Abstract
Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorist attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow for the extraction of network knowledge from terrorist information. This paper presents the latest work on the CrimeFighter toolbox for counterterrorism. The toolbox is designed based on past experiences working with investigative data mining, mathematical modeling, social network analysis, graph theory, link analysis, knowledge management, and hypertext. CrimeFighter consists of a knowledge base and a set of tools that each support different activities in criminal investigation work: data acquisition tools supporting web harvesting, knowledge structuring tools supporting information analysis, explorer tools for searching and exploring the knowledge base, algorithms for data mining, algorithms for visualization, algorithms for social network analysis, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds.): Terrorism Informatics. Knowledge Management and Data Mining for Homeland Security. Springer, Heidelberg (2008)
Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting Covert Networks: The Case Study of the iMiner Database. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). Inderscience Publishers (2010)
Petersen, R.R., Wiil, U.K.: ASAP: A Planning Tool for Agile Software Development. In: Proc. of the ACM Hypertext Conference, pp. 27–32. ACM Press, New York (2008)
Henriksen, K., Sørensen, M.: Design and Implementation of a Focused Web Crawler for use in Web Harvesting for Counterterrorism Planning Purposes. Project report. University of Southern Denmark (2009)
Knudsen, M.: Dynamic Web Harvesting Using RSS Feeds. Project report. University of Southern Denmark (2009)
Dasho, E., Puszczewicz, R.: Tools and Techniques for Counterterrorism: Web Mining and Social Network Analysis in Blogs. Project report. University of Southern Denmark (2009)
Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann, Butterworths (2003)
Devlin, K., Lorden, G.: The Numbers Behind NUMB3RS: Solving Crime with Mathematics. Plume (2007)
Alam, M.B.: Perceptions of Japanese Students on Terrorism. Strategic Analysis 27(2), 279–291 (2003)
Carpenter, M.A., Stajkovic, A.D.: Social network theory and methods as tools for helping business confront global terrorism: Capturing the case and contingencies presented by dark social networks. Corporate strategies under international terrorism and adversity. Edward Elgar Publishing (2006)
Raine, N.E., Rossmo, D.K., Comber, S.C.: Geographic profiling applied to testing models of bumble-bee foraging. J. R. Soc. Interface 6, 307–319 (2009)
Rossmo, D.K., Velarde, L.: Geographic profiling analysis: principles, methods, and applications. In: Crime Mapping Case Studies: Practice and Research, pp. 35–43. Wiley, Chichester (2008)
Bennell, C., Corey, S.: Geographic profiling of terrorist attacks. In: Criminal Profiling: International Theory, Research and Practice, pp. 189–203. Humana Press, Totowa (2007)
Canter, D.V., Hammond, L.: Prioritizing burglars: comparing the effectiveness of geographic profiling methods. Police Pract. Res. 8, 371–384 (2007)
Maciejewski, R., Hafen, R., Rudolph, S., Tebbetts, G., Cleveland, W.S., Grannis, S.J., Ebert, D.S.: Generating Synthetic Syndromic-Surveillance Data for Evaluating Visual - Analytics Techniques. IEEE Computer Graphics and Applications 29(3), 18–28 (2009)
Yan, P., Chen, H., Zeng, D.: Syndromic Surveillance Systems: Public Health and Bio-defence. Annual Review of Information Science and Technology (ARIST) 41, 425–495 (2007)
Engelbart, D.C.: Augmenting human intellect: A conceptual framework, Summary Report AFOSR-3233, Standford Research Institute (1962)
Shipman, F.M., Hsieh, H., Maloor, P., Moore, J.M.: The Visual Knowledge Builder: A Second Generation Spatial Hypertext. In: Proc. of the ACM Hypertext Conference, pp. 113–122. ACM Press, New York (2001)
Thomas, J., Cook, K.: A Visual Analytics Agenda. IEEE Computer Graphics and Applications 26(1), 10–13 (2006)
Heer, J., Boyd, D.: Vizster: Visualizing Online Social Networks. In: Proc. of the IEEE Symposium on Information Visualization (InfoVis 2005) (2005)
Adam, P., Shneiderman, B.: Balancing Systematic and Flexible Exploration of Social Networks. IEEE Transactions on Visualization and Computer Graphics 12(5), 693–700 (2006)
Xu, J., Chen, H.: CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems 23(2), 201–226 (2005)
Stasko, J., Gorg, C., Liu, Z., Singhal, K.: Jigsaw: Supporting Investigative Analysis through Interactive Visualization. In: Proc. of the IEEE Symposium on Visual Analytics Science and Technology, pp. 131–138 (2007)
Atzenbeck, C., Hicks, D.L., Memon, N.: Supporting Reasoning and Communication for Intelligence Officers. Accepted for the International Journal of Networking and Virtual Organizations (IJNVO). Inderscience Publishers (2010)
Shkapenyuk, V., Suel, T.: Design and Implementation of a High-Performance Distributed Web Crawler. In: Proceedings of 18th International Conference on Data Engineering, San Jose, CA, February, pp. 357–368. IEEE Computer Society, Los Alamitos (February 2002)
Hornung, T., Simon, K., Lausen, G.: Information Gathering in a Dynamic World. In: Alferes, J.J., Bailey, J., May, W., Schwertel, U. (eds.) PPSWR 2006. LNCS, vol. 4187, pp. 237–241. Springer, Heidelberg (2006)
Chau, M., Xu, J.: Using Web Mining and Social Network Analysis to Study the Emergence of Cyber Communities in Blogs. In: Terrorism Informatics, Knowledge Management and Data Mining for Homeland Security, pp. 473–494. Springer, Heidelberg (2008)
Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)
Gloor, P.A., Zhao, Y.: Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis. In: Information Visualization. IV, pp. 130–135 (2006)
Memon, N.: Investigative Data Mining: Mathematical Models of Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. Dissertation, Aalborg University, Denmark (2007)
Wiil, U.K.: Memon, Nasrullah, and Gniadek, Jolanta. 2009. Knowledge Management Processes, Tools and Techniques for Counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing (KMIS 2009), Funchal, Portugal, pp. 29–36. INSTICC Press (October 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wiil, U.K., Memon, N., Gniadek, J. (2011). CrimeFighter: A Toolbox for Counterterrorism. In: Fred, A., Dietz, J.L.G., Liu, K., Filipe, J. (eds) Knowledge Discovery, Knowlege Engineering and Knowledge Management. IC3K 2009. Communications in Computer and Information Science, vol 128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19032-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-19032-2_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19031-5
Online ISBN: 978-3-642-19032-2
eBook Packages: Computer ScienceComputer Science (R0)