The paper describes an advanced prototype of a web-based geographical information system enabling interactive visualization of container movements. It implements multiple data selection mechanisms and presentation methods, one of which is the geographical visualization on a map of the locations where the container events occurred. Key features of the system include the visualization on the map of critical aspects of the data and the semantic summarization of the records while allowing the user to drill-down to all the details available. Risk analysts dealing with the container traffic can use the system through a regular web browser and easily find and understand the information they are looking for. Such a system is expected to allow them to make better and faster decisions.
{"title":"Visualization of Container Movements through a Web-Based Geographical Information System","authors":"T. Dimitrova, A. Tsois, E. Camossi","doi":"10.1109/EISIC.2013.40","DOIUrl":"https://doi.org/10.1109/EISIC.2013.40","url":null,"abstract":"The paper describes an advanced prototype of a web-based geographical information system enabling interactive visualization of container movements. It implements multiple data selection mechanisms and presentation methods, one of which is the geographical visualization on a map of the locations where the container events occurred. Key features of the system include the visualization on the map of critical aspects of the data and the semantic summarization of the records while allowing the user to drill-down to all the details available. Risk analysts dealing with the container traffic can use the system through a regular web browser and easily find and understand the information they are looking for. Such a system is expected to allow them to make better and faster decisions.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Summary form only given. Analyzing discussion boards is becoming an important task for intelligence analysts all over the world. One important aspect when analyzing discussion boards is to identify users that make use of multiple aliases. We have implementation a prototype that can be used to check different equality measures among users on a discussion boards. To test the prototype we use the ICWSM data set boards.ie.
{"title":"A Tool for Visualizing and Analyzing Users on Discussion Boards","authors":"A. Shrestha","doi":"10.1109/EISIC.2013.60","DOIUrl":"https://doi.org/10.1109/EISIC.2013.60","url":null,"abstract":"Summary form only given. Analyzing discussion boards is becoming an important task for intelligence analysts all over the world. One important aspect when analyzing discussion boards is to identify users that make use of multiple aliases. We have implementation a prototype that can be used to check different equality measures among users on a discussion boards. To test the prototype we use the ICWSM data set boards.ie.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"795 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intelligence analysis is dependent on credible input data that comes from trusted and reliable sources. Open Source Information (OSINF) provides an abundance of data, but it comes with the price of noise, i.e., a lot of the data is irrelevant, ambiguous, contradicting, biased or plain wrong. Despite this, making full use of the wealth of data that OSINF encompasses would improve the quality of intelligence analysis.
{"title":"Trusting Open Source Information","authors":"Marianela García Lozano","doi":"10.1109/EISIC.2013.77","DOIUrl":"https://doi.org/10.1109/EISIC.2013.77","url":null,"abstract":"Intelligence analysis is dependent on credible input data that comes from trusted and reliable sources. Open Source Information (OSINF) provides an abundance of data, but it comes with the price of noise, i.e., a lot of the data is irrelevant, ambiguous, contradicting, biased or plain wrong. Despite this, making full use of the wealth of data that OSINF encompasses would improve the quality of intelligence analysis.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geographic information systems (GIS) and global navigation satellite systems (GNSS) have transformed emergencies and disasters response across the world. These technologies are enabling emergency management agencies to carry out their duty efficiently. However, current GNSS-based tracking systems have serious technical flaws and vulnerabilities. This paper presents a modular system-level description for a hybrid tracking system. The paper further discusses and suggests how the technical vulnerabilities of GNSS-based tracking systems can be resolve.
{"title":"A New Redundant Tracking System for Emergency Response","authors":"J. Rajamäki, Paresh Rathod, Pasi Kamppi","doi":"10.1109/EISIC.2013.50","DOIUrl":"https://doi.org/10.1109/EISIC.2013.50","url":null,"abstract":"Geographic information systems (GIS) and global navigation satellite systems (GNSS) have transformed emergencies and disasters response across the world. These technologies are enabling emergency management agencies to carry out their duty efficiently. However, current GNSS-based tracking systems have serious technical flaws and vulnerabilities. This paper presents a modular system-level description for a hybrid tracking system. The paper further discusses and suggests how the technical vulnerabilities of GNSS-based tracking systems can be resolve.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125744625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Astute project is an ongoing European Artemis project that researches methods to improve the effectiveness of embedded and mobile systems. It does so by providing human-machine interfaces (HMIs) that automatically and proactively adapt, based on the sensed environment and user state. One of the implemented demonstrators supports emergency workers during field operations using on-sleeve and tablet-sized mobile devices. Extensive field and usability studies have proved that a geospatial, map-centric user interface (UI)is essential to provide a low-barrier interface that is easy to learn. The integration of context and user-state reasoning enables proactive decision support that makes HMIs smarter and more effective in stressful and critical situations. We argue that the promising results obtained for the emergency domain have great potential to improve the current practice in border control use cases as well.
{"title":"Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces","authors":"Bart Adams, Frank Suykens","doi":"10.1109/EISIC.2013.74","DOIUrl":"https://doi.org/10.1109/EISIC.2013.74","url":null,"abstract":"The Astute project is an ongoing European Artemis project that researches methods to improve the effectiveness of embedded and mobile systems. It does so by providing human-machine interfaces (HMIs) that automatically and proactively adapt, based on the sensed environment and user state. One of the implemented demonstrators supports emergency workers during field operations using on-sleeve and tablet-sized mobile devices. Extensive field and usability studies have proved that a geospatial, map-centric user interface (UI)is essential to provide a low-barrier interface that is easy to learn. The integration of context and user-state reasoning enables proactive decision support that makes HMIs smarter and more effective in stressful and critical situations. We argue that the promising results obtained for the emergency domain have great potential to improve the current practice in border control use cases as well.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127959939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evolutions in both the socio-political dynamics of the World and in Information and Computing Technologies have drastically changed the nature of many intelligence problems in ways that make them much more complex. Information Fusion (IF) technologies, which have historically been among the leading suppliers of information to intelligence analyses and analysts, are now similarly challenged to address these new complexities. This paper offers perspectives on what these challenges entail, and briefly describes some research efforts attempting to deal with some of these challenges. However, there is much more that needs to be done by the IF community, and some of the needed research and development is also described in the paper.
{"title":"Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems","authors":"J. Llinas","doi":"10.1109/EISIC.2013.20","DOIUrl":"https://doi.org/10.1109/EISIC.2013.20","url":null,"abstract":"Evolutions in both the socio-political dynamics of the World and in Information and Computing Technologies have drastically changed the nature of many intelligence problems in ways that make them much more complex. Information Fusion (IF) technologies, which have historically been among the leading suppliers of information to intelligence analyses and analysts, are now similarly challenged to address these new complexities. This paper offers perspectives on what these challenges entail, and briefly describes some research efforts attempting to deal with some of these challenges. However, there is much more that needs to be done by the IF community, and some of the needed research and development is also described in the paper.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamaruddin Abdul Ghani, K. Dimyati, Khadijah Ismail, L. S. Supian
Handheld communication devices fitted with touch-screen LCDs do emit some kind of electromagnetic radiation (EMR) even though they were not designed to do so. There is potential for the emission can be intercepted and reconstructed for eavesdropping or even intelligence purposes. Information leakage from hand-held devices can be valuable information for the intelligence communities. This paper presented discussions on how much unintentional emission is radiated from these devices. Comparison on the level of emission is made based on manufacturers and sizes of LCD.
{"title":"Radiated Emission from Handheld Devices with Touch-Screen LCDs","authors":"Kamaruddin Abdul Ghani, K. Dimyati, Khadijah Ismail, L. S. Supian","doi":"10.1109/EISIC.2013.51","DOIUrl":"https://doi.org/10.1109/EISIC.2013.51","url":null,"abstract":"Handheld communication devices fitted with touch-screen LCDs do emit some kind of electromagnetic radiation (EMR) even though they were not designed to do so. There is potential for the emission can be intercepted and reconstructed for eavesdropping or even intelligence purposes. Information leakage from hand-held devices can be valuable information for the intelligence communities. This paper presented discussions on how much unintentional emission is radiated from these devices. Comparison on the level of emission is made based on manufacturers and sizes of LCD.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data mining and visualization techniques show their value in various domains but have not been broadly applied to the study of crime, which is in demand of an instrument to efficiently and effectively analyze available data. The purpose of this study is to apply the Self-Orgamizing Map (SOM) to mapping countries with different situations of socio-economic development. Supplemented by other methods, including Scatter Counter for attribute selection, and nearest neighbor search, discriminant analysis and decision trees for obtaining comparable results, the SOM is found to be a useful tool for mapping criminal phenomena through processing of multivariate data.
{"title":"Crime and Its Social Context: Analysis Using the Self-Organizing Map","authors":"Xingan Li, M. Juhola","doi":"10.1109/EISIC.2013.26","DOIUrl":"https://doi.org/10.1109/EISIC.2013.26","url":null,"abstract":"Data mining and visualization techniques show their value in various domains but have not been broadly applied to the study of crime, which is in demand of an instrument to efficiently and effectively analyze available data. The purpose of this study is to apply the Self-Orgamizing Map (SOM) to mapping countries with different situations of socio-economic development. Supplemented by other methods, including Scatter Counter for attribute selection, and nearest neighbor search, discriminant analysis and decision trees for obtaining comparable results, the SOM is found to be a useful tool for mapping criminal phenomena through processing of multivariate data.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most real-life networks are not only massive but also highly heterogeneous, involving more than one type of entity, more than one type of relationship, and multiple attributes associated with both entities and relationships. Many of the existing methods and tools don't take into account these additional modalities that make networks highly heterogenous and complex-such methods and tools are mostly limited to dealing with much simpler networks (e.g., single-mode networks or bi-modal affiliation networks). In this paper we present a novel method for visual analysis of heterogenous networks. The method is based on a visual approach to analysis that allows the user to define complex structural patterns to query the network, and further explore the returned network patterns intuitively.
{"title":"Visual Analysis of Heterogeneous Networks","authors":"Bisharat Rasool Memon, U. Wiil","doi":"10.1109/EISIC.2013.28","DOIUrl":"https://doi.org/10.1109/EISIC.2013.28","url":null,"abstract":"Most real-life networks are not only massive but also highly heterogeneous, involving more than one type of entity, more than one type of relationship, and multiple attributes associated with both entities and relationships. Many of the existing methods and tools don't take into account these additional modalities that make networks highly heterogenous and complex-such methods and tools are mostly limited to dealing with much simpler networks (e.g., single-mode networks or bi-modal affiliation networks). In this paper we present a novel method for visual analysis of heterogenous networks. The method is based on a visual approach to analysis that allows the user to define complex structural patterns to query the network, and further explore the returned network patterns intuitively.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Measuring how much cyber crime exists is typically done by first defining cyber crime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cyber crimes are recorded as traditional crimes. An alternative is to keep traditional definitions of crime and quantify the amount of associated information and communication technologies (ICT) that each contains. This research established how much ICT was used a) in the three phases of the 'crime script' (i.e. 'before', 'during' and 'after'), b) during the criminal investigation and c) in the apprehension of the suspect(s) and d) whether digital crimes differ from traditional crimes in terms of the relationships between the victim and the offender or in terms of the physical distance between them. Residential and commercial burglary, threats and fraud were investigated and 809 incidents from the Police Department of East Netherlands were studied. It was found that ICT does not affect all types of crime equally: 16% of the threats and 41% of all frauds have partial digital modus operandi (MO). To commit burglaries, however, offenders hardly ever use ICT. In 2.9% of the residential burglaries, however, bank cards were stolen and later used to steal money from a bank account. For commercial burglary there was no associated ICT. Digital crimes differ from traditional crimes in a number of ways: the geographical distance between the victim and the offender is larger, digital threats occur relatively more often between ex-partners and digital frauds occur more often between business partners compared to traditional fraud. The study found that physical tools are more often linked to apprehension than digital ones. The regression models, however, showed digital and physical tools to be equally strong at predicting apprehension. The main findings show that ICT plays a greater role in traditional crime than expected on the basis of previous research.
{"title":"How \"Digital\" is Traditional Crime?","authors":"Lorena Montoya, M. Junger, P. Hartel","doi":"10.1109/EISIC.2013.12","DOIUrl":"https://doi.org/10.1109/EISIC.2013.12","url":null,"abstract":"Measuring how much cyber crime exists is typically done by first defining cyber crime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cyber crimes are recorded as traditional crimes. An alternative is to keep traditional definitions of crime and quantify the amount of associated information and communication technologies (ICT) that each contains. This research established how much ICT was used a) in the three phases of the 'crime script' (i.e. 'before', 'during' and 'after'), b) during the criminal investigation and c) in the apprehension of the suspect(s) and d) whether digital crimes differ from traditional crimes in terms of the relationships between the victim and the offender or in terms of the physical distance between them. Residential and commercial burglary, threats and fraud were investigated and 809 incidents from the Police Department of East Netherlands were studied. It was found that ICT does not affect all types of crime equally: 16% of the threats and 41% of all frauds have partial digital modus operandi (MO). To commit burglaries, however, offenders hardly ever use ICT. In 2.9% of the residential burglaries, however, bank cards were stolen and later used to steal money from a bank account. For commercial burglary there was no associated ICT. Digital crimes differ from traditional crimes in a number of ways: the geographical distance between the victim and the offender is larger, digital threats occur relatively more often between ex-partners and digital frauds occur more often between business partners compared to traditional fraud. The study found that physical tools are more often linked to apprehension than digital ones. The regression models, however, showed digital and physical tools to be equally strong at predicting apprehension. The main findings show that ICT plays a greater role in traditional crime than expected on the basis of previous research.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}