Harvesting and analysis of weak signals for detecting lone wolf terrorists

J. Brynielsson,Andreas Horndahl,F. Johansson,Lisa Kaati,Christian Mårtenson,Pontus Svenson

Published 2012 in European Intelligence and Security Informatics Conference

ABSTRACT

AbstractLone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kinds of terrorists before they commit a terror act is limited since they are hard to detect using traditional methods. However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge to plan an attack. Therefore there is a good possibility that they leave digital traces in the form of weak signals that can be gathered, fused, and analyzed.In this article we present an analysis method that can be used to analyze extremist forums to detect digital traces of possible lone wolf terrorists. This method is conceptually demonstrated using the FOI Impactorium fusion platform. We also present a number of different technologies which can be used to harvest and analyze pieces of information from Internet that may serve as weak digital traces that can be fused using the suggested analysis method in order to discover possible lone wolf terrorists.

PUBLICATION RECORD

  • Publication year

    2012

  • Venue

    European Intelligence and Security Informatics Conference

  • Publication date

    2012-08-22

  • Fields of study

    Computer Science, Environmental Science

  • Identifiers
  • External record

    Open on Semantic Scholar

  • Source metadata

    Semantic Scholar

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-36 of 36 references · Page 1 of 1

CITED BY

Showing 1-100 of 124 citing papers · Page 1 of 2