Daisy, 100–101
defined, 100
display, 100
menu, 101
See also Link analysis tools
Data
ambiguous, 353
auto, 46
balancing, 296
cleaning, 62
concatenating, 62
converting, 62
credit, 46–47
criminal, 47–55
criminal, standardizing, 72–74
demographic, 42–46
encoding, 187, 354–55
flow schematic, 191
in fraud detection, 259–60
government, 55
Internet, 55–59
interrogation, 63
missing, 186–87, 354
money as, 276–77
overlaying, 42
preferences, 45
privacy, 65–66
real estate, 46
relevant, 39–40
residential, 45
rotating, 297
security, 65–66
socioeconomic, 45
splitting, 296–97
structure, 63
testing, 40
transactional, 253
Data-Audit, 70
Database agents, 114
Database visualization, 370–73
Datagration, 70
Data integration, 64–65
data connection and, 64
defined, 64
issues, 64
multimedia formats, 65
multiple operating systems and, 64–65
DataManager, 69
Data mining, 3–4
agents, 120–21
for behavioral profiling, 19
crime detection methodology, 220–21, 293–96
criminal analysis and, 15–19
as deductive method of profiling, 20–21
defined, 3
development, 3
forensic, 375–76
IDSs, 321–23
model value, 39
precrime, 1–38
signatures in, 22
text mining vs., 126–27
ultimate goal, 4
DataMite, 230
Data preparation, 61–63
ambiguous data, 353
cleaning, 62
concatenating, 62
converting, 62
CRISP-DM, 294–95
data encoding, 354–55
government financial transaction detection case study, 217
missing data, 354
model building, 355–56
sexual assault offender behavior modeling case study, 353–60
variable selection, 355
verification, 356–60
Data preparation tools, 68–72
Amadea, 68–69
BioComp iManageData, 69
Data-Audit, 70
Datagration, 70
DataManager, 69
Dataskope, 70
Datawash, 70–71
Digital Excavator, 71
GritBot, 71
IBM Datajoiner, 71
Princeton Relational Tools, 72
Sagent, 72
SyncSort, 72
DataQuick, 46
Dataskope, 70
Data warehousing, 40–42
concept, 40–41
defined, 4, 40
investigative, 4–5, 39–74
Datawash, 70–71
Death claims case study, 287–88
Deception, text mining for, 132–38
DecisionMaker, 196
Decision trees, 207–8
defined, 207
example, 207–8
fraud and, 268–69
illustrated, 207
terminal nodes, 208
See also Machine-learning algorithms
Decision tree tools, 221–29
AC2, 222–23
Attar XperRule, 223
Business Miner, 223–24
C4.5, 229
C5.0, 224
CART, 224–27
Cognos Scenario, 227–28
EC4.5, 229
free trees, 229
IND, 229
LMDT, 229
Neusciences aXi Decision Tree, 228
OC1, 229
PC4.5, 229
PLUS, 229
SPSS Answer Tree, 228
Defense Advanced Research Projects Agency (DARPA), 4, 338
Delay patterns, 290
Demographic data, 42–46
Acxiom InfoBased data profile, 42–46
neighborhood, 43–45
private firms, 42
Dendrogram, 34, 35
Digital Excavator, 71
Disambiguation, 78
Distraction burglary. See Bogus official crime
"DOCSHOW" Security Papers Archive, 326
Document clustering, 140
Document summarization, 140
DolphinSearch, 145
Domain Name Service (DNS), 305
Doppelgaenger, 116
Drug trafficking case study, 81–82
DRUGX, 53
DShield.org, 326
dtSearch, 145–46
defined, 145
Forensic Toolkit (FTK), 146
Know File Filer (KFF) feature, 146
search options, 145–46
DumpSEC, 306