CrimeFighter: A Toolbox for Counterterrorism

Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorist attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow for the extraction of network knowledge from terrorist information. This paper presents the latest work on the CrimeFighter toolbox for counterterrorism. The toolbox is designed based on past experiences working with investigative data mining, mathematical modeling, social network analysis, graph theory, link analysis, knowledge management, and hypertext. CrimeFighter consists of a knowledge base and a set of tools that each support different activities in criminal investigation work: data acquisition tools supporting web harvesting, knowledge structuring tools supporting information analysis, explorer tools for searching and exploring the knowledge base, algorithms for data mining, algorithms for visualization, algorithms for social network analysis, etc.

[1]  Uffe Kock Wiil,et al.  Knowledge Management Processes, Tools and Techniques for Counterterrorism , 2009, KMIS.

[2]  David V. Canter,et al.  Prioritizing Burglars: Comparing the Effectiveness of Geographical Profiling Methods , 2007 .

[3]  Lisa Tompson,et al.  Crime Mapping Case Studies: Practice and Research , 2008 .

[4]  Claus Atzenbeck,et al.  Supporting reasoning and communication for intelligence officers , 2011, Int. J. Netw. Virtual Organisations.

[5]  Gabriele Suder,et al.  Corporate Strategies under International Terrorism and Adversity , 2006 .

[6]  Mason A. Carpenter,et al.  Social Network Theory and Methods as Tools for Helping Business Confront Global Terrorism: Capturing the Case and Contingencies Presented by Dark Social Networks , 2006 .

[7]  Jennifer Xu,et al.  Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs , 2008 .

[8]  James J. Thomas,et al.  Defining Insight for Visual Analytics , 2009, IEEE Computer Graphics and Applications.

[9]  Yan Zhao,et al.  Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis , 2006, Tenth International Conference on Information Visualisation (IV'06).

[10]  Frank M. Shipman,et al.  The visual knowledge builder: a second generation spatial hypertext , 2001, HYPERTEXT '01.

[11]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[12]  Uffe Kock Wiil,et al.  Asap: a planning tool for agile software development , 2008, HT '08.

[13]  Keith Devlin,et al.  The Numbers Behind NUMB3RS: Solving Crime with Mathematics , 2007 .

[14]  Torsten Suel,et al.  Design and implementation of a high-performance distributed Web crawler , 2002, Proceedings 18th International Conference on Data Engineering.

[15]  Ben Shneiderman,et al.  Balancing Systematic and Flexible Exploration of Social Networks , 2006, IEEE Transactions on Visualization and Computer Graphics.

[16]  Douglas C. Engelbart,et al.  Augmenting human intellect: a conceptual framework , 1962 .

[17]  François Fages,et al.  Principles and Practice of Semantic Web Reasoning, Third International Workshop, PPSWR 2005, Dagstuhl Castle, Germany, September 11-16, 2005, Proceedings , 2005, PPSWR.

[18]  Ryan Hafen,et al.  Generating Synthetic Syndromic-Surveillance Data for Evaluating Visual-Analytics Techniques , 2009, IEEE Computer Graphics and Applications.

[19]  D. Kim Rossmo,et al.  Geographic Profiling Analysis: Principles, Methods and Applications , 2008 .

[20]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[21]  D. Kim Rossmo,et al.  Geographic profiling applied to testing models of bumble-bee foraging , 2008, Journal of The Royal Society Interface.

[22]  Daniel Zeng,et al.  Syndromic surveillance systems , 2008, Annual Review of Information Science and Technology.

[23]  Nasrullah Memon Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks , 2007 .

[24]  Danah Boyd,et al.  Vizster: visualizing online social networks , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..

[25]  Hsinchun Chen,et al.  Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security , 2008 .

[26]  Claus Atzenbeck,et al.  Harvesting covert networks: a case study of the iMiner database , 2011, Int. J. Netw. Virtual Organisations.

[27]  Georg Lausen,et al.  Information Gathering in a Dynamic World , 2006, PPSWR.

[28]  Craig Bennell,et al.  Geographic Profiling of Terrorist Attacks , 2008 .

[29]  Richard N Kocsis,et al.  Criminal profiling : international theory, research and practice , 2007 .

[30]  John T. Stasko,et al.  Jigsaw: Supporting Investigative Analysis through Interactive Visualization , 2007, 2007 IEEE Symposium on Visual Analytics Science and Technology.

[31]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[32]  Mohammed Badrul Alam,et al.  Perceptions of Japanese students on terrorism and other security problems: Initial results from a pilot study , 2003 .