I. Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju
{"title":"Tools and Methods for Security: Stimulating the Skill to Philosophize","authors":"I. Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju","doi":"10.1109/EISIC.2013.36","DOIUrl":"https://doi.org/10.1109/EISIC.2013.36","url":null,"abstract":"Finding optimal solutions to security issues is very difficult or impossible. Conflicting interests and values decide what has to be done. Every thinkable answer contains both risks and possibilities. I our effort to find solutions we have always to negotiate and make compromises. A dialectic process is necessary in security in order to identify significant interests and values, and to formulate principles and policies. Handling security issues and working for secure IT systems demand continuous adjustment to relevant values as well as the necessary personal skills and suitable group processes. Focusing on the method and making sure that the right way of proceeding has been adopted is the way to get satisfactory answers to the problems of IT security. The philosophical method of deliberative thinking seems to be the basis of such methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"46 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement","authors":"J. Rajamäki, J. Knuuttila","doi":"10.1109/EISIC.2013.44","DOIUrl":"https://doi.org/10.1109/EISIC.2013.44","url":null,"abstract":"When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways. However at worst, LEAs must perform many stages twice with the help of different technical tools. When investigating the identity of criminals LEAs may apply totally different technical tools than when gathering evidences for charge, because the data provided by investigating may not be valid in court. For that reason, a new monitoring system that goes beyond state of the art is needed. Three organizational layers need attentions: 1) LEA, the people that actually retrieve and store the information. 2) Prosecutors and their offices, how they get access to the information. 3) Courts, the final destination of the retrieved information. Until now, the information gathering tools for LEAs have been engineered focusing only on the best way to retrieve the information from the target. The attention paid to the legal, integrity and chain-of-custody requirements as well as social acceptance and legal oversight in connection with retrieving information has been inadequate and guidance on the matters has existed only in manuals written by legal departments.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects","authors":"S. Bernhardsson, R. Forsen","doi":"10.1109/EISIC.2013.54","DOIUrl":"https://doi.org/10.1109/EISIC.2013.54","url":null,"abstract":"FOI has for many years conducted experiments and developed models for assessment of damage and protective capacity of buildings exposed to weapon effects. The main tools used for these types of assessments are large scale, empirical based evaluations and more detailed finite element analyses. In this paper we present the tools that have been developed and the ongoing work at FOI in this area.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test","authors":"J. Proudfoot","doi":"10.1109/EISIC.2013.69","DOIUrl":"https://doi.org/10.1109/EISIC.2013.69","url":null,"abstract":"The standard Concealed Information Test (CIT) requires the use of target items to elicit physiological response differences between those concealing information and those naïve to target items. Interpersonal Deception Theory contends that deceivers often exhibit both strategic and nonstrategic behaviors in an attempt to appear truthful. This paper proposes a study designed to ascertain the feasibility of using noncontact sensors to conduct a target less CIT to elicit cues of strategic and nonstrategic behaviors indicative of concealed knowledge and deception. The ability to implement a CIT without target items increases the feasibility of CIT use in a number of border control, passenger screening, and document adjudication contexts.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129667725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Key Players in Criminal Networks Using Dynalink","authors":"Andrew J. Park, Herbert H. Tsang","doi":"10.1109/EISIC.2013.46","DOIUrl":"https://doi.org/10.1109/EISIC.2013.46","url":null,"abstract":"Detecting key players in criminal networks is an important aspect of criminal investigation because it promotes the efficient use of available resources (human, financial, time, etc.). In this paper, we propose a new technique of detecting key players in co-offending networks using the Dynalink framework. Dynalink is a social network visualization tool developed intentionally employs visual analytics to visualize networks interactively over time. This novel technique proposed here employs the intuitive concept of centrality in detecting key players in criminal networks. The tool will allow crime analysts and investigators to visualize networks interactively over time and use this technique to discover criminal patterns and key players.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"10 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods","authors":"M. Saravanan, Rakhi Thayyil, S. Narayanan","doi":"10.1109/EISIC.2013.27","DOIUrl":"https://doi.org/10.1109/EISIC.2013.27","url":null,"abstract":"A crime investigation is an official effort to uncover information about a crime. In recent years the number of crime cases has been on a rise. The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. In this paper we propose a swift response system which can identify the most probable local suspects involved in a crime case, by analyzing the relevant case histories. We have looked into the mobile call detail records of suspects and victims to understand their presence in crime scenario. Records of Cell tower near crime scene have been analyzed to track the real perpetrators. With the knowledge of suspect's journey to crime and about the movements of people in the crime scene, we are able to model the system and to understand the probable suspects involved in the crime. Prediction techniques are used to filter and identify the different types of people present at the crime scene. To solve the case at a rapid pace, we have mapped the current location of the probable suspects using Mobile GIS. We have also evaluated the methods used in this system in comparison with traditional methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief","authors":"","doi":"10.1109/EISIC.2013.55","DOIUrl":"https://doi.org/10.1109/EISIC.2013.55","url":null,"abstract":"Information and Communication Technology (ICT) service of the Public Protection and Disaster Relief (PPDR) are currently delivered in heterogeneous and tailor made methods. Majority of PPDR actors prefers their own technology, contract and process implementation. Utility, cloud and service-oriented computing are cutting-edge technologies that standardize ICT services and solutions. This paper studies ICT services and argues technologies, contracts and processes should be standardized in PPDR. This research also explores leveraging benefits and challenges of cloud base utility and service-oriented computing.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeffrey L. Jenkins, Jim Marquardson, J. Proudfoot, J. Valacich, E. Golob, J. Nunamaker
{"title":"The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation","authors":"Jeffrey L. Jenkins, Jim Marquardson, J. Proudfoot, J. Valacich, E. Golob, J. Nunamaker","doi":"10.1109/EISIC.2013.65","DOIUrl":"https://doi.org/10.1109/EISIC.2013.65","url":null,"abstract":"Proper resource allocation at Border Patrol checkpoints is essential for effective and efficient screening. Improper resource allocation can lead to flushing-i.e., allowing cars to pass through a checkpoint without screening-or cost inefficiencies. To better inform resource allocation, we present a prototype simulation that models the major processes of an operational checkpoint. Data for the simulation was collected during extensive site visits to checkpoints on the U.S. northern and southern borders. In a case study, we configure the simulation to model the Tucson Sector, I-19 checkpoint. We found that the checkpoint can handle current traffic demands, but additional screening capacity is needed to accommodate traffic in the next 20 years.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Forensics: A Technical Approach to Virtual Machine Acquisition","authors":"L. Holt, Mohammad Hammoudeh","doi":"10.1109/EISIC.2013.59","DOIUrl":"https://doi.org/10.1109/EISIC.2013.59","url":null,"abstract":"The cloud is radically changing the face of information technology. Traditional digital forensic procedures, software, and hardware are incapable of scaling to the cloud. This paper introduces a new system, leveraging cloud management SDK's to enable highly scalable Virtual Machine (VM) acquisition from cloud infrastructures.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"18 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131711652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Butt, Sandra Marti, A. Nouak, Jörg Köplin, Ramachandra Raghavendra, Guoqiang Li
{"title":"Towards e-Passport Duplicate Enrollment Check in the European Union","authors":"M. Butt, Sandra Marti, A. Nouak, Jörg Köplin, Ramachandra Raghavendra, Guoqiang Li","doi":"10.1109/EISIC.2013.64","DOIUrl":"https://doi.org/10.1109/EISIC.2013.64","url":null,"abstract":"Automated border control gates are now being more and more deployed at airports to smooth border crossings with reduced man power and more convenience to the passenger. In order to use these new gates the traveler is required to present an electronic passport (e-Passport or biometric passport). Lots of efforts have been undertaken to improve the security of the infrastructure at borders or by adding various security features to the passport. However, the weakest point in the passport issuance process is the enrolment step for passport applicant including the breeder documents authenticity and the duplicate enrolment check. The goal of duplicate enrolment check is to prevent the issuance of duplicate illegal passports containing possibly fake identities. A solution to this problem needs to be flexible and precise if the solution is meant for large-scale deployments and eventually standardization. This paper describes how a duplicate enrolment check can be realized securely between European Union member states using distributed databases of alphanumeric data and multiple biometric modalities.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}