Update cookies preferences

E-book: Knowledge Discovery for Counterterrorism and Law Enforcement

(Queen's University, Kingston, Ontario, Canada)
Other books in subject:
  • Format - PDF+DRM
  • Price: 77,99 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
Other books in subject:

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Most of the research aimed at counterterrorism, fraud detection, or other forensic applications assumes that this is a specialized application domain for mainstream knowledge discovery. Unfortunately, knowledge discovery changes completely when the datasets being used have been manipulated in order to conceal some underlying activity. Knowledge Discovery for Counterterrorism and Law Enforcement operates from the premise that detection algorithms must be rethought to be effective in this domain, and presents a new approach based on cutting-edge analysis for use in adversarial settings.





Reveals How Criminals Conceal Information





This volume focuses on four main forms of knowledge discovery: prediction, clustering, relationship discovery, and textual analysis. For each of these application areas, the author discusses opportunities for concealment that are available to criminals and reveals some of the tactics that can aid in detecting them. He reviews what is known about the different technologies for each area and evaluates their effectiveness. The book also supplies a preview of technologies currently under development and describes how they will fit in to existing approaches to knowledge discovery.





Provides Proactive Formulas for Staying One Step Ahead of Adversaries





While all knowledge-discovery systems are susceptible to manipulation, designers and users of algorithmic systems who are armed with the knowledge of these subversive tactics are better able to create systems to avoid these vulnerabilities. This book delineates an effective process for integrating knowledge-discovery tools, provides a unique understanding of the limits of the technology, and contains a clear presentation of the upsides and pitfalls of data collection. It is a powerful weapon in the arsenal of anyone confronting the increasingly sophistic

Reviews

The writing is organized, clear, and free of technical jargon and mathematical notation. ... In summary, this is a highly readable introduction to an interesting field. While it is certainly a valuable introductory resource for the technically adept, it is also appropriate for those with the desire to understand the applicability, potential, and limitations of computer-assisted knowledge discovery techniques in counterterrorism and law enforcement. -Computing Reviews, September 2009

Preface xv
List of Figures
xix
Introduction
1(20)
What is `Knowledge Discovery'?
2(4)
Main Forms of Knowledge Discovery
2(2)
The Larger Process
4(2)
What is an Adversarial Setting?
6(5)
Algorithmic Knowledge Discovery
11(5)
What is Different about Adversarial Knowledge Discovery?
14(2)
State of the Art
16(5)
Data
21(20)
Kinds of Data
21(5)
Data about Objects
22(1)
Low-Level Data
22(1)
Data about Connections
23(1)
Textual Data
24(1)
Spatial Data
25(1)
Data That Changes
26(1)
Slow Changes in the Underlying Situation
26(1)
Change is the Important Property
26(1)
Stream Data
27(1)
Fusion of Different Kinds of Data
27(3)
How is Data Collected?
30(3)
Transaction Endpoints
30(1)
Interaction Endpoints
30(1)
Observation Endpoints
31(1)
Human Data Collection
31(1)
Reasons for Data Collection
32(1)
Can Data Be Trusted?
33(2)
The Problem of Noise
35(1)
How Much Data?
35(6)
Data Interoperability
37(1)
Domain Knowledge
38(3)
High-Level Principles
41(26)
What to Look for
41(7)
Subverting Knowledge Discovery
48(5)
Subverting the Data-Collection Phase
48(1)
Subverting the Analysis Phase
49(1)
Subverting the Decisiori-and-Action Phase
50(1)
The Difficulty of Fabricating Data
50(3)
Effects of Technology Properties
53(3)
Sensemaking and Situational Awareness
56(4)
Worldviews
58(2)
Taking Account of the Adversarial Setting over Time
60(1)
Does This Book Help Adversaries?
61(1)
What about Privacy?
62(5)
Looking for Risk --- Prediction and Anomaly Detection
67(60)
Goals
67(8)
Misconceptions
67(1)
The Problem of Human Variability
68(1)
The Problem of Computational Difficulty
68(1)
The Problem of Rarity
68(2)
The Problem of Justifiable Preemption
70(1)
The Problem of Hindsight Bias
71(1)
What are the Real Goals?
72(3)
Outline of Prediction Technology
75(7)
Building Predictors
75(2)
Attributes
77(1)
Missing Values
77(1)
Reasons for a Prediction
78(1)
Prediction Errors
78(2)
Reasons for Errors
80(1)
Ranking
80(2)
Prediction with an Associated Confidence
82(1)
Concealment Opportunities
82(2)
Technologies
84(24)
Decision Trees
84(4)
Ensembles of Predictors
88(5)
Random Forests
93(2)
Support Vector Machines
95(6)
Neural Networks
101(2)
Rules
103(2)
Attribute Selection
105(2)
Distributed Prediction
107(1)
Symbiotic Prediction
107(1)
Tactics and Process
108(5)
Extending the Process
113(1)
Special Case: Looking for Matches
114(1)
Special Case: Looking for Outliers
115(4)
Special Case: Frequency Ranking
119(4)
Frequent Records
120(1)
Records Seen Before
121(1)
Records Similar to Those Seen Before
122(1)
Records with Some Other Frequency
123(1)
Special Case: Discrepancy Detection
123(4)
Looking for Similarity - Clustering
127(30)
Goals
128(2)
Outline of Clustering Technology
130(4)
Concealment Opportunities
134(1)
Technologies
135(16)
Distance-Based Clustering
136(2)
Density-Based Clustering
138(1)
Distribution-Based Clustering
139(2)
Decomposition-Based Clustering
141(3)
Hierarchical Clustering
144(2)
Biclustering
146(4)
Clusters and Prediction
150(1)
Symbiotic Clustering
150(1)
Tactics and Process
151(1)
Special Case - Looking for Outliers Revisited
152(5)
Looking Inside Groups --- Relationship Discovery
157(44)
Goals
158(1)
Outline of Relationship-Discovery Technology
159(8)
Real-World Graphs
162(3)
Selection in Graphs
165(1)
Analysis of Graphs
166(1)
Concealment Opportunities
167(3)
Technologies
170(24)
Social Network Analysis
170(2)
Visualization
172(4)
Pattern Matching/Information Retrieval
176(3)
Single-Node Exploration
179(3)
Unusual-Region Detection
182(1)
Ranking on Graphs
183(2)
Graph Clustering
185(4)
Edge Prediction
189(1)
Anomalous-Substructure Discovery
189(5)
Graphs and Prediction
194(1)
Tactics and Process
194(7)
Discovery from Public Textual Data
201(46)
Text as it Reveals Internal State
203(1)
Goals
204(5)
Finding Texts of Interest
205(1)
Finding Content
206(2)
Finding Authors
208(1)
Finding Author Properties
208(1)
Finding Metainformation
208(1)
Outline of Textual-Analysis Technology
209(5)
Exploring Content
210(3)
Exploring Authorship
213(1)
Exploring Metainformation
213(1)
Concealment Opportunities
214(2)
Technologies
216(22)
Collecting Textual Data
216(2)
Extracting Interesting Documents from a Large Set
218(2)
Extracting Named Entities
220(1)
Extracting Concepts
221(2)
Extracting Relationships
223(1)
Extracting Topics
224(2)
Extracting Narrative and Sensemaking
226(1)
Summarization
227(2)
Extracting Intention and Slant
229(1)
Trends in Content
229(1)
Authorship from Large Samples
230(1)
Authorship from Small Samples
231(4)
Detecting Author Properties
235(2)
Extracting Metainformation
237(1)
Tactics and Process
238(9)
Playing the Adversaries
238(2)
Playing the Audience
240(1)
Fusing Data from Different Contexts
241(6)
Discovery in Private Communication
247(26)
The Impact of Obfuscation
249(1)
Goals
249(1)
Concealment Opportunities
249(4)
Encryption
250(1)
Word Substitutions
251(2)
Technologies
253(16)
Selection of Interesting Communication
253(9)
Content Extraction after Substitution
262(6)
Authorship after Substitution
268(1)
Metainformation after Substitution
268(1)
Tactics and Process
269(4)
Using a Multifaceted Process for Selection
269(4)
Discovering Mental and Emotional State
273(28)
Frame Analysis for Intentions
274(4)
Goals
275(1)
Frame-Analysis Detection Technology
276(1)
Concealment Opportunities
277(1)
Tactics and Process
277(1)
Sentiment Analysis
278(3)
Goals
278(1)
Sentiment-Analysis Technology
279(2)
Concealment Opportunities
281(1)
Mental-State Extraction
281(11)
Goals
282(1)
Mental-State Extraction Technology
283(8)
Concealment Opportunities
291(1)
Systemic Functional Linguistics
292(9)
Introduction to Systemic Functional Linguistics
293(3)
SFL for Intention Detection
296(1)
SFL for Sentiment Analysis
296(1)
SFL for Mental-State Extraction
297(4)
The Bottom Line
301(16)
Framing the Problem
301(4)
The Process
305(2)
Applying the Process
307(4)
Open Problems
311(6)
Process Improvements
311(1)
Straightforward Technical Problems
312(2)
More-Difficult Technical Advances
314(3)
Bibliography 317(10)
Index 327
Skillicorn, David