Abstract
Criminal network investigation involves a number of complex knowledge management tasks such as collection, processing, and analysis of information. Synthesis and sense-making are core analysis tasks; analysts move pieces of information around, they stop to look for patterns that can help them relate the information pieces, they add new pieces of information and iteration after iteration the information becomes increasingly structured and valuable. Synthesizing emerging and evolving information structures is a creative and cognitive process best performed by humans. Making sense of synthesized information structures (i.e., searching for patterns) is a more logic-based process where computers outperform humans as information volume and complexity increases. CrimeFighter Investigator is a novel tool that supports sense-making tasks through the application of advanced software technologies such as hypertext structure domains, semantic web concepts, known human-computer interaction metaphors, and a tailorable computational model rooted in a conceptual model defining first class entities that enable separation of structural and mathematical models.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Structure domains (or simply structures) play a vital role in the design and development of CrimeFighter Investigator. The Hypertext research community has developed a number of structure domains over the years: navigational structures allow arbitrary pieces of information (entities) to be linked (associated); spatial structures were designed to deal with emergent and evolving structures of information which is a central task in information analysis; taxonomic structures can support various classification tasks. See [42] for further details.
- 2.
We have found three studies evaluating user acceptance of intelligence and security informatics technology (COPLINK [24], COPLINK Mobile [23], and POLNET [76]) all based on the Technology Acceptance Model [14]. However, none of these studies ask the users to what degree they trust the information provided by the systems and how that affects their acceptance of the technology.
- 3.
Computer security expert Clifford Stoll spent a year studying at a Chinese observatory with Professor Li Fang. Li studied star observations and used a Fourier transform, the standard tool of astronomers everywhere, to hunt for periodic motions. Li, however, did the Fourier transform completely by hand! Stoll decided to show Li how his new Hewlett Packard HP-85 could be used to calculate some 50 coefficients for the polar wandering in under a minute. The task had taken Professor Li 5 months. When presented to the computer’s results, Li smiled and said: “When I compare the computer’s results to my own, I see that an error has crept in. I suspect it is from the computers assumption that our data is perfectly sampled throughout history. Such is not the case and it may be that we need to analyze the data in a slightly different manner”. Stoll realized that Li had not spent 5 months doing rote mechanical calculations. Instead, he had developed a complex method for analyzing the data that took into account the accuracy of different observers and ambiguities in the historical record [56].
- 4.
“Andiwal” is the Pashto (Afghani language) word for “friend”.
- 5.
Structural models are typically embedded in mathematical models. See for example [8].
- 6.
The network nodes and attributes used in this example are inspired by the Greek criminal network November 17 (see [45] for more details).
- 7.
Only the products above a cut-off value of 2,14 are included. The cut-off value is calculated as the total possible links in the gold standard divided by the existing links.
- 8.
If we chose to apply the predict covert network structure algorithm then the evidence could also be information about individuals not in the network. These individuals would be added if a link (relation) to them is predicted from within the gold standard network.
- 9.
The Danish CTU is “invented” for this scenario and is not related to the Danish Security and Intelligence Service’s Center for Terror Analysis or other Danish counterterrorism units.
References
Adderly R, Musgrove P (2001) Police crime recording and investigation systems – a user’s view. Int J Police Strateg Manag 24(1):100–114
Amland BH. (2012) 2 convicted in al-Qaeda terror plot in Norway. Associated Press, New York City, NY
Atzenbeck C, Hicks DL, Memon N (2011) Supporting reasoning and communication for intelligence officers. Int J Netw Virtual Organ 8(1/2):15–36
Badalamente RV, Greitzer FL (2005) Top ten needs for intelligence analysis tool development. In: Proceedings of the 2005 international conference on intelligence analysis, MITRE, (McLean, Virginia) online proceedings only, (http://cryptome.org/intel-2005.htm)
Bier EA, Card SK, Bodnar WJ (2010) Principles and tools for collaborative entity-based intelligence analysis. IEEE Trans Vis Comput Graph 16(2):178–191
Brachman JM. (2009) Global jihadism: theory and practice. Routledge, London/New York
Brachman JM, Levine A (2011) You too can be awlaki! Fletcher Forum World Aff 35:25–46
Brantingham P, Glässer U, Jackson P, Vajihollahi M (2009) Modeling criminal activity in urban landscapes. In: Mathematical methods in counterterrorism. Springer, Wien, pp 9–31
Carley KM. (2003) Destabilizing dynamic covert networks. In: Proceedings of the 8th international command and control research and technology symposium. Evidence Based research, Electronic publication. Vienna, VA
Carley KM, Lee JS, Krackhardt D (2001) Destabilizing networks. Connections 24:31–34
Clark R (2007) Intelligence analysis: a target-centric approach. CQ Press, Washington, DC
Conway M (2008) Jihadi video and auto-radicalisation: evidence from an exploratory youtube study. In: Intelligence and security informatics. Lecture notes in computer science (LNCS). Springer, Wien, pp 108–118
Conway M (2012) From al-zarqawi to al-awlaki: the emergence of the internet as a new form 861 of violent radical milieu. Working paper, Dublin City University (available from http://www.isodarco.it/courses/andalo12/doc/Zarqawi%20to%20Awlaki_V2.pdf,lastvisited)
Davis F (1989) Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Q 13:319–340
Dean G, Gottschalk P (2007) Knowledge management in policing and law enforcement. Oxford University Press, Oxford/New York
Drogin B (2008) Curveball. Ebury Press, London
Europol (2009) TE-SAT 2009: EU terrorism situation and trend report. Europol, The Hague, Netherlands
Europol (2010) TE-SAT 2010: EU terrorism situation and trend report. Europol, The Hague, Netherlands
Europol (2011) TE-SAT 2011: EU terrorism situation and trend report. Europol, The Hague, Netherlands
Gloor PA, Zhao Y (2006) Analyzing actors and their discussion topics by semantic social network analysis. In: Proceedings of information visualization. IEEE Computer Society. Washington, DC, pp 130–135
Hauck RV, Chau M, Chen H (2002) Coplink: arming law enforcement with new knowledge management technologies. In: Advances in digital government: technology, human factors, and policy. Kluwer, Boston, pp 163–179
Hoffman B (2006) Inside terrorism. Columbia University Press, New York, NY
Hu PJH, Chen H, Hu H, Larson C, Butierez C (2011) Law enforcement officers’ acceptance of advanced e-government technology: a survey study of coplink mobile. Electron Commer Res Appl 10:6–16
Hu PJH, Lin C, Chen H (2005) User acceptance of intelligence and security informatics technology: a study of coplink. Am Soc Inf Sci Technol 56:235–244
Huntington SP (1996) The clash of civilizations and the remaking of world order. Simon & Schuster, New York
i2 limited, analyst’s notebook (2012) http://www.i2group.com/
Intelligence and Security Committee, United Kingdom (2009) Could 7/7 have been prevented? Review of the intelligence on the London terrorist attacks on 7 July 2005
Irons LR. (2008) Recent patterns of terrorism prevention in the united kingdom. Homel Secur Aff 28:1–19
Kebbell MR, Muller DA, Martin K (2010) Understanding and managing bias. Dealing with uncertainties in policing serious crime. ANU E Press, Canberra, pp 87–97
Laville S (2012) Al-Qaida-inspired plotters planned attacks on high-profile London targets. The Guardian (online), London
Levy BH. (2003) Who killed Daniel Pearl? Melville, Brooklyn, NY
Linschoten AS, Kuehn F (2012) An enemy we created: the myth of the Taliban/Al-Qaeda merger in Afghanistan:1970–2010. Hurst, London
MacDougall I (2012) Norway ‘bomb plot’ highlights al-Qaida problems. Associated Press, New York City, NY
MacKensie J (2010) The battle for aghanistan: militancy and conflict in helmand. New America Foundation, Washington, DC
McBride M, Morgan S (2010) Trust calibration for automated decision aids, Institute for Homeland Security Solutions, Durham, NC
National Commission on Terrorist Attacks upon the United States, United States (2004) The 9/11 Commission report (executive summary). http://www.9-11commission.gov/report/911Report_Exec.pdf
Nesser P (2006) Structures of jihadist terrorist cells in the uk and europe. In: Proceedings of the joint FFI/King’s college conference on “the changing faces of jihadism”, It is actually a presentation, not proceedings authors notes. Kings College, London
Palantir (2012) http://www.palantirtech.com/government
Pearl M (2004) A mighty heart. Virago, London
Petersen RR, Rhodes CJ, Wiil UK (2011) Node removal in criminal networks. In: Proceedings of European intelligence and security informatics conference. IEEE, Washington, DC, pp 360–365
Petersen RR, Wiil UK (2011) Crimefighter investigator: a novel tool for criminal network investigation. In: Proceedings of European intelligence and security informatics conference. IEEE, Washington, DC, pp 360–365
Petersen RR, Wiil UK (2011) Hypertext structures for investigative teams. In: Proceedings of the 22nd ACM conference on hypertext. ACM, New York, NY, pp 123–132
Pioch NJ, Everett JO. (2006) Polestar: collaborative knowledge management and sensemaking tools for intelligence analysts. In: Proceedings of the international conference on information and knowledge management. ACM, pp 513–521
Rhodes C (2011) The use of open source intelligence in the construction of covert social networks. In: Wiil UK (ed) Counterterrorism and open source intelligence. Lecture notes in social networks (LNSN 2). Springer, Wien, pp 159–170
Rhodes CJ, Jones P (2009) Inferring missing links in partially observed social networks. J Oper Res Soc 60(10):1373–1383
Rhodes CJ, Keefe CMJ (2007) Social network topology: a bayesian approach. J Oper Res Soc 58(12):1605–1611
Sageman M (2004) Understanding terrorist networks. PENN, Philadelphia, PA
Sageman M (2008) Leaderless jihad. PENN, Philadelphia, PA
Saunders-Newton D, Scott H (2001) “but the computer said!”: credible uses of computational modeling in public sector decision making. Soc Sci Comput Rev 19:47–65
Security D, (PET), I.S. (undated) Terror arrests in Copenhagen. http://www.pet.dk/Nyheder/morkhoj-uk.aspx
Shrinivasan YB, Wijk JJ (2008) Supporting the analytical reasoning process in information visualization. In: Proceedings of the 26th conference on human factors in computing systems. ACM, New York, NY
Silber MD, Bhatt A (2007) Radicalisation in the west: the homegrown threat. NYPD, New York, NY
Skjoldager M (2009) Truslen indefra: de danske terrorister. Lindhardt & Ringhof, Copenhagen, Denmark
Smith EA. (2006) Complexity, networking, & effects-based approaches to operations. CCRP, Washington, DC
Sparrow MK. (1991) The application of network analysis to criminal intelligence: An assessment of the prospects. Soc Netw 13:251–274
Stoll C (1995) Silicon snake oil: second thoughts on the information highway, Doubleday. New York, NY
Taarnby M (2006) Jihad in Denmark: an overview and analysis of jihadi activity in denmark 1990–2006. Danish institute for international studies, DIIS. Copenhagen, Denmark
Todd BF, Nomani A (2011) The truth left behind: inside the kidnapping and murder of Daniel Pearl. The Pearl Project, Georgetown University
N/A (2012) London terror bomb plot: the four terrorists. The Telegraph (online), London
Veldhuis T, Staun J (2009) Islamist radicalisation: a root cause model. Institute of International Relations, The Hague, Netherlands
Vidino L (2005) Al Qaeda in Europe: the new battleground of international jihad. Prometheus Books, Amherst, NY
Vidino L (2011) Radicalization, linkage, and diversity: current trends in terrorism in Europe, RAND Corporation. Santa Monica, CA and Arlington, VA and Pittsburgh, PA
Vogel KM. (2008) ‘iraqi winnebagosTM of death’: imagined and realized futures of us bioweapons threat assessment. Sci Public Policy 35:561–573
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press. Cambridge, United Kingdom
Wegner P (1997) Why interaction is more powerful than algorithms. Commun ACM 40:80–91
Weiman G (2010) Terror on facebook, twitter, and youtube. Brown J World Aff 16:45–54
Weiner T (2008) Legacy of ashes: the history of the cIA. Anchor Books, New York, NY
Wiil UK, Gniadek J, Memon N (2010) Measuring link importance in terrorist networks. In: proceedings of the international conference on advances in social networks analysis and mining. IEEE, Washington, DC, pp 225–232
Wiil UK, Gniadek J, Memon N, Petersen RR. (2011) Knowledge management tools for terrorist network analysis. In: Knowledge discovery, knowledge engineering and knowledge management. Lecture notes in communications in computer and information science (LNCCIS). Springer, Wien
Wiil UK, Memon N, Gniadek J (2011) Crimefighter: a toolbox for counterterrorism. Lecture notes in communications in computer and information science (knowledge discovery, knowledge engineering and knowledge management), Springer Berlin Heidelberg, vol 128. pp 337–350
Wilson C (updated 2010) Searching for saddam: a five-part series on how the u.s. military used social networking to capture the iraqi dictator. http://www.slate.com/articles/news_and_politics/searching_for_saddam/2010/02/searching_for_saddam_5.single.html
Woo G (2009) Intelligence constraints on terrorist network plots. In: Memon N, Farley JD, Hicks DL, Rosenorn T (eds) Mathematical methods in counterterrorism. Springer, Wien, pp 205–214
Wright W, Schroh D, Proulx P, Skaburskis A, Cort B (2006) The sandbox for analysis: concepts and methods. In: Proceedings of the conference on human factors in computing systems. ACM, New York, NY, pp 801–810
Xanalys (2012) http://www.xanalys.com/
Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6): 100–107
Yalcinkaya R (2007) Police officers’ adoption of information technology: a case study of the turkish polnet system. Ph.D. thesis, University of North Texas
Youtube (2012) General colin powell un speech on iraq part 1 of 5. http://www.youtube.com/watch?v=Nt5RZ6ukbNc. Last visited on February 19th 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Petersen, R.R., Wiil, U.K. (2013). CrimeFighter Investigator: Criminal Network Sense-Making. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_16
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5311-6_16
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5310-9
Online ISBN: 978-1-4614-5311-6
eBook Packages: Computer ScienceComputer Science (R0)