Publicly available information (PAI) provides data for reasoning about an environment when direct sensing is constrained, and augments scarce direct measurements. Specifically, PAI sources providing movement information over time support analysis of behavior patterns. In this paper we describe sources and uses of PAI, discuss a tool for automated data analysis with emphasis on detection of anomalous behavior, discuss challenges present in exploiting PAI, and explore how anomalous activity in social media PAI is correlated with anomalous traffic observed using movement PAI.
Elizabeth Bowman, Matt Turek, Paul Tunison, Reed Porter, Steve Thomas, Vadas Gintautas, Peter Shargo, Jessica Lin, Qingzhe Li, Yifeng Gao, Xiaosheng Li, Ranjeev Mittu, Carolyn Penstein Rosé, Keith Maki, Chris Bogart, Samrihdi Shree Choudhari
KEYWORDS: Data modeling, Web 2.0 technologies, Sensors, Kinematics, Data mining, Analytical research, Video processing, Video, Analytics, Machine learning
Today’s warfighters operate in a highly dynamic and uncertain world, and face many competing demands. Asymmetric warfare and the new focus on small, agile forces has altered the framework by which time critical information is digested and acted upon by decision makers. Finding and integrating decision-relevant information is increasingly difficult in data-dense environments. In this new information environment, agile data algorithms, machine learning software, and threat alert mechanisms must be developed to automatically create alerts and drive quick response. Yet these advanced technologies must be balanced with awareness of the underlying context to accurately interpret machine-processed indicators and warnings and recommendations. One promising approach to this challenge brings together information retrieval strategies from text, video, and imagery. In this paper, we describe a technology demonstration that represents two years of tri-service research seeking to meld text and video for enhanced content awareness. The demonstration used multisource data to find an intelligence solution to a problem using a common dataset. Three technology highlights from this effort include 1) Incorporation of external sources of context into imagery normalcy modeling and anomaly detection capabilities, 2) Automated discovery and monitoring of targeted users from social media text, regardless of language, and 3) The concurrent use of text and imagery to characterize behaviour using the concept of kinematic and text motifs to detect novel and anomalous patterns. Our demonstration provided a technology baseline for exploiting heterogeneous data sources to deliver timely and accurate synopses of data that contribute to a dynamic and comprehensive worldview.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.