Scenario-Driven System for Open Source Intelligence

  • Edward Nawarecki
  • Grzegorz Dobrowolski
  • Jacek Dajda
  • Aleksander Byrski
  • Marek Kisiel-Dorohinicki
Part of the Communications in Computer and Information Science book series (CCIS, volume 287)

Abstract

The system that performs information integration based on formalized scenarios is presented. Heterogeneous data are collected from different sources, transformed and integrated in the course of a process supervised by a user (here a police analyst). The data comes from generally accessible sources, thus the presented system follows an open-source intelligence paradigm. The core of the paper is introduction to the system idea and functionality. All considerations are illustrated with an exemplary pedophilia content localization scenario.

Keywords

Criminal Analysis Phone Bill Internet Provider External Information Source Intelligent Decision System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Byrski, A.: Effective analysis of overtaken data storage. In: Artificial Intelligence Methods Supporting Public Security. AGH University of Science and Technology Press (2009) (in polish)Google Scholar
  2. 2.
    Byrski, A., Dajda, J., Dobrowolski, G., Kisiel-Dorohinicki, M., Koźlak, J., Nawarecki, E., Śnieżyński, B., Turek, W., Zygmunt, A., Uruena, M., Berger-Sabbatel, G., Duda, A., Korczyński, M.: Specification of scenarios, software agents and components for operational and investigation activities support. Technical report, University of Science and Technology, Krakow, Poland (2011)Google Scholar
  3. 3.
    Byrski, A., Kisiel-Dorohinicki, M., Dajda, J., Dobrowolski, G., Nawarecki, E.: Hierarchical Multi-Agent System for Heterogeneous Data Integration. In: Bouvry, P., González-Vélez, H., Kołodziej, J. (eds.) Intelligent Decision Systems. SCI, vol. 362, pp. 165–186. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  4. 4.
    Byrski, A., Stryjewski, W., Czechowicz, B.: Adaptation of pyflag to efficient analysis of seized computer data storage. The Journal of Digital Forensics, Security and Law 5 (2010)Google Scholar
  5. 5.
    Dajda, J., Debski, R., Byrski, A., Kisiel-Dorohinicki, M.: Component-based architecture for systems, services and data integration in support for criminal analysis. Journal of Telecommunications and Information Technology (2012)Google Scholar
  6. 6.
    Nawarecki, E., Dobrowolski, G.: Information – knowledge – intelligence in systems supporting public security. In: Practical Elements of Organized Crime and Terrorism Fighting: New Technologies and Operational Actions. Wolters Kluwer Poland (2009) (in polish)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Edward Nawarecki
    • 1
  • Grzegorz Dobrowolski
    • 1
  • Jacek Dajda
    • 1
  • Aleksander Byrski
    • 1
  • Marek Kisiel-Dorohinicki
    • 1
  1. 1.Department of Computer ScienceAGH University of Science and TechnologyKrakówPoland

Personalised recommendations