DATA MINING AND TERRORISM. Margaret H. Dunham CSE Department Southern Methodist University Dallas, Texas 75275 [email protected] 11/5/05 This material is based upon work supported by the National Science Foundation under Grant No. 9820841.
Data Mining Introductory and Advanced Topics, by Margaret H. Dunham, Prentice Hall, 2003.
DILBERT reprinted by permission of United Feature Syndicate, Inc.
Explore the use of data mining techniques in identifying terrorists and criminals.
Where job =
FBI Strategic Focus
“Substantially enhance analytical capabilities with personnel and technology”
“Expand use of data mining, financial record analysis, and communications analysis to combat terrorism”
Suppose you knew that a specific cave had gold:
October 7, 2005
“If it looks like a terrorist, walks like a terrorist, and quacks like a terrorist, then it’s a terrorist.”
“If it looks like a duck, walks like a duck, and quacks like a duck, then it’s a duck.”
Classification Clustering Link Analysis
Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman and Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network” Lecture Notes in Computer Science, Publisher: Springer-Verlag GmbH, Volume 3495 / 2005 , p. 287.
Thank You Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network”