Advertisement

Counterterrorism and Open Source Intelligence

  • Uffe Kock Wiil

Part of the Lecture Notes in Social Networks book series (LNSN)

Table of contents

  1. Front Matter
    Pages i-xviii
  2. Models

    1. Front Matter
      Pages 7-7
    2. Alexander Gutfraind
      Pages 9-32
    3. David Skillicorn, M. A. J. Bourassa
      Pages 33-47
    4. Roy Lindelauf, Peter Borm, Herbert Hamers
      Pages 61-72
    5. Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, Mohammad A. Tayebi
      Pages 73-102
  3. Tools and Techniques

    1. Front Matter
      Pages 103-103
    2. Paulo Shakarian, V. S. Subrahmanian
      Pages 105-142
    3. Alan Chen, Shang Gao, Panagiotis Karampelas, Reda Alhajj, Jon Rokne
      Pages 143-158
    4. Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon
      Pages 171-187
    5. Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil
      Pages 249-264
    6. Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil
      Pages 265-283
    7. Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer et al.
      Pages 285-313
  4. Case Studies

    1. Front Matter
      Pages 315-315
    2. Fatih Ozgul, Ahmet Celik, Claus Atzenbeck, Nadir Gergin
      Pages 343-354
    3. Martin Atkinson, Jakub Piskorski, Erik Van der Goot, Roman Yangarber
      Pages 355-390
    4. Federico Neri, Carlo Aliprandi, Furio Camillo
      Pages 391-412
    5. Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas
      Pages 413-427
  5. Alternative Perspective

    1. Front Matter
      Pages 429-429
  6. Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon
    Pages E1-E1
  7. Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas
    Pages E2-E2

About this book

Introduction

Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.

Keywords

Counterterrorism Data Mining Open Source Intelligence Social Networking

Editors and affiliations

  • Uffe Kock Wiil
    • 1
  1. 1.The Maersk McKinney Moller InstituteUniversity of Southern DenmarkOdenseDenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-7091-0388-3
  • Copyright Information Springer-Verlag/Wien 2011
  • Publisher Name Springer, Vienna
  • eBook Packages Computer Science
  • Print ISBN 978-3-7091-0387-6
  • Online ISBN 978-3-7091-0388-3
  • Series Print ISSN 2190-5428
  • Series Online ISSN 2190-5436
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering