Technology Development for Security Practitioners (Security Informatics and Law Enforcement)
â Scribed by Babak Akhgar (editor), Dimitrios Kavallieros (editor), Evangelos Sdongos (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 553
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emergingsecurity threats, provides analysis of operational capability gaps, and includes real-world applied solutions.
Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
⌠Table of Contents
Preface
Contents
Part I: Cyber Crime, Cyber Terrorism and Cyber Security
Chapter 1: ASGARD: A Novel Approach for Collaboration in Security Research Projects
1.1 Introduction
1.2 Related Work
1.3 Methods
1.4 Results
1.5 Discussion and Future Research
References
Chapter 2: SoK: Blockchain Solutions for Forensics
2.1 Introduction
2.1.1 Blockchain as a Game Changer in Digital Forensics
2.1.2 Goal and Plan of the Chapter
2.2 Methodology
2.3 Classification of the Available Blockchain-Based Forensics Literature
2.3.1 Cloud Forensics
2.3.2 Data Management Forensics
2.3.3 Healthcare Forensics
2.3.4 IoT Forensics
2.3.5 Mobile Forensics
2.3.6 Multimedia Forensics
2.3.7 Smart Grid Forensics
2.3.8 Intelligent Transportation Systems Forensics
2.4 Discussion
2.4.1 Limitations in Blockchain
2.4.2 Challenges in Blockchain Digital Forensics
2.5 Conclusions
Bibliography
Chapter 3: Query Reformulation Based on Word Embeddings: A Comparative Study
3.1 Introduction
3.2 Related Work
3.3 Methods
3.3.1 Word Embedding
3.3.2 Query Expansion
3.4 Evaluation
3.4.1 Experiments on Benchmark Datasets
3.4.2 Experiments on a Terrorism-Related Dataset
3.5 Results
3.5.1 Benchmark Datasets
3.5.2 Terrorism-Related Dataset
3.6 Conclusions
References
Chapter 4: Evolving from Data to Knowledge Mining to Uncover Hidden Relationships
4.1 Introduction
4.2 State of the Art
4.3 Proposed System
4.4 Methodology and Tools
4.4.1 Semantic Fusion Tools
4.4.2 Trend Prediction
4.5 Conclusions
Bibliography
Chapter 5: Cyber-Trust: Meeting the Needs of Information Sharing Between ISPs and LEAs
5.1 Introduction
5.2 Related Work
5.2.1 Industry Solutions
5.2.2 Research Solutions
5.3 Towards Reshaping Cyber-Crime Investigation Procedures
5.3.1 Platform User Requirements
5.3.2 LEAs Evidence Procedures in Cyber-Trust Platform
5.4 Cyber-Trust for LEAs
5.4.1 LEAs in Cyber-Trust Platform
5.4.2 Blockchain for LEAs
5.4.3 LEAs User Interface (UI)
5.5 Conclusions
References
Chapter 6: Cyber Ranges: The New Training Era in the Cybersecurity and Digital Forensics World
6.1 Introduction
6.2 State-of-the-Art of Cyber Ranges
6.2.1 Government, Military, and LEAs Oriented
6.2.1.1 Department of Defence (DoD) Cybersecurity Range
6.2.1.2 Arizona Cyber Warfare Range
6.2.1.3 Hybrid Network Simulation (HNS) Platform
6.2.1.4 ManTech
6.2.1.5 Ăcole Navale CR
6.2.1.6 Airbus CR
6.2.2 Academic
6.2.2.1 KYPO Cyber Range
6.2.2.2 Augusta University CR
6.2.2.3 US Cyber Range
6.2.2.4 Austrian Institute of Technology Cyber Range
6.2.2.5 Saros Technology
6.2.2.6 European Space Agency (ESA) CR (by RHEA Group)
6.2.2.7 Virginia CR
6.2.2.8 THE Michigan CR
6.2.3 Commercial
6.2.3.1 IXIA Cyber Range
6.2.3.2 Palo Alto Networks Cyber Range
6.2.3.3 IBM Cyber Range
6.2.3.4 CybExer Cyber Range
6.2.3.5 Raytheon Cyber Range
6.2.3.6 CYBERBIT Cyber Range
6.2.3.7 Breaking Point
6.2.3.8 RGCE
6.2.3.9 Berkatweb
6.2.3.10 CYBERGYM
6.2.3.11 CyberCENTS
6.2.3.12 Silensec Cyber Range
6.2.3.13 Cisco Cyber Range
6.3 IT, OT, and Hybrid Approaches of Cyber Ranges
6.4 Components of Modern Cyber Ranges
6.4.1 Artificial Intelligence (AI) and Machine Learning
6.4.2 Information Gathering and Sharing
6.4.3 Gamification and Serious Gaming
6.4.4 Evaluation Module
6.5 Operational Impact of Cyber Range Elements
6.5.1 Impact of Training in Cybersecurity/Defence
6.5.2 Impact of Training in Digital Forensics
6.6 FORESIGHT Paradigm
6.7 Conclusions
References
Part II: Serious and Organized Crime (SOC)
Chapter 7: COPKIT: Technology and Knowledge for Early Warning/Early Action-Led Policing in Fighting Organised Crime and Terrorism
7.1 Introduction
7.2 Relevant Characteristics of the Techniques Used
7.2.1 Approaches to Incorporation of Knowledge
7.2.2 Interpretability of Techniques
7.2.3 Requirements for the Information System
7.3 Ethical, Data Protection and Related Aspects
7.3.1 Legal, Ethical and Societal Challenges
7.4 Conclusions
References
Chapter 8: Detection of Irregularities and Abnormal Behaviour in Extreme-Scale Data Streams
8.1 Introduction
8.2 State-of-the-Art Research Projects
8.3 Available Technologies in Crime Investigations and Future Trends
8.3.1 Visual Intelligence
8.3.2 Semantic Integration and Technologies
8.3.3 Data Mining and Detection of Cybercriminal Activities
8.4 Proposed Architecture
8.4.1 Visual Intelligence Modules
8.4.2 Data Mining Modules for Crime Prevention and Investigation
8.4.3 Semantic Information Representation and Fusion Modules
8.4.4 Trend Detection and Probability Prediction Modules for Organized Terrorism and Criminal Activities
8.4.5 Detection Modules of Cybercriminal Activities
8.4.6 Situation Awareness and HMI Modules
8.5 Conclusions
References
Chapter 9: Visual Recognition of Abnormal Activities in Video Streams
9.1 Introduction
9.2 Related Work
9.3 Activity Recognition Framework
9.4 Experiments
9.4.1 Dataset
9.4.2 Experimental Setup
9.4.3 Results
9.5 Conclusions
Bibliography
Chapter 10: Threats and Attack Strategies Used in Past Events: A Review
10.1 Introduction
10.1.1 Background
10.1.2 Purpose and Contents of the Chapter
10.2 Review of Terrorist Threats
10.2.1 Defining Terrorism
10.2.2 Origins and Typologies of Terrorism
10.2.3 Key Developments in Modern Terrorism
10.2.3.1 The Profile of âNew Terrorismâ
10.2.3.2 Foreign Terrorist Fighters (FTFs)
10.2.3.3 The Terrorist Landscape in Europe
10.3 Review of Terrorist Attack Strategies
10.3.1 Lone Actors and Organisational Structure
10.3.2 Rationalism and Decision-Making Model
10.3.3 Modern Technology and Online-Digital Environments
10.3.4 Explosives as Weapons of Choice
10.4 Emerging Threats and Attack Strategies in Terrorism
10.4.1 Trends and Patterns in Modern Security Environment
10.4.2 The Explosives Threat
10.4.3 Misuse of Technological Advances
Bibliography
Chapter 11: Syntheses of âHemtexâ Simulants of Energetic Materials and Millimetre Wave Characterisation Using the Teraview CW400 Spectrometer: Fundamental Studies for Detection Applications
11.1 Introduction
11.2 Theory
11.3 Experimental
11.3.1 Materials
11.3.2 Synthesis Procedure
11.3.3 Characterisation
11.4 Results and Discussion
11.4.1 Liquid Characterisation Results
11.4.2 Simulant Characterisation Results
11.5 Conclusions
References
Chapter 12: Law Enforcement Priorities in the Era of New Digital Tools
12.1 Introduction
12.2 European Law Enforcement Networks
12.3 Open Source Intelligence (OSINT)
12.3.1 Priorities of the OSINT Community of Practitioners
12.3.2 Opportunities for Development Within OSINT
12.4 Mobility for Officers
12.4.1 Priorities of the Mobility for Officers Community of Practitioners
12.4.2 Opportunities for Development for the Mobile Police Officer
12.5 People Trafficking
12.5.1 Priorities of the People Trafficking Community of Practitioners
12.5.2 Opportunities for Development Within People Trafficking
12.6 Intelligence Analysis
12.6.1 Priorities of the Intelligence Analysis Community of Practitioners
12.6.2 Opportunities for Development Within the Intelligence Analysis
12.7 Emerging Technologies in DNA
12.7.1 Priorities of the Emerging Technologies Community of Practitioners
12.7.2 Opportunities for Development Within DNA Technologies
12.8 Conclusions and Future Work
Bibliography
Part III: Border Security
Chapter 13: Threats and Attack Strategies Used in Past Events: A Review
13.1 Introduction
13.2 Related Literature
13.2.1 Information Fusion
13.3 Proposed Solution
13.4 Conclusion
Bibliography
Chapter 14: Early Warning for Increased Situational Awareness: A Pre-Operational Validation Process on Developing Innovative Technologies for Land Borders
14.1 Introduction
14.2 EWISA Core System
14.3 EWISA Validation Methodology
14.3.1 Technical Verification
14.3.2 Operational Validation
14.3.2.1 Definition of Validation Concepts
14.4 EWISA Operational Validation Execution
14.5 EWISA Operational Validation Results
14.6 Conclusions
Bibliography
Chapter 15: Border Surveillance Using Computer Vision-Enabled Robotic Swarms for Semantically Enriched Situational Awareness
15.1 Introduction
15.2 Swarm Intelligence for Autonomous Navigation
15.3 Visual Detection Capabilities
15.4 Semantic Enrichment for Increased Situation Awareness
15.5 Conclusions
References
Chapter 16: FOLDOUT: A Through Foliage Surveillance System for Border Security
16.1 Introduction
16.2 FOLDOUT User Requirements
16.3 FOLDOUT Architecture Design
16.3.1 Ground Sensors
16.3.2 Sensor Mounted on a StratobusTM
16.3.3 Sensor Mounted on a Satellite
16.3.4 Fusion of Ground Sensors, StratobusTM and Satellite Data
16.4 Scenarios Description
16.5 Current Results
16.6 Conclusion
Bibliography
Chapter 17: Identifying and Prioritising Security Capabilities for the Mediterranean and Black Sea Regions
17.1 Introduction
17.2 The MEDEA Network of Practitioners
17.3 MEDEA Methodology Building Blocks
17.4 Problem Definition and Scenario-Based Approach
17.4.1 A Systems Approach to Scenarios
17.4.2 Scenario Planning and Horizon Scanning
17.5 The Origins and the Evolution of THOR Methodology
17.5.1 The MEDEA Approach to Identify Missing Capabilities
17.5.2 Application of MEDEA SP and HS Approaches
17.5.3 THOR Methodology in Context of MEDEA
17.6 Prioritisation of Practitionersâ Capabilities in Three Horizons
17.7 Conclusions
References
Chapter 18: The Andromeda Galaxy: Legal and Ethical Aspects of Technology-Aided Maritime Border Surveillance Operations
18.1 Introduction
18.2 Overview of Technology-Aided Maritime Border Surveillance Operations Framework
18.3 Legal and Ethical Challenges for Technology-Aided Maritime Border Surveillance Operations
18.3.1 Technological Means for Maritime Border Surveillance
18.3.2 Assessment of Technology-Aided Maritime Border Surveillance Operations from an Ethics and Fundamental Human Rights Perspective
18.4 Equilibrium Between Privacy, Personal Data Protection, the Principle of Non-refoulement, and Security
18.5 Conclusion
Bibliography
Part IV: Protection of Critical Infrastructures (CI)
Chapter 19: Security and Resilience in Critical Infrastructures
19.1 Threats and Resilience in Critical Infrastructures
19.1.1 Introduction
19.1.2 Security Threats and Resilience Challenges within RESISTO
19.1.3 The RESISTO Resilience Framework
19.2 The RESISTO Solution
19.2.1 Concept and Approach
19.2.2 The RESISTO Architecture and Key Elements
19.3 Validation Cases: Analysis and Discussion
19.4 Conclusions
References
Chapter 20: Supporting Decision-Making Through Methodological Scenario Refinement: The PREVENT Project
20.1 Introduction
20.2 PREVENT Methodological Framework
20.3 Security Scenarios Definition and First Refinement
20.4 8 to 6 Security Scenarios
20.4.1 Technological Analysis
20.4.1.1 EIF-Based Questionnaires
20.4.2 Regulatory Aspects
20.4.3 Economic Aspects
20.4.4 Security Scenarios Definition
20.5 Project Outcomes
20.5.1 Common Challenge Elaboration
20.5.2 Innovations and Solutions Roadmap
20.6 Conclusions
Bibliography
Chapter 21: Securing the European Gas Network, the Greek Business Case
21.1 Introduction
21.2 SecureGas Perspective
21.3 Methodology
21.3.1 Phase 1: Construct/Develop
21.3.2 Phase 2: Demonstrate
21.3.3 Phase 3: Validate and Diffuse
21.4 Technical Components
21.4.1 Joint Cyber-Physical Risk and Resilience Management
21.4.2 Cognitive Framework for Biometrics and Video Analytics
21.4.3 Risk Aware Information to the Population
21.4.4 Cyber-Physical Correlator
21.5 The Greek Business Case
21.5.1 End Users
21.5.2 Greek Business Case Scenarios
21.6 Conclusions
References
Part V: Disaster and Crisis Management
Chapter 22: Technological and Methodological Advances in the Protection of Soft Targets: The Experience of the STEPWISE Project
22.1 Introduction
22.2 Assessing the Security of Public Spaces and the Protection of Soft Targets
22.3 State of the Art on Decision Support in the Security Domain
22.4 Beyond the State of the Art on Decision Support in the Security Domain: The STEPWISE Project
22.5 Limitations and Future Developments
22.6 Conclusions
References
Chapter 23: Trials: New Method of Assessing Innovative Solution in Crisis Management
23.1 Introduction
23.2 Trial Guidance Methodology
23.3 Validation of Trial Guidance Methodology
23.3.1 Evolution of the Methodology
23.3.2 General Approach to TGM Evaluation
23.3.3 Elements of the TGM Evaluation
23.3.4 First Outcomes
23.4 Trial Guidance Methodology in Practice: How to Create and Execute a Trial [5]
23.4.1 Step Zero
23.4.2 Six-Step Approach
23.4.3 Execution Phase
23.4.4 Analysis
23.4.5 Reporting
23.5 Conclusions
References
Chapter 24: EU Cities Vulnerability Assessment
24.1 Introduction
24.2 EU VA Tool
24.2.1 Public Space of Interest
24.2.2 EU VAT Functionality
24.3 Workshops and Results
24.3.1 Vulnerability Assessment Workshops
24.3.2 Categories of Vulnerabilities Identified
24.4 Recommendations
24.4.1 Recommendations Stemming from VA Process
24.4.2 Experience from Other Disciplines
24.4.3 Tackling Terrorism Without Fuelling Feeling of Insecurity
24.5 Conclusions
Bibliography
Chapter 25: Risk-Based Methodological Approach for Planning for Emergency Sheltering due to Earthquake Disasters
25.1 Introduction
25.2 Operational Value of Risk-Based Needs Assessment
25.3 Methodology Description
25.3.1 Seismic Risk Assessment
25.3.2 Social Vulnerability Modeling
25.4 Local Contingency Planning
25.5 Geographic Distribution of Capabilities
25.6 Discussion and Conclusions
Bibliography
Chapter 26: FASTER: First Responder Advanced Technologies for Safe and Efficient Emergency Response
26.1 Introduction
26.2 Overall Concept
26.3 Technical Approach
26.3.1 Augmented Reality for Operational Awareness
26.3.2 Mobile and Wearable Technologies
26.3.3 Body and Gesture-Based User Interfaces
26.3.4 Autonomous Vehicles
26.3.5 Resilient Communications Support
26.3.6 Common Operational Picture
26.4 Target Scenarios of the FASTER System
26.5 Exploitation Planning
26.6 Conclusion
Bibliography
Chapter 27: The Architecture of EVAGUIDE: A Security Management Platform for Enhanced Situation Awareness and Real-Time Adaptive Evacuation Strategies for Large Venues
27.1 Introduction
27.1.1 EVAGUIDE Platform
27.1.2 Mobile Application for Spectators
27.1.3 Mobile Application for Stewards
27.2 Platform Design and Architecture
27.2.1 Communication Middleware
27.2.2 Location-Based Dynamic Evacuation Route Component (LDER)
27.2.3 Systems Management Server
27.2.4 Complex Event Processing
27.3 EVAGUIDE Pilot at PAOK Toumba Stadium
27.3.1 Configuration of the Pilot
27.3.2 Demonstration Scenarios
27.3.3 Results
27.4 Conclusions
References
Chapter 28: Stakeholders Involved in Hospitalsâ Crisis Management Processes
28.1 Introduction
28.2 Crisis Management Process
28.3 Research Methodology
28.4 The Case Study of a Greek Hospital
28.4.1 Hospital Physical and Cybersecurity Crisis Management Process
28.4.2 Crisis Management Process and Stakeholders Involved in Healthcare Organizations
28.5 Conclusions
References
Chapter 29: Multiple Drone Platform for Emergency Response Missions
29.1 Introduction
29.2 End-User Requirements
29.2.1 Requirements Gathering Methodology
29.2.2 Requirements Analysis
29.3 Roles and Capabilities of Drones
29.4 SWIFTERS Platform
29.4.1 Architecture
29.4.2 Graphical User Interfaces
29.4.3 Ground Control Station
29.4.4 Algorithms
29.4.5 Functionalities
29.5 Lessons Learned
29.6 Conclusions
References
Chapter 30: Towards to Integrate a Multilayer Machine Learning Data Fusion Approach into Crisis Classification and Risk Assessment of Extreme Natural Events
30.1 Introduction
30.2 Related Work
30.2.1 Risk Assessment
30.2.2 Machine Learning in Disaster Management
30.3 The Proposed Methodological Approach
30.3.1 High-Level Architecture of the Early Warning Module
30.3.2 High-Level Architecture of the Real-Time Monitoring and Risk Assessment Module
30.3.2.1 Results from Flood Pilot
30.3.3 Enhance Crisis Classification Module with Machine Learning Techniques
30.4 Discussion
Bibliography
Correction to: FOLDOUT: A Through Foliage Surveillance System for Border Security
Index
đ SIMILAR VOLUMES
<P>Reflects a decade of leading-edge research on intelligence and security informatics. </P> <P>Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. </P> <P>Describes real-world community situations. </P> <P
<p><P>On September 11, 2001 the World became cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help the world meet an array of security challenges. From these activities the s
<p><span>The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lo