用户名: 密码: 验证码:
“欧洲反恐怖主义中心”的智能反恐系统构建
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Study on the Intelligence Anti-terrorism System of European Counter Terrorism Centre
  • 作者:柳思思
  • 英文作者:Liu Sisi;
  • 关键词:欧洲反恐怖主义中心 ; 人工智能 ; 智能反恐 ; 智能识别检测 ; 智能决策 ; 智能模拟应用
  • 英文关键词:Artificial Intelligence;;European Counter Terrorism Centre;;Intelligent Data Collection;;Intelligent Identification Detection;;Intelligent Decision System;;Intelligent Simulation Application
  • 中文刊名:SHKX
  • 英文刊名:Journal of Social Sciences
  • 机构:北京第二外国语学院国际关系学院;北京第二外国语学院世界政党研究中心;
  • 出版日期:2019-05-10
  • 出版单位:社会科学
  • 年:2019
  • 期:No.465
  • 基金:北京市社科基金项目“人工智能时代北京市‘智慧反恐’体系构建的路径研究”(项目编号:18ZGC010)的阶段性成果
  • 语种:中文;
  • 页:SHKX201905001
  • 页数:9
  • CN:05
  • ISSN:31-1112/C
  • 分类号:5-13
摘要
近年来,活跃在欧洲的恐怖主义组织呈现网络化与高科技化趋势,这就要求反恐机构也走向智能化。鉴于此,"欧洲反恐怖主义中心"成立并构建跨国智能反恐系统。该系统涵盖三个具体领域:智能信息整合与宣传、智能数据采集与识别检测、智能决策与模拟应用。智能信息整合与宣传包括共享反恐信息,编制恐怖组织的网络结构图,上传反恐数据包,在线巡查网络恐怖主义、宣传反恐理念;智能数据采集与识别检测涵盖开发应用程序,在线采集恐怖分子图片,将图片转换为数据,上传图片数据到云端,研发政府的智能防火墙,推广微表情测谎与虹膜识别;智能决策与模拟应用包括建立模仿人类反恐专家决策过程的计算机系统、普及智能决策支持系统,加大力度研发反恐机器人、反恐无人机和无人汽车等。因此,通过分析"欧洲反恐怖主义中心"构建人工智能反恐系统的过程与规划,以期增进国内学界对人工智能如何应用于反恐领域的认知,并为中国反恐机构将来如何构建智能反恐、防恐系统拓展思路。
        In recent years, the terrorists' attacks and promotion models have shown a trend of high-tech. This requires that counter-terrorism agencies also become intelligent. In view of this, the European Counter Terrorism Centre was established and called on all European countries to jointly establish a intelligent counter-terrorism system. The system includes three specific areas: intelligent information integration and promotion, intelligent data acquisition and identification detection, intelligent decision systems and simulation applications. Intelligence information integration includes sharing counter-terrorism information, compiling a network structure chart of terrorist organizations, uploading anti-terrorism data packages, inspecting online terrorism and promoting anti-terrorism. Intelligent data collection and identification detection includes developing applications, collecting terrorist images online, converting images into data, uploading image data to the cloud, developing government intelligent firewalls, promoting micro-expression detection and iris recognition. Intelligent decision-making and simulation applications include establishing computer systems that mimic the decision-making process of human experts, popularizing intelligent decision support systems, and stepping up research of anti-terrorism robots, anti-terrorism drones and unmanned cars. The author analyzes the construction process of the European artificial intelligence counter-terrorism system in order to increase the domestic academic community's understanding of how artificial intelligence is used in the field of counter-terrorism, and to expand ideas for how China will build an intelligent counter-terrorism system in the future.
引文
(1)Europol,“Cybercrime,Internet Organised Crime Threat Assessment”,Europol,https://www.europol.europa.eu/crime-areas-and-trends/crime-areas/cybercrime.
    (2)J.M.Berger and Jonathon Morgan,“The ISIS Twitter Census:Defining and Describing the Population of ISIS Supporters on Twitter”,Brookings,March 5,2015,https://www.brookings.edu/research/the-isis-twitter-census-defining-and-describing-the-population-of-isis-supporters-on-twitter/.
    (3)David Gilbert,“ISIS Moves to the Dark Web to Spread Its Message and Avoid Detection”,International Business Times,November 19,2015,http://www.ibtimes.com/isis-moves-dark-web-spread-its-message-avoid-detection-2191593.
    (4)John McCarthy and Patrick Hayes,“Some Philosophical Problems from the Standpoint of Artificial Intelligence”,Readings in Artificial Intelligence,Vol.4,No.4,1981,p.431.
    (5)Europol Analysis System,“Intelligence Analysis”,Europol,https://www.europol.europa.eu/activities-services/services-support/intelligence-analysis.
    (6)28国包括英国。英国目前仍是欧盟成员,它的脱欧时间推迟到2019年10月31日。
    (7)European Counter Terrorism Centre,“A Central Hub of Expertise Working to Provide an Effective Response to Terrorism”,Europol,https://www.europol.europa.eu/about-europol/european-counter-terrorism-centre-ectc.
    (8)Europol’s European Counter Terrorism Centre,“Europol Hosts Conference on Online Terrorist Propaganda”,Europol,https://www.europol.europa.eu/newsroom/news/europol-hosts-conference-online-terrorist-propaganda.
    (9)Europol’s European Counter Terrorism Centre,“Europol Hosts Conference on Online Terrorist Propaganda”,Europol,https://www.europol.europa.eu/newsroom/news/europol-hosts-conference-online-terrorist-propaganda.
    (10)Marcos A Rodrigues and Alan Robinson,“Fast 3D Recognition for Forensics and Counter-Terrorism Applications”,in Akhgar Babak and Yates Simeon,ed.,Intelligence Management :Knowledge Driven Frameworks for Combating Terrorism and Organized Crime,London:Springer-Verlag,p.95.
    (11)Boudriga Noureddine,Security of Mobile Communications,Boca Raton:CRC Press,2010,pp.32-33.
    (12)“Firewall as a DHCP Server and Client”,Palo Alto Networks,https://www.paloaltonetworks.com/documentation/eol.
    (13)Armindo Freitas-Magalh?es,“Microexpression and macroexpression”,in V.S.Ramachandran,ed.,Encyclopedia of Human Behavior,Oxford:Elsevier/Academic Press,2012,p.173.
    (14)Senya Polikovsky,Koshida Kashi and Yuichi Ohta,“Facial Micro-Expressions Recognition Using High Speed Camera and 3D-Gradient Descriptor”,January 2010,https://www.researchgate.net/publication/224160151_Facial_micro-expressions_recognition_using_high_speed_camera_and_3D-gradient_descriptor.
    (15)Gemma Warren,Elizabeth Schertler and Peter Bull,“Detecting Deception from Emotional and Unemotional Cues”,Journal of Nonverbal Behavior,Vol.33,No.1,2009,p.59.
    (16)Armindo Freitas-Magalh?es,Facial Action Coding System 3.0:Manual of Scientific Codification of the Human Face,Porto:FEELab Science Books,2018,p.1.
    (17)Kim Zetter,“Reverse-Engineered Irises Look So Real,They Fool Eye-Scanners”,Wired Magazine,July 25,2012,https://www.wired.com/2012/07/reverse-engineering-iris-scans/.
    (18)Zach Martin,“Biometric Trends:Will Emerging Modalities and Mobile Applications Bring Mass Adoption”,SecureIDNews,March 3,2011,https://www.secureidnews.com/news-item/*biometric-trends-will-emerging-modalities-and-mobile-applications-bring-mass-adoption/?tag=Law_Enforcement.
    (19)Jackson Peter,“Introduction To Expert Systems”,Addison Wesley,1998,https://www.abebooks.com/Introduction-Expert-Systems-3rd-Edition-Peter/11789182877/bd.
    (20)Kaczor Krzystof,Szymon Bobek and Grzegorz J.Nalepa,Overview of Expert System Shells,Poland:Institute of Automatics:AGH University of Science and Technology,December 5,2010,http://geist.agh.edu.pl/doku.php.
    (21)Michel Chein and Marie-Laure Mugnier,Graph-based Knowledge Representation:Computational Foundations of Conceptual Graphs,Springer,2009,p.297.
    (22)Daniel Powerower,“A Brief History of Decision Support Systems”,Dssresources,March 10,2007,http://dssresources.com/history/dsshistory.html.
    (23)Kenneth Rose,“Robot soldiers”,BBC News,April 12,2002,http://news.bbc.co.uk/cbbcnews/hi/teachers/citizenship_11_14/subject_areas/scientific_development/newsid_1923000/1923299.stm.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700