Home Land Security Research at CIMIC Presented Nabil R. Adam and Vijay Atluri Team members: F. Artigas, K. Barrett, S. Chun, R. Clark, M. Halem, L. Liu Ph.D. Students: A. Gomaa, Q. Guo, D. Guo, V. Janeja, Y. Mohamoud, A. Paliwal, L. Qin, J. Warner, S. Yu CIMIC (Center for Information Management, Integration and Connectivity) Rutgers University – Newark Campus September 23, 2003 Ongoing HS Projects Border Security: Secure Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications Supported by NSF $1,050,000 (Sept 03 – Aug 06) additional matching funds from SAP Corporate Research Water Security: End –to End Early Warning Decision Support System for Dinking Water Safety and Security: Monitoring, Modeling and Info Management Supported by EPA $2,000,000 (Dec 03 – Nov 05) additional $2M matching from water utilities Emergency Response GIS for the Emergency Response Supported by the NJMC, $350,000 (June 03 – May 04) Protection of Critical Resources Meadowlands Environmental Research Institute Supported by the NJMC $8,000,000 (Jan 02 – Dec 07) 2 Border Security Specific Goals Supplement the profiling, by making it targeted towards anomalies Utilize data available from different agencies, ports and customs divisions Detect various flags raised by non-conforming shipments or abnormal behavior of inbound cargos and raise a combination of alerts Identify the anomalous shipment before it enters the country 3 4 Border Security Proposed Work Provide decision makers with the ability to Extract and fuse information from multiple, heterogeneous sources in response to a query Mine data distributed in various sources within and across various agencies Research Building Blocks Semantic Interoperability Security Enforcement Text Mining, Data Mining and Alert Management Systems The Diplomacy and Politics of Implementing Homeland Security Information Technology Initiatives 5 Broader Impact of Proposed Work Advances fundamental research in the areas of semantic interoperability, data mining, text mining and security enforcement Devises solutions to accomplish secure interoperation among different government agencies Our partnership with SAP, which is the supplier of software to the Customs and Border Protection Modernization Program and contractor to IBM, the prime contractor for eCustoms Partnership (eCP) that is implementing the modernization program Provides the opportunity to directly contribute to fulfilling the practical needs of the Bureau of Customs and Border Protection Serves as a reference model to be adopted by other divisions of the Department of Homeland Security and other departments contributing to homeland security missions. 6 The Team Researchers Nabil R. Adam and Vijay Atluri, CIMIC, Rutgers University Robert Grossman, National Center for Data Mining, Univ. of Illinois at Chicago Vasileios Hatzivassiloglou and Kathleen R. McKeown, Dept. of Computer Science, Columbia University Rey Koslowski, Dept. of Political Science, Rutgers University Tao Lin, SAP Corporate Research Labs Domain experts SAP labs IBM Global services Dr. Stephen E. Flynn, Council on Foreign Relations C.J. Chang, Special Agent, SAIC Denver, Bureau of Immigration and Customs Enforcement, U.S. Customs Service Steve Cooper, CIO, Department of Homeland Security Luis R. Cortes, Chief of Intelligence, Office of National Risk Assessment (ONRA), Transportation Security Administration (TSA) Lee Holcomb, Department of Homeland Security James R. Sutton, Managing Associate of McManis Associates, Inc. and former Senior Intelligence Research Specialist for the U.S. Department of Justice on the Foreign Terrorist Tracking Task Force. Consumers US Customs, INS 7 Water Security Specific Goals Develop an End –to End Early Warning Decision Support System (EWS) for Dinking Water Safety and Security to detect deliberate or accidental introduction of contaminants into a distribution system (back flow, cross connections) deliberate or accidental contamination of source waters Cyber attacks caused by either externally or internally Model the behavior of the level and extent of the threats Develop a decision support system to generate warnings and alerts Complement the EWS surveillance monitoring system (SMS) focuses on public health surveillance of disease data in the population 8 Real-time Monitoring, Modeling, and Alert System for Drinking Water Safety Security Service Area DATA Sources ALERT GENERATION Managers / Officials Hospitals •Reservoir •Treatment plant Community •Treatment plant •Sensors •Clinics •Hospitals Public REAL-TIME MODELING Weather station with data logger Predicted toxin concentration, ppb 8/24/01 Coastal GeoTools ‘01 18 Simulation Time, hr Location 1 Location 2 Location 3 0 2 4 6 8 10 12 14 16 18 20 20.3 14.1 10.2 8.4 6.5 4.4 3.4 2.3 1.3 0.4 0.0 0.0 8.4 14.3 18.2 13.3 9.5 7.0 5.1 3.2 2.3 1.2 0.0 0.3 11.1 15.1 17.5 15.5 11.1 9.2 7.3 5.4 4.0 Concentration, ppb 25.0 Predicted concentration at 5 locations moving downstream 20.0 Location 1 Location 2 Location 3 Location 4 Location 5 15.0 10.0 5.0 0.0 0 5 10 15 20 Simulation Time, hr 25 30 35 9 Water Security: Research Building Blocks Sensor and Monitoring Research Monitor Chemical, Biological, Radiological contaminants Each source water monitoring station will include the installation of on-line sensors for the collection of water quality data: Alkalinity, Temperature, UV absorbance, Particle counts, Dissolved oxygen, pH, Turbidity Finished water on-line monitoring stations will also be installed to monitor the quality of finished water: Total organic carbon, dissolved oxygen, free chlorine residual, Turbidity, pH, UV absorbance, particle counts Modeling Research tie together the sensor and monitoring systems to simulation models -- source water and distributed water to predict where contaminant is moving and suggest possible remediation strategies calibration of models and feed back loop so that monitors can be used to continuously self-calibrate the models Information Management Research Develop Real-time data acquisition information network system, a Sensor data management system, and Data validation and alert system Develop Security modules to ensure security policies among the utilities, provide authentication, fine-grained access control, and secure data transfer Web-based user interface and visualization to display alerts, warnings, affected areas 10 Water Security: The Team Formed a Consortium EPA Region II, USGS, NJDEP, AWWSC, NJDWSC, PVWC, and Rutgers CIMIC Researchers Nabil Adam, Francisco Artigas, Vijay Atluri, Kirk Barrett, Robert Clark (Rutgers CIMIC), Milton Halem (NASA/Rutgers CIMIC), Yelena Yesha (UMBC) End users Laura Cummings PVWSC, Eva Ibrahim, American Waters, Pen C. Tao, NJDWSC, Eric F Vowinkel, USGS 11 12