120 likes | 283 Views
Home Land Security Research at CIMIC. Presented Nabil R. Adam and Vijay Atluri Team members: F. Artigas, K. Barrett, S. Chun, R. Clark, M. Halem, L. Liu Ph.D. Students: A. Gomaa, Q. Guo, D. Guo, V. Janeja, Y. Mohamoud, A. Paliwal, L. Qin, J. Warner, S. Yu CIMIC
E N D
Home Land Security Research at CIMIC Presented Nabil R. Adam and Vijay Atluri Team members: F. Artigas, K. Barrett, S. Chun, R. Clark, M. Halem, L. Liu Ph.D. Students: A. Gomaa, Q. Guo, D. Guo, V. Janeja, Y. Mohamoud, A. Paliwal, L. Qin, J. Warner, S. Yu CIMIC (Center for Information Management, Integration and Connectivity) Rutgers University – Newark Campus September 23, 2003
Ongoing HS Projects • Border Security: • Secure Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications • Supported by NSF $1,050,000 (Sept 03 – Aug 06) additional matching funds from SAP Corporate Research • Water Security: • End –to End Early Warning Decision Support System for Dinking Water Safety and Security: Monitoring, Modeling and Info Management • Supported by EPA $2,000,000 (Dec 03 – Nov 05) additional $2M matching from water utilities • Emergency Response • GIS for the Emergency Response • Supported by the NJMC, $350,000 (June 03 – May 04) • Protection of Critical Resources • Meadowlands Environmental ResearchInstitute • Supported by the NJMC $8,000,000 (Jan 02 – Dec 07)
Border Security • Specific Goals • Supplement the profiling, by making it targeted towards anomalies • Utilize data available from different agencies, ports and customs divisions • Detect various flags raised by non-conforming shipments or abnormal behavior of inbound cargos and raise a combination of alerts • Identify the anomalous shipment before it enters the country
Border Security • Proposed Work • Provide decision makers with the ability to • Extract and fuse information from multiple, heterogeneous sources in response to a query • Mine data distributed in various sources within and across various agencies • Research Building Blocks • Semantic Interoperability • Security Enforcement • Text Mining, Data Mining and Alert Management Systems • The Diplomacy and Politics of Implementing Homeland Security Information Technology Initiatives
Broader Impact of Proposed Work • Advances fundamental research in the areas of semantic interoperability, data mining, text mining and security enforcement • Devises solutions to accomplish secure interoperation among different government agencies • Our partnership with • SAP, which is the supplier of software to the Customs and Border Protection Modernization Program and contractor to IBM, the prime contractor for eCustoms Partnership (eCP) that is implementing the modernization program • Provides the opportunity to directly contribute to fulfilling the practical needs of the Bureau of Customs and Border Protection • Serves as a reference model to be adopted by other divisions of the Department of Homeland Security and other departments contributing to homeland security missions.
The Team • Researchers • Nabil R. Adam and Vijay Atluri, CIMIC, Rutgers University • Robert Grossman, National Center for Data Mining, Univ. of Illinois at Chicago • Vasileios Hatzivassiloglou and Kathleen R. McKeown, Dept. of Computer Science, Columbia University • Rey Koslowski, Dept. of Political Science, Rutgers University • Tao Lin, SAP Corporate Research Labs • Domain experts • SAP labs • IBM Global services • Dr. Stephen E. Flynn, Council on Foreign Relations • C.J. Chang, Special Agent, SAIC Denver, Bureau of Immigration and Customs Enforcement, U.S. Customs Service • Steve Cooper, CIO, Department of Homeland Security • Luis R. Cortes, Chief of Intelligence, Office of National Risk Assessment (ONRA), Transportation Security Administration (TSA) • Lee Holcomb, Department of Homeland Security • James R. Sutton, Managing Associate of McManis Associates, Inc. and former Senior Intelligence Research Specialist for the U.S. Department of Justice on the Foreign Terrorist Tracking Task Force. • Consumers • US Customs, INS
Water Security • Specific Goals • Develop an End –to End Early Warning Decision Support System (EWS) for Dinking Water Safety and Security • to detect • deliberate or accidental introduction of contaminants into a distribution system (back flow, cross connections) • deliberate or accidental contamination of source waters • Cyber attacks caused by either externally or internally • Model the behavior of the level and extent of the threats • Develop a decision support system to generate warnings and alerts • Complement the EWS surveillance monitoring system (SMS) focuses on public health surveillance of disease data in the population
Weather station with data logger Service Area Managers / Officials Community • Reservoir • Treatment plant • Treatment plant • Sensors • Clinics • Hospitals Public Hospitals Real-time Monitoring, Modeling, and Alert System for Drinking Water Safety Security DATA Sources ALERT GENERATION VISUALIZATION CONTINUOUS MONITORING REAL-TIME MODELING
Water Security: Research Building Blocks • Sensor and Monitoring Research • Monitor Chemical, Biological, Radiological contaminants • Each source water monitoring station will include the installation of on-line sensors for the collection of water quality data: Alkalinity, Temperature, UV absorbance, Particle counts, Dissolved oxygen, pH, Turbidity • Finished water on-line monitoring stations will also be installed to monitor the quality of finished water: Total organic carbon, dissolved oxygen, free chlorine residual, Turbidity, pH, UV absorbance, particle counts • Modeling Research • tie together the sensor and monitoring systems to simulation models -- source water and distributed water • to predict where contaminant is moving and suggest possible remediation strategies • calibration of models and feed back loop so that monitors can be used to continuously self-calibrate the models • Information Management Research • Develop Real-time data acquisition information network system, a Sensor data management system, and Data validation and alert system • Develop Security modules to ensure security policies among the utilities, provide authentication, fine-grained access control, and secure data transfer • Web-based user interface and visualization to display alerts, warnings, affected areas
Water Security: The Team • Formed a Consortium • EPA Region II, USGS, NJDEP, AWWSC, NJDWSC, PVWC, and Rutgers CIMIC • Researchers • Nabil Adam, Francisco Artigas, Vijay Atluri, Kirk Barrett, Robert Clark (Rutgers CIMIC), Milton Halem (NASA/Rutgers CIMIC), Yelena Yesha (UMBC) • End users • Laura Cummings PVWSC, Eva Ibrahim, American Waters, Pen C. Tao, NJDWSC, Eric F Vowinkel, USGS