Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks
نویسندگان
چکیده
Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorists’ attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of network knowledge from large volumes of criminal-justice data. It is a well known fact that terrorist activities consist of dispersed organizations (like non-hierarchical organizations), small groups, and individuals who communicate, coordinate and conduct their campaign in a network-like manner. There is a pressing need to automatically collect data of terrorist networks, analyze such networks to find hidden relations and groups, prune datasets to locate regions of interest, find key players, characterize the structure, trace point of vulnerability, and detect efficiency of the network. To meet this challenge, we designed and developed a knowledgebase for storing and manipulating data collected from various authenticated websites. This paper presents framework of investigative data mining toolkit, our recently introduced techniques and algorithms (which are implemented in the investigative data mining toolkit) could be useful for law enforcement agencies that need to analyze terrorist networks and prioritize their targets. Applying recently introduced algorithms for constructing hidden hierarchy of non-hierarchical terrorist networks, we present case studies of the terrorist attacks that occurred in past, in order to construct command structure of the networks.
منابع مشابه
Investigative Data Mining and its Application in Counterterrorism
It is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at extracting knowledge form data, mining for investigative analysis, called Investigative Data Mining (IDM), aims at discovering hidden instances of patte...
متن کاملStructural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analysis (such as cliques, n-cliques, n-clans and k-plex) to determine familiarity, robustness and reachability within subgroups in 9/11 terrorist network; (ii) role analysis (such as position role index) to determine criti...
متن کاملEfficient Algorithm for Destabilization of Terrorist Networks
The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...
متن کاملExploring the Current Trends and Future Prospects in Terrorist Network Mining
In today’s era of hi-tech technologies, criminals are easily fulfilling their inhuman goals against the mankind. Thus, the security of civilians has significantly become important. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed using data mining techniques. One such technique is Social network analysis which...
متن کاملEvaluating the Use of a Visual Approach to Business Stakeholder Analysis
As businesses increasingly use the Web to share information with stakeholders, the problems arising from information overload and interconnected nature of the Web make it difficult to obtain business intelligence (BI). This research proposes a visual approach to business stakeholder analysis that integrates information visualization and Web mining techniques with human domain knowledge. A proof...
متن کامل