Data Mining: Study on Intelligence-Led Counterterrorism
This paper establishes a relatively complete theoretical framework, with multi-disciplinary perspective. Intelligence-led counterterrorism framework based on data mining can be divided into four function modules: data storage, data pretreatment, data analysis and data visualization processor. The data mining process of counterterrorism’s information analysis includes problem identification of counterterrorism, data preparation, data mining, model assessment and knowledge representation. Bayesian Belief Network is a very useful tool for data mining in intelligence-led counterterrorism.
Terrorists more or less will leave the corresponding clues in premeditated, planning and implementing crime. However, it is harder than looking for a needle in a bottle of hay to use the existing technology and method to extract the antiterrorist information from the clues! Because this kind of terrorism information which is covered in the magnitude of the general information is indefinite and unknown in time series and space. The traditional database retrieval system cannot respond to this inquiry. Artificial identification, mutatis mutandis, monitoring technology and the implementation of known goal detection all need lots of manpower, and it is powerless to search unknown target in voluminous information. But the Data Mining can do!
Unable to display preview. Download preview PDF.
- 1.Wu, S., Gao, X., Buster, M.: Data Warehouse and Data Mining. The Metallurgical Industry Press, Beijing (2003) (in Chinese)Google Scholar
- 2.Jin, G., Qian, J., Qian, J., et al.: The Crime Risk Prediction Model Based on Data Mining Decision Tree. Computer Engineering 29(9), 183–185 (2003) (in Chinese)Google Scholar
- 3.Wang, R., Ma, D., Chen, C.: The Data Mining Technology and Analysis of its Application Status. Computer Application Technology (2), 20–23 (2007) (in Chinese)Google Scholar
- 4.Li, Y.: The Data Classification Mining Algorithm Based on Bayesian Belief Network. Computer Science 33(10), 157–158 (2006) (in Chinese)Google Scholar