CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation

AbstractCriminal network investigation involves a number of complex tasks and problems. Overall tasks include collection, processing, and analysis of information, in which analysis is the key to successful use of information since it transforms raw data into intelligence. Analysts have to deal with problems such as information volume and complexity which are typically resolved with more resources. This approach together with sequential thinking introduces compartmentalization, inhibits information sharing, and ultimately results in intelligence failure. We view analysis as an iterative and incremental process of creative synthesis and logic-based sense-making where all stakeholders participate and contribute. This paper presents a novel tool that supports a human-centered, target-centric model for criminal network investigation. The developed tool provides more comprehensive support for analysis tasks than existing tools and measures of performance indicate that the integration of synthesis and sense-making is feasible.

[1]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[2]  Stuart K. Card,et al.  Principles and Tools for Collaborative Entity-Based Intelligence Analysis , 2010, IEEE Transactions on Visualization and Computer Graphics.

[3]  Kenton O'Hara,et al.  Social Impact , 2019, Encyclopedia of Food and Agricultural Ethics.

[4]  V. S. Subrahmanian,et al.  Handbook of Computational Approaches to Counterterrorism , 2013, Springer New York.

[5]  B. Lévy,et al.  Who killed Daniel Pearl , 2003 .

[6]  C. J. Rhodes,et al.  Social network topology: a Bayesian approach , 2007, J. Oper. Res. Soc..

[7]  Claus Atzenbeck,et al.  Supporting reasoning and communication for intelligence officers , 2011, Int. J. Netw. Virtual Organisations.

[8]  Merrick E. Krause,et al.  The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States , 2004 .

[9]  Uffe Kock Wiil,et al.  CrimeFighter: A Toolbox for Counterterrorism , 2009, IC3K.

[10]  David L. Hicks,et al.  Mathematical Methods in Counterterrorism , 2009 .

[11]  Richard Adderley,et al.  Police crime recording and investigation systems – A user’s view , 2001 .

[12]  Andreas Tolk,et al.  NATO Code of Best Practice for C2 Assessment - Implications for SISO , 2002 .

[13]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[14]  Johanna D. Moore,et al.  Proceedings of the Conference on Human Factors in Computing Systems , 1989 .

[15]  Tim Weiner,et al.  Legacy of Ashes: The History of the CIA , 2007 .

[16]  Uffe Kock Wiil,et al.  CrimeFighter Investigator: Criminal Network Sense-Making , 2013 .

[17]  Uffe Kock Wiil,et al.  Hypertext structures for investigative teams , 2011, HT '11.

[18]  Petter Gottschalk,et al.  Knowledge management in policing and law enforcement : foundations, structures, applications , 2007 .

[19]  Petter Gottschalk,et al.  Knowledge Management in Policing and Law Enforcement , 2007 .

[20]  Christine Merlino,et al.  A Mighty Heart , 2007 .

[21]  Nicholas J. Pioch,et al.  POLESTAR: collaborative knowledge management and sensemaking tools for intelligence analysts , 2006, CIKM '06.

[22]  Graham J Hole,et al.  How to Design and Report Experiments , 2002 .

[23]  Michael L. Begeman,et al.  gIBIS: a hypertext tool for exploratory policy discussion , 1988, CSCW '88.

[24]  J. Frey The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .

[25]  Mark Bernstein The Tinderbox Way , 2007 .

[26]  P. Jones,et al.  Inferring missing links in partially observed social networks , 2009, J. Oper. Res. Soc..

[27]  Robert M. Clark,et al.  Intelligence Analysis: A Target-Centric Approach , 2003 .

[28]  Gordon Woo,et al.  Intelligence Constraints on Terrorist Network Plots , 2009 .

[29]  Frank L. Greitzer,et al.  Top Ten Needs for Intelligence Analysis Tool Development , 2005 .

[30]  Alexander W. Skaburskis,et al.  The Sandbox for analysis: concepts and methods , 2006, CHI.

[31]  Jarke J. van Wijk,et al.  Supporting the analytical reasoning process in information visualization , 2008, CHI.

[32]  Uffe Kock Wiil,et al.  Node Removal in Criminal Networks , 2011, 2011 European Intelligence and Security Informatics Conference.

[33]  Uffe Kock Wiil,et al.  CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation , 2011, 2011 European Intelligence and Security Informatics Conference.