Unmasking a Terrorist How to Visualise the Problem.

Slides:



Advertisements
Similar presentations
Getting to k now your Community Edna R. Hensey, Office of Healthy Carolinians /Health Education.
Advertisements

Organize Workplace Information
MODULE 5 Understanding Legal Issues of New Populations Unit 2: Understanding Cultures Building Bridges Across Cultures In Communities.
Task shift Meeting in Iceland 5. September 2014 Marit Hermansen.
Anti-Money Laundering (AML)
BA 303 BUSINESS 2 BUSINESS MARKETING LINDELL PHILLIP CHEW
Information Security Management The Implicit Need for Privacy Requirements or How Ignoring Privacy Can Kill Your Program.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
CardVisor ID Scanner By: Anya Mojiri March 3, 2008.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
3 Ethics and Privacy.
THE EXECUTIVE BRANCH The President The Administration
1 E-Government PPA 490 Margaret Moorhead. 2 Introduction E-government – to deliver public services in a more convenient, customer oriented, cost effective,
By Garland Land NAPHSIS Consultant. Importance of Birth Certificates Needed for: Social Security Card School Enrollment Driver’s License Passport.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
Brought to you by: Myles Banks and-security-investigationshttp:// and-security-investigations/
Taxes © 2013 Created by Sally Camden ~ The Reflective Educator ~
Analyze the Needs of Customers How Market Segmentation Can Help an Entrepreneur analyze a Target Market.
The Federal Bureaucracy
Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.
Social Network Analysis
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Export Control and Trade Sanctions: An Overview Loraine J. Hudson Director of Research Facilitation and Dissemination April 7, 2015.
The Federal Bureaucracy
Data and You. Computer Crime Less Cash money Credit cards types credit, debit, cash cards, and checks ATMs.
National Law Enforcement and Corrections Technology Center - West The Security Summit Law Enforcement – Finding, Evaluating & Employing Best-of-Breed Technologies.
Victoria Ziborova Scientific supervisor: Y. Petrunia DNIPROPETROVSK 2015.
Types of E-Commerce.  Definition of Commerce Definition of Commerce  What is a network What is a network  What is E-commerce What is E-commerce  Types.
Workshop on Labour Migration and and Labour Market Information Systems Quebec City, Canada, February 2009 Labour Migration Risks and Opportunities.
Section 28.1 Marketing Information Chapter 28 marketing research Section 28.2 Issues in Marketing Research.
Chapter 2 Financial Aspects of Career Planning. Job or Career? Job--an employment position obtained mainly to earn money Job--an employment position obtained.
THE BASICS OF IMMIGRATION Presenter: Noemi Guzman Immigration Program Manager.
User Management. Basics SDMS shall maintain a database of all users. SDMS shall maintain a database of all users. SDMS shall not limit the number of registered.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
H.R Subtitle E: Automated Exporting System Relating to Export Information.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Use Case Diagrams.
Bureaucratic Organization Chapter 10 Section 1. The Cabinet Departments The federal bureaucracy is made up of hundreds of agencies with staff members.
Using the Statistical Abstract of the United States Module 1, Class Assignment A Teaching Module Developed by the Curriculum Task Force of the Sloan Work.
Winners or losers?
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
Illegal Immigrants in the US - What to do with them?
COBRA® V5 Janet L. Anderson, M.S., D-ABC Forensic Toxicologist Alcohol and Drug Testing Program Technical Director.
7 th Grade Civics Miss Smith *pgs Civics in Practice.
THE CABINET. Cabinet History In 1789, George Washington asked Congress to make 4 specific departments (State, War, Treasury, Attorney General) Today,
Executive Branch The Cabinet and Federal Agencies.
5.01 UNDERSTAND RULES AND LAWS DESIGNED TO PROMOTE SAFETY AND SECURITY AT HOSPITALITY AND TOURISM DESTINATIONS.
Elizabeth Sanchez. Forensic psychology is a specialty area that deals with issues that involve psychology and the law.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
Objective 4.7 The Cabinet. Objective 4.7 how do cabinet departments and federal agencies, help to carry out the laws?
Executive Branch The Cabinet and Federal Agencies.
Human Resources Functions of Management Unit 6. Human Resources What is it? The people who work for the business. Management and all employees (full-time.
Immigration: Social Inhibitors Impact on the Increasing Rates of Crime Amongst Latino Populations Alia Scott Honors Program.
The Connection Between Taxation and Social Programs.
Terrorism in the EU: Threats & Trends EAASP Annual Conference Dubrovnik, April 2014 Europol Public Information.
CJS 200 Week 4 Individual Law Enforcement Today Paper Write a 700- to 1,050-word paper in which you describe the issues facing police departments in today’s.
The Cabinet and Federal Agencies
Chapter 15 The Future of Policing in America
Executive Departments and the Cabinet
Executive Departments and the Cabinet
Database Relationships
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Computers and Homeland Security
Chapter 11: Launching an Employment Campaign PSY 251 Dr. Emily Bullock
Functions of Government
Estonian Education Information System (EHIS)
15-5 Automated Fingerprint Identification System
What is Government and What Are Its Functions
Presentation transcript:

Unmasking a Terrorist How to Visualise the Problem

Potential Terrorist??? Country of Origin Country of Origin Visa Type Visa Type Length of Time in Country Length of Time in Country Ethnicity Ethnicity Religious Preference Religious Preference Education Education Profession/Licenses Profession/Licenses Identification/Other Licenses Identification/Other Licenses Location in Country Location in Country State of Health State of Health Criminal Record Criminal Record Psychological Profile Psychological Profile Organizational Membership/Affliation Organizational Membership/Affliation Housing Housing Employment Employment Economic Situation Economic Situation Money Spending Habits Money Transfer Family Background Family Background Family/Friends/Associates Family/Friends/Associates Hobbies Hobbies Communications: Communications: Internet Telephone Mail Manufacturing Manufacturing Library Use Library Use Traveling Habits Traveling Habits There are numerous problems associated with identifying an individual as a terrorist -- ”Connecting the Dots”

”Connecting the Dots” Numerous organizations involved: Numerous organizations involved: Immigration/Customs Immigration/Customs Interpol Interpol Embassies Embassies Local law enforcement (Federal, State, Local, as applicable) Local law enforcement (Federal, State, Local, as applicable) Intelligence agencies Intelligence agencies Defense Departments (as applicable) Defense Departments (as applicable) Port Security Port Security Hospitals Hospitals

Proposed Methods of Visualisation Requires an object-oriented database Requires an object-oriented database People People Organizations Organizations Interactions Interactions Geographic Locations Geographic Locations Time Time A relationship-based database is possible but far less optimal A relationship-based database is possible but far less optimal

The Visualisation??? ID VISA Time in country Religous Preference Country of origin Ethnicity Licenses Education Profession Employment State of helth Criminal Record Fanily Background FamilyFriends Associates Hobbies Library Use Location in Counry Housing Travelling Immigration/ Customs Interpol Local law enforcement Embassies WHO Intelligence agencies Defense Departments Hospitals Port Security

Visualisation of the Network Directional and Non-Directional Relationships between the Nodes Directional and Non-Directional Relationships between the Nodes Various organizations are responsible for different aspects of determining relationships between the nodes Various organizations are responsible for different aspects of determining relationships between the nodes Adds a layer of complexity to the problem Adds a layer of complexity to the problem

?