DATA MINING AND TERRORISM. Margaret H. Dunham CSE Department Southern Methodist University Dallas, Texas 75275 firstname.lastname@example.org 11/5/05 This material is based upon work supported by the National Science Foundation under Grant No. 9820841.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
DATA MINING AND TERRORISM
Margaret H. Dunham
Southern Methodist University
Dallas, Texas 75275
This material is based upon work supported by the National Science Foundation under Grant No. 9820841
Data Mining Introductory and Advanced Topics, by Margaret H. Dunham, Prentice Hall, 2003.
DILBERT reprinted by permission of United Feature Syndicate, Inc.
Explore the use of data mining techniques in identifying terrorists and criminals.
Where job =
FBI Strategic Focus
“Substantially enhance analytical capabilities with personnel and technology”
“Expand use of data mining, financial record analysis, and communications analysis to combat terrorism”
Suppose you knew that a specific cave had gold:
Dallas Morning News
October 7, 2005
“If it looks like a terrorist, walks like a terrorist, and quacks like a terrorist, then it’s a terrorist.”
“If it looks like a duck, walks like a duck, and quacks like a duck, then it’s a duck.”
Classification Clustering Link Analysis
“Proof” that Bin Laden was involved in 9/11
Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman and Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network” Lecture Notes in Computer Science, Publisher: Springer-Verlag GmbH, Volume 3495 / 2005 , p. 287.