26,942 research outputs found
DScentTrail: A new way of viewing deception
The DScentTrail System has been created to support and demonstrate research theories in the joint disciplines of computational inference, forensic psychology and expert decision-making in the area of counter-terrorism. DScentTrail is a decision support system, incorporating artificial intelligence, and is intended to be used by investigators. The investigator is presented with a visual representation of a suspectâs behaviour over time, allowing them to present multiple challenges from which they may prove the suspect guilty outright or receive cognitive or emotional clues of deception. There are links into a neural network, which attempts to identify deceptive behaviour of individuals; the results are fed back into DScentTrail hence giving further enrichment to the information available to the investigator
Liberty versus safety: a design review
It is our contention that when designing against terrorism, it is important to fully understand both
terrorist perpetrator techniques and terrorism prevention principles and to establish the myths and
realities about âfear of terrorismâ, before catalyzing new design innovations. This paper assesses the
requirement for designers to mediate issues of user liberty versus security. We assess the troublesome
design tradeoffs between accommodation of users and exclusion of terrorist misuse and abuse linked to
bicycle parking, using the Conjunction of Terrorism Opportunity framework. We include the case
study of the Biceberg automated bike parking system in relation to the fitness for purpose versus
resistance to terrorism debate
State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism
Overview
This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.
The paper is structured as follows:
Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS).
Part 2 provides an introduction to the key approaches of social media intelligence (henceforth âSOCMINTâ) for counter-terrorism.
Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored.
Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work
Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.Wyniki analizy wskazujÄ
, ĆŒe pod wzglÄdem instytucji Polska nie wypada Ćșle w odniesieniu do zagroĆŒeĆ wynikajÄ
cych z wdroĆŒenia technologii. Sytuacja nie jest tak dobra, jeĆli chodzi o ĆwiadomoĆÄ obywateli i mniejszych firm. Wymaga to uĆatwiania szerszego dostÄpu do darmowych programĂłw zabezpieczajÄ
cych firmy przed wyciekiem danych lub niekontrolowanych cyber-atakĂłw terrorystycznych. W odniesieniu do stosowania systemĂłw zabezpieczeĆ CCTV oraz biometrii, Polska pod wzglÄdem prawnym jest wciÄ
ĆŒ na poczÄ
tku procesu dostosowania do dyrektywy UE. CiÄ
gĆy rozwĂłj technologii powinien zmusiÄ ustawodawcÄ do stworzenia jednoznacznych standardĂłw i przepisĂłw obowiÄ
zujÄ
cych w zakresie stosowania technologii CCTV oraz biometrii, gdyĆŒ ma to ogromne znaczenie w zapewnieniu podstawowych praw i wolnoĆci kaĆŒdego obywatela Rzeczypospolitej Polskiej
Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or âlone wolf terroristâ), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terroristâs blueprint
Jihad online : how do terrorists use the internet?
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety among wide circles of the targeted population. This paper provides information about the ways terrorists are using the Internet. The threat of terrorism is real and significant. As the Internet becomes a major arena for modern terrorists, we need to understand how modern terrorism operates and devise appropriate methods to forestall such activities
- âŠ