Marshalling Evidence Through Data Mining in Support of Counter Terrorism
نویسندگان
چکیده
In this paper we present an architecture to manage a large, distributed volume of evidence for counterterrorism applications. This approach facilitates the intelligence analyst’s train of thought by enabling hypotheses to be postulated and evaluated against the available evidence. The hypothesis creation is left to the human (as we believe only humans possess the flexibility to adapt hypothesis to the dynamic nature of the problem), but the system automates the gathering and linking of evidence that supports or negates the hypothesis. We do this by extensive use of data mining techniques in support of the process of query answering. The approach is incorporated into a distributed agent system that allows users to discover and compose agents for hypothesis processing.
منابع مشابه
Scaling Up ILP to Large Examples: Results on Link Discovery for Counter-Terrorism
Inductive Logic Programming (ILP) has been shown to be a viable approach to many problems in multi-relational data mining (e.g. bioinformatics). Link discovery (LD) is an important task in data mining for counter-terrorism and is the focus of DARPA's program on Evidence Extraction and Link Discovery (EELD). Learning patterns for LD is a novel problem in relational data mining that is characteri...
متن کاملPerceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment
This study examines the relationships between various risks, beliefs, and behavioral intentions that are related to citizens' use of anti-/counter-terrorism e-Government websites. The data was collected through two surveys within a one-year interval — before and after the Iraqi regime was expelled by the US coalition army. The results suggest that perceived privacy risk from an anti/counter-ter...
متن کاملData Mining for Counter-Terrorism
Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...
متن کاملIs counter-terrorism policy evidence-based? What works, what harms, and what is unknown.
Is counter-terrorism policy evidence-based? What works, what harms, and what is unknown. One of the central concerns surrounding counter-terrorism interventions today, given the attention and money spent on them, is whether such interventions are effective. To explore this issue, we conducted a general review of terrorism literature as well as a Campbell systematic review on counter-terrorism s...
متن کاملMathematical modeling of dynamics behavior of terrorism and control
Terrorism is generally understood to be the use of threat or extra normal violence to gain ideological reasons and personal benefit. In this paper, a mathematical modelling of terrorism with military strategies and rehabilitation of terrorists was constructed. The model is developed to control the spread of terrorist ideologies in the society and suitable to describe terrorist group. The popula...
متن کامل