Threats & Opportunities of Big Data

35
Threats & Opportuni0es of Big Data HongEng Koh Vice President (Corporate) The Society for the Policing of Cyberspace Global Lead Jus0ce & Public Safety (JPS), Oracle Corpora0on Visi0ng Researcher China Public Security University @he_koh

Transcript of Threats & Opportunities of Big Data

Page 1: Threats & Opportunities of Big Data

Threats  &  Opportuni0es  of  Big  Data  

Hong-­‐Eng  Koh  Vice  President  (Corporate)  

The  Society  for  the  Policing  of  Cyberspace    

Global  Lead  Jus0ce  &  Public  Safety  (JPS),  Oracle  Corpora0on  

 Visi0ng  Researcher  

China  Public  Security  University  @he_koh  

Page 2: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Safe  Harbor  Statement  The  following  is  intended  to  outline  our  general  product  direc0on.  It  is  intended  for  informa0on  purposes  only,  and  may  not  be  incorporated  into  any  contract.  It  is  not  a  commitment  to  deliver  any  material,  code,  or  func0onality,  and  should  not  be  relied  upon  in  making  purchasing  decisions.  The  development,  release,  and  0ming  of  any  features  or  func0onality  described  for  Oracle’s  products  remains  at  the  sole  discre0on  of  Oracle.  

2  

Page 3: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Global  Jus0ce  &  Public  Safety  (JPS)  Team  

3  

Jorge  Medina  

Cindy  Schwimer  Tim  Wallace   Jeff  Penrose  

David  Shepherd   Udi  Nessimyan  Hong-­‐Eng  Koh  

Global  Lead  Director  Industry  Strategy  &  Marke0ng  

Bert  Oltmans  

Page 4: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

34th  America’s  Cup  •  September  2013,  San  Francisco  Bay  •  Team  New  Zealand  leading  8-­‐1,  one  more  to  win  the  Cup  • Most  improbable  comebacks  in  the  history  of  sports:  Team  USA  consecu0ve  victories  and  won  with  9-­‐8  

4  

Page 5: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

What  is  Big  Data?  

5  

VOLUME   VELOCITY   VARIETY  

SOCIAL  

BLOG  

SMART  METER  

VALUE  

Data  

Informa0on  

Intelligence  

Page 6: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

What’s  Happening?    

hip://www.go-­‐gulf.com/blog/60-­‐seconds  

Big  Data  

6  

Page 7: Threats & Opportunities of Big Data

Twitter Gives Occupy Wall Street Tweets To New York Judge  14  Sep  2012  

“We   talk   on   the   Internet   about   what  happened   in   Egypt,   about   our   structure,  about   our   organiza0on,   how   to   organize   a  flash  mob,  how  to  organize  a  sit-­‐in”  

Ahmed  Maher,  one  of  the  founders  of  Egypt’s  Facebook  Revolu0on  on  6  Apr  08,  

on  advising  the  Occupy  ac0vists  7  

Page 8: Threats & Opportunities of Big Data

Why BlackBerry Messenger was rioters' communication method of choice    7  Dec  2011  

“Everyone in edmonton e n f i e l d w o o d g r e e n everywhere in north link up at enfield town station at 4 o clock sharp!!!!” “Ah, who wants to buy rioting kits? Gloves, masks, petrol bombs: £5” Crime-Sourcing

8  

Page 9: Threats & Opportunities of Big Data

New Witness Behavior

9  

Page 10: Threats & Opportunities of Big Data

US Government Agency Compromised by Social Engineering 4 Nov 2013

2009: “Robin Sage” (The Security Blogger)!Information and intelligence obtained from US military personnel!

2011: “Emily Williams”!“What else can happen outside of data being leaked over social networks?”!

Emily Williams Social Engineering 10  

Page 11: Threats & Opportunities of Big Data

How a Hacker Intercepted FBI and Secret Service Calls With Google Maps    27  Feb  2014  

Page 12: Threats & Opportunities of Big Data

Cyber Bullying

Page 13: Threats & Opportunities of Big Data

“Free this week for a quick gossip/prep before I go and destroy America?” “3 weeks today, we’re totally in LA pissing people off on Hollywood Blvd and diggin’ Marilyn Monroe up!”

13  

Page 14: Threats & Opportunities of Big Data

16  Apr:    Boston  Police  confirming  explosion  at  marathon  finish  line  with  injuries.    Boston  Police  looking  for  video  of  the  finish  line    BPD  asking  for  0ps    Family  members  looking  for  info  rela0ve  to  individuals  injured  during  the  incident  are  encouraged  to  call  (617)  635-­‐4500.  

Boston  Police  looking  for  video  of  the  finish  line    17  Apr:    Airlines  and  hotels  are  waiving  cancella0on  &  trip  change  fees  for  people  traveling  to  Boston.    19  Apr:    Do  you  recognize  these  individuals?  Contact  1-­‐800-­‐CALL-­‐FBI  (1-­‐800-­‐225-­‐5324)  

20  Apr:    CAPTURED!!!  The  hunt  is  over.  The  search  is  done.  The  terror  is  over.  And  jusGce  has  won.  Suspect  in  custody.    

Social-enabled Policing

14  

Page 15: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Intelligence  Hub  &  Alerts    

Integrated  Policing  PlaMorm   Integrated  Judiciary  Management  

Integrated  CorrecGons  PlaMorm  

             

Integrated  Border  Management   Emergency  Management   Cyber  Intelligence   Intelligent  Video  Surveillance  

Oracle  Jus0ce  &  Public  Safety  (JPS)  Solu0ons  

15  

Page 16: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Intelligence  Hub  &  Alerts    

Integrated  Policing  PlaMorm   Integrated  Judiciary  Management  

Integrated  CorrecGons  PlaMorm  

             

Integrated  Border  Management   Emergency  Management   Cyber  Intelligence   Intelligent  Video  Surveillance  

Oracle  Jus0ce  &  Public  Safety  (JPS)  Solu0ons  

16  

Page 17: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Intelligence  Hub  &  Alerts  

17  

Oracle  Policy  AutomaGon  

Big  Data  Appliance,  Exadata,  Exalogic,  ExalyGcs,  etc.  

Oracle  Data  Integrator  /  Oracle  

GoldenGate  Oracle  Event  Processing  

Master  Data  Management  

Ontology-­‐based  

SemanGc  Analysis  

Business  Intelligence  /  

Endeca  InformaGon  Discovery  

Oracle  SOA  /  Service  Bus  

IdenGty  &  Access  M

anagement  /  

Database  Security  OpGons  

Page 18: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Intelligence  Hub  &  Alerts  

18  

Oracle  Policy  AutomaGon  

Big  Data  Appliance,  Exadata,  Exalogic,  ExalyGcs,  etc.  

Oracle  Data  Integrator  /  Oracle  

GoldenGate  Oracle  Event  Processing  

Master  Data  Management  

Ontology-­‐based  

SemanGc  Analysis  

Business  Intelligence  /  

Endeca  InformaGon  Discovery  

Oracle  SOA  /  Service  Bus  

IdenGty  &  Access  M

anagement  /  

Database  Security  OpGons  

Page 19: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Oracle  Business  Intelligence  (BI)  Chicago  Police  Department  –  PredicGve  Policing  

19  

Intelligence  Hub  &  Alerts  

Page 20: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Oracle  Business  Intelligence  (BI)  Italy  Ministry  of  Interior  

20  

Intelligence  Hub  &  Alerts  

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Deployment  vs  Crime  Analysis  

Visibility   Crime  Search  

Deployment  Planning  

Deployment  Analysis  

•  Database  •  Data  Mining  •  Spa0al  • MapViewer  •  OBIEE  

Dangerous  Area  Predic0on  

Page 21: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Oracle  BI  &  Endeca  Informa0on  Discovery  Chicago  Police  Department  –  PredicGve  Policing  

•  Data  mining  model  that  calculates  the  probability  of  a  crime  or  incident  for  the  current  day  and  the  next  three  days  

•  What  goes  into  the  predic0on:  –  Weather  –  Contact  cards  –  Emergency  calls,  incidents,  arrests  –  Day  of  week,  date  of  month  

•  Technologies  used:  –  Oracle  Business  Intelligence  (BI)  –  Oracle  Data  Mining  –  Oracle  Mapviewer  (and  ESRI)  

21  

Intelligence  Hub  &  Alerts  

Oracle  Business  Intelligence  

 You  know  what  you  don’t  know  

What  if  you  don’t  know  what  you  don’t  know?  

 Endeca  InformaGon  Discovery  

Page 22: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Intelligence  Hub  &  Alerts  Demo  

22  

Page 23: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Data  Center  and  Analy0cs  UAE  Abu  Dhabi  Police  

23  

•  Endeca  •  Big  Data  Appliance  •  Database  

Intelligence  Hub  &  Alerts  

Page 24: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Social-­‐Enabled  Policing  ArgenGne  Federal  Police  

•  Engage  the  community  as  part  of  community  policing  

•  Beier  understanding  of  public  sen0ments  

•  Improve  crime  analysis  over  social  networks  

•  Early  detec0on  of  suspicious  ac0vi0es  and  crime  suspects  

•  Incorporate  new  techniques  in  crime  inves0ga0on  process  

24  

•  Endeca  •  OBIEE  •  Exaly0cs  •  Exadata  •  Database  •  Social  Engagement  and  Monitoring  Cloud  Service  

Intelligence  Hub  &  Alerts  

131  Non-­‐Emergency  

Call  Center  

Centralized  Video  

Surveillance  

Page 25: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Argen0ne  Riots,  December  2013  

25  

Page 26: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Cloud:  Social  Rela0onship  Management  (SRM)  Social  Engagement  &  Monitoring  

• Advanced  Latent  Seman0c  Analysis  (LSA)  technology  •  700+  million  messages  daily  • Deeper  &  more  precise  data  • Rou0ng  &  auto-­‐categoriza0on  • Custom  topics  &  indicators  • Global  languages  &  data  

26  

Page 27: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Social  Engagement  &  Monitoring  Demo  

27  

Page 28: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

US  Customs  &  Border  Protec0on  Automated  TargeGng  System  (ATS)  

• Rules  based  decision  support  system  • Data  sources:  government  and  public  • Historical  data  and  trends  analysis  • Deployed  for  air,  land  and  sea  travel  • Massive  volume  of  data  •  Iden0fy  high  risk  targets  •  Faster  clearance  for  low  risk  traveler/cargo  

28  

Intelligence  Hub  &  Alerts  

Source:  Internet  

Na0onal  Targe0ng  Center  

•  Exadata  •  Exalogic  •  Exaly0cs  

Page 29: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Intelligence  Hub  &  Alerts    

Integrated  Policing  PlaMorm   Integrated  Judiciary  Management  

Integrated  CorrecGons  PlaMorm  

             

Integrated  Border  Management   Emergency  Management   Cyber  Intelligence   Intelligent  Video  Surveillance  

Oracle  Jus0ce  &  Public  Safety  (JPS)  Solu0ons  

29  

Page 30: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Cyber  Intelligence  •  Cyber  Intelligence  •  Network  Behavior  Anomaly  Detec0on  (NBAD)  

•  Analy0cs  &  Repor0ng  •  DPI-­‐based  Router  

30  

•  Big  Data  Appliance  •  Oracle  Event  Processing  •  Real-­‐Time  Decisions  •  Endeca  Informa0on  Discovery  

Page 31: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

Cyber  Intelligence  

31  

Page 32: Threats & Opportunities of Big Data

M2M  (Machine  2  Machine),  IoT  (Internet  of  Things)  

Page 33: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

European  Union  eCall  (by  2015?)  

33  

Page 34: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |  

San  Francisco  SFPark  

34  

•  Sensors  •  Big  Data  • Mobility  •  Social  

Privacy?    

That’s  another  story…  

Page 35: Threats & Opportunities of Big Data

Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   35  

hong-­‐[email protected]    @he_koh    linkedin.com/in/hekoh