Detecting terrorist activities
Download
Report
Transcript Detecting terrorist activities
Detecting terrorist activities
Presentation on a specialist topic in Data
Mining and Text Analytic
Summary
Definitions
Why use it
Techniques
Conclusion
What It is
Terrorists are people who resort to physical/psychological
means of pressuring people in response to their own
beliefs and opinions
This can be for a number of reasons such as political
gain, social/global awareness
Can be used to set an example.
Would you class strike as a form of terrorists activity?
Medium
Traditional methods- repeat offenders
Social Media
Cults and organisations
Encrypted Messages
Techniques
Keyword/Text extraction
Intrusion Detection
Vector-Space Model
Information Extraction
Automatic Text Summaries
Keyword Extraction
“Terror” Corpus
Multiple Language
statistical techniques
“Aboutness” of a text or genre
Keyword Total/Percentage
Intrusion Detection
Monitor/Analyse actions
Decision making- Hostile
Database of information
Current Systems
Data logs
Algorithm
% normal action vs intrusive action
Idea
Data mining works best when you're searching for a welldefined profile, a reasonable number of attacks per
year and a low cost of false alarms.
Terrorist plots are different. There is no well-defined
profile and attacks are very rare. Taken together, these
facts mean that data-mining systems won't uncover
any terrorist plots until they are very accurate, and that
even very accurate systems will be so flooded with
false alarms that they will be useless.
Conclusion
Privacy Issues
Ambiguity- Text
Very Rare
Pattern Seeking/ Counting Things
Hard to distinguish
Further Development needed