www.stengg.com CHALLENGES AND OPPORTUNITIES ENHANCING

More information

Risk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness. Duane Boniface ABS Consulting

Risk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness. Duane Boniface ABS Consulting Risk-Based Resource Allocation in Maritime Security and Maritime Domain Awareness Duane Boniface ABS Consulting dboniface@absconsulting.com 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public

More information

RESS. WATCH OVER YOUR ASSETS, WHENEVER YOU WANT, WHEREVER YOU ARE. RUSSELL ELECTRONIC SECURITY SYSTEMS YOUR NUMBER ONE SECURITY PROVIDER

RESS. WATCH OVER YOUR ASSETS, WHENEVER YOU WANT, WHEREVER YOU ARE. RUSSELL ELECTRONIC SECURITY SYSTEMS YOUR NUMBER ONE SECURITY PROVIDER RUSSELL ELECTRONIC SECURITY SYSTEMS YOUR NUMBER ONE SECURITY PROVIDER WATCH OVER YOUR ASSETS, WHENEVER YOU WANT, WHEREVER YOU ARE. ALARM INSTALLATION CCTV SPECIALISTS ACCESS CONTROL PROTECTING PEOPLE,

More information

Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration. Presented by: Ken Mitchell / Kyle Talbot

Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration. Presented by: Ken Mitchell / Kyle Talbot Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration Presented by: Ken Mitchell / Kyle Talbot Activity Based Intelligence A Perilous Journey to Intelligence Integration Leverage

More information

IARPA Cloud Computing. IARPA Overview

IARPA Cloud Computing. IARPA Overview IARPA Cloud Computing IARPA Overview Kerry Name Long Job Program Title Manager Date The United States Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of State

More information

Catching malicious insiders through behavioral analytics

Catching malicious insiders through behavioral analytics Catching malicious insiders through behavioral analytics Jesse Hughes, Managing Principal Agenda 8 Understanding bad guys Recognizing what it takes to be a good guy 2 Heads up: This is going to get fluffy

More information

Accelerating innovation with IBM Cloud

Accelerating innovation with IBM Cloud Accelerating innovation with IBM Cloud Anthony Butler, CTO, IBM Cloud MEA 26 April, 2017 Viceroy Hotel, Palm Jumeirah Why innovate? and it s a trend that continues till this day. Since 2000, 52% of

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base Applied OCO ## Total FY 2015 FY 2016 FY

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments

More information

Chapter 9. Business Intelligence Systems

Chapter 9. Business Intelligence Systems Chapter 9 Business Intelligence Systems We Can Make the Bits Produce Any Report You Want, But You ve Got to Pay for It. Need to monitor patient workout data. Spending too many hours each day looking at

More information

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the

More information

Software Assurance Ecosystem

Software Assurance Ecosystem Software Assurance Ecosystem Djenana Campara Chief Executive Officer, KDM Analytics Board Director, Object Management Group (OMG) Co-Chair Software Assurance and Architecture Driven Modernization, OMG

More information

Digital & Technology Solutions Specialist Integrated Degree Apprenticeship (Level 7)

Digital & Technology Solutions Specialist Integrated Degree Apprenticeship (Level 7) Digital & Technology Solutions Specialist Integrated Degree Apprenticeship (Level 7) Role Profile A Digital & Technology Solutions Specialist maintains digital and technology strategies through technology

More information

The SWRLing Future of OWL. Mark Greaves DARPA / IXO

The SWRLing Future of OWL. Mark Greaves DARPA / IXO The SWRLing Future of OWL Mark Greaves DARPA / IXO In the Beginning DARPA Agent Mark Up Language (DAML) PE/Project Number: 62301E/ST-11 PAD ID NUMBER: 010033 PGM NUMBER: XAM8E DIRO APPROVAL: PGM MANAGER:

More information

SAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts

SAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts SAP Configuration Validation Solution Brief Objectives Solution Benefits Quick Facts Drive your business with confidence Realize the potential of SAP software Develop a robust response to cyber risks SAP

More information

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:

More information

GDPR and Microsoft 365: Streamline your path to compliance

GDPR and Microsoft 365: Streamline your path to compliance Streamline your path to compliance GDPR: an overview The General Data Protection Regulation (GDPR) is a new European Union (EU) privacy law that takes effect on May 25,. It is designed to give individuals

More information

bizsafe Level 2 Ver. 1.0 by MOM/WSH Council. For Authorised Use Only. All Rights Reserved.

bizsafe Level 2 Ver. 1.0 by MOM/WSH Council. For Authorised Use Only. All Rights Reserved. bizsafe Level 2 What is? SGSecure is a national movement to sensitise, train and mobilise our community to play a part to prevent and deal with a terrorist attack. It is how the whole of Singapore can

More information

ARC VIEW. Owens Corning Goes Mobile with TCS. Keywords. Summary. Improved Visibility Needed. By Ralph Rio

ARC VIEW. Owens Corning Goes Mobile with TCS. Keywords. Summary. Improved Visibility Needed. By Ralph Rio ARC VIEW MAY 10, 2012 Owens Corning Goes Mobile with TCS By Ralph Rio Keywords Owens Corning, Mobility, TCS, Visibility, ios, Android Summary At this early stage in Owen Corning s mobility journey, the

More information

Hiren Majmudar Vice President, Intel Capital Austin, TX

Hiren Majmudar Vice President, Intel Capital Austin, TX Hiren Majmudar Vice President, Intel Capital Austin, TX 4th Industrial Revolution You Are Here 1760 s 1860 s 1960 s 2 the Vortex Effect 3 Intel Capital Investment focus areas fueling the 4 th industrial

More information

Your Trusted Technology Partner

Your Trusted Technology Partner Business Solutions Your Trusted Technology Partner Serving Kansas and Beyond Delivering critical technology applications in an increasingly complex world can be a tremendous challenge for any business

More information

ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION

ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION ECONOMIC MACHINE LEARNING FOR FRAUD DETECTION Maytal Saar-Tsechansky 2015 UT CID Report #1511 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE

More information

Design and Implementation of an ERP System. Reg No: F17/1431/2011 Project Index:PRJ047 Supervisor: Prof. M.K Mang oli Examiner: DR. C.

Design and Implementation of an ERP System. Reg No: F17/1431/2011 Project Index:PRJ047 Supervisor: Prof. M.K Mang oli Examiner: DR. C. Design and Implementation of an ERP System Reg No: F17/1431/2011 Project Index:PRJ047 Supervisor: Prof. M.K Mang oli Examiner: DR. C. Wekesa OBJECTIVE To define what a medium office is and to come up with

More information

The Cognitive Costs and Benefits of Automation

The Cognitive Costs and Benefits of Automation Dr Richard Breton DRDC-RDDC Valcartier 2459 Pie-XI Blvd North Val-Bélair, Québec G3J 1X5 CANADA Tel.: 418-844-4000 (ext.:4753) Fax: 418-844-4538 Richard.Breton@drdc-rddc.gc.ca Dr Éloi Bossé DRDC-RDDC Valcartier

More information

Annual Big Data for Intelligence Symposium

Annual Big Data for Intelligence Symposium Defense Strategies Institute professional educational forum: 4th Annual Big Data for Intelligence Symposium ~Leveraging the Big Data Opportunity~ November 29-30, 2016: AUSA Conference and Event Center

More information

A How to Guide to Predictive Analytics

A How to Guide to Predictive Analytics A How to Guide to Predictive Analytics A How to Guide to Predictive Analytics Chapter 1: The Promise of Predictive Analytics Chapter 2: Data End Points Chapter 3: Storing and Managing Data Chapter 4: Policy

More information

The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment

The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment Timothy Darr, Richard Mayer and Perakath Benjamin Knowledge-Based Systems, Inc. 1408 University Drive East College

More information

Economic Machine Learning for Fraud Detection

Economic Machine Learning for Fraud Detection Economic Machine Learning for Fraud Detection Maytal Saar-Tsechansky 2015 UT CID Report #1518 This UT CID research was supported in part by the following organizations: identity.utexas.edu ECONOMIC MACHINE

More information

The Cognitive Bank: Redefining banks and banking

The Cognitive Bank: Redefining banks and banking Sales and Distribution Thought Leadership White Paper Banking The Cognitive Bank: Redefining banks and banking 2 The Cognitive Bank: Redefining banks and banking Bankers have always understood the value

More information

A tool for generating, structuring, and analyzing multiple hypotheses in intelligence work

A tool for generating, structuring, and analyzing multiple hypotheses in intelligence work 2013 European Intelligence and Security Informatics Conference A tool for generating, structuring, and analyzing multiple hypotheses in intelligence work Tove Gustavi, Maja Karasalo, Christian Mårtenson

More information

Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a

Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a subordinate level are subsumed under a super-ordinate activity.

More information

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Area:

More information

Security & Defense Solutions

Security & Defense Solutions intelligent convergence TM Security & Defense Solutions Intelligent Convergence with Augusta Systems EdgeFrontier White Paper The Need for Intelligent Convergence The distributed and evolving nature of

More information

Establishing Data Fusion Center Baseline Technology Capabilities. Paul Christin ESRI David Stampfli Microsoft

Establishing Data Fusion Center Baseline Technology Capabilities. Paul Christin ESRI David Stampfli Microsoft Establishing Data Fusion Center Baseline Technology Capabilities Paul Christin ESRI David Stampfli Microsoft Problem The asymmetrical threat of organized crime, gangs, drug cartels and terrorist organizations

More information

Document and Media Exploitation (DOMEX)

Document and Media Exploitation (DOMEX) SOLUTION BRIEF: DOCUMENT AND MEDIA EXPLOITATION (DOMEX)........................................ Document and Media Exploitation (DOMEX) Who should read this paper DOMEX analysts looking to quickly prioritize,

More information

lead the digital transformation

lead the digital transformation lead the digital transformation bhge.com Digital Drive productivity, up-time, and profitability It s time to write a new energy story, one that will transform the industry from the reservoir to the refinery.

More information

Current and Future Uses Of ARES Video Data Intelligence At Maritime Ports

Current and Future Uses Of ARES Video Data Intelligence At Maritime Ports Current and Future Uses Of ARES Video Data Intelligence At Maritime Ports A White Paper Issued by Cyclops Technologies, Inc. October 2014 Copyright 2014 Cyclops Technologies, Inc. This document is available

More information

CATHEXIS. CathexisVision Solutions Beyond Surveillance. Beyond Surveillance. Increase return on investment

CATHEXIS. CathexisVision Solutions Beyond Surveillance. Beyond Surveillance. Increase return on investment CATHEXIS Solutions Beyond Surveillance Increase return on investment The IP Video Management Software suite provides an extensive range of sophisticated solutions to satisfy all security and infrastructure

More information

Intelligence Advanced Research Projects Activity. May 2014

Intelligence Advanced Research Projects Activity. May 2014 Intelligence Advanced Research Projects Activity May 2014 Office of the Director of National Intelligence Central Intelligence Agency Defense Intelligence Agency Department of State National Security Agency

More information

Presentation by: Meredith A. Lane. Presentation for: CESU Network

Presentation by: Meredith A. Lane. Presentation for: CESU Network Presentation by: Meredith A. Lane Presentation for: CESU Network Presentation date: 11 July 2013 BECS Mission: Science to Manage Environmental and Social Transitions Increase problem focused understanding

More information

Copyright Notice. For reprint permission and information, please direct your inquiry to

Copyright Notice. For reprint permission and information, please direct your inquiry to Copyright Notice Copyright Notice. All materials contained within this document are protected by United States copyright law and may not be reproduced, distributed, transmitted, displayed, published, or

More information

Using SysML for model-based vulnerability assessment

Using SysML for model-based vulnerability assessment Available online at www.sciencedirect.com Scienceirect Procedia Computer Science 00 (2015) 000 000 www.elsevier.com/locate/procedia 2015 Conference on Systems Engineering Research Using SysML for model-based

More information

Copyright 2013 Oracle and/or its affiliates. All rights reserved.

Copyright 2013 Oracle and/or its affiliates. All rights reserved. 1 The Value of Big Data and Analytics in Government Jan 22, 2014 Wayne Babby, Deputy Director (A), California Department of Corrections & Rehabilitation Tim Dexter, Solution Architect, Analytics Practice,

More information

Towards Better Control of Information Assurance Assessments in Exercise Settings

Towards Better Control of Information Assurance Assessments in Exercise Settings ITEA Journal 2008; 29: 63 66 Copyright 2008 by the International Test and Evaluation Association Towards Better Control of Information Assurance Assessments in Exercise Settings David J. Aland Wyle, Arlington,

More information

Report of Presidential Ad Hoc Committee for Building Health and Safety under Extraordinary Incidents

Report of Presidential Ad Hoc Committee for Building Health and Safety under Extraordinary Incidents Report of Presidential Ad Hoc Committee for Building Health and Safety under Extraordinary Incidents On Risk Management Guidance for Health, Safety and Environmental Security under Extraordinary Incidents

More information

Maxxess to exhibit smart hospitality access control and visitor management solutions at Intersec 2019

Maxxess to exhibit smart hospitality access control and visitor management solutions at Intersec 2019 Maxxess to exhibit smart hospitality access control and visitor management solutions at Intersec 2019 Published on 11 Jan 2019 Maxxess will be at Intersec 2019 showcasing its latest advances in corporate

More information

E-Plan Implementation Guide for Federal, State, and Local Authorizing Authority

E-Plan Implementation Guide for Federal, State, and Local Authorizing Authority E-Plan Implementation Guide for Federal, State, and Local Authorizing Authority E-Plan Implementation Guide for Federal, State, and Local Authorizing Authority v2.0 Page 1 of 11 Document Change History

More information

2015 Research Trainee Program Competition for Post-Doctoral Fellowship Awards EVALUATION CRITERIA FOR REVIEWERS

2015 Research Trainee Program Competition for Post-Doctoral Fellowship Awards EVALUATION CRITERIA FOR REVIEWERS 2015 Research Trainee Program Competition for Post-Doctoral Fellowship Awards EVALUATION CRITERIA FOR REVIEWERS VERSION 1 LAST UPDATED: JANUARY 28, 2015 Note to ALL Reviewers: Read all assigned applications

More information

EMPOWER YOUR ANALYSTS. GO BEYOND BIG DATA. Delivering Unparalleled Clarity of Entity Data. White Paper. September 2015 novetta.com 2015, Novetta, LLC.

EMPOWER YOUR ANALYSTS. GO BEYOND BIG DATA. Delivering Unparalleled Clarity of Entity Data. White Paper. September 2015 novetta.com 2015, Novetta, LLC. EMPOWER YOUR ANALYSTS. GO BEYOND BIG DATA. Delivering Unparalleled Clarity of Entity Data White Paper September 2015 novetta.com 2015, Novetta, LLC. DELIVERING UNPARALLELLED CLARITY OF ENTITY DATA The

More information

Advancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION

Advancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information Management and Analysis with Entity Resolution Whitepaper February 2016 novetta.com 2016, Novetta ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information

More information

Microsoft 365 Business Services

Microsoft 365 Business Services The Partner Financial Opportunity March 2018 Copyright information 2018 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document,

More information

The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS

The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation!! 2 For Most Organizations,

More information

SAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016

SAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016 SAP Enterprise Threat Detection Overview & Roadmap Martin Plummer, SAP SE November 2016 Disclaimer The information in this document is confidential and proprietary to SAP and may not be disclosed without

More information

THIRD PARTY VS SAP SOLUTION MANAGER FOR SAP CYBERSECURITY PROTECTION

THIRD PARTY VS SAP SOLUTION MANAGER FOR SAP CYBERSECURITY PROTECTION LAYER SEVEN SECURITY THIRD PARTY VS SAP SOLUTION MANAGER FOR SAP CYBERSECURITY PROTECTION COMPARISON CHART Third Party vs. SAP Solution Manager Third Party Solutions Recommended System Inventory Vulnerability

More information

Detect & Investigate Threats. THE ANALYTICS HIGHLIGHTS AFTER DATA COLLECTION, IT'S ALL ABOUT THE ANALYTICS

Detect & Investigate Threats. THE ANALYTICS HIGHLIGHTS AFTER DATA COLLECTION, IT'S ALL ABOUT THE ANALYTICS Detect & Investigate Threats. HIGHLIGHTS The Analytics Proven, patented interactive data-driven investigative session analysis Powerful streaming analytics for incident detection, and alerting Malware

More information

The App Economy Requires Mainframe Intelligence

The App Economy Requires Mainframe Intelligence The App Economy Requires Mainframe Intelligence Digital Transformation and the Mainframe Today, customer experience is paramount to business survival. Frankly, every interaction whether with a bank or

More information

Oracle Knowledge Analytics User Guide

Oracle Knowledge Analytics User Guide Oracle Knowledge Analytics User Guide Working with Oracle Knowledge Analytics Reports Oracle Knowledge Version 8.4.2.2 April, 2012 Oracle, Inc. COPYRIGHT INFORMATION Copyright 2002, 2011, Oracle and/or

More information

Third-Party Enterprise Software Support: Key Risks and Questions to Ask

Third-Party Enterprise Software Support: Key Risks and Questions to Ask -rr.z.-'71., iirritirit w 0 et Arkalyze the Future IDC PERSPECTIVE Third-Party Enterprise Software Support: Key Risks and Questions to Ask Rob Brothers Elaina Stergiades EXECUTIVE SNAPSHOT FIGURE 1 Executive

More information

1 P a g e. IT Tailored to Your Needs

1 P a g e. IT Tailored to Your Needs 1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,

More information

Intelligent Systems. For more information on partnering with the Kansas City Plant, contact:

Intelligent Systems. For more information on partnering with the Kansas City Plant, contact: Intelligent Systems For more information on partnering with the Kansas City Plant, contact: Office of Business Development 1.800.225.8829 customer_inquiry@kcp.com Machine Intelligence Machine intelligence

More information

Task Force on the Role of Autonomy in the DoD Systems

Task Force on the Role of Autonomy in the DoD Systems Task Force on the Role of Autonomy in the DoD Systems Dr. Robin Murphy, Co-Chair Mr. James Shields, Co-Chair June 2012 Terms of Reference Review relevant technologies to evaluate readiness for introduction

More information

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Modeling

More information

DAU-South Acquisition Update February 23, 2017 Session Topics and Descriptions (Presentations will be available for download after the event.

DAU-South Acquisition Update February 23, 2017 Session Topics and Descriptions (Presentations will be available for download after the event. DAU-South Acquisition Update February 23, 2017 Session Topics and Descriptions (Presentations will be available for download after the event.) Session 1: 8:00 9:30 am (CENTRAL) 1.1: Understanding Government:

More information

Fraud Investigation & Dispute Services. Forensic analysis and global experience: the intelligent connection

Fraud Investigation & Dispute Services. Forensic analysis and global experience: the intelligent connection Fraud Investigation & Dispute Services Forensic analysis and global experience: the intelligent connection Protect your company s reputation and reduce financial risk Businesses are always under scrutiny

More information

Advanced Analytics for High Tech Firms

Advanced Analytics for High Tech Firms Advanced Analytics for High Tech Firms AYASDI FOR HIGH TECH: THE BENEFITS OF ADVANCED ANALYTICS 2 Introducing Ayasdi s Advanced Analytics Software As a manufacturer, you look for ways to capitalize on

More information

Using discrete event simulation in supply chain planning

Using discrete event simulation in supply chain planning Using discrete event simulation in supply chain planning Hellström, Daniel; Johnsson, Mats 2002 Link to publication Citation for published version (APA): Hellström, D., & Johnsson, M. (2002). Using discrete

More information

Designing Optimal Organizational Structures for Combat Information Centers in the Next Generation of Navy Ships

Designing Optimal Organizational Structures for Combat Information Centers in the Next Generation of Navy Ships Designing Optimal Organizational Structures for Combat Information Centers in the Next Generation of Navy Ships Michael J. Paley* Yuri N. Levchuk Daniel Serfaty Jean MacMillan Aptima, Inc. 600 West Cummings

More information

UNTANGLING ATTRIBUTION: WHY IT HAS FAILED AND HOW IT SHOULD BE DONE MANOS ANTONAKAKIS SEPTEMBER 27,2017

UNTANGLING ATTRIBUTION: WHY IT HAS FAILED AND HOW IT SHOULD BE DONE MANOS ANTONAKAKIS SEPTEMBER 27,2017 UNTANGLING ATTRIBUTION: WHY IT HAS FAILED AND HOW IT SHOULD BE DONE MANOS ANTONAKAKIS SEPTEMBER 27,2017 WHAT IS AND WHY SHOULD WE CARE ABOUT ATTRIBUTION? What is attack attribution? It is the process through

More information

HOW TO PREVENT REGISTRATION FRAUD. The ultimate guide to responsibly growing a user base

HOW TO PREVENT REGISTRATION FRAUD. The ultimate guide to responsibly growing a user base HOW TO PREVENT REGISTRATION FRAUD The ultimate guide to responsibly growing a user base TABLE OF CONTENTS INTRODUCTION The User Base Is the New Black 3 ONLINE BUSINESSES AND THE EPIDEMIC OF ACCOUNT FRAUD

More information

AGILITY QUOTIENT (AQ) without specifying the nature of the mission or the circumstances under which it will be conducted?

AGILITY QUOTIENT (AQ) without specifying the nature of the mission or the circumstances under which it will be conducted? AGILITY QUOTIENT (AQ) David Alberts sponsivenes Progress in designing and developing more rsatility agile entities will depend on our ability to observe exibility appropriate behaviors and outcomes, associate

More information

On the Radar: Liaison Technologies

On the Radar: Liaison Technologies On the Radar: Liaison Technologies dpaas-based managed services for complex integration and data management requirements Publication Date: 16 Jun 2015 Product code: IT0022-000386 Saurabh Sharma Summary

More information

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution

More information

An Empirical Assessment of Domestic Radicalization *

An Empirical Assessment of Domestic Radicalization * An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies

More information

TELESTE S-AWARE. Situational awareness and incident management solution

TELESTE S-AWARE. Situational awareness and incident management solution TELESTE S-AWARE Situational awareness and incident management solution TELESTE S-AWARE YOUR KEY TO SHARPER DECISION-MAKING Security and operations control systems, such as video surveillance systems, are

More information

Smart Building. Provide emergency notification and event record

Smart Building. Provide emergency notification and event record Smart Building Provide emergency notification and event record IP Camera VMS Access Control LPR How GeoVision makes smart building even smarter GeoVision Access Control provides the most advanced full

More information

OCTAVE -S Implementation Guide, Version 1.0. Volume 2: Preparation Guidance. Christoper Alberts Audrey Dorofee James Stevens Carol Woody.

OCTAVE -S Implementation Guide, Version 1.0. Volume 2: Preparation Guidance. Christoper Alberts Audrey Dorofee James Stevens Carol Woody. OCTAVE -S Implementation Guide, Version 1.0 Volume 2: Preparation Guidance Christoper Alberts Audrey Dorofee James Stevens Carol Woody January 2005 HANDBOOK CMU/SEI-2003-HB-003 Pittsburgh, PA 15213-3890

More information

Manufacturing: Small and Midsize Industrial Machinery and Components Manufacturers Are Using Technology to Make a Difference

Manufacturing: Small and Midsize Industrial Machinery and Components Manufacturers Are Using Technology to Make a Difference Sponsored by: SAP Authors: Raymond Boggs Jeffrey Hojlo August 2016 Manufacturing: Small and Midsize Industrial Machinery and Components Manufacturers Are Using Technology to Make a Difference THE BRIEF

More information

IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON

IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON 25 October 2016 Intelligence Advanced Research Projects Activity The Intelligence Community Central Intelligence Agency Defense Intelligence

More information

Digitalisation of services in the marine, oil and gas and energy sectors

Digitalisation of services in the marine, oil and gas and energy sectors Digitalisation of services in the marine, oil and gas and energy sectors BUSINESS WHITE PAPER CONTENTS Digitalisation is an opportunity to develop industrial services into deeper partnerships, with a focus

More information

Ensuring progress toward risk management and continuous configuration compliance

Ensuring progress toward risk management and continuous configuration compliance IBM Security Thought Leadership White Paper July 2017 Ensuring progress toward risk management and continuous configuration compliance Get continuous compliance, real-time analytics and insight with IBM

More information