Skip to main content

A Neural Network for Counter-Terrorism

  • Conference paper
  • First Online:

Abstract

This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different AI techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiments showed on average a 60% success rate and at best a 68% success rate for correctly identifying deceptive behaviour. These figures indicate that, as part of an investigator support system, a neural network would be a valuable tool in the identification of terrorists prior to an attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dixon, S., Guest, E., Dixon, M., Elliott, J., Mullier, D.: DScent Final Report (2011). Available from: http://www.leedsmet.ac.uk/aet/computing/Computing_DScentFinalReport v2_0_2011.pdf Accessed 8 March 2011.

  2. Markman, A., Rachkovskij, D., Misuno, I., Revunova, E.: Analogical Reasoning Techniques in Intelligent Counterterrorism Systems. International Journal “Information Theories & Applications” Volume 10 (2) (2003).

    Google Scholar 

  3. Marappan, K., Nallaperumal, K., Kannan, S., Bensujin, B.: A Soft Computing Model to Counter Terrorism. IJCSNS International Journal of Computer Science and Network Security, Volume 8 May 2008, p.141. (2008).

    Google Scholar 

  4. Schneier, B.: Why Data Mining Won’t Stop Terror. Wired (2006). Available from: http://www.wired.com/politics/security/commentary/securitymatters/2006/03/70357 Accessed 28 October 2010.

  5. Rudmin, F.: Why Does the NSA Engage in Mass Surveillance of Americans When It's Statistically Impossible for Such Spying to Detect Terrorists? Counterpunch (2006). Available from:http://www.counterpunch.org/rudmin05242006.html Accessed 1 Aug 2011.

  6. Jonas, J., Harper, J.: Effective counterterrorism and the limited role of predictive data mining. CATO Institute (2006) Available from: http://www.cato.org/pubs/pas/pa584.pdf Accessed 27 October 2010.

  7. Ware, B.S., Beverina, A., Gong, L., Colder, B.: A Risk-Based Decision Support System for Antiterrorism (2002). Available from: http://www.dsbox.com/Documents/MSS_A_Risk- Based_Decision_Support_System_for_Antiterrorism.pdf Accessed 30 Jan 2009

  8. Marrone, P.: An Object Oriented Neural Engine. SourceForge (2010). Available from: http://www.jooneworld.com Accessed 26 October 2010.

  9. Neural Planner Software: EasyNN-plus - Neural Network Software. (2010). Available from: http://www.easynn.com Accessed 26 October 2010.

  10. Mitchell, T.M.: Machine Learning, WCB-McGraw-Hill (1997).

    Google Scholar 

  11. Levinson, N.: The Wiener RMS (ROOT MEAN SQUARE) ERROR Criterion in Filter Design and Prediction. Journal of Mathematics and Physics (1946).

    Google Scholar 

  12. Sexton, R.S., Sikander, N.A.: Data mining using a genetic algorithm-trained neural network. Intelligent Systems in Accounting, Finance and Management 10(4):201-210. doi:10.1002/isaf.205 (2002).

    Google Scholar 

  13. Mann, H.B., Whitney, D.R.:On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics Volume 18 March 1947, p.50–60 (1947)

    Google Scholar 

  14. Avery, L.: Mann-Whitney U Test (2007). Available from: http://elegans.swmed.edu/~leon/stats/utest.html Accessed 27 October 2010.

  15. Evertsz, R.: Populating VBS2 with Realistic Virtual Actors. Proceedings of the 18th Conference on Behavior Representation in Modeling and Simulation, p.1–8. (2009).

    Google Scholar 

  16. Ferreira, C.: Gene Expression Programming: Mathematical Modeling by an Artificial Intelligence (Studies in Computational Intelligence). 2nd ed. Springer (2006).

    Google Scholar 

  17. Petersen, U.: Emdros: a text database engine for analyzed or annotated text. Proceedings of the 20th international conference on Computational Linguistics (2004). Available from: http://emdros.org/petersen-emdros-COLING-2004.pdf Accessed 24 January 2011.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S.J. Dixon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this paper

Cite this paper

Dixon, S., Dixon, M., Elliott, J., Guest, E., Mullier, D.J. (2011). A Neural Network for Counter-Terrorism. In: Bramer, M., Petridis, M., Nolle, L. (eds) Research and Development in Intelligent Systems XXVIII. SGAI 2011. Springer, London. https://doi.org/10.1007/978-1-4471-2318-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2318-7_18

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2317-0

  • Online ISBN: 978-1-4471-2318-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics