Investigative Data Mining and its Application in Counterterrorism

نویسندگان

  • Nasrullah Memon
  • Abdul Rasool Qureshi
چکیده

It is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at extracting knowledge form data, mining for investigative analysis, called Investigative Data Mining (IDM), aims at discovering hidden instances of patterns of interest, such as patterns indicating an organized crime activity. An important problem targeted by IDM is identification of terror/crime networks, based on available intelligence and other information. We present an approach to an IDM solution of this problem, using semantic link analysis and visualization of findings. The approach is demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, and funds transfer, etc. The findings are represented by a network in the form of an attributed relational graph. Paths from a node to any other node in the network indicate the relationships between individuals and organizations. The system also provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will likely destabilize the terrorist network. Key-Words: Terrorism, Counterterrorism, Investigative Data Mining, Link Analysis, Visualization

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proposed Data Mining Methodology and its Application to Industrial Procedures

Data mining is the process of discovering correlations, patterns, trends or relationships by searching through a large amount of data stored in repositories, corporate databases, and data warehouses. Industrial procedures with the help of engineers, managers, and other specialists, comprise a broad field and have many tools and techniques in their problem-solving arsenal. The purpose of this st...

متن کامل

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining

This paper presents a data mining application in metabolomics. It aims at building an enhanced machine learning classifier that can be used for diagnosing cachexia syndrome and identifying its involved biomarkers. To achieve this goal, a data-driven analysis is carried out using a public dataset consisting of 1H-NMR metabolite profile. This dataset suffers from the problem of imbalanced classes...

متن کامل

Synchrosqueezing-based Transform and its Application in Seismic Data Analysis

Seismic waves are non-stationary due to its propagation through the earth. Time-frequency transforms are suitable tools for analyzing non-stationary seismic signals. Spectral decomposition can reveal the non-stationary characteristics which cannot be easily observed in the time or frequency representation alone. Various types of spectral decomposition methods have been introduced by some resear...

متن کامل

Using a Data Mining Tool and FP-Growth Algorithm Application for Extraction of the Rules in two Different Dataset (TECHNICAL NOTE)

In this paper, we want to improve association rules in order to be used in recommenders. Recommender systems present a method to create the personalized offers. One of the most important types of recommender systems is the collaborative filtering that deals with data mining in user information and offering them the appropriate item. Among the data mining methods, finding frequent item sets and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005