24 July 2002 Information surveillance
Author Affiliations +
Proceedings Volume 4745, Technologies, Systems, and Architectures for Trans-National Defense; (2002); doi: 10.1117/12.475855
Event: AeroSense 2002, 2002, Orlando, FL, United States
Abstract
Biological weapons are within reach of individuals, small groups, terrorist organizations, as well as nations. With pervasive integration of civilian and military populations worldwide, the ill winds of biological warfare stand to affect military troops and civilians alike. A variety of technologies are emerging - such as pathogen detection devices, streaming internet characterization tools, information exploitation techniques, automated feature extraction, and ubiquitous wireless communication - that can help. These technologies, if taken together within an integrated analytical framework, could make possible the monitoring of diverse parameters that may indicate a change in the state of health of a given population - either the emergence of a naturally occurring disease or the outbreak of a disease as a result of hostile intent. This presentation will discuss the application of new information surveillance tools and technologies as they apply to health and disease monitoring, particularly within the context of potential terrorist or hostile nation use of biological warfare. Although discussed within the specific context of health surveillance, the tools and processes described here are generally applicable within other domains of subject matter expertise.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Barbara Seiders, Dennis McQuerry, Thomas A. Ferryman, Paul D. Whitney, Anthony Rybka, "Information surveillance", Proc. SPIE 4745, Technologies, Systems, and Architectures for Trans-National Defense, (24 July 2002); doi: 10.1117/12.475855; https://doi.org/10.1117/12.475855
PROCEEDINGS
9 PAGES


SHARE
KEYWORDS
Surveillance

Medicine

Diagnostics

Biological research

Data modeling

Information security

Internet

Back to Top