Skip to main content

CrimeFighter: A Toolbox for Counterterrorism

  • Conference paper
Knowledge Discovery, Knowlege Engineering and Knowledge Management (IC3K 2009)

Abstract

Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorist attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow for the extraction of network knowledge from terrorist information. This paper presents the latest work on the CrimeFighter toolbox for counterterrorism. The toolbox is designed based on past experiences working with investigative data mining, mathematical modeling, social network analysis, graph theory, link analysis, knowledge management, and hypertext. CrimeFighter consists of a knowledge base and a set of tools that each support different activities in criminal investigation work: data acquisition tools supporting web harvesting, knowledge structuring tools supporting information analysis, explorer tools for searching and exploring the knowledge base, algorithms for data mining, algorithms for visualization, algorithms for social network analysis, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds.): Terrorism Informatics. Knowledge Management and Data Mining for Homeland Security. Springer, Heidelberg (2008)

    Google Scholar 

  2. Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting Covert Networks: The Case Study of the iMiner Database. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). Inderscience Publishers (2010)

    Google Scholar 

  3. Petersen, R.R., Wiil, U.K.: ASAP: A Planning Tool for Agile Software Development. In: Proc. of the ACM Hypertext Conference, pp. 27–32. ACM Press, New York (2008)

    Google Scholar 

  4. Henriksen, K., Sørensen, M.: Design and Implementation of a Focused Web Crawler for use in Web Harvesting for Counterterrorism Planning Purposes. Project report. University of Southern Denmark (2009)

    Google Scholar 

  5. Knudsen, M.: Dynamic Web Harvesting Using RSS Feeds. Project report. University of Southern Denmark (2009)

    Google Scholar 

  6. Dasho, E., Puszczewicz, R.: Tools and Techniques for Counterterrorism: Web Mining and Social Network Analysis in Blogs. Project report. University of Southern Denmark (2009)

    Google Scholar 

  7. Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann, Butterworths (2003)

    Google Scholar 

  8. Devlin, K., Lorden, G.: The Numbers Behind NUMB3RS: Solving Crime with Mathematics. Plume (2007)

    Google Scholar 

  9. Alam, M.B.: Perceptions of Japanese Students on Terrorism. Strategic Analysis 27(2), 279–291 (2003)

    Article  Google Scholar 

  10. Carpenter, M.A., Stajkovic, A.D.: Social network theory and methods as tools for helping business confront global terrorism: Capturing the case and contingencies presented by dark social networks. Corporate strategies under international terrorism and adversity. Edward Elgar Publishing (2006)

    Google Scholar 

  11. Raine, N.E., Rossmo, D.K., Comber, S.C.: Geographic profiling applied to testing models of bumble-bee foraging. J. R. Soc. Interface 6, 307–319 (2009)

    Article  Google Scholar 

  12. Rossmo, D.K., Velarde, L.: Geographic profiling analysis: principles, methods, and applications. In: Crime Mapping Case Studies: Practice and Research, pp. 35–43. Wiley, Chichester (2008)

    Google Scholar 

  13. Bennell, C., Corey, S.: Geographic profiling of terrorist attacks. In: Criminal Profiling: International Theory, Research and Practice, pp. 189–203. Humana Press, Totowa (2007)

    Google Scholar 

  14. Canter, D.V., Hammond, L.: Prioritizing burglars: comparing the effectiveness of geographic profiling methods. Police Pract. Res. 8, 371–384 (2007)

    Article  Google Scholar 

  15. Maciejewski, R., Hafen, R., Rudolph, S., Tebbetts, G., Cleveland, W.S., Grannis, S.J., Ebert, D.S.: Generating Synthetic Syndromic-Surveillance Data for Evaluating Visual - Analytics Techniques. IEEE Computer Graphics and Applications 29(3), 18–28 (2009)

    Article  Google Scholar 

  16. Yan, P., Chen, H., Zeng, D.: Syndromic Surveillance Systems: Public Health and Bio-defence. Annual Review of Information Science and Technology (ARIST) 41, 425–495 (2007)

    Google Scholar 

  17. Engelbart, D.C.: Augmenting human intellect: A conceptual framework, Summary Report AFOSR-3233, Standford Research Institute (1962)

    Google Scholar 

  18. Shipman, F.M., Hsieh, H., Maloor, P., Moore, J.M.: The Visual Knowledge Builder: A Second Generation Spatial Hypertext. In: Proc. of the ACM Hypertext Conference, pp. 113–122. ACM Press, New York (2001)

    Google Scholar 

  19. Thomas, J., Cook, K.: A Visual Analytics Agenda. IEEE Computer Graphics and Applications 26(1), 10–13 (2006)

    Article  Google Scholar 

  20. Heer, J., Boyd, D.: Vizster: Visualizing Online Social Networks. In: Proc. of the IEEE Symposium on Information Visualization (InfoVis 2005) (2005)

    Google Scholar 

  21. Adam, P., Shneiderman, B.: Balancing Systematic and Flexible Exploration of Social Networks. IEEE Transactions on Visualization and Computer Graphics 12(5), 693–700 (2006)

    Article  Google Scholar 

  22. Xu, J., Chen, H.: CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems 23(2), 201–226 (2005)

    Article  Google Scholar 

  23. Stasko, J., Gorg, C., Liu, Z., Singhal, K.: Jigsaw: Supporting Investigative Analysis through Interactive Visualization. In: Proc. of the IEEE Symposium on Visual Analytics Science and Technology, pp. 131–138 (2007)

    Google Scholar 

  24. Atzenbeck, C., Hicks, D.L., Memon, N.: Supporting Reasoning and Communication for Intelligence Officers. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). Inderscience Publishers (2010)

    Google Scholar 

  25. Shkapenyuk, V., Suel, T.: Design and Implementation of a High-Performance Distributed Web Crawler. In: Proceedings of 18th International Conference on Data Engineering, San Jose, CA, February, pp. 357–368. IEEE Computer Society, Los Alamitos (February 2002)

    Chapter  Google Scholar 

  26. Hornung, T., Simon, K., Lausen, G.: Information Gathering in a Dynamic World. In: Alferes, J.J., Bailey, J., May, W., Schwertel, U. (eds.) PPSWR 2006. LNCS, vol. 4187, pp. 237–241. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  27. Chau, M., Xu, J.: Using Web Mining and Social Network Analysis to Study the Emergence of Cyber Communities in Blogs. In: Terrorism Informatics, Knowledge Management and Data Mining for Homeland Security, pp. 473–494. Springer, Heidelberg (2008)

    Google Scholar 

  28. Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)

    Google Scholar 

  29. Gloor, P.A., Zhao, Y.: Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis. In: Information Visualization. IV, pp. 130–135 (2006)

    Google Scholar 

  30. Memon, N.: Investigative Data Mining: Mathematical Models of Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. Dissertation, Aalborg University, Denmark (2007)

    Google Scholar 

  31. Wiil, U.K.: Memon, Nasrullah, and Gniadek, Jolanta. 2009. Knowledge Management Processes, Tools and Techniques for Counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing (KMIS 2009), Funchal, Portugal, pp. 29–36. INSTICC Press (October 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wiil, U.K., Memon, N., Gniadek, J. (2011). CrimeFighter: A Toolbox for Counterterrorism. In: Fred, A., Dietz, J.L.G., Liu, K., Filipe, J. (eds) Knowledge Discovery, Knowlege Engineering and Knowledge Management. IC3K 2009. Communications in Computer and Information Science, vol 128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19032-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19032-2_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19031-5

  • Online ISBN: 978-3-642-19032-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics