Improving rapid counter terrorism decision making

Similar documents
E x e c u t i v e S u m m a r y. P o w e r e d b y

A Review of The Polygraph: History, Current Status and Emerging Research

CRIMINAL JUSTICE (CJ)

Fingerprinting. A game-changing science that detects concealed information stored in the brain

Polygraph Tests. Charles R. Honts Boise State University Idaho USA. Field Practices and Inconclusive Outcomes

Brain Fingerprinting Technology

A Validity Study of the Comparison Question Test Based on Internal Criterion in Field Paired Examinations 1

Brain Fingerprinting Technology

Trust but Verify WHITE PAPER. PSYCHOPHYSIOLOGICAL TOUCH SCREEN STRESS ANALYSIS (PTSSA) Applied to Security and Investigative Screening

MODEL POLICY FOR LAW ENFORCEMENT/PUBLIC-SERVICE PRE- EMPLOYMENT POLYGRAPH SCREENING EXAMINATIONS. 1. Introduction Evidence-based Approach...

Investigation. Part Three: Interrogation

Assessing the Credibility of Threats Toward Schools

Behavioural Detection

"Preparedness and Personal Awareness" - Albert Timen

The Investigative Process. Detective Commander Daniel J. Buenz

Biceps Activity EMG Pattern Recognition Using Neural Networks

The Relationship between Crime and CCTV Installation Status by Using Artificial Neural Networks

Bio-Feedback Based Simulator for Mission Critical Training

Arab American Attitudes & the September 11 Attacks By Dr. James J. Zogby President, Arab American Institute October 15, 2001

Book Note: In Doubt: The Psychology Of The Criminal Justice Process, by Dan Simon

X13 VSA Voice Stress Analysis Lie Detector Software

Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze

Are you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test?

Discovering Identity Problems: A Case Study

Pipeline Technology Conference 2007

Five Mistakes and Omissions That Increase Your Risk of Workplace Violence

BRAIN FINGERPRINTING

Comparison of Mamdani and Sugeno Fuzzy Interference Systems for the Breast Cancer Risk

Lie Detector: Measure Physiological Values Nidhi Srivastava and Dr. Sipi Dubey

Research and Innovation Roadmap Annual Projects

MSc Enterprise Security and Digital Forensics. Examinations for / Semester 1

Modeling Terrorist Beliefs and Motivations

Module 2 - Public Health Preparedness

University of Cambridge Engineering Part IB Information Engineering Elective

FORENSIC SCIENCES AND CONTEMPORARY SECURITY CHALLENGES

Homeland Security and Protective Services CIP Task Grid

Scoring Respiration When Using Directed Lie Comparison Questions

EEL-5840 Elements of {Artificial} Machine Intelligence

Case-based Reasoning in Health Care

VOLUNTEERS OF AMERICA OF GREATER NEW ORLEANS, INC Saint Anthony Street, New Orleans, LA ADMINISTRATIVE AND CRIMINAL AGENCY INVESTIGATIONS

Multi Parametric Approach Using Fuzzification On Heart Disease Analysis Upasana Juneja #1, Deepti #2 *

GETTING TO YES OR NO IN THE INVESTIGATION OF TERRESTRIAL AND CYBERCRIMES, NATIONAL SECURITY THREATS AND COUNTER-INTELLIGENCE: BRAIN FINGERPRINT By

Los Angeles Valley College Emergency Services Department

You're guilty, so just confess! : The psychology of interrogations and false confessions

Investigating the Acoustic Correlates of Deceptive Speech. Christin Kirchhübel IAFPA, Vienna, 27 th July, 2011

APA STANDARDS OF PRACTICE (Effective October 10, 2017)

Phone Number:

APA STANDARDS OF PRACTICE (Effective September 1, 2015)

TIME SERIES MODELING USING ARTIFICIAL NEURAL NETWORKS 1 P.Ram Kumar, 2 M.V.Ramana Murthy, 3 D.Eashwar, 4 M.Venkatdas

Predicting Heart Attack using Fuzzy C Means Clustering Algorithm

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence

FREE INTRODUCTION MODULE

Food Bioterrorism: Schools as a Target

Detecting and Disrupting Criminal Networks. A Data Driven Approach. P.A.C. Duijn

Statistics 13, Midterm 1

ILLICIT DRUG TRADE. Future-oriented policing projects

4. The School is committed to the prevention of substance misuse through education and support. PROCEDURE

Sleepy Suspects Are Way More Likely to Falsely Confess to a Crime By Adam Hoffman 2016

VERSION 2016 INVESTIGATIONS CHAPTER 15 UTAH STATE BOARD OF EDUCATION CAREER AND TECHNICAL EDUCATION

Mohegan Sun Casino/Resort Uncasville, CT AAPP Annual Seminar

Augmented Cognition to enhance human sensory awareness, cognitive functioning and psychic functioning: a research proposal in two phases

COMPARING THE IMPACT OF ACCURATE INPUTS ON NEURAL NETWORKS

Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis.

Building Unity in the Community through Professionalism, Passion, Vision and Commitment. Sheriff Leon Lott

Modeling Terrorist Beliefs and Motivations

Embracing Complexity in System of Systems Analysis and Architecting

BRAIN FINGER PRINTING

The Brandermill Church

SNOW HILL POLICE DEPARTMENT

Sparse Coding in Sparse Winner Networks

Estimation of the Upper Limb Lifting Movement Under Varying Weight and Movement Speed

Neuroinformatics. Ilmari Kurki, Urs Köster, Jukka Perkiö, (Shohei Shimizu) Interdisciplinary and interdepartmental

Criminal Justice. Criminal Justice, B.S. major Victimology Emphasis. Criminal Justice 1. Career Directions

Expert consultation on improving drug statistics and strengthening the Annual Report Questionnaire (ARQ)

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict

GENERAL ORDER 426- MENTALLY ILL AND HOMELESS PERSONS

Research Article. August 2017

Science on the rise: birth and development of the Concealed Information Test

LIE DETECTION SYSTEM USING INPUT VOICE SIGNAL K.Meena 1, K.Veena 2 (Corresponding Author: K.Veena) 1 Associate Professor, 2 Research Scholar,

NORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION

Lecture 6: Terrorist Profiles/Theories. Lecture 6: Terrorist Profiles/Theories

A Fuzzy Improved Neural based Soft Computing Approach for Pest Disease Prediction

ARE POLYGRAPH EXAMINATIONS HELPFUL IN CRIMINAL INVESTIGATION CASES?

HUMAN FATIGUE RISK SIMULATIONS IN 24/7 OPERATIONS. Rainer Guttkuhn Udo Trutschel Anneke Heitmann Acacia Aguirre Martin Moore-Ede

Empowered by Psychometrics The Fundamentals of Psychometrics. Jim Wollack University of Wisconsin Madison

Regulatory Impact Statement. The International Convention on Standards of Training, Certification and Watchkeeping 1978

Different Perspectives to Analyze the Penal Justice System in Function of Crime Control from Professionals of Social Sciences

Smart NDT Tools: A New Generation of NDT Devices

A micropower support vector machine based seizure detection architecture for embedded medical devices

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis?

Understanding and Preventing Workplace Violence. Alameda County Health Care Services Agency

Disengagement and De-radicalization

Preventing and Managing Workplace Violence and other High-Risk Behaviors)

Non Linear Control of Glycaemia in Type 1 Diabetic Patients

Chapter 1 Observation Skills

Criminology Courses-1

MANAGEMENT. MGMT 0021 THE MANAGEMENT PROCESS 3 cr. MGMT 0022 FINANCIAL ACCOUNTING 3 cr. MGMT 0023 MANAGERIAL ACCOUNTING 3 cr.

Infrastructure Breakdown:

-What kind of person becomes a terrorist?

Adaptive Type-2 Fuzzy Logic Control of Non-Linear Processes

Transcription:

Improving rapid counter terrorism decision making COGITO Artificial Intelligence based human pattern recognition General Terrorists are threatening world peace. While intelligence is limited and cultural gap are a challenge COGITO is an effective tool to know who among travelers might pose a serious threat to security. While most technologies focus in identifying specific people based on prior intelligence COGITO concept and approach is focusing in the human factor and Intent Detection. COGITO systems are deployed and used by governments in US, Israel, Singapore, Mexico, Latin America and other parts of the world. This field proven COGITO technology led to detection of criminals, terrorists and employees harboring hostile intent or actually conducted crimes. The main obstacle to COGITO becoming a standard the fear of authorities of privacy concern and public opinion. The COGITO is an automated decision making system capable of collecting and analyzing psycho-physiological indications and cross-referencing these indications with additional objective (and available) information. In test duration of 5 minutes, the system can isolate those examinees (suspects) that qualify for further procedures. The system performs this examination with a high level of accuracy and reliability. The COGITO is specially designed for terrorist and Internal Threat detection and was tested successfully by the DHS. The system high performance reach as low as false-positive 5% (false positive) and 90% hit. This is achieved through the specificities of the COGITO methodology and software - Cross-referencing objective information with subjective reactions to specific terror related issues and stimulation, Using the Guilty Knowledge Test (GKT) method as opposed to the Control Question Technique (CQT). COGITO Concept COGITO presents a significant conceptual breakthrough that can assist international aviation and homeland security authorities in responding to increasingly sophisticated means of international terrorism. This concept is based on several well-established paradigms and assumptions. The COGITO system is a technology-based concept and solution for the detection of suspects harboring malicious intent serves for detection of Internal Threat (employees of governmental agencies and enterprises that have

destructive intents), Police interrogations and border security. The COGITO concept is derived from extensive interdisciplinary know-how in security, polygraph testing and field-proven security-related interrogation techniques. The COGITO core technology is based on proprietary software an expert system that emulates an investigator s Modus Operandi by incorporating soft decision-making algorithms such as Neural Networks and Fuzzy Logic. All hardware elements are best-of-breed off-the-shelf third-party components. The technical solution is comprised of a front-end, the Test Station, and a back-office where multiple-station and multiple-site data is stored, managed and distributed. Stimulated Psycho Physical Reaction (SPPR) The COGITO method is based on stimulating examinees with specific terrorism-related triggers using a direct contact, interaction, conscious, portal approach: The COGITO method postulates that specific words or questions can force terrorist to generate a SPPR that is identifiably different than that of a non-terrorist s SPPR to the same words or questions. Based on extensive field experience accumulated by Israeli security agencies, the only common characteristic to all suicide bombers and effective terrorists is their desire not to be caught by security authorities. The terrorist s fundamental motivation to successfully perform the terrorist act and not be caught by security authorities clearly differentiates him from the innocent person not harboring such intent. This identifiable motivation is known as the terrorist hunting hunted syndrome (THHS). In order to identify and isolate the terrorist, one needs to stimulate and detect the THHS. In order to expose the terrorist, the COGITO system generates a specific monitored stimulation of the THHS (i.e. to check the terrorist individually with his full awareness to the fact that he is being checked, and with wording or questions having specific relevance to terrorism or terrorist culture and terminology). This stimulation will engender an uncontrolled reaction (SPPR) from the terrorist, different than the reaction common to the so-called innocent person. Direct contact will ensure accurate calibration of the sensors to each individual and to each specific stimulated interaction. Terrorists can use sedation and control their psycho-physical output. Only full-contact sensors can detect the alleged sedation by examining the individual s reactions to specific stimulation. There is no academic or field experience supporting the assumption that a terrorist will tend to externalize a higher level of nervousness than an ordinary traveler. This is accentuated by the fact that there are many reasons for which an ordinary traveler may show signs of nervousness. Conversely, and based on field experience accumulated by Israeli law-enforcement and security agencies, the typical suicide bomber is highly mission-focused, and in most cases, does not show his stress in a visible and detectable manner. Uses of general excitement detection methods have been shown to yield unacceptably high positive-false alarms (30% and higher). Thus, any artificial statistic calibration to reduce positive false alarms will be of little value if not based on operational and field experience.

Low false alarm The system achieves results as low as 5% false-positive and negligible false-negative results. This is achieved through the specificities of the COGITO concept Cross-referencing objective information with subjective reactions to specific terror related issues and stimulation Using the Guilty Knowledge Test (GKT) method as opposed to the Control Question Technique (CQT) One of the tenets behind the COGITO method is the Guilty Knowledge Test (GKT)*. This method differs from the classic Control Question Technique (CQT), more commonly used by polygraphists. This method offers a methodology that enables investigators to identify the perpetrators of a criminal act. This is achieved by questioning the suspect based on information that can only be known to the actual perpetrator and that is not available to the general public. The underlying assumption of this theory is that when an individual performs an emotionally affecting act involving guilt or fear (known only to himself and to the investigator) his reaction to a specific event-related stimulation will be different than that of a non-involved individual. This example demonstrates how the chance to randomly generate a false-positive result (i.e. that an innocent person will react strongly to the RSOs) when using the GKT method is extremely low. 1/5*1/5*1/5 = 1/125 or less then 1% Using the GKT method enables COGITO to build and use an algorithm that can significantly reduce the levels of false-alarms. Cross-referencing the GKT results with additional objective passenger information reduces the level of false-alarm even further. * http://en.wikipedia.org/wiki/lie_detection#the_control_question_test_and_the_guilty_knowledge_test COGITO Algorithms The software component that is handling the decision process is a multi-layer algorithm: The Signal Analysis Input Algorithm The GSR output is analyzed by algorithms which are based originally on an expert system. This expert system resembles the way a polygraph specialist analyzes the

polygraph visual graphs. COGITO engineers have studied thousands of polygraph tests under the supervision of leading polygraph specialists. This knowledge base has been transformed into 4 basic algorithms that have been improved upon based on trials and studies. These 4 different algorithms are being used to analyze 12 different parameters (signal slope, amplitude, etc.). Signal analysis algorithm utilizes Sugeno type fuzzy interface system. The system uses several rules. For example: the height of the peak and the delay between the rise time of the reaction and the question. In the algorithm there are several rules with up to 4 inputs. The second part of the algorithm is Neural Network based. One of the inputs for the fuzzy system described above is the dissimilarity of a reaction. In order to accomplish this subjective parameter, the COGITO signal analysis algorithm uses LMS linear neural network. The network is trained on the input signal [P(t)]. After the learning, the network is used as a linear predictor for the signal and the error represents the relative dissimilarity of the response signal. The system uses several rules of the type described below. In the figure below, Input 1 and Input 2 are, for example, the height of the peak and the delay between the rise time of the reaction and the question. The output of the algorithm as described below, represent the relative excitation for each question. In the algorithm there are several rules with up to 4 inputs.

The second algorithm is Neural network based. One of the inputs for the fuzzy system described above is the dissimilarity of a reaction. In order to accomplish this subjective parameter, the COGITO signal analysis algorithm uses LMS linear neural network. The network is trained on the input signal [P(t)]. The learning is done with the Least Mean Square algorithm as described below: Where α is the learning rate. After the learning, the network is used as a linear predictor for the signal and the error represents the relative dissimilarity of the response signal. Peak of tension algorithm that compares only the signal altitude.