4,596 research outputs found

    Key steps for the construction of a glossary based on FunGramKB Term Extractor and referred to international cooperation against organised crime and terrorism

    Get PDF
    The employment of new technological instruments for the processing of natural languages is crucial to improve the way humans interact with machines. The Functional Grammar Knowledge Base (FunGramKB henceforth) has been designed to cover Natural Language Processing (NLP henceforth) tasks in the area of Artificial Intelligence. The multipurpose lexical conceptual knowledge base FunGramKB is capable of combining linguistic knowledge and human cognitive abilities within its system as a whole. The conceptual module of FunGramKB contains both common-sense knowledge (Ontology), procedural knowledge (Cognicon) as well as knowledge about named entities representing people, places, organisations or other entities (Onomasticon). The Onomastical component is used to process the information from the perspective of specialised discourse. The definition in Natural Language of a consistent list of encyclopaedic terms existent referred to the legislation and to entities which fight against organised crime and terrorism existent in the GCTC would be the stepping stone for the future development of the Onomasticon. The FunGramKB Term Extractor (FGKBTE henceforth) is used to process the information. To cope with the inclusion of the terms in the Onomasticon according to the Conceptual Representation Language (COREL henceforth) schemata, the DBpedia project has been of paramount importance to develop specific patterns for the structure of the definitions.El empleo de nuevas herramientas tecnológicas para el Procesamiento del Lenguaje Natural (PLN en adelante) es fundamental para mejorar la forma en que las máquinas se relacionan con los seres humanos. FunGramKB ha sido diseñada para abordar tareas de PLN inmersas en el área de la Inteligencia Artificial. La base de conocimiento léxico conceptual multipropósito FunGramKB es capaz de combinar el conocimiento lingüístico con las habilidades cognitivas humanas dentro de su sistema como conjunto. El modulo conceptual de FunGramKB se basa en el sentido común (Ontología) y en el conocimiento procedimental (Cognicón), a la vez que en el conocimiento sobre entidades nombradas que representan personas, lugares, organizaciones u otras entidades (Onomasticon). La definición en Lenguaje Natural de una lista consistente de términos enciclopédicos concerniente tanto a instrumentos legales como a organizaciones que luchan contra el crimen organizado y el terrorismo que se ha incluido en el GCTC supondrá un gran adelanto en aras al futuro desarrollo del Onomasticon. El FGKBTE se usa para procesar la información. Con vistas a incluir los términos en el Onomasticón de acuerdo al esquema COREL, el proyecto DBpedia ha sido de una importancia fundamental para desarrollar patrones determinados con los que estructurar las definiciones.Universidad de Granada. Departamento de Filologías Inglesa y Alemana. Máster en Lingüística y Literatura Inglesas, curso 2013-201

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Changes and Countermeasures of Investigation Activities Under the Background of Big Data

    Get PDF
    In recent years, the ideas and methods of big data have caused a substantial change in the field of social and economic life and brought new opportunities and challenges to the public, prosecutors, and judicial organs. However, academic research on big data investigation is still at an early stage, and no theory and method of using big data systems have been formed. Therefore, this study focuses on examining the effect of big data on modern investigation activities and discusses how to use big data to improve the efficiency of investigation activities. The study also proposes the author’s views and opinions on how to maintain high efficiency in big data investigations. This study investigates the application of big data in investigative activities. First, the background of big data and the significance of studying big data investigation are introduced. On this basis, the origin and development of big data and the informatization of investigation are systematically classified. The connotation and changes of the investigation and the informatization of investigation under the background of big data are further examined. This study suggests that big data influences investigative thinking, investigative methods, and techniques. Moreover, traditional investigation methods should be reformed to understand big data investigation. Last, considering the risks that big data may bring to investigation activities, how to use big data to enhance investigation activities from the perspectives of privacy protection, platform establishment, and talent training is analyzed. Keywords: big data, investigation activities, investigation reform and response DOI: 10.7176/DCS10-9-06 Publication date:September 30th 202

    The Role of the Internet in Intelligence Gathering and Spreading Propaganda

    Get PDF
    The analysis of American intelligence as an academic discipline exhibits an excellent level of integration regarding subject matter and methods from military history and strategic studies. The knowledge and information revolution steered a different online culture of sharing and oversharing. While the study of intelligence has primarily been associated with historical methods thus far, opportunities for innovation are also afforded by advances in theoretical and conceptual thinking about intelligence. Such revolutions can help intelligence history while concurrently enlightening the disputes on intelligence in the twentyfirst century. The takings from the information age consist of low cost for access to data and significant dependence on the Internet. Intelligence agencies profit from the Internet equally through open sources and concealed data gathering from networked computers (Haines, 2004). In addition, Information gathering through Twitter, Facebook, Snapchat, Instagram, blogs, and several social media sites, to name a few, facilitated intelligence gathering all over the world. While some researchers may argue that social media may be an intelligence-gathering tool, several reports revealed that it could also be used for propaganda and misinformation or is intelligence in support of secret operations. This project will investigate how the Internet and the use of Social Media in particular, along with the military strategy of a country, can affect the design of its market intelligence processes

    Overlaps between Organised Crime and Terrorism

    Get PDF
    This article analyses the distinctive and connecting aspects of organised crime and terrorism, presenting the criminological elements of these two phenomena and legal aspects involved in fighting them. Although each of them has an independent existential theoretical and legal expression, they are not only interconnected, but also complement each other. The article emphasises that to combat these ills effectively, international and national (including criminal and procedural) legislation must reflect both the individual specifics of organised crime and terrorism and the context of their common features – with the connections between these features understood. Both international and national normative regulation can be more effective in the fight against organised crime and terrorism if their content is directed against these phenomena by perceiving them both in isolation and in recognising their integrity

    OVERLAPS BETWEEN ORGANISED CRIME AND TERRORISM

    Get PDF
    This article analyses the distinctive and connecting aspects of organised crime and terrorism, presenting the criminological elements of these two phenomena and legal aspects involved in fighting them. Although each of them has an independent existential theoretical and legal expression, they are not only interconnected, but also complement each other. The article emphasises that to combat these ills effectively, international and national (including criminal and procedural) legislation must reflect both the individual specifics of organised crime and terrorism and the context of their common features – with the connections between these features understood. Both international and national normative regulation can be more effective in the fight against organised crime and terrorism if their content is directed against these phenomena by perceiving them both in isolation and in recognising their integrity

    Global Risks 2015, 10th Edition.

    Get PDF
    The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers. Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result. Taking this effort one step further, this year's report underscores potential causes as well as solutions to global risks. Not only do we set out a view on 28 global risks in the report's traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends. In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communitie
    corecore