Investigative data mining and its application in counterterrorism

It is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at extracting knowledge form data, mining for investigative analysis, called Investigative Data Mining (IDM), aims at discovering hidden instances of patterns of interest, such as patterns indicating an organized crime activity. An important problem targeted by IDM is identification of terror/crime networks, based on available intelligence and other information. We present an approach to an IDM solution of this problem, using semantic link analysis and visualization of findings. The approach is demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, and funds transfer, etc. The findings are represented by a network in the form of an attributed relational graph. Paths from a node to any other node in the network indicate the relationships between individuals and organizations. The system also provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will likely destabilize the terrorist network.

[1]  Homa Atabakhsh,et al.  MANAGING LAW ENFORCEMENT DATA AND KNOWLEDGE , 2003 .

[2]  Ted E. Senator,et al.  Restructuring Databases for Knowledge Discovery by Consolidation and Link Formation , 1995, KDD.

[3]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[4]  Douglas H. Harris,et al.  The Application of Link Analysis to Police Intelligence , 1975 .

[5]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[6]  Paul R. Pillar Counterterrorism after Al Qaeda , 2004 .

[7]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[8]  Sherry Marcus,et al.  Graph-based technologies for intelligence analysis , 2004, CACM.

[9]  C. Lawrence The Social Psychology of Crime: Groups, Teams and Networks , 2000 .

[10]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[11]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[12]  Nasrullah Memon,et al.  Investigative Data Mining: A General Framework , 2004, International Conference on Computational Intelligence.

[13]  Hsinchun Chen,et al.  COPLINK: managing law enforcement data and knowledge , 2003, CACM.

[14]  Jeffrey Heer,et al.  prefuse: a toolkit for interactive information visualization , 2005, CHI.

[15]  D. Ruppert The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .

[16]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[17]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .