WORLD ARTIFICIAL INTELLIGENCE ORGANIZATION WAIO ON TERROR

Similar documents
EPP Policy Paper 1 A Secure Europe

Countering Violent Extremism and Radical Rhetoric

Terrorism in Africa: Challenges and perspectives

Finland's response

Following the Money to Combat Terrorism, Crime and Corruption

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

SOFTWARE AND SATELLITES HELP U.S. TRACK MIGRANTS HEADING FOR AMERICAN BORDERS

International Organization for Migration (IOM) Migrant Smuggling as a Form of Irregular Migration

Next- Generation National Security and Public Safety in Europe

THE EU S GLOBAL ENGAGEMENT TO COUNTER SMUGGLING AND TRAFFICKING NETWORKS

Note verbale dated 9 July 2015 from the Permanent Mission of Sao Tome and Principe to the United Nations addressed to the Chair of the Committee

An interactive exhibition designed to expose the realities of the global refugee crisis

PC.DEL/764/08 15 September ENGLISH only

Written Evidence to the ECtHR: The situation of unaccompanied and separated minors in Calais, France

Measures to eliminate international terrorism

1267 and 1988 Committees Monitoring Team. CCW - Geneva, 2 April 2014

Countering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies

ACP-EU JOINT PARLIAMENTARY ASSEMBLY

ASHTON UNDER-LYNE SIXTH FORM COLLEGE BTEC EXTENDED DIPLOMA PUBLIC SERVICES

- 1 - Address by Donald Tusk, President of the European Council to the 72nd United Nations General Assembly New York, 20 September 2017

8799/17 1 DPG LIMITE EN

The Trump Administration s New Africa Strategy

Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism

Tangier Model United Nations Human Rights Committee

Joint Statement Paris, August 28, Addressing the Challenge of Migration and Asylum

FORCED FROM HOME. Doctors Without Borders Presents AN INTERACTIVE EXHIBITION ABOUT THE REALITIES OF THE GLOBAL REFUGEE CRISIS

14276/16 UM/lv 1 DGE 1C

I am happy to have the opportunity to address you today

Organic Consumers/Regeneration Candidate Questionnaire

It Happens on the Pavement: The Role of Cities in Addressing Migration and Violent Extremism Challenges and Opportunities

Preventing Violent Extremism A Strategy for Delivery

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

Delegations will find attached the conclusions adopted by the European Council at the above meeting.

Since 1992 a comprehensive normative and operational counterterrorism framework has been developed.

Intelligence brief 19 March 2014

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

EU-India relations post-lisbon: cooperation in a changing world New Delhi, 23 June 2010

PREVENTING VIOLENT EXTREMISM ONLINE

An overview of irregular migration trends in Europe

T H E R O Y A L E M B A S S Y O F S A U D I A R A B I A I N R O M E FOCUS ON R O M E, N O V E M B E R

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

COMMISSION IMPLEMENTING DECISION. of XXX

(UNISS) and welcomes the briefing on 25 November 2015 by the Special Envoy of the Secretary-

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

The intensification of geopolitical risks makes discerning the economic path ahead especially difficult Alan Greenspan

COREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism

The European Union Strategy for Combating Radicalisation and Recruitment to Terrorism

8147/18 1 GIP LIMITE EN

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

U.S.- Gulf Cooperation Council Camp David Joint Statement

The Astana declaration. of the Heads of State of the Shanghai Cooperation Organisation

United Nations Alliance of Civilizations Group of Friends Meeting. New York, 3 April Summary Report

Exemplar for Internal Achievement Standard. Geography Level 2

Ethiopia. Strategy for Sweden s development cooperation with MFA

Adopted by the Security Council at its 7598th meeting, on

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

Unit II Migration. Unit II Population and Migration 21

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

UN Summit on Refugees and Migrants discussions, commitments and follow up

States Obligations to Protect Refugees Fleeing Libya: Backgrounder

AFRICAN UNION UNION AFRICAINE

STRATEGY FOR NORWAY S EFFORTS IN THE SAHEL REGION

Manual for trainers. Community Policing Preventing Radicalisation & Terrorism. Prevention of and Fight Against Crime 2009

RECOMMENDATION of the Committee on Economic and Financial Affairs, Social Affairs and Education

S/2004/276. Security Council. United Nations

Revised EU-Ukraine Action Plan on Freedom, Security and Justice. Challenges and strategic aims

LIMITE EN COUNCIL. Brussels, 14 November 2008 THE EUROPEAN UNION 15175/08 LIMITE JAI 597 ENFOPOL 209 COTER 78. "A" ITEM NOTE from : COREPER

Worldwide Caution: Annotated

Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub. UK-US Workshop Summary Report December 2010

Thematic Recommendations

STATEMENT BY DAVID AGUILAR CHIEF OFFICE OF BORDER PATROL U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Draft Conclusions. Inter-Parliamentary Conference for the Common Foreign and Security Policy and the Common Security and Defence Policy

A BRIEF presentation

Background on International Organizations

UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters

UNIÃO AFRICANA P.O. Box: 3243, Addis Ababa, Ethiopia, Tel.: (251-11) Fax: (251-11)

to the United Nations

Security Council Counter-terrorism Committee (SC CTC)

EPP Group Position Paper. on Migration. EPP Group. in the European Parliament

Chair s Statement 1. Strengthening Partnership for Peace and Sustainable Development

S/2003/633* Security Council. United Nations

S/2003/487. Security Council. United Nations

Title of Presentation. Global Threat Brief President / CEO Global Guardian

Preventing violent extremism through youth empowerment

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet

Opening Statement by IFA President Joe Healy to the Joint Oireachtas Committee on Justice and Equality on Community Policing and Rural Crime

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

epp european people s party

MIGRANT VULNERABILITY TO HUMAN TRAFFICKING AND EXPLOITATION BRIEF

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:

October Next Generation Smart Border Security Ability. Quality. Delivery.

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

Agreement on counter-terrorism measures

Education and Creating a Culture of Accountability Legal Implications. Cédric Apercé Legal Officer, VERTIC

Table of contents. UNODC mandate Strategic objectives Border control operations Criminal justice and anti-corruption...

Inform on migrants movements through the Mediterranean

American Border Patrol 2160 E. Fry Blvd. Sierra Vista, AZ 85635

Severing the Web of Terrorist Financing

icd - institute for cultural diplomacy

Transcription:

WORLD ARTIFICIAL INTELLIGENCE ORGANIZATION

Prepared by ambassador Zampolli WORLD ARTIFICIAL INTELLIGENCE ORGANIZATION The partnership between private sector Cyber Security, Fintech, Artificial Intelligence companies and law enforcement agencies are essential in the fight against terror. Artificial Intelligence (AI) can collect data from sensors and cameras that can direct law enforcement efficiently to soft targets. AI and deep-learning machines can analyze large quantities of data and find patterns. The solution is the installation of more advanced surveillance camera systems capable of facial recognition that can identify terrorist suspects. Aiming to have full 360o video coverage in cities and high-risk locations such as the following: Airports, Borders, Point of entries, UNESCO Sites Facial Recognition software can reduce the number of surveillance officers required to track suspects on terror lists, normally a minimum of 6 officers are required to monitor 1 suspect. In European Union countries terror list numbers vary between 20,000 and 25,000 in countries such as France, UK and Germany. In addition USA has 83,000 individuals on the no fly list. AI facial recognition enables the fight against terror without any questions. AI for facial recognition should be nominated for a Nobel Prize. Social media companies and encrypted messenger applications need to coordinate amongst themselves to undertake an effective data monitoring task force that will prevent and combat terrorism. Another area of importance is the assistance that pharmaceutical companies can provide in the form of research and development in finding a safer fast acting antidote for nerve agents available to all. 1 Numbers very for example France has 20,000 with 4000 considered a real danger in similar the UK has at any given time 500 to 3000 deemed extremely dangerous that have required more investigation.

FIT (FACEBOOK - INSTAGRAM - TWITTER) The pressure is growing from government leaders to identify and prevent the spread of violent content from terrorist groups and platform users on the social networks such as Facebook, Instagram and Twitter (FIT). These companies must collaborate and consider a shared secured platform accessible by an interlinking FIT CT Agency. The technology should be able to recognize online terrorist propaganda, identify who watches the propaganda, identify members of the terrorist groups, alert authorities of any post with threats of terrorist attacks, block and erase any picture/video/content that was previously flagged from been published again on any of the FIT platforms. Without it being uploaded and available for over 10 years like the case of the Yemeni cleric Anwar Alwalaki. Social media companies must continue to develop AI Machine learning algorithms that can identify terrorist language and propaganda. The UN GA should consider passing a resolution to request all manufactures and social media companies to modify and install a new operating system with an anti CT detection program that can communicate to the FIT CT task force. One of the most important applications for AI in the field of counterterrorism is the processing of collected data. AI can collect and store unlimited amounts of data, recognize patterns and relationships. To make this process more effective and useful, governments should further support the development of AI counter terrorist agenda for collecting data. The results can be shared via a Counter Terrorism (CT) cloud with secure access by CT-partners and international intelligence agencies. For the consideration of member states, a pilot project for Anti- Radicalization Propaganda Ideological Warfare can be implemented in the algorithms and AI systems already in use. Fighting ideology with new ideology, extremist Muslims radicalized through recruiting propaganda with distorted translations of Islamic tenets that incite barbarism and conquering through fear, social media platforms have enabled the proliferation of content that is far from true Islam. This should be countered by the proliferation of content that is an undistorted version of the true Islamic tenets while at the same time addressing via content the ideological and psychological causes of terrorism. Data of the viewers of propaganda should be stored and analyzed with AI to properly classify the at risk of radicalization demographics and micro address the issue with measures such as alerting authorities and parents of page 3

minors and to consider confiscating travel documents. AI CT will be able to continually monitor all suspicious people on watch list without extending local law enforcement resources. FIT and other social media platforms are trying to improve compliance and monitoring systems due to the intense scrutiny they are under. At this early age of AI machine learning human moderators executives must be enforced and empowered for flagging protocols and preventative measure. This FIT CT task force must reach a meeting of mind with human rights agencies and UNHRC in Geneva. The civil society should not forget that we are in a war against terror. AI-v-Cybercrime The Source of 75% of Terror Funding Cybercrime is becoming extreme, aggressive and confrontational; it is the global threat to all nations and can affect many areas not just data breaches. Financial data and general data can now generate funds either by fraud and extortion. Cybercrime is being associated with crypto currencies that provide transaction anonymity and irreversibility of payments that have made them essential as one of the only methods of funding terror. It is estimated 75% of terrorist activities is funded by cybercrime. Virtual currencies like Bitcoin require more regulatory oversight. Authorities need to harness the potential of Crypto currencies and understand its mechanism to facilitate earlier detection of terror financing. Failure to do so would allow the unconstrained development of a potentially major financial apparatus waiting to be fully exploited by cyber-driven terrorism. Freezing Wallets Wallets that are identified as high risk need to be frozen in collaboration with the crypto exchanges. Compliance in this field needs to catch up with the digital world. page 4

NERVE GAS and ANTIDOTES Nerve agents, a class of synthetic phosphorus-containing compounds, are among the most toxic substances known. Brief exposure can lead to death within minutes. Once nerve agents enter the body, if not swiftly treated, they will irreversibly inhibit a vitally important enzyme called acetyl-cholinesterase; the function of this enzyme within the nervous system is to help brain and muscle communicate. When the nerve agent shuts down this enzyme, the nervous systems quickly gets over stimulated, leading to profuse sweating, convulsions and an excruciating death by asphyxiation. There is currently not an appropriate antidote to safely counteract the poisonous, deadly effects of nerve gases. There is a need for a fast-acting antidote for a medical intervention to work after nerve gas exposure. It has been highlighted that Scientists designing drugs and researching proteins must get a better understanding of AI to understand the benefits in creating new enzymes. To be able to create an enzyme using AI, instead of a process that normally takes millions of years to evolve we use this to create antidote against Nerve Agents that would have taken decades to produce. If a first responder administers a Sarin-destroying molecule, each therapeutic molecule must be capable of breaking down through hydrolysis hundreds of nerve agent molecules per second, one after another. Enzymes, the genetically encoded catalysts of biology, are up for such a task. Man-made organophosphates such as Sarin are Xenobiotic. There are no enzymes that hydrolyze them. When farmers spray pesticides, much of it ends up on the ground. Soil bacteria living nearby in these extreme environments are challenged by high doses of these potent foreign chemicals. It turns out that efficient detoxifying enzymes have recently evolved inside some of these microbes as a result. Scientists have identified and isolated a small number of these enzymes and tested them on a range of nasty compounds, including nerve agents, which are structurally like some pesticides. A select few did indeed show hydrolytic activity. Enzymes that initially showed only modest activity have been turned into potential therapeutics against VX a chemical cousin of Sarin and the most toxic nerve agent of all. Using AI we will be able in a matter of months, scientists can engineer biological catalysts that normally take millions of years to evolve and fine-tune. page 5

In a collaboration study between researchers in Germany and Israel in late 2014, Guinea pigs under anesthesia were exposed to lethal doses of VX, followed by optimized VX-destroying proteins. Low doses of the protein drug, even after a 15-minute delay, resulted in survival of all animals and only moderate toxicity. Targeting AI to create the most efficient enzyme will cut decades in selecting the best antidote for nerve gas agents. Protecting Refugee Values against the stigma of economic migrants and possible infiltration of extremists Since 2011 the international spotlight has been focused mainly on the Middle East we have seen millions displaced from countries in the region, escaping from war, religious persecution, political persecution, hunger, daily fear of death to name a few of the reason we see migrants moving vast distances. The immediate reaction from the international community came from the EU that found itself in the direct path of the exodus; it had to spend resources to stem the flow of refugees. Migrant flows can take place between nations and continents. Cross border flows are no longer one nation to another. Before a crisis can begin we must use AI to be able to predict the next migration crisis and Intelligently suggest remedies to an impending crisis. AI may predict imminent famine based on historic data and the climate change trajectory it will recommend alternative farming methods or alternate food sourcing that will cater to a changing climate. AI can address climate security and immigration as debated in the UN Security Council. Another use of AI is to begin to predict new routes of migration finding weak spots and monitor them using facial recognition software. There has been an increase in using the South American migration route to the USA this has been boosted by new air routes from the Middle East and Africa. These air routes join continents without a visa requiring transit stop; this has created new migrant routes that cross the world. In South America it is now common to see migrants from Nepal, Yemen, Bangladesh, Pakistan, Ethiopia, Eritrea, Somalia, and Iran. The numbers are reaching 10,000 per year. Many governments are focusing on the question of whether terror groups are exploiting these flows to mobilize operatives and resources, or whether vulnerable individuals within migrant groups will be radicalized or recruited. page 6

Land and sea-based routes in West Africa involve a dangerous land crossing of the Sahara. These African migration routes are key routes towards Libya and on to Europe. The northern city of Agadez in Niger remains the principal transit hub for West African migrants. This route is highly porous with armed groups patrolling and financing their cause. Recently we have seen a consolidation of these extremist groups into one Nusrat al-islam, now the fight against violent extremism across the Sahel, (Sub-Saharan nations) as well as the migrant crisis have made this region a strategic important area. Social Media a link or a threat? Refugees Journey to a new land is full of negative factors these include fear, isolation, stigmatization, language barriers, illness, abuse, disrespect even when they settle in the final country. The closed border policy of nations will continue to deteriorate creating choke points for example the following: Calais Jungle (France/UK) Libya (Africa/EU) Darien (Colombia/Panama) It is at these choke points that migrants are at their most vulnerable of becoming radicalized. Humanitarian agencies should deploy counselors to guide and help the real refugees and spot possible extremists. Social media allows refugees to stay in touch with loved ones that have remained, however, it is also a means for extremists to target these migrants. Hence AI and the FIT CT task force should monitor traffic from these areas. Online and offline recruitment by extreme groups looking out for weak migrants requires real time intelligence. Using AI to screen this data will effectively target groups that want to expand radicalization. These groups target individuals who feel isolated, ostracized, and aimless. The extremist groups usually offer a sense of belonging and praise to the individual they recruit. Setting up motivational programs to engage family and future generations. Large tech companies should create programs to detect and prevent this type of recruitment into violent extremism is required. page 7