Tcpdump, 307
Telecommunications fraud, 288–90
association patterns, 290
criminal strategy, 288
delay patterns, 290
detection techniques, 290
reuse of identity patterns, 289
signature calling patterns, 289–90
types of, 288–89
Telephone toll analysis, 94
Temis, 152–53
Insight Discoverer, 152
Online Miner, 152–53
Skill Cartridge, 152
See also Text mining tools
Temporal analysis, 187–88
Teradata Warehouse Miner, 247–48
Terminal nodes, 208
Text Analyst, 153
Text mining, 2, 8–9, 125–57
applications, 8, 127–28
aviation crash clues case study, 128–30
clustering news stories case study, 130–32
in combating digital crimes, 126
data mining vs., 126–27
data sources, 139
for deception, 132–38
defined, 125–26
example use, 9
functioning of, 126–27
as fundamental tool, 139
Lextek, 150–51
processes, 140
requirements for effectiveness, 127
software, 128
technologies, 127, 138
threats, 138–41
tools, 8
Text mining tools, 141–57
Autonomy, 141–42
Clairvoyance, 142–43
ClearForest, 143–44
Copernic, 144–45
DolphinSearch, 145
dtSearch, 145–46
HNC software, 146–47
IBM, 147
iCrossReader, 148–49
Klarity, 149
Kwalitan, 149
Leximancer, 149–50
processes, 140
Quenza, 154
Readware, 154
Semio, 151–52
Temis, 152–53
Text Analyst, 153
TripleHop, 153–54
VantagePoint, 154–55
VisualText, 155–56
Wordstat, 156–57
thinkAnalytics, 248
Threats
assessing, 14
probability of, 22
text mining, 138–41
Timeline Analysis, 95–97
TopCat, 130–32
with biographical summarization filter, 131–32
defined, 130
Transactional data, 253
Treasury Enforcement Communications System (TECS), 53
TripleHop, 153–54
defined, 153
information processing levels, 153–54
three-layer architecture, 153
See also Text mining tools