Skip to main content
  • Book
  • © 2011

Counterterrorism and Open Source Intelligence

Editors:

  • Presents state-of-the-art research and practice concerning intelligence work
  • Detailed description of novel tools and techniques for counterterrorism open source intelligence
  • Provides perspectives on the use of open source intelligence in the future
  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Social Networks (LNSN)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 chapters)

  1. Case Studies

    1. Investigating Terrorist Attacks Using CDR Data: A Case Study

      • Fatih Ozgul, Ahmet Celik, Claus Atzenbeck, Nadir Gergin
      Pages 343-354
    2. Multilingual Real-time Event Extraction for Border Security Intelligence Gathering

      • Martin Atkinson, Jakub Piskorski, Erik Van der Goot, Roman Yangarber
      Pages 355-390
    3. Mining the Web to Monitor the Political Consensus

      • Federico Neri, Carlo Aliprandi, Furio Camillo
      Pages 391-412
    4. Retracted: Exploring the Evolution of Terrorist Network

      • Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas
      Pages 413-427
  2. Alternative Perspective

    1. Front Matter

      Pages 429-429
  3. Retraction Note to: A Novel Method to Analyze the Importance of Links in Terrorist Networks

    • Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon
    Pages E1-E1
  4. Retraction Note to: Exploring the Evolution of Terrorist Network

    • Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas
    Pages E2-E2

About this book

Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.

Reviews

From the reviews:

“Informatics may be used to analyze open sources in the fight against terrorism. This state-of-the-art overview from an impressive group of international contributors is mandatory reading for criminologists and intelligence professionals. Many of the tools discussed have broad application to social network analysis. … I recommend this broad overview of state-of-the-art research.” (Brad Reid, ACM Computing Reviews, October, 2011)

Editors and Affiliations

  • The Maersk McKinney Moller Institute, University of Southern Denmark, Odense, Denmark

    Uffe Kock Wiil

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access