Preview

Automated Behavior Analysis

Good Essays
Open Document
Open Document
592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Automated Behavior Analysis
Over the last several years, single actor terrorism has introduced a new phrase to the American public, self-radicalization. As an anonymous threat, the whereabouts, motives and activities of self-radicalized extremists are virtually unknown. Although investigative arms of the U.S. Government have uncovered several terrorist plots over the years , those perpetrated by self-radicalized extremists often go undetected until it is too late. The 1995 bombing of the Alfred P. Murrah Federal Building, the 2013 Boston Marathon bombing and the 2015 San Bernardino shootings are just a few examples of attacks perpetrated by self-radicalized extremists in recent history. Their existence poses a challenging security question for government officials; how do you detect an anonymous threat? The 2013 Boston Marathon bombing demonstrated the benefits of public and private video surveillance. In the aftermath of this horrific event, authorities, attempting to identify those responsible, amassed an astonishing “120,000 still photos and nearly 13,000 video clips” (Kiger, 2014, p. NA). As the race to identify the perpetrators continued, a segment of video was discovered that showed “a backpack-carrying man in a white hat talking on a cell phone. As the crowd …show more content…
By automatically analyzing human behavior and alerting authorities to only those instances that require higher levels of analysis, the wasted man hours and human error associated with active monitoring are effectively mitigated by way of a reduction in the amount of video monitored. Additionally, passive monitoring becomes more active by automatically analyzing human behavior in the background. As a result, automated behavior analysis could effectively increase public safety through a reduction in criminal activity by identifying suspicious or abnormal behavior “during the suspicion stage itself” (Gowsikhaa, Abirami, & Baskaran, 2012, p.

You May Also Find These Documents Helpful

  • Best Essays

    Since the terrorist attacks of September 11, 2001, the manifestation of terrorism as a form of conflict has seen the introduction and expansion of different unconventional methods designed to achieve an array of political, religious and ideological objectives. Of such examples, the concept of ‘lone-wolf’ terrorism has re-emerged as what is perceived to be a relatively contemporary yet effective tactic, causing particular concern among counter-terrorism institutes. Moreover, it has incited claims by noted authorities reiterating its status as a threat, including a statement given by US President Barack Obama claiming that lone-wolf terrorism is the primary threat to US security.…

    • 4092 Words
    • 17 Pages
    Best Essays
  • Good Essays

    Terrorism can carry out in various ways, whether in a group or the leaderless resistance environment. The focus will be upon the lone wolf terrorist and the behavioral attributes that are prevalent among such individuals. The lone wolf invokes a sense of fear and creates images of an unknown; they are malicious plotters working alone and silently to perform an unpredictable, undetectable, and unstoppable act of terror (www.Statfor.com). Over several years, the face of terrorism has undergone substantial change. Although the US government is understandably concerned about well-established and enduring terrorist organizations, there is a noticeable trend indicating the increasing prevalence of so--called lone wolf attacks by individuals and…

    • 390 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Whether the officer is acting inappropriately or the suspect is acting hostile the video will prove to be the most critical evidence. Tennenbaum, A. N., & Moore, A. M. (1993) assures surveillance systems are great additions to police cars. They protect both sides, and if one thinks about it, he would rather be stunned than shot. The most distinct video surveillance brings the highest quality to agencies. They are easy to use and they have the technology to transfer, gather, and retrieve evidence. In fact, the video is shared with court officials and the prosecution while maintaining the integrity of the original…

    • 980 Words
    • 4 Pages
    Good Essays
  • Better Essays

    608). In this case, multiple surveillance tools, professionals and every day citizens functioned and worked together for the purposes of identifying and locating the bombing suspects. The bombing event is troubled further when we consider that, “the radical nature of this vision becomes more apparent when one realizes how any particular assemblage is itself composed of different discrete assemblages which are themselves multiple” (Haggerty & Ericson, 2000, p. 608). To flush this out further, three key parts of the surveillant assemble, as outlined by Haggerty and Ericson (2000), will be applied to the Boston Marathon bombing: component parts, the body, and rhizomatic surveillance. The bombing was framed around the notion of Islam extremism and terrorism. In summation of this paper, the framing of terrorism will be troubled as it distracts from clearly identifying the act. In place of it, the bombing of the Boston Marathon will be discussed as a control…

    • 5252 Words
    • 22 Pages
    Better Essays
  • Good Essays

    It is estimated that 8 million aliens are residing in the United States with more than a million arriving each year. These indicates that there is a loophole that could be exploited by terror organization to ensure there operatives enter the country. Some of these illegal immigrants enter the country with the intentions getting meaningful employment. However, others have the intention of passing through the border undetected so that they can later carry out terror activities against the American people. The current influx of illegal immigrants and individuals overstaying their visas has exacerbated the situation for border and interior enforcement agencies capacity to specifically focus on organized crime, violent felons, as well as terrorist groups because they use the anonymity that the current system offers them (Johnson, 2014; Stewart,…

    • 902 Words
    • 4 Pages
    Good Essays
  • Good Essays

    P: Charles will identify and eliminate the pattern of acting out, disruptive, and negative attention-seeking behaviors when facing difficulty or frustration in learning. A: MHP taught Charles how to use progressive relaxation and guided imagery techniques to stimulate a sense of calmness and decrease the intensity of his angry feelings. MHP taught Charles efficient communication and assertiveness skills to convey anger in a controlled fashion and to meet his needs through more practical actions. MHP educated Charles about appropriate behavior. MHP taught Charles conflict resolution skills. MHP provided a worksheet on anger management. MHP demonstrated the appropriate way to manger a confrontational situation. I: Charles appeared to be…

    • 460 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Better technology and training to detect terrorist are important steps to reduce terrorist attacks. To achieve this objective, government must authorize national and local leaders to design programs, training, and funding. Thus, high priority should be given to developing programs to detect and prevent intended attacks before they occur.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Final Paper

    • 2626 Words
    • 8 Pages

    Ko, T. (2011). A Survey on Behaviour Analysis in Video Surveillance Applications. In Video Surveillance (pp. 279–294).…

    • 2626 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Crime seems to be on a rise, from low poverty areas to the white collar vicinities. Today’s technology however, is assisting with the apprehension of criminals through the means of cameras, computers, fingerprinting and others. However, something that technology cannot help with is to identify the exact actions of individuals, nor can you duplicate what is seen by others. Eyewitnesses are so important when it comes to the criminal process. It’s vital for individuals to give accurate account of crimes witnessed. It is just as important for those that are gathering the information, or witness statements, to assess each eyewitness correctly, for that statement can put an innocent man in jail and a criminal back in the streets.…

    • 361 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Boston Marathon Bombing

    • 588 Words
    • 3 Pages

    References: 1. Andrea , P. (2013). New questions on boston bombing suspects’ ties to us intelligence. Retrieved from http://www.wsws.org/en/articles/2013/04/29/izve-a29.html…

    • 588 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    research

    • 3483 Words
    • 14 Pages

    On April 19, 1995, at 9:02 a.m., the United States of America was reminded that the worst horror often comes from within. Within a matter of days Americans were forced to realize that this terrible tragedy may have been caused by citizens who call themselves patriots. Until the Oklahoma City bombing, Americans generally though of terrorism as a foreign problem that could not invade the walls of this nation. Many Americans had given little thought to what these patriots sought to do. Militia and patriot groups were considered to be fairly harmless groups who enjoyed stirring people up. The vast majority of Americans did not realize how serious or how dangerous these groups actually were. Very few people could understand why a fellow countryman would wreak such havoc on them. When it was learned that the accused suspects in the Oklahoma City bombing allegedly had ties to political extremist groups, citizens started to give these groups a second, closer look. Very slowly, and over several decades, these fundamental extremist groups and backyard political patriots have evolved into the most dangerous enemy this country has ever faced.…

    • 3483 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Domestic Terrorism Essay

    • 506 Words
    • 3 Pages

    Domestic terrorism is a very tricky topic, and an almost equally tough to define. But over the years we know that Lone Wolfs, special –interest groups, and radicalized persons are among the current classification of Domestic terrorists.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bad Of Crowdsourcing

    • 806 Words
    • 4 Pages

    This unproven method of solving crimes led to people being followed and harassed, and even one incorrectly identified man ended up on the cover of the NY post as being labeled as a person of interest (Wadhwa, 2013). The many social media avenues following the bombing provided two major lessons. The first being that the intelligence gathering contribution that crowdsourcing provided was priceless. However, the other lesson learned was crowdsourcing ability to solve crime was a failure (Wadhwa, 2013). This failure made those falsely identified lives miserable and even…

    • 806 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    An alert to surveillance officer would be generated when the abnormal activity will be observed; this would reduce the cost and effort of security surveillance in routine life. The application of surveillance can be grouped in three different divisions as surveillance, control and analysis. Surveillance includes types of problems for automatically monitoring and understanding locations with crowed or large number of people, it can be used in counting number of people, shopping behaviour analysis, and recognizing abnormal behaviour in crowed or it has also some applications for…

    • 1391 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    IDEO surveillance systems are omnipresent nowadays, with large systems in use in strategic places such as public transportation, airports, city centers, or residential areas. The prevailing sense of insecurity at the beginning of this century, with terrorist threats and high criminality, renders the intensive use of video surveillance tolerable despite its Orwellian big brother nature. However, people have a legitimate fear of this invasion of their personal privacy, with this objection slowing down a wider acceptance of video surveillance systems. In this paper, we address the issue of privacy protection in video surveillance, with a goal to be able to conciliate the needs of video surveillance with the objection of privacy invasion. This issue has been previously addressed in [1]–[10]. In [1], the scene is represented using an object-based representation. Depending on the end-user access control authorizations, the system subsequently renders a modified version of the video where some objects are masked out. Hence,…

    • 4363 Words
    • 18 Pages
    Powerful Essays