Title :
Notice of Violation of IEEE Publication Principles
Harvesting Terrorists Information from Web
Author :
Memon, Nasrullah ; Hicks, David L. ; Larsen, Henrik Legind
Author_Institution :
Aalborg Univ., Esbjerg
Abstract :
Data collection is difficult to do in any network analysis because it is hard to create a complete network. It is not easy to gain information on terrorist networks. It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data [1]. Very few researchers [2] [3] [4] collected data from open sources, and to the best of our knowledge, no knowledge base is available in academia for the analysis of the terrorist events. To counter the information scarcity, we at Software Intelligence Security Research Center, Aalborg University Esbjerg Denmark, designed and developed a terrorism knowledge base by harvesting information from authenticated websites. In this paper we discuss data collection and analysis results of our ongoing research of investigative data mining (IDM). In addition, we present a system architecture of our analyzing, visualizing and destabilizing terrorist networks prototype, i.e., iMiner, and also describe how we collected terrorist information using an information harvesting system.
Keywords :
Internet; data analysis; data mining; data visualisation; police data processing; terrorism; Web terrorist information harvesting; authenticated Web sites; data analysis; data collection; iMiner prototype; information scarcity; investigative data mining; network analysis; terrorism knowledge base; terrorist network prototype visualization; Computer architecture; Counting circuits; Data analysis; Data mining; Data security; Government; Information security; Open source software; Terrorism; Web page design;
Conference_Titel :
Information Visualization, 2007. IV '07. 11th International Conference
Conference_Location :
Zurich
Print_ISBN :
0-7695-2900-3