Computational Methods for Counterterrorism

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governments and militaries work to devise new policies and doctrines to combat terror, new technologies are desperately needed to make these efforts effective.

This book collects a wide range of the most current computational research addressing critical issues for counterterrorism in a dynamic and complex threat environment:

  • finding, summarizing, and evaluating relevant information from large and dynamic data stores;
  • simulation and prediction of likely enemy actions and the effects of proposed counter-efforts; and
  • producing actionable intelligence by finding meaningful patterns hidden in masses of noisy data items.

The contributions are organized thematically into four sections. The first section concerns efforts to provide effective access to small amounts of relevant information buried in enormous amounts of diverse unstructured data. The second section discusses methods for the key problem of extracting meaningful information from digitized documents in various languages. The third section presents research on analyzing graphs and networks, offering new ways of discovering hidden structures in data and profiles of adversaries’ goals and intentions. Finally, the fourth section of the book describes software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts.

The models and methods discussed in this book are invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies based on new technologies, and for academic and industrial researchers devising more effective methods for knowledge discovery in complicated and diverse datasets.

Author(s): Ophir Frieder (auth.), Shlomo Argamon, Newton Howard (eds.)
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 306
City: Dordrecht; New York
Tags: Data Mining and Knowledge Discovery; Systems and Data Security; Criminology & Criminal Justice; Document Preparation and Text Processing; Information Storage and Retrieval; Computers and Society

Front Matter....Pages i-xvi
Front Matter....Pages 1-1
On Searching in the “Real World”....Pages 3-16
Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields....Pages 17-32
What Makes a Good Summary?....Pages 33-50
A Prototype Search Toolkit....Pages 51-64
Front Matter....Pages 65-65
Unapparent Information Revelation: Text Mining for Counterterrorism....Pages 67-87
Identification of Sensitive Unclassified Information....Pages 89-108
Rich Language Analysis for Counterterrorism....Pages 109-120
Front Matter....Pages 121-121
Dicliques: Finding Needles in Haystacks....Pages 123-142
Information Superiority via Formal Concept Analysis....Pages 143-171
Reflexive Analysis of Groups....Pages 173-210
Evaluating Self-Reflexion Analysis Using Repertory Grids....Pages 211-225
Front Matter....Pages 227-227
Anticipating Terrorist Safe Havens from Instability Induced Conflict....Pages 229-248
Applied Counterfactual Reasoning....Pages 249-262
Adversarial Planning in Networks....Pages 263-274
Gaming and Simulating Ethno-Political Conflicts....Pages 275-301
Back Matter....Pages 1-4