1.11 September 11, 2001


1.11 September 11, 2001

Criminals leave digital clues, which represent patterns of behavior that data mining software and techniques can uncover. It is virtually impossible to exist in a modern society without leaving a trail of digital transactions in commercial and private databases and networks. Data mining has traditionally been used to predict consumer behavior, but the same tools and techniques can also be used to detect and validate the identity of criminals for security purposes. These data mining techniques will herald a new method of validating individuals for security applications over the Internet and proprietary networks and databases.

The need for a predictive enemy detection and comprehensive threat and risk assessment capability cannot be underestimated in matters of national security. In the words of the National Defense Panel, it is of pivotal importance to "Improve predictive capabilities through latest technologies in data collection, storage, dissemination, and analysis." Data is everywhere, and with it are the clues to anticipate, prevent, and solve crimes; enhance security; and discover, detect, and deter unlawful and dangerous entities. In the twenty-first century, investigators must begin to use advanced pattern-recognition technologies to protect society and civilization. Analysts need to use data mining techniques and tools to stem the flow of crime and terror and enhance security against individuals, property, companies, and civilized countries.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net