home land security research at cimic
Post on 12-Jan-2016
43 Views
Preview:
DESCRIPTION
TRANSCRIPT
Home Land Security Research at CIMIC
PresentedNabil R. Adam and Vijay Atluri
Team members: F. Artigas, K. Barrett, S. Chun, R. Clark, M. Halem, L. Liu
Ph.D. Students: A. Gomaa, Q. Guo, D. Guo, V. Janeja, Y. Mohamoud, A. Paliwal, L. Qin, J. Warner, S. Yu
CIMIC (Center for Information Management, Integration and Connectivity)
Rutgers University – Newark CampusSeptember 23, 2003
2
Ongoing HS Projects Border Security:
Secure Agency Interoperation for Effective Data Mining in Border Control and Homeland
Security Applications
Supported by NSF $1,050,000 (Sept 03 – Aug 06) additional matching funds from SAP
Corporate Research
Water Security:
End –to End Early Warning Decision Support System for Dinking Water Safety and Security:
Monitoring, Modeling and Info Management
Supported by EPA $2,000,000 (Dec 03 – Nov 05) additional $2M matching from water
utilities
Emergency Response
GIS for the Emergency Response
Supported by the NJMC, $350,000 (June 03 – May 04)
Protection of Critical Resources
Meadowlands Environmental Research Institute
Supported by the NJMC $8,000,000 (Jan 02 – Dec 07)
3
Border Security
Specific Goals Supplement the profiling, by making it targeted towards
anomalies
Utilize data available from different agencies, ports and
customs divisions
Detect various flags raised by non-conforming shipments
or abnormal behavior of inbound cargos and raise a
combination of alerts
Identify the anomalous shipment before it enters the
country
4
5
Border Security
Proposed Work Provide decision makers with the ability to
Extract and fuse information from multiple, heterogeneous sources in response to a query
Mine data distributed in various sources within and across various agencies
Research Building Blocks Semantic Interoperability Security Enforcement Text Mining, Data Mining and Alert Management Systems The Diplomacy and Politics of Implementing Homeland
Security Information Technology Initiatives
6
Broader Impact of Proposed Work
Advances fundamental research in the areas of semantic interoperability, data mining, text mining and security enforcement
Devises solutions to accomplish secure interoperation among different government agencies
Our partnership with SAP, which is the supplier of software to the Customs
and Border Protection Modernization Program and contractor to IBM, the prime contractor for eCustoms Partnership (eCP) that is implementing the modernization program
Provides the opportunity to directly contribute to fulfilling the practical needs of the Bureau of Customs and Border Protection
Serves as a reference model to be adopted by other divisions of the Department of Homeland Security and other departments contributing to homeland security missions.
7
The Team Researchers
Nabil R. Adam and Vijay Atluri, CIMIC, Rutgers University Robert Grossman, National Center for Data Mining, Univ. of Illinois at Chicago Vasileios Hatzivassiloglou and Kathleen R. McKeown, Dept. of Computer
Science, Columbia University Rey Koslowski, Dept. of Political Science, Rutgers University Tao Lin, SAP Corporate Research Labs
Domain experts SAP labs IBM Global services Dr. Stephen E. Flynn, Council on Foreign Relations C.J. Chang, Special Agent, SAIC Denver, Bureau of Immigration and Customs
Enforcement, U.S. Customs Service Steve Cooper, CIO, Department of Homeland Security Luis R. Cortes, Chief of Intelligence, Office of National Risk Assessment
(ONRA), Transportation Security Administration (TSA) Lee Holcomb, Department of Homeland Security James R. Sutton, Managing Associate of McManis Associates, Inc. and former
Senior Intelligence Research Specialist for the U.S. Department of Justice on the Foreign Terrorist Tracking Task Force.
Consumers US Customs, INS
8
Water Security Specific Goals
Develop an End –to End Early Warning Decision Support System (EWS) for Dinking Water Safety and Security
to detect deliberate or accidental introduction of contaminants into a
distribution system (back flow, cross connections) deliberate or accidental contamination of source waters Cyber attacks caused by either externally or internally
Model the behavior of the level and extent of the threats Develop a decision support system to generate warnings and
alerts Complement the EWS surveillance monitoring system (SMS) focuses
on public health surveillance of disease data in the population
9
Real-time Monitoring, Modeling, and Alert System for Drinking Water Safety Security
DATA Sources
ALERT GENERATION
REAL-TIME MODELING
VIS
UA
LIZA
TIO
N
CO
NTIN
UO
US
MO
NIT
OR
ING
Predicted toxin concentration, ppbSimulation
Time, hr Location 1 Location 2 Location 30 20.3 0.0 0.02 14.1 8.4 0.34 10.2 14.3 11.16 8.4 18.2 15.18 6.5 13.3 17.5
10 4.4 9.5 15.512 3.4 7.0 11.114 2.3 5.1 9.216 1.3 3.2 7.318 0.4 2.3 5.420 0.0 1.2 4.0
Public
Community
Hospitals
Managers / Officials
Weather station Weather station with with
data loggerdata logger
Service Area
•Reservoir
•Treatment plant
•Treatment plant
•Sensors
•Clinics
•Hospitals
10
Water Security: Research Building Blocks
Sensor and Monitoring Research Monitor Chemical, Biological, Radiological contaminants Each source water monitoring station will include the installation of on-line
sensors for the collection of water quality data: Alkalinity, Temperature, UV absorbance, Particle counts, Dissolved oxygen, pH, Turbidity
Finished water on-line monitoring stations will also be installed to monitor the quality of finished water: Total organic carbon, dissolved oxygen, free chlorine residual, Turbidity, pH, UV absorbance, particle counts
Modeling Research tie together the sensor and monitoring systems to simulation models --
source water and distributed water to predict where contaminant is moving and suggest possible remediation
strategies calibration of models and feed back loop so that monitors can be used to
continuously self-calibrate the models Information Management Research
Develop Real-time data acquisition information network system, a Sensor data management system, and Data validation and alert system
Develop Security modules to ensure security policies among the utilities, provide authentication, fine-grained access control, and secure data transfer
Web-based user interface and visualization to display alerts, warnings, affected areas
11
Water Security: The Team
Formed a Consortium
EPA Region II, USGS, NJDEP, AWWSC, NJDWSC, PVWC, and Rutgers
CIMIC
Researchers
Nabil Adam, Francisco Artigas, Vijay Atluri, Kirk Barrett, Robert Clark
(Rutgers CIMIC), Milton Halem (NASA/Rutgers CIMIC), Yelena Yesha
(UMBC)
End users
Laura Cummings PVWSC, Eva Ibrahim, American Waters, Pen
C. Tao, NJDWSC, Eric F Vowinkel, USGS
12
top related