Analysis of Weak Signals for Detecting Lone Wolf Terrorists

Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kind of terrorists before they commit a terror act is limited since they are very hard to detect using traditional methods. However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge to plan an attack. Therefore, there is a good possibility that they leave digital traces in the form of weak signals that can be gathered, fused, and analyzed. In this work we present an analysis method that can be used to analyze extremist forums to profile possible lone wolf terrorists. This method is conceptually demonstrated using the FOI Impactorium fusion platform. We also present a number of different technologies that can be used to harvest and analyze information from Internet, serving as weak digital traces that can be fused using the suggested analysis method, in order to discover possible lone wolf terrorists.

[1]  Sangkyum Kim,et al.  Authorship classification: a syntactic tree mining approach , 2010, UP '10.

[2]  Hsinchun Chen,et al.  Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism , 2004, ISI.

[3]  Peter Berggren,et al.  Swedish-Singapore studies of Bayesian modelling techniques for tactical intelligence analysis , 2010, 2010 13th International Conference on Information Fusion.

[4]  Marcia Fissette Author Identifcation in Short Texts , 2010 .

[5]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[6]  Ramon Spaaij,et al.  The Enigma of Lone Wolf Terrorism: An Assessment , 2010 .

[7]  Ahmed Abbasi,et al.  Affect Intensity Analysis of Dark Web Forums , 2007, 2007 IEEE Intelligence and Security Informatics.

[8]  Monika Henzinger,et al.  Hyperlink Analysis for the Web , 2001, IEEE Internet Comput..

[9]  Hsinchun Chen,et al.  Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security , 2008 .

[10]  Carl J. Ungerer,et al.  Countering internet radicalisation in Southeast Asia , 2009 .

[11]  Peter J. Phillips,et al.  Lone Wolf Terrorism , 2010 .

[12]  Lisa Kaati,et al.  Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist , 2011, 2011 European Intelligence and Security Informatics Conference.

[13]  Lisa Kaati,et al.  Development of Computerized Support Tools for Intelligence Work , 2009 .

[14]  Joseph Migga Kizza,et al.  Discovering topics from dark websites , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[15]  Martin Bouchard,et al.  Strategies to Disrupt Online Child Pornography Networks , 2011, 2011 European Intelligence and Security Informatics Conference.

[16]  Lisa Kaati,et al.  Social positions and simulation relations , 2011, Social Network Analysis and Mining.

[17]  Marc Sageman,et al.  Leaderless Jihad , 2011 .

[18]  William E. Winkler,et al.  String Comparator Metrics and Enhanced Decision Rules in the Fellegi-Sunter Model of Record Linkage. , 1990 .

[19]  Lisa Kaati,et al.  An overview of the Impactorium tools 2008 , 2008 .

[20]  Phyllis B. Gerstenfeld,et al.  Hate Online: A Content Analysis of Extremist Internet Sites , 2003 .

[21]  John Scott Social Network Analysis , 1988 .