Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Link Analysis in Counter Terrorism Summary

Rating
-
Sold
-
Pages
3
Uploaded on
17-05-2021
Written in
2019/2020

This document is very short but exploring how data plays a part in identifying counter-terrorism. Specifically exploring Link analysis and how it has been used in the past. This is simply a review paper with lots of sources and references that would be good to use for further reading.

Show more Read less
Institution
Course

Content preview

Review Paper: Exploring Link Analysis in
Counter Terrorism via Investigative Data
Mining & Analysis
A. Savill 3505901
Abstract After the wake of the September 11th attacks, terrorism has been on the rise. Within the
rise of terrorism in the world, there is a rise in the participants within terrorist organisations,
which can be difficult to identify and keep track. Therefore, modern technological solutions also
need to be on the rise to Counter Terrorism. In this paper, link analysis will be in the research
process as it can be used to identify these terror organisations and link their activities together to
identify who is who and what they are up to.
Keywords: Counter Terrorism, Counter Terrorism Databases, Data Analysis, Link Analysis,
Investigative Data Mining & Analysis



I. Introduction used to link together their activities and
associations.
This review paper goes over what Link
Analysis (LA) is and how it can help with III. Methods in Counter Terrorism
Investigative Data Mining (IDM). The review
As one can tell from the main title of this
paper will also go over the challenges of
review paper IDM is typically the main
collecting data in the first place regarding
method for issues that regard to
terrorist, as the availability may not
counterterrorism [1] - [3]. What makes IDM
necessarily be easy. The issues that may occur
different from traditional data mining is that
when exploring available data will also be
traditional data mining usually focuses on
issued and an explanation of how data can be
larger datasets that focuses on business and
visualised to make LA easier to understand.
customer-related issues typically, while IDM
II. Data Collection focuses on more abstract, smaller data sets [1].
Of course, according to Memon and Qureshi’s
Collecting data regarding possible terrorist is paper of [1], IDM has to focus on smaller
not exactly the easiest data sets to have access subjects/actors within a database within a huge
to, as that kind of data is expected to be in the population of the subject’s location they may
government’s hands. However, there is was be in. To connect links between certain
access to open source data [2] that have been subjects that do not necessarily focus on
collected by users via public information customer or business transactional related
regarding terror suspect, i.e. news and media issues. Instead, focusing more on which people
outlets, information online. During the process are associated with who depending on their
of this review paper, there were many open- suspicion with potential terrorism
sourced databases regarding terrorist such as organisations [3].
RAND Terrorism Chronology Database [6],
which is historical data. RAND-MITP [7],
which is past and present data. MIPT
Enticement database [8], data gathered via
open-source outlets. Finally, Intel Centre
Database [9], which is a database used for
mapping Al-Qaida activities, which can be


1

Written for

Institution
Study
Course

Document information

Uploaded on
May 17, 2021
Number of pages
3
Written in
2019/2020
Type
SUMMARY

Subjects

$8.73
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
savilla1110

Get to know the seller

Seller avatar
savilla1110 I hop
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
4 year
Number of followers
1
Documents
0
Last sold
4 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions