In this paper we examine the latest thinking, approaches and methodologies in use for finding the nuggets of information and subliminal (and perhaps intentionally hidden) patterns and associations that are critical to identify criminal activity and suspects to private and government security agencies. An emphasis in the paper is placed on Social Network Analysis and Investigative Data Mining, and the use of these technologies in the counterterrorism domain. Tools and techniques from both areas are described, along with the important tasks for which they can be used to assist with the investigation and analysis of terrorist organizations. The process of collecting data about these organizations is also considered along with the inherent difficulties that are involved.
|Journal||Progress in Biomedical Optics and Imaging|
|Publication status||Published - 2008|
|Event||International Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008 - Orlando, FL, United States|
Duration: 16 Mar 2008 → 20 Mar 2008
|Conference||International Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008|
|Period||16/03/2008 → 20/03/2008|