Skip to main content

CrimeFighter Investigator: Criminal Network Sense-Making

  • Chapter
  • First Online:

Abstract

Criminal network investigation involves a number of complex knowledge management tasks such as collection, processing, and analysis of information. Synthesis and sense-making are core analysis tasks; analysts move pieces of information around, they stop to look for patterns that can help them relate the information pieces, they add new pieces of information and iteration after iteration the information becomes increasingly structured and valuable. Synthesizing emerging and evolving information structures is a creative and cognitive process best performed by humans. Making sense of synthesized information structures (i.e., searching for patterns) is a more logic-based process where computers outperform humans as information volume and complexity increases. CrimeFighter Investigator is a novel tool that supports sense-making tasks through the application of advanced software technologies such as hypertext structure domains, semantic web concepts, known human-computer interaction metaphors, and a tailorable computational model rooted in a conceptual model defining first class entities that enable separation of structural and mathematical models.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Structure domains (or simply structures) play a vital role in the design and development of CrimeFighter Investigator. The Hypertext research community has developed a number of structure domains over the years: navigational structures allow arbitrary pieces of information (entities) to be linked (associated); spatial structures were designed to deal with emergent and evolving structures of information which is a central task in information analysis; taxonomic structures can support various classification tasks. See [42] for further details.

  2. 2.

    We have found three studies evaluating user acceptance of intelligence and security informatics technology (COPLINK [24], COPLINK Mobile [23], and POLNET [76]) all based on the Technology Acceptance Model [14]. However, none of these studies ask the users to what degree they trust the information provided by the systems and how that affects their acceptance of the technology.

  3. 3.

    Computer security expert Clifford Stoll spent a year studying at a Chinese observatory with Professor Li Fang. Li studied star observations and used a Fourier transform, the standard tool of astronomers everywhere, to hunt for periodic motions. Li, however, did the Fourier transform completely by hand! Stoll decided to show Li how his new Hewlett Packard HP-85 could be used to calculate some 50 coefficients for the polar wandering in under a minute. The task had taken Professor Li 5 months. When presented to the computer’s results, Li smiled and said: “When I compare the computer’s results to my own, I see that an error has crept in. I suspect it is from the computers assumption that our data is perfectly sampled throughout history. Such is not the case and it may be that we need to analyze the data in a slightly different manner”. Stoll realized that Li had not spent 5 months doing rote mechanical calculations. Instead, he had developed a complex method for analyzing the data that took into account the accuracy of different observers and ambiguities in the historical record [56].

  4. 4.

    “Andiwal” is the Pashto (Afghani language) word for “friend”.

  5. 5.

    Structural models are typically embedded in mathematical models. See for example [8].

  6. 6.

    The network nodes and attributes used in this example are inspired by the Greek criminal network November 17 (see [45] for more details).

  7. 7.

    Only the products above a cut-off value of 2,14 are included. The cut-off value is calculated as the total possible links in the gold standard divided by the existing links.

  8. 8.

    If we chose to apply the predict covert network structure algorithm then the evidence could also be information about individuals not in the network. These individuals would be added if a link (relation) to them is predicted from within the gold standard network.

  9. 9.

    The Danish CTU is “invented” for this scenario and is not related to the Danish Security and Intelligence Service’s Center for Terror Analysis or other Danish counterterrorism units.

References

  1. Adderly R, Musgrove P (2001) Police crime recording and investigation systems – a user’s view. Int J Police Strateg Manag 24(1):100–114

    Google Scholar 

  2. Amland BH. (2012) 2 convicted in al-Qaeda terror plot in Norway. Associated Press, New York City, NY

    Google Scholar 

  3. Atzenbeck C, Hicks DL, Memon N (2011) Supporting reasoning and communication for intelligence officers. Int J Netw Virtual Organ 8(1/2):15–36

    Google Scholar 

  4. Badalamente RV, Greitzer FL (2005) Top ten needs for intelligence analysis tool development. In: Proceedings of the 2005 international conference on intelligence analysis, MITRE, (McLean, Virginia) online proceedings only, (http://cryptome.org/intel-2005.htm)

  5. Bier EA, Card SK, Bodnar WJ (2010) Principles and tools for collaborative entity-based intelligence analysis. IEEE Trans Vis Comput Graph 16(2):178–191

    Google Scholar 

  6. Brachman JM. (2009) Global jihadism: theory and practice. Routledge, London/New York

    Google Scholar 

  7. Brachman JM, Levine A (2011) You too can be awlaki! Fletcher Forum World Aff 35:25–46

    Google Scholar 

  8. Brantingham P, Glässer U, Jackson P, Vajihollahi M (2009) Modeling criminal activity in urban landscapes. In: Mathematical methods in counterterrorism. Springer, Wien, pp 9–31

    Google Scholar 

  9. Carley KM. (2003) Destabilizing dynamic covert networks. In: Proceedings of the 8th international command and control research and technology symposium. Evidence Based research, Electronic publication. Vienna, VA

    Google Scholar 

  10. Carley KM, Lee JS, Krackhardt D (2001) Destabilizing networks. Connections 24:31–34

    Google Scholar 

  11. Clark R (2007) Intelligence analysis: a target-centric approach. CQ Press, Washington, DC

    Google Scholar 

  12. Conway M (2008) Jihadi video and auto-radicalisation: evidence from an exploratory youtube study. In: Intelligence and security informatics. Lecture notes in computer science (LNCS). Springer, Wien, pp 108–118

    Google Scholar 

  13. Conway M (2012) From al-zarqawi to al-awlaki: the emergence of the internet as a new form 861 of violent radical milieu. Working paper, Dublin City University (available from http://www.isodarco.it/courses/andalo12/doc/Zarqawi%20to%20Awlaki_V2.pdf,lastvisited)

  14. Davis F (1989) Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q 13:319–340

    Google Scholar 

  15. Dean G, Gottschalk P (2007) Knowledge management in policing and law enforcement. Oxford University Press, Oxford/New York

    Google Scholar 

  16. Drogin B (2008) Curveball. Ebury Press, London

    Google Scholar 

  17. Europol (2009) TE-SAT 2009: EU terrorism situation and trend report. Europol, The Hague, Netherlands

    Google Scholar 

  18. Europol (2010) TE-SAT 2010: EU terrorism situation and trend report. Europol, The Hague, Netherlands

    Google Scholar 

  19. Europol (2011) TE-SAT 2011: EU terrorism situation and trend report. Europol, The Hague, Netherlands

    Google Scholar 

  20. Gloor PA, Zhao Y (2006) Analyzing actors and their discussion topics by semantic social network analysis. In: Proceedings of information visualization. IEEE Computer Society. Washington, DC, pp 130–135

    Google Scholar 

  21. Hauck RV, Chau M, Chen H (2002) Coplink: arming law enforcement with new knowledge management technologies. In: Advances in digital government: technology, human factors, and policy. Kluwer, Boston, pp 163–179

    Google Scholar 

  22. Hoffman B (2006) Inside terrorism. Columbia University Press, New York, NY

    Google Scholar 

  23. Hu PJH, Chen H, Hu H, Larson C, Butierez C (2011) Law enforcement officers’ acceptance of advanced e-government technology: a survey study of coplink mobile. Electron Commer Res Appl 10:6–16

    Google Scholar 

  24. Hu PJH, Lin C, Chen H (2005) User acceptance of intelligence and security informatics technology: a study of coplink. Am Soc Inf Sci Technol 56:235–244

    Google Scholar 

  25. Huntington SP (1996) The clash of civilizations and the remaking of world order. Simon & Schuster, New York

    Google Scholar 

  26. i2 limited, analyst’s notebook (2012) http://www.i2group.com/

  27. Intelligence and Security Committee, United Kingdom (2009) Could 7/7 have been prevented? Review of the intelligence on the London terrorist attacks on 7 July 2005

    Google Scholar 

  28. Irons LR. (2008) Recent patterns of terrorism prevention in the united kingdom. Homel Secur Aff 28:1–19

    Google Scholar 

  29. Kebbell MR, Muller DA, Martin K (2010) Understanding and managing bias. Dealing with uncertainties in policing serious crime. ANU E Press, Canberra, pp 87–97

    Google Scholar 

  30. Laville S (2012) Al-Qaida-inspired plotters planned attacks on high-profile London targets. The Guardian (online), London

    Google Scholar 

  31. Levy BH. (2003) Who killed Daniel Pearl? Melville, Brooklyn, NY

    Google Scholar 

  32. Linschoten AS, Kuehn F (2012) An enemy we created: the myth of the Taliban/Al-Qaeda merger in Afghanistan:1970–2010. Hurst, London

    Google Scholar 

  33. MacDougall I (2012) Norway ‘bomb plot’ highlights al-Qaida problems. Associated Press, New York City, NY

    Google Scholar 

  34. MacKensie J (2010) The battle for aghanistan: militancy and conflict in helmand. New America Foundation, Washington, DC

    Google Scholar 

  35. McBride M, Morgan S (2010) Trust calibration for automated decision aids, Institute for Homeland Security Solutions, Durham, NC

    Google Scholar 

  36. National Commission on Terrorist Attacks upon the United States, United States (2004) The 9/11 Commission report (executive summary). http://www.9-11commission.gov/report/911Report_Exec.pdf

  37. Nesser P (2006) Structures of jihadist terrorist cells in the uk and europe. In: Proceedings of the joint FFI/King’s college conference on “the changing faces of jihadism”, It is actually a presentation, not proceedings authors notes. Kings College, London

    Google Scholar 

  38. Palantir (2012) http://www.palantirtech.com/government

  39. Pearl M (2004) A mighty heart. Virago, London

    Google Scholar 

  40. Petersen RR, Rhodes CJ, Wiil UK (2011) Node removal in criminal networks. In: Proceedings of European intelligence and security informatics conference. IEEE, Washington, DC, pp 360–365

    Google Scholar 

  41. Petersen RR, Wiil UK (2011) Crimefighter investigator: a novel tool for criminal network investigation. In: Proceedings of European intelligence and security informatics conference. IEEE, Washington, DC, pp 360–365

    Google Scholar 

  42. Petersen RR, Wiil UK (2011) Hypertext structures for investigative teams. In: Proceedings of the 22nd ACM conference on hypertext. ACM, New York, NY, pp 123–132

    Google Scholar 

  43. Pioch NJ, Everett JO. (2006) Polestar: collaborative knowledge management and sensemaking tools for intelligence analysts. In: Proceedings of the international conference on information and knowledge management. ACM, pp 513–521

    Google Scholar 

  44. Rhodes C (2011) The use of open source intelligence in the construction of covert social networks. In: Wiil UK (ed) Counterterrorism and open source intelligence. Lecture notes in social networks (LNSN 2). Springer, Wien, pp 159–170

    Google Scholar 

  45. Rhodes CJ, Jones P (2009) Inferring missing links in partially observed social networks. J Oper Res Soc 60(10):1373–1383

    Google Scholar 

  46. Rhodes CJ, Keefe CMJ (2007) Social network topology: a bayesian approach. J Oper Res Soc 58(12):1605–1611

    Google Scholar 

  47. Sageman M (2004) Understanding terrorist networks. PENN, Philadelphia, PA

    Google Scholar 

  48. Sageman M (2008) Leaderless jihad. PENN, Philadelphia, PA

    Google Scholar 

  49. Saunders-Newton D, Scott H (2001) “but the computer said!”: credible uses of computational modeling in public sector decision making. Soc Sci Comput Rev 19:47–65

    Google Scholar 

  50. Security D, (PET), I.S. (undated) Terror arrests in Copenhagen. http://www.pet.dk/Nyheder/morkhoj-uk.aspx

  51. Shrinivasan YB, Wijk JJ (2008) Supporting the analytical reasoning process in information visualization. In: Proceedings of the 26th conference on human factors in computing systems. ACM, New York, NY

    Google Scholar 

  52. Silber MD, Bhatt A (2007) Radicalisation in the west: the homegrown threat. NYPD, New York, NY

    Google Scholar 

  53. Skjoldager M (2009) Truslen indefra: de danske terrorister. Lindhardt & Ringhof, Copenhagen, Denmark

    Google Scholar 

  54. Smith EA. (2006) Complexity, networking, & effects-based approaches to operations. CCRP, Washington, DC

    Google Scholar 

  55. Sparrow MK. (1991) The application of network analysis to criminal intelligence: An assessment of the prospects. Soc Netw 13:251–274

    Google Scholar 

  56. Stoll C (1995) Silicon snake oil: second thoughts on the information highway, Doubleday. New York, NY

    Google Scholar 

  57. Taarnby M (2006) Jihad in Denmark: an overview and analysis of jihadi activity in denmark 1990–2006. Danish institute for international studies, DIIS. Copenhagen, Denmark

    Google Scholar 

  58. Todd BF, Nomani A (2011) The truth left behind: inside the kidnapping and murder of Daniel Pearl. The Pearl Project, Georgetown University

    Google Scholar 

  59. N/A (2012) London terror bomb plot: the four terrorists. The Telegraph (online), London

    Google Scholar 

  60. Veldhuis T, Staun J (2009) Islamist radicalisation: a root cause model. Institute of International Relations, The Hague, Netherlands

    Google Scholar 

  61. Vidino L (2005) Al Qaeda in Europe: the new battleground of international jihad. Prometheus Books, Amherst, NY

    Google Scholar 

  62. Vidino L (2011) Radicalization, linkage, and diversity: current trends in terrorism in Europe, RAND Corporation. Santa Monica, CA and Arlington, VA and Pittsburgh, PA

    Google Scholar 

  63. Vogel KM. (2008) ‘iraqi winnebagosTM of death’: imagined and realized futures of us bioweapons threat assessment. Sci Public Policy 35:561–573

    Google Scholar 

  64. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press. Cambridge, United Kingdom

    Google Scholar 

  65. Wegner P (1997) Why interaction is more powerful than algorithms. Commun ACM 40:80–91

    Google Scholar 

  66. Weiman G (2010) Terror on facebook, twitter, and youtube. Brown J World Aff 16:45–54

    Google Scholar 

  67. Weiner T (2008) Legacy of ashes: the history of the cIA. Anchor Books, New York, NY

    Google Scholar 

  68. Wiil UK, Gniadek J, Memon N (2010) Measuring link importance in terrorist networks. In: proceedings of the international conference on advances in social networks analysis and mining. IEEE, Washington, DC, pp 225–232

    Google Scholar 

  69. Wiil UK, Gniadek J, Memon N, Petersen RR. (2011) Knowledge management tools for terrorist network analysis. In: Knowledge discovery, knowledge engineering and knowledge management. Lecture notes in communications in computer and information science (LNCCIS). Springer, Wien

    Google Scholar 

  70. Wiil UK, Memon N, Gniadek J (2011) Crimefighter: a toolbox for counterterrorism. Lecture notes in communications in computer and information science (knowledge discovery, knowledge engineering and knowledge management), Springer Berlin Heidelberg, vol 128. pp 337–350

    Google Scholar 

  71. Wilson C (updated 2010) Searching for saddam: a five-part series on how the u.s. military used social networking to capture the iraqi dictator. http://www.slate.com/articles/news_and_politics/searching_for_saddam/2010/02/searching_for_saddam_5.single.html

  72. Woo G (2009) Intelligence constraints on terrorist network plots. In: Memon N, Farley JD, Hicks DL, Rosenorn T (eds) Mathematical methods in counterterrorism. Springer, Wien, pp 205–214

    Google Scholar 

  73. Wright W, Schroh D, Proulx P, Skaburskis A, Cort B (2006) The sandbox for analysis: concepts and methods. In: Proceedings of the conference on human factors in computing systems. ACM, New York, NY, pp 801–810

    Google Scholar 

  74. Xanalys (2012) http://www.xanalys.com/

  75. Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6): 100–107

    Google Scholar 

  76. Yalcinkaya R (2007) Police officers’ adoption of information technology: a case study of the turkish polnet system. Ph.D. thesis, University of North Texas

    Google Scholar 

  77. Youtube (2012) General colin powell un speech on iraq part 1 of 5. http://www.youtube.com/watch?v=Nt5RZ6ukbNc. Last visited on February 19th 2012

Download references

Acknowledgements

This work builds upon previous publications by the authors in hypertext and security informatics conference proceedings [4042].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rasmus Rosenqvist Petersen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Petersen, R.R., Wiil, U.K. (2013). CrimeFighter Investigator: Criminal Network Sense-Making. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_16

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics