Information Technology and Homeland Security
Information technology has dramatically changed the way we secure our nation. Few people would dispute the fact that in place of a massive spy network, we have now sophisticated information-gathering systems. For the most part the security of our nation rests in the silicon within these systems and the people who analyze the massive amount of information they collect 24 hours a day, seven days a week, 365 days a year. From eavesdropping on cell phone conversations to listening in on satellite communications to multifunction sensors, the intelligence we gather is the fundamental protection against terrorism. For years now we have read articles on the so called electronic listening stations and their ability to intercept almost, if not all, types of electronic communications. In the not so distant past we heard about carnivore, the FBI system that would intercept emails on the internet. These current capabilities will pale in comparison to the systems currently under consideration or in some cases in development.
We have all seen the articles in the media about bits of information we have collected and used to foil terrorist plots. You may also recall we had the ability to listen in to Osama Bin Laden's satellite phone conversations. However, once it was reported via the mass media he stopped using his satellite phone. Imagine that! Another story that received far less media attention was the assassination of a foreign leader via a missile that honed in on his cell phone signal. The fact is that information technology has become integrated into almost every weapons system in today's modern military.
There are many applications of information technology in the fight to defend against terrorism. Cyber attacking tools that might allow one country to electronically transfer the funds out of a terrorist organization's bank accounts or to place a web bug on their computer so every time they send an email the intelligence agency would also receive a copy. The applications of information technology to homeland security or to warfare in general seem endless. In order to constrain the topic for this column, we will investigate information technology based intelligence systems that are evolving as we speak.The Global Intelligence Grid (GIG) is this next generation of intelligence gathering systems that will serve to protect against terrorism. In our technology analysis framework presented in the first column, the GIG would be classified as a Defensive Tool for Protection and without question the exact operations and capabilities would fall under Black (Covert) Operations.
The Global Intelligence Grid will be the most complex systems development effort ever undertaken. While we can only speculate about the true capabilities, the following description should provide a glimpse into what the system might be like. To help define the GIG we can break it down into simple input systems, processing systems, and output systems.
A multi-layered approach would be used to create a sensor network array that collects data in real time and communicates that data back to the processing system. Advances in sensor technology has created the ability to decrease the size of these devices and with breakthroughs in semiconductor technology, decrease the power consumption; thus, extending the length of operational time and increasing communications power. This new breed of sensor will be much more intelligent. In essence they would hibernate until something happens that would cause the sensor to become stimulated. At which point the individual sensor or sensors would collect the specific type of information and send it back for processing and analysis. These sensors would also identify the presence of detection equipment and remain silent until it was safe to transmit the collected data.
The new sensors will be able to detect vibration, chemicals, radiation,
biological agents, explosives, footsteps, voices, still images, and even
video images and transmit them to a network of fixed and mobile relay collection
stations. The significant reduction in size will enable sensors
to be deeply embedded in the physical world products or materials and spread
throughout our environment like smart grains of sand.Currently, the sensor
networks with communications capabilities have been produces that are as
small as a penny. In the future NanoTechnology (the capability of
building things one molecule at a time) will create miniature sensors so
small they could be woven directly into the fabric of a chair or in the
layers of plastic in a milk carton or maybe even within the ink on a piece
The multiple layers of networked sensors would consist of seven layers.
- Spaced Based Satellite Systems
- Airborne Based Combination Relay/Sensing Systems
- Elevated Land Based Sensors and Relay Systems
- Common Product Based Sensing Systems
- Ground based Sensors
- Sea Surface Sensing Systems
- Ocean Floor Sensor Systems
Collecting the information from the sensors is one thing, but making sense out of all this data is another. Data collected and processed becomes information - information analyzed, understood and put in context is Knowledge. The GIG must not just collect this mountain of data but also have the ability to transform the bits and bytes into information and knowledge that can be acted upon. The ability to store the information and extract meaningful information is another. Because of the unique characteristics of the terrorist networks, careful attention must be given to the location of each and every event, action, or fragment of information. The ability to covertly sense and monitor events and activities on this scale will stretch the limits our current Geographic Information Systems (GIS) capabilities. GIS is a system of hardware and software used for storage, retrieval, mapping, and analysis of geographic data in this case sensory data.Spatial features are stored in a coordinate system latitude/longitude, state plane, UTM, etc., which references a particular place on the earth. Once the data is stored in the GIS system, advanced processing capabilities such as data fusion must be employed to make sense out of events that may be taking place in different parts of the world. Simply put: data fusion is the seamless integration of data from disparate sources.It is like picking a puzzle part out of a box containing pieces from 60 different puzzles and selecting not only the puzzle it belong to but also where it fits. These individual events may be meaningless, but put together like pieces of a puzzle could indicate a terrorist attack. Advanced pattern recognition techniques coupled with the GIS capabilities create a powerful tool to combat terrorism and defend our homeland. GIS with advanced drill down capabilities and interoperability with other pattern identification tools must be an integral part of the GIG processing system. Another information tool looks at not only the location of events, actions, or information; but also who is involved must also be included in the processing capabilities With complex relationships and the magnitude of information, information overload must be overcome through the use of advanced visualization techniques and automated profiling and modeling capabilities.One such technique is advanced relationship mapping capabilities that identifies known and in some cases obscure relationships between people or organizations, calculates the weight of each relationship or connection based on actions, events and intelligence and displays these relationship graphically in a nodal relationship matrix. This allows rapid identification of significant participants (leaders) within organizations and possibly the network within or external to a terrorist cell.
Data visualization is essentially a mapping process from computer representations to perceptual representations, choosing encoding techniques to maximize human understanding and communication.The goal of a viewer might be a deeper understanding of physical phenomena or mathematical concepts, but it also might be a visual proof of computer representations derived from the initial stage of intelligence analysis routines. Without the ability to quickly make sense out of the mountains of data the GIG will produce, we will not be able to interpret the sensory input data quick enough to intercede in clandestine activities. The work product of the automated analysis tools is every bit as important as the ability to collect the data to begin with.
BioTechnology and Homeland Security
BioTechnology is a strategic asset in the fight to protect the world's population against bioterrorism.Laboratories in companies around the world are actively developing biological detection and defense technologies. While the BioTech industry in general has a long standing policy against using this science to develop weapons, there are also labs working on creating bioweapons.
Nearly 20 countries around the world possess biological weapons of mass destruction. It is important to note that BioTech used as a weapon not only target humans, but crops and livestock as well. There are four primary Biological agents used as weapons.
As a technology, BioTech is relatively immature.As BioTechechnology advances, we can expect new applications of this science to create weapons of mass destruction. As you can see by Figure 3, BioTechnology is in the latter stages of the applied research phase of maturity.
While there is very little direct impact technology can have on the proliferation of biological weapons, it will play a pivotal role in alerting the public of threats and releases of biological weapons. Currently, air monitoring station within major metropolitan areas (areas of high threat) have and are being retrofitted to include sensors to detect the presence of biological agents. While not yet a real time system (as described earlier) these detection systems are perhaps the first line of bioterrorism detection. Our second line of defense rest with the network of health care providers. As unknowing victims of a bioterrorism attack fall ill they will seek diagnosis and treatment, health care providers must recognize the symptoms and report it to our CDC that tracks such health threats. Public health and homeland security officials recognize that there's a very limited period of time to determine if an act of bioterrorism has occurred and identify the organism before the disease spreads and creates a second wave of exposed victims.
Once again this system uses GIS technology to monitor and track the spread the disease which will aid in limiting exposures and assist in tracing the initial point of release. The looming threat of bioterrorism has raised the level of angst and heightened the sense of urgency to enhance the existing systems that are used to monitor infectious diseases. A fully integrated, real time GIS would provide greater meaning to the data and speed the detection of disease outbreaks. In order to be effective the systems must address the multiple layers of care providers and agencies. One critical issue is the numerous points of data collection and the education of health care workers and first responders for early identification of victims.
Technology can not totally protect us against the threats of terrorism.
But it can increase our ability to prevent such acts or limit the impact
of the acts. As you can see technology is a double edge sword.
Just as nuclear technology can by used to treat cancer and provide electricity
- it can also be used in weapons. It is not the technology that we
should be concerned about, it is the application of the technology.
For decades governments have tried to control the spread of technology.
This has had only limited success. In a recent presentation a discussion
arose that suggests the only way to control technology is to control the
knowledge that is required to create it. What a scary thought!
There are already signs that this is occurring. Discussions are underway
that would limit the publication of general academic research in a number
of different areas. This is an effort meant to prevent the knowledge
transfer to undesirables. While one can certainly understand the
rational behind such actions, you have to consider just how much impact
this could have on the advancement of science and technology that would
serve to benefit all of mankind. Reducing collaboration and peer
review will greatly slow the advancement of scientific research.A delicate
balance must be struck as not to impair the evolution of science and technology.