15,887 research outputs found

    Building Knowledge Management System for Researching Terrorist Groups on the Web

    Get PDF
    Nowadays, terrorist organizations have found a cost-effective resource to advance their courses by posting high-impact Web sites on the Internet. This alternate side of the Web is referred to as the “Dark Web.” While counterterrorism researchers seek to obtain and analyze information from the Dark Web, several problems prevent effective and efficient knowledge discovery: the dynamic and hidden character of terrorist Web sites, information overload, and language barrier problems. This study proposes an intelligent knowledge management system to support the discovery and analysis of multilingual terrorist-created Web data. We developed a systematic approach to identify, collect and store up-to-date multilingual terrorist Web data. We also propose to build an intelligent Web-based knowledge portal integrated with advanced text and Web mining techniques such as summarization, categorization and cross-lingual retrieval to facilitate the knowledge discovery from Dark Web resources. We believe our knowledge portal provide counterterrorism research communities with valuable datasets and tools in knowledge discovery and sharing

    Spartan Daily, October 1, 2002

    Get PDF
    Volume 119, Issue 23https://scholarworks.sjsu.edu/spartandaily/10667/thumbnail.jp

    The Foundation Center 2002 Annual Report

    Get PDF
    Nonprofit organizations faced new challenges in 2002 as a result of the effects of September 11, 2001, and a weakened economy. To identify sources of support to sustain their organizations, and often to respond to increased demand for their services, growing numbers of grantseekers turned to the Foundation Center for authoritative information on grantmakers and their giving. This increased need for information coincided with the Center's efforts to expand our grantmaker and grant information and to increase the currency of the data we provide to grantseekers and other researchers through our print and electronic resources

    The role of information systems in the prevention and detection of transnational and international crime

    Get PDF
    © Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity

    Applied Research Exemplars

    Get PDF
    The Center for Homeland Defense and Security’s unique academic environment brings together mid- and senior-level government officials with world-renowned faculty and experts in the diverse disciplines that comprise homeland security. The CHDS classroom is a place where participants think critically about homeland security issues and work collaboratively to develop strategic solutions. Master’s degree participants research and write course papers along with a final thesis. These original works concentrate on proposing creative policies, strategies and approaches to the public safety challenges facing their agencies and the broader homeland security community

    Exploring the capabilities of Prevent in addressing radicalisation in cyberspace within Higher Education

    Get PDF
    The Counter Terrorism and Security Act (2015) introduced a binding duty on public sector bodies in the United Kingdom (UK), including education, to have ‘due regard to the need to prevent people from being drawn into terrorism’. The Prevent duty has become widely controversial in the Higher Education (HE) sector with questions as to whether it contravenes academic freedom and freedom of speech.This research seeks to identify how Prevent may be applied to cyberspace to reduce risk of students being radicalised online at universities. Through semi-structured interviews (N= 16) with individuals working in Prevent and HE, attention is given to the capability of monitoring and filtering website content, which must be considered by universities as part of Prevent compliance. In addition, non-technical methods of reducing radicalisation in cyberspace are explored. Consideration is given to building students’ resilience to challenging information they see online through developing counter-narrative content for social media platforms. With students developing counter-narrative content themselves, specifically addressing vulnerability drivers to radicalisation, universities can enhance compliance with Prevent and create counter extremist content which can be used in cyberspace both in and outside of HE

    Artificial intelligence and UK national security: Policy considerations

    Get PDF
    RUSI was commissioned by GCHQ to conduct an independent research study into the use of artificial intelligence (AI) for national security purposes. The aim of this project is to establish an independent evidence base to inform future policy development regarding national security uses of AI. The findings are based on in-depth consultation with stakeholders from across the UK national security community, law enforcement agencies, private sector companies, academic and legal experts, and civil society representatives. This was complemented by a targeted review of existing literature on the topic of AI and national security. The research has found that AI offers numerous opportunities for the UK national security community to improve efficiency and effectiveness of existing processes. AI methods can rapidly derive insights from large, disparate datasets and identify connections that would otherwise go unnoticed by human operators. However, in the context of national security and the powers given to UK intelligence agencies, use of AI could give rise to additional privacy and human rights considerations which would need to be assessed within the existing legal and regulatory framework. For this reason, enhanced policy and guidance is needed to ensure the privacy and human rights implications of national security uses of AI are reviewed on an ongoing basis as new analysis methods are applied to data

    A return on investment: the future of police cooperation between Australia and Indonesia

    Get PDF
    This Special Report presents a strategy for the future relationship between Indonesia’s National Police—known as POLRI—and the Australian Federal Police (AFP). It draws on 60 interviews with current and retired police officers, officials from other Australian and Indonesian agencies, and academic experts in related fields. The report presents a strategy for the future POLRI–AFP relationship in two parts. The first paperexamines the near term to early 2015. POLRI and the AFP should first aim to restore full trust and cooperation in all relevant policing areas, especially in cybercrime. Early initiatives could include a 10‑year celebration for the Jakarta Centre for Law Enforcement Cooperation, workshops for future AFP and POLRI leaders, and a request for POLRI officers to support the AFP during the G20 meeting in November 2014. It would also be worth sponsoring an international ‘needs analysis’ for POLRI. Reinstating funding for the Law Enforcement Cooperation Program is needed to promote the AFP’s flexibility and responsiveness during this time. The second paper provides background, tracing the remarkable relationship between the Australian Federal Police and the Indonesian National Police from its early days, where the focus was on information sharing, through a journey into joint operations. The paper describes the numerous capability cooperation initiatives that the forces have undertaken, especially since 2002, and charts both successes and times where cooperation didn’t necessarily deliver as intended

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work

    Urban resilience:two diverging interpretations

    Get PDF
    This paper uses two diverging interpretations of resilience to review and assess current UK policies for urban resilience. Both developed in scientific studies, the first interpretation is based on a mechanistic model of systems that can recover their original state after shocks, and the second is based on an evolutionary model enabling adaptation to disturbances. The literature review demonstrates that at present urban resilience is predominantly associated with the former. By contrast, only few policies and studies are inspired by the latter, although this is better suited to analyse dynamics of urban adaptation and manage cities accordingly. The contribution of this paper to an understanding of urban resilience is therefore twofold. First, an identification of the long-term consequences on the built environment associated with each model is provided, with the mechanical model ultimately hindering adaptation. Second, some approaches to generate effective responses to environmental and societal change are identified. Ultimately, this paper emphasises that the idea of a resilient city is fit for this age characterised by uncertainty, albeit it requires the recognition within planning practice that urban adaptation cannot be attained with current methodologies, and that much can be learned from theories on the resilience of ecosystems.
    • 

    corecore