26,942 research outputs found

    DScentTrail: A new way of viewing deception

    Get PDF
    The DScentTrail System has been created to support and demonstrate research theories in the joint disciplines of computational inference, forensic psychology and expert decision-making in the area of counter-terrorism. DScentTrail is a decision support system, incorporating artificial intelligence, and is intended to be used by investigators. The investigator is presented with a visual representation of a suspect‟s behaviour over time, allowing them to present multiple challenges from which they may prove the suspect guilty outright or receive cognitive or emotional clues of deception. There are links into a neural network, which attempts to identify deceptive behaviour of individuals; the results are fed back into DScentTrail hence giving further enrichment to the information available to the investigator

    Liberty versus safety: a design review

    Full text link
    It is our contention that when designing against terrorism, it is important to fully understand both terrorist perpetrator techniques and terrorism prevention principles and to establish the myths and realities about ‘fear of terrorism’, before catalyzing new design innovations. This paper assesses the requirement for designers to mediate issues of user liberty versus security. We assess the troublesome design tradeoffs between accommodation of users and exclusion of terrorist misuse and abuse linked to bicycle parking, using the Conjunction of Terrorism Opportunity framework. We include the case study of the Biceberg automated bike parking system in relation to the fitness for purpose versus resistance to terrorism debate

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work

    Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland

    Get PDF
    The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.Wyniki analizy wskazują, ĆŒe pod względem instytucji Polska nie wypada Ćșle w odniesieniu do zagroĆŒeƄ wynikających z wdroĆŒenia technologii. Sytuacja nie jest tak dobra, jeƛli chodzi o ƛwiadomoƛć obywateli i mniejszych firm. Wymaga to uƂatwiania szerszego dostępu do darmowych programĂłw zabezpieczających firmy przed wyciekiem danych lub niekontrolowanych cyber-atakĂłw terrorystycznych. W odniesieniu do stosowania systemĂłw zabezpieczeƄ CCTV oraz biometrii, Polska pod względem prawnym jest wciÄ…ĆŒ na początku procesu dostosowania do dyrektywy UE. CiągƂy rozwĂłj technologii powinien zmusić ustawodawcę do stworzenia jednoznacznych standardĂłw i przepisĂłw obowiązujących w zakresie stosowania technologii CCTV oraz biometrii, gdyĆŒ ma to ogromne znaczenie w zapewnieniu podstawowych praw i wolnoƛci kaĆŒdego obywatela Rzeczypospolitej Polskiej

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    Jihad online : how do terrorists use the internet?

    Get PDF
    Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety among wide circles of the targeted population. This paper provides information about the ways terrorists are using the Internet. The threat of terrorism is real and significant. As the Internet becomes a major arena for modern terrorists, we need to understand how modern terrorism operates and devise appropriate methods to forestall such activities

    Privacy & law enforcement

    Get PDF
    • 

    corecore