Program

The 2-day program will consist of:
  • 4 keynote/invited speakers,
  • non-parallel presentations of accpepted research and industry practice and experience papers,
  • panel on "Innovation in Border Security Research & Development",
  • special session on "Future Scenarios for Border Control Processes" [SLIDES]

The tentative schedule of WIBC 2013 can be downloaded here: DETAILED VERSION | SHORT VERSION

KEYNOTE SPEAKERS

  • Aldert Vrij, Professor of Applied Social Psychology, University of Portsmouth (UK)

    Aldert Vrij is a Professor of Applied Social Psychology in the Department of Psychology at the University of Portsmouth (UK), and the contact person for EPRODD, the European consortium of Psychological Research On Deception Detection. He has published more than 400 articles and book chapters to date, mainly on the subjects of nonverbal and verbal cues to deception (i.e., how do liars behave and what do they say), and lie detection. He has developed a cognitive approach to lie detection, and published overview (invited) articles about it in Psychological Science in the Public Interest in 2010 and Current Directions in Psychological Science in 2011. His book Detecting Lies and Deceit: Pitfalls and Opportunities, published by Wiley in 2008, provides a comprehensive overview of deception and lie detection research. He advises the police about conducting interviews with suspects, and gives invited talks and workshops on lie detection to practitioners and scholars across the world, including police, homeland security, defence, judges, solicitors, social workers, fraud investigators, insurers and bankers. He has held research grants from The British Academy, The Dutch Organisation for Scientific Research (NWO), The Defence Science and Technology Laboratory (DSTL), The Dutch Government, The Economic and Social Research Council (ESRC), The Engineering and Physical Science Research Council (EPSRC), Federal Bureau of Investigation, The Leverhulme Trust, the Nuffield Foundation, the UK Government and the US Government, totaling £3 million. He serves on the Editor Boards of 14 journals.

    TITLE OF THE TALK: Lie detection in border crossings

    In part 1 of this talk I will discuss an innovative cognitive approach to lie detection. Key of the approach is that questions can be asked that are more difficult to answer for liars than for truth tellers and therefore elicit cognitive cues to deceit An overview of 23 experiments published in this area showed a significant increase in lie detection as a result of employing cognitive lie detection techniques. Part 2 discusses interview methods to detect deceit designed for intelligence interviewing, such as undercover interviewing (interviewing a suspect without the suspect being aware that the 'chat' is an actual interview) and collective interviewing (interviewing two or more suspects simultaneously).

    [SLIDES]

  • Joseph Cannataci, Professor of Information Policy, Security & Technology Law , University of Malta

    Joe Cannataci is Head of the Department of Information Policy & Governance at the Faculty of Media & Knowledge Sciences of the University of Malta and also Chair of European Information Policy & Technology Law within the Faculty of Law at the University of Groningen. He is additionally Adjunct Professor at the Security Research Institute and the School of Computer and Security Science at Edith Cowan University Australia. A considerable deal of Joe's time is dedicated to collaborative research and he is currently overall co-ordinator for the SMART and RESPECT projects dealing with various forms of surveillance. He also continues to act as Expert Consultant to a number of international organisations. During 2012 he was engaged by the Council of Europe to develop a concept paper on the application of data protection regulations in relation to transborder private/public information sharing for (a) network security purposes and (b) criminal justice purposes. For the period 2013-2017, he is a domain-expert as well as co-leader of WG4 and a member of the Management Committee of the COST ICT 1206 Project `De-identification for privacy protection in multimedia content'. In 2010 Joe was External Consultant for the Impact Assessment of policy options for data protection law in Europe contracted by the European Commission to GHK International. Since 2010, he is also Expert Consultant engaged by Council of Europe's Consultative Committee (T-PD) and Directorate for Legal Affairs and Human Rights to review provisions of the European Data Protection Convention and Recommendation (R(87)15 on police use of personal data. He has written books and articles on data protection law, liability for expert systems, legal aspects of medical informatics, copyright in computer software and co-authored various papers and textbook chapters on self-regulation and the Internet, the EU Constitution and data protection, on-line dispute resolution, data retention and police data. In 2005 he was decorated by the Republic of France and elevated to Officier dans l'ordre des palmes academiques. His pioneering role in the development of technology law and especially privacy law was cited as one of the main reasons for his being made the recipient of such an honour as was his contribution to the development of European information policy He has held or currently holds research grants from the British Academy, the Council of Europe, COST (European Cooperation in Science and Technology) and the European Commission, totaling in excess of Euro 20 million. He serves on the editorial board of six peer-reviewed journals.

    TITLE OF THE TALK: Issues in evidence-based policy-making in surveillance: some reflections from the SMART and RESPECT projects

    The policy makers in Brussels and in Strasbourg are once again examining the pros and cons of large new IT-based systems aimed at improving the security of Europe's borders through increased surveillance. Against this background, Professor Cannataci's keynote speech will first examine the distinctions between surveillance and smart surveillance and then outline the significance of the advent of MIMSI or Massively Integrated Multiple Sensor Installations. It will also raise the question `To what extent are the new proposals for solutions effective and proportional to the threat?'. The speaker will examine how the methodology of EU FP7 projects like SMART and RESPECT, which include at least one Work Package devoted to border control, attempts to provide a more solid evidence base for decision-making by policy makers. He will reflect on the growing reliance on integration of systems as the greatest single factor which may affect the balance between security and safety on the one hand and privacy and data protection on the other hand.

  • Roman Yangarber, Computer Science Department, University of Helsinki

    Roman Yangarber received his PhD in Computer Science with concentration in Natural Language Processing (NLP), from the Courant Institute of Mathematical Sciences, New York University (NYU) in 2000. Prior to moving to Finland in 2004 he held the post of Assistant Research Professor at NYU, where he specialized in computational linguistics with special focus on machine learning algorithms for acquisition of semantic knowledge from plain text. Since coming to the University of Helsinki (Department of Computer Science), he has held the post of Principal Investigator and Acting Professor; at present he leads the Research Group on NLP, where he supervises MSc and PhD students in text mining and computational linguistics within several internationally- and nationally-funded research projects, which are conducted in collaboration with partner organizations in industry, academia, government and NGO sectors. Several of the projects focus on Web-scale surveillance of news media. Dr Yangarber has been an organizer, editorial board member, and program committee member for a number scientific events, conferences, and journals, and has served on evaluation panels for the US National Science Foundation. He has over 60 publications in international conferences, journals, and book chapters.

    TITLE OF THE TALK: Language technology for large-scale surveillance of open information sources

    This talk discusses techniques for analyzing large streams of documents coming from on-line news sites, for monitoring events of interest in certain knowledge-intensive domains, such as monitoring cross-border security incidents and crises. We begin with a high-level introduction to Open-Source intelligence, and how and under what conditions it can be useful in the context of border security-related intelligence gathering. We will discuss technical challenges posed to this task by "traditional approaches", such as keyword-based search and Boolean queries. We will then present methods for analyzing the content on a deeper (semantic) level, and the benefits that such analysis brings. Particular attention will be paid to learning from the extracted information via aggregation across individual facts, by leveraging trends that emerge by considering facts linked across time, different sources and different languages. Practical examples will be demonstrated using PULS - an on-line system developed at the University of Helsinki that implements the discussed ideas and methodologies.

    [SLIDES]

LIST OF ACCEPTED PAPERS

Research Papers

  • Monica Gariup, Gustav Soederlind
    Document Fraud Detection at the Border: Preliminary observations on human and machine performance
    [SLIDES]
  • Debra Tower, Matthew Jensen, Norah Dunbar, Aaron Elkins
    Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony
    [SLIDES]
  • Jeffrey Gainer Proudfoot
    Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test
    [SLIDES]
  • Moazzam Butt, Sandra Martiy, Alexander Nouak, Joerg Koeplinz, R. Raghavendrax and Guoqiang Lix
    Towards e-Passport Duplicate Enrolment Check in the European Union
  • Jakub Piskorski, Hristo Tanev, Alexandra Balahur
    Exploiting Twitter for Border Security-Related Intelligence Gathering
    [SLIDES]
  • Joe Valacich, David Wilson, Jay Nunamaker, Elyse Golob
    Modeling Border Traffic Flow using Cell Phone Header Packets
    [SLIDES]
  • Jyri Rajamaeki
    Mobile Digital Services for Border Protection: Standardization of Emergency Response Vehicles
    [SLIDES]
  • Jeffrey Jenkins, Jim Marquardson, Jeffrey Proudfoot, Joseph Valacich, Elyse Golob, Jay Nunamaker, Jr.
    The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation
    [SLIDES]

"Practice and Experience" Papers

  • Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez
    A multi-modal biometric fusion implementation for ABC Systems
    [SLIDES]
  • Chris Hurrey
    The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-Threat World
    [SLIDES]
  • Gregory Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson
    OptaSense distributed acoustic and seismic sensing performance for multi-threat, multi-environment border monitoring
  • Bart Adams, Frank Suykens
    Astute: Increased Situational Awareness through proactive decision support and adaptive map-centric user interfaces
    [SLIDES]
  • Sandrine Trochu, Olivier Touret
    Managing the Border, Smartly
    [SLIDES]