Paper
27 March 2001 Asymmetric threat data mining and knowledge discovery
John F. Gilmore, Michael A. Pagels, Justin Palk
Author Affiliations +
Abstract
Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
John F. Gilmore, Michael A. Pagels, and Justin Palk "Asymmetric threat data mining and knowledge discovery", Proc. SPIE 4384, Data Mining and Knowledge Discovery: Theory, Tools, and Technology III, (27 March 2001); https://doi.org/10.1117/12.421076
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Taxonomy

Internet

Data mining

Knowledge discovery

Databases

Profiling

Satellites

RELATED CONTENT

Data mining in metadata repositories
Proceedings of SPIE (March 12 2002)
PNP: mining of profile navigational patterns
Proceedings of SPIE (March 12 2002)
Interactive mining of schema for semistructured data
Proceedings of SPIE (March 12 2002)
Adapting the right web pages to the right users
Proceedings of SPIE (April 06 2000)

Back to Top