27 March 2001 Asymmetric threat data mining and knowledge discovery
Author Affiliations +
Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
John F. Gilmore, John F. Gilmore, Michael A. Pagels, Michael A. Pagels, Justin Palk, Justin Palk, "Asymmetric threat data mining and knowledge discovery", Proc. SPIE 4384, Data Mining and Knowledge Discovery: Theory, Tools, and Technology III, (27 March 2001); doi: 10.1117/12.421076; https://doi.org/10.1117/12.421076


Data mining in metadata repositories
Proceedings of SPIE (March 11 2002)
Empirical evaluation of interest-level criteria
Proceedings of SPIE (February 24 1999)
PNP: mining of profile navigational patterns
Proceedings of SPIE (March 11 2002)
Interactive mining of schema for semistructured data
Proceedings of SPIE (March 11 2002)

Back to Top