Skip to main content

EWAS: Modeling Application for Early Detection of Terrorist Threats

  • Chapter

Abstract

This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carpenter, M. A., and Stajkovic, A. D. 2006. Social Network Theory and Methods as Tools for Helping Business Confront Global Terrorism: Capturing the Case and Contingencies Presented by Dark Social Networks. In G. Suder (Ed), Corporate Strategies Under International Terrorism and Adversity, 7–19. UK: Edward Elgar Publishing.

    Google Scholar 

  2. Carley K.M. et al. 2006. Toward an Interoperable Dynamic Analysis Toolkit. Decision Support Systems 43(4): 1324–1347.

    Article  Google Scholar 

  3. Chen H. et al. 2008, Terrorism informatics: Knowledge Management and Data mining for Homeland Security, Springer.

    Google Scholar 

  4. Chen H. et al. 2008. IEDs in the Dark Web: Genre Classification of Improvised Explosive Device Web Pages. In proc. IEEE ISI 2008.

    Google Scholar 

  5. Devlin, K., and Lorden, G. 2007. The Numbers Behind NUMB3RS: Solving Crime with Mathematics. Plume.

    Google Scholar 

  6. Engelbart, D. C. 1962. Augmenting Human Intellect: A Conceptual Framework, Summary Report. AFOSR-3233, Stanford Research Institute.

    Google Scholar 

  7. Gloor, P. A., and Zhao, Y. 2006. Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis. Information Visualization. IV 2006, pp. 130–135.

    Google Scholar 

  8. Memon, N., Wiil, U. K., Alhajj, R., Atzenbeck, C., and Harkiolakis, N. 2010. Harvesting Covert Networks: The Case Study of the iMiner Database. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). InderScience (to appear).

    Google Scholar 

  9. Memon N.; Larsen H.L.; Hicks D.; Harkiolakis N. 2008. Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies: Lecture Notes in Computer Science, vol. 5075/2008, pp. 477–489.

    Google Scholar 

  10. Memon N.; Hicks D.; Larsen H. L.; Uqaili M.A. 2007. Understanding the Structure of Terrorist Networks, In International Journal of Business Intelligence and Data Mining, vol. 2(4), pp. 401–425.

    Article  Google Scholar 

  11. Memon N. 2007 “Investigative Data Mining: Analyzing, Visualizing and Destabilizing Terrorist Networks”, PhD dissertation, Aalborg University.

    Google Scholar 

  12. Memon N.; Hicks D.; Larsen H. L. 2006. How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. Lecture Notes in Computer Science, vol. 4632/2006, pp. 430–441.

    Google Scholar 

  13. Steele, R. D. 2006. The Failure of 20th Century Intelligence, c

    Google Scholar 

  14. Shipman, F. M., Hsieh, H, Maloor, P., and Moore, J. M. 2001. The Visual Knowledge Builder: A Second Generation Spatial Hypertext, In Proc. of the ACM Hypertext Conference, pp. 113–122. ACM Press.

    Google Scholar 

  15. Thomas, J., and Cook, K. 2006. A Visual Analytics Agenda. IEEE Computer Graphics and Applications 26(1), 10–13.

    Article  Google Scholar 

  16. Tsvelovat M., and Carley K. M. 2005. Structural Knowledge and Success of Antiterrorist Activity: The Downside of Structural Equivalence. Journal of social structures 6(2).

    Google Scholar 

  17. Wiil U.K., Memon, N., Gniadek J. 2009. Knowledge Management Processes, Tools and Techniques for Counterterrorism. International Conference on Knowledge Management and Information Sharing (KMIS 2009), (Funchal, Portugal, October). INSTICC Press, pp. 29–36.

    Google Scholar 

  18. Xu J., Chen H. (2005) “CrimeNet Explorer: A framework for criminal network knowledge discovery”, ACM Transactions on Information Systems, Vol. 23(2), pp. 201–226.

    Google Scholar 

  19. Damljanovic D., Agatonovic M., Cunningham H. 2010.: Natural Language Interfaces to Ontologies: Combining Syntactic Analysis and Ontology-based Lookup through the User Interaction. In Proceedings of the 7th Extended Semantic Web Conference (ESWC 2010), Springer Verlag, Heraklion, Greece, May 31–June 3, 2010.

    Google Scholar 

  20. Maynard D., Funk A., Peters W. 2009. Using Lexico-Syntactic Ontology Design Patterns for ontology creation and population. In Proceedings of ISWC Workshop on Ontology Patterns (WOP 2009), Washington, 2009.

    Google Scholar 

  21. Ning Li, Jun Rao, Eugene Shekita. 2009. Leveraging a scalable Row Store to Build a Distributed Text Index. In Proceedings of the first international workshop on Cloud data management (CloudDB 09) Hong Kong, China, pp. 29–36.

    Google Scholar 

  22. Qureshi P.A.R., Memon N., Wiil U. K. 2010. EWaS: Novel Approach for Generating Early Warnings to Prevent Terrorist Attacks in the Proceedings of 2010 Second International Conference on Computer Engineering and Application (ICCEA 2010), Bali Island, Indonesia, IEEE Computer Society, pp. 410–414.

    Google Scholar 

  23. Qureshi P. A. R., Wiil U. K., Memon N. 2009. Modeling Early Warning System to Predict Terrorist Threats: Preliminary Results. In the Proceedings of the 10th International Symposium on Knowledge and System Sciences, Hong Kong, China, 2009. pp. 179–190.

    Google Scholar 

  24. Memon N., Wiil U.K., Qureshi P. A. R. 2009. Design and Development of an Early Warning System to Prevent Terrorist Attacks. In the Proceedings of International Conference on Artificial Intelligence and Neural Networks, Beijing, China, 2009. IEEE Press, pp. 222–226

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag/Wien

About this chapter

Cite this chapter

Qureshi, P.A.R., Memon, N., Wiil, U.K. (2010). EWAS: Modeling Application for Early Detection of Terrorist Threats. In: Memon, N., Alhajj, R. (eds) From Sociology to Computing in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0294-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0294-7_8

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0293-0

  • Online ISBN: 978-3-7091-0294-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics