© 2011

Counterterrorism and Open Source Intelligence

  • Uffe Kock Wiil


  • Presents state-of-the-art research and practice concerning intelligence work

  • Detailed description of novel tools and techniques for counterterrorism open source intelligence

  • Provides perspectives on the use of open source intelligence in the future


Part of the Lecture Notes in Social Networks book series (LNSN)

Table of contents

  1. Front Matter
    Pages i-xviii
  2. Models

    1. Front Matter
      Pages 7-7
    2. Alexander Gutfraind
      Pages 9-32
    3. David Skillicorn, M. A. J. Bourassa
      Pages 33-47
    4. Roy Lindelauf, Peter Borm, Herbert Hamers
      Pages 61-72
    5. Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, Mohammad A. Tayebi
      Pages 73-102
  3. Tools and Techniques

    1. Front Matter
      Pages 103-103
    2. Paulo Shakarian, V. S. Subrahmanian
      Pages 105-142
    3. Alan Chen, Shang Gao, Panagiotis Karampelas, Reda Alhajj, Jon Rokne
      Pages 143-158
    4. Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon
      Pages 171-187
    5. Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil
      Pages 249-264
    6. Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil
      Pages 265-283
    7. Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer et al.
      Pages 285-313
  4. Case Studies

    1. Front Matter
      Pages 315-315

About this book


Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.


Counterterrorism Data Mining Open Source Intelligence Social Networking

Editors and affiliations

  • Uffe Kock Wiil
    • 1
  1. 1.The Maersk McKinney Moller InstituteUniversity of Southern DenmarkOdenseDenmark

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment


From the reviews:

“Informatics may be used to analyze open sources in the fight against terrorism. This state-of-the-art overview from an impressive group of international contributors is mandatory reading for criminologists and intelligence professionals. Many of the tools discussed have broad application to social network analysis. … I recommend this broad overview of state-of-the-art research.” (Brad Reid, ACM Computing Reviews, October, 2011)