Abstract
After the tragic events of 9/11, the concern about national security has increased significantly. However, law enforcement agencies, particularly in view of current emphasis on terrorism, increasingly face the challenge of information overload and lack of advanced, automated techniques for the effective analysis of criminal and terrorism activities. Data mining applied in the context of law enforcement and intelligence analysis, called Investigative Data Mining (IDM), holds the promise of alleviating such problems. An important problem targeted by IDM is the identification of terror/crime networks, based on available intelligence and other information. In this paper, we present an understanding to show how IDM works and the importance of this approach in the context of terrorist network investigations and give particular emphasis on how to destabilize them by knowing the information about leaders and subgroups through hierarchical structure.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
McIllwain, J.S.: Organized crime: A social network approach. Crime, Law & Social Change 32, 301–323 (1999)
Xu, J., Chen, H.: Criminal network analysis and visualization: A data mining perspective. Communications of the ACM 48(6), 101–107 (2005)
Heuer, R.: Psychology of intelligence analysis. Center for the study of Intelligence, Central Intelligence Agency (2005)
Pillar, P.R.: Counterterrorism after al qaeda. The Washington Quarterly 27(3), 101–113 (2004)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Mena, J.: Investigative Data Mining for security and criminal Detection. Butterworth Heinemann, Elsevier Science (2003)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)
Chan, K., Liebowitz, J.: The synergy of social network analysis and knowledge mapping: a case study. Int. J. Management and Decision Making 7(1), 19–35 (2006)
McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III, Aldershot, Dartmouth, pp. 53–94 (1999)
Sparrow, M.K.: The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13, 251–274 (1991)
Chen, H., et al.: Crime data mining: A general framework and some examples, pp. 0018–9162. IEEE computer society, Los Alamitos (2004)
Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review 58(12), 837–860 (1993)
http://www.i2inc.com/Products/Analysts_Notebook/default.asp (Accessed on May 12, 2006)
http://www.megaputer.com/products/pa/index.php3 (Accessed on June 12, 2006)
http://www.spss.com/clementine/ (Accessed on June 26, 2006)
http://www.netmapanalytics.com (Accessed on June 27, 2006)
http://www.visualanalytics.com/Products/VL3-0Features.cfm (Accessed on June 26, 2006)
http://www.netminer.com/NetMiner/home_01.jsp (Accessed on May 9 2006)
http://www.analytictech.com/download_products.htm (Accessed on May 20, 2006)
Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)
Farely, D.J.: Breaking al qaeda cells: A mathematical analysis of counterterrorism. operations. Studies in conflict terrorism 26, 399–411 (2003)
White, S., Smyth, P.: Algorithms for estimating relative importance in networks. In: SIGKDD 2003, ACM, New York (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shaikh, M.A., Wang, J., Liu, H., Song, Y. (2007). Investigative Data Mining for Counterterrorism. In: Szczuka, M.S., et al. Advances in Hybrid Information Technology. ICHIT 2006. Lecture Notes in Computer Science(), vol 4413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77368-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-77368-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77367-2
Online ISBN: 978-3-540-77368-9
eBook Packages: Computer ScienceComputer Science (R0)