CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from...

24
CrimeFighter: A Toolbox for Counterterrorism Uffe Kock Wiil

Transcript of CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from...

Page 1: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

CrimeFighter: A Toolbox for Counterterrorism

Uffe Kock Wiil

Page 2: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

2

Counterterrorism Research LabEstablished in the Spring of 2009

Research goes back to 2003

Research & DevelopmentMathematical modelsProcesses, tools, techniques, and algorithmsRobust prototypesEnd-user involvement

FocusOpen source intelligenceDestabilizing terrorist networks

10 researchers

Page 3: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

3

CounterterrorismKnowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorist attacksTheory from the knowledge management field plays an important role in dealing with terrorist information

Page 4: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

4

Open source intelligenceOpen Source Information (OSINF) is data which is available publicly – not necessarily freeOSINF Collection is monitoring, selecting, retrieving, tagging, cataloging, visualizing & disseminating dataOpen Source Intelligence (OSINT) is proprietary intelligence recursively derived from OSINFOSINT is the result of expert analysis of OSINF

Page 5: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

5

HUMINT SIGINT IMINT MASINT

ALL-SOURCE ANALYSIS

OPEN SOURCE INFORMATION

OPEN SOURCE INTELLIGENCE

5% of cost 80% of value

95% of cost 20% of value

Secret Intelligence Misses 80% of the Relevant Information!

Page 6: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

6

KM for intelligence analysisKnowledge management processes, tools, and techniques can help intelligence analysts in various ways when trying to make sense of the vast amount of data being collectedSeveral manual knowledge management processes can either be semi-automated or supported by software tools

Page 7: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

7

KM for intelligence analysis

DataAcquisition

InformationProcessing

KnowledgeManagement

Data

Information

Knowledge

Page 8: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

8

CrimeFighterCrimeFighter

Toolbox for counterterrorism

OutlineKM processes in more detailRelated workResearch objectivesTool categoriesToolbox overviewPrevious workOngoing workContributions

Page 9: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

9

Knowledge Management Processes

Data Information Knowledge

Acquiring Datafrom Open Source

Databases

Harvesting Datafrom the Web

Other Sources Defining Patterns

Processing Data Mining Data

EvaluatingKnowledge

Visualizing

Interpreting

Analyzing

Page 10: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

10

Related workCounterterrorism research approaches can be divided into two overall categories

data collection and data modelling

The Dark Web Project conducted at the AI Lab, University of Arizona (Professor Chen) is a prominent example relating to the data collection approachThe Networks and Terrorism Project conducted at the CASOS Lab, Carnegie Mellon University (Professor Carley) is a prominent example relating to the data modelling approach

Page 11: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

11

Related workCrimeFighter combines the data collection and data modelling approaches into holistic prototypes for open source intelligence The research is inter-disciplinary involving techniques from disciplines such as data mining, social network analysis, hypertext, visualization, and many othersTo our knowledge, no other approaches provide a similar comprehensive coverage of tools and techniques for counterterrorism

Page 12: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

12

Research objectivesTo specify, develop, and evaluate novel models, algorithms, tools, and techniques for open source intelligence in close collaboration with end-usersThe tool philosophy is that the intelligence analysts are in charge and the tools are there to assist themThe purpose of the tools is to support as many of the knowledge management processes as possible to assist the intelligence analysts in performing their work more efficiently

Efficient means that the analysts arrive at better analysis results much faster

Page 13: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

13

Tool categoriesSemi-automatic tools that need to be configured by the intelligence analysts to perform the dedicated task. After configuration, the tool will automatically perform the dedicated task Manual tools that support the intelligence analysts in performing specific tasks by providing dedicated features that enhance the work efficiency when performing manual intelligence analysis work

Page 14: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

14

KnowledgeBase

OtherSources

WebContent

Open SourceDatabases

Web Harvesting

Tools

DataConversion

Tools

Data MiningTools

Social Network Analysis

Tools

VisualizationTools

StructureAnalysis

Tools

KnowledgeBaseTools

Toolbox

ToolStorage Data flow

Toolbox overview

Page 15: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

15

Previous workThe work on CrimeFighter builds on previous work on iMineriMiner includes tools for data conversion, data mining, social network analysis, visualization, and for the knowledge base. iMiner incorporates several advanced and novel models and techniques useful for counterterrorism like subgroup detection, network efficiency estimation, and destabilization strategies for terrorist networks including detection of hidden hierarchies

Page 16: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

16

Previous workWork has also been conducted on the ASAP tool to assist software developers to perform structural analysis of software planning data

Many of the spatial hypertext concepts and techniques that supports working with emergent and evolving structures used in ASAP are domain independent and can be re-used in a tool that supports intelligence analysts working with terrorist information

Several prototypes have been constructed to harvest terrorist information from the Web

Regular web pagesRSS feedsBlogs

Page 17: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

17

KnowledgeBase

OtherSources

WebContent

Open SourceDatabases

Web Harvesting

Tools

DataConversion

Tools

Data MiningTools

Social Network Analysis

Tools

VisualizationTools

StructureAnalysis

Tools

KnowledgeBaseTools

iMiner tools

Other tools

Previous work

Page 18: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

18

Ongoing workDomain modelWeb harvesting toolStructure analysis toolSoftware architecture

Page 19: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

19

Domain modelLinks as first class

New domain model for terrorist networksNodes and links in the graph

Knowledge baseGlobal Terrorism Database (GTD)

New social network analysis algorithmsFinding missing linksUsing link weightsIdentifying key links

Terrorist network visualizationBoth nodes and links

Page 20: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

20

Web harvesting tool

Web pages

RSS feeds

Forms & othersources

Blogs

Web harvester

TOOL-

-

-

-

-

parameters

ConfigurableGUI

-----------

-----------

----------

----------

----------

----------

---------

---------

KnowledgeBaseIN

FOR

MA

TION

xml

Feedback

Page 21: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

21

Info 111

Web harvestedintelligence

KnowledgeBase

Undercover agentintelligence etc.

Open Source Database intelligence

Intelligence Analyst

?Info 44:adfkdsfjsdfsjdf skdfjsk

dfks jf

Info 22

Person1: %#¤%#¤%&%Person2:%#¤ 234”#4 534Person 1:¤#”%%%¤&¤#%3Person 2:¤#”#%¤#%&#¤%#¤%

Info 454

Info 99

Intelligence Analyst

Case: ###, Session 2311, Time: ##:##:##

Structure analysis tool

Page 22: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

22

Structure analysis toolAnalysis tool for emergent and evolving structure of terrorist information

Spatial metaphorWhiteboard

History featureSession featureParser featureGrouping feature

Page 23: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

23

Software architecture

SNAtool

Analysistool

EWaStool

Domainmodel

Domainmodel

Domainmodel

Knowledgebase

Knowledgebase

Knowledgebase

Levels of integration between toolsCommon knowledge baseCommon domain modelRe-use of services

Page 24: CrimeFighter: A Toolbox for Counterterrorismw-cmmc/research/CrimeFighter.pdftechniques from disciplines such as data mining, social network analysis, hypertext, visualization, and

24

ContributionsWe have identified and described knowledge management processes, tools, and techniques that are central to the counterterrorism domainWe have developed and implemented advanced mathematical models and software tools that help automate and support knowledge processes for counterterrorism to assist intelligence analysts in their workWe have presented past, ongoing, and future work on CrimeFighter – a novel toolbox for counterterrorism that provides advanced support for the counterterrorism domain