Emergent Information Technologies and Enabling Policies for Counter-Terrorism

Front Cover
Robert L. Popp, John Yen
John Wiley & Sons, Apr 28, 2006 - Computers - 480 pages
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security

After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected.

Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties.

Topics covered include:

  • Counter-terrorism modeling
  • Quantitative and computational social science
  • Signal processing and information management techniques
  • Semantic Web and knowledge management technologies
  • Information and intelligence sharing technologies
  • Text/data processing and language translation technologies
  • Social network analysis
  • Legal standards for data mining
  • Potential structures for enabling policies
  • Technical system design to support policy

Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

From inside the book

Contents

Chapter 1 Utilizing Information and Social Science Technology to Understand and Counter the TwentyFirst Century Strategic Threat
1
Chapter 2 Hidden Markov Models and Bayesian Networks for CounterTerrorism
27
Chapter 3 Anticipatory Models for CounterTerrorism
51
Chapter 4 Information Processing at Very High Speed Data Ingestion Rates
75
Chapter 5 Analysis of Heterogeneous Data in Ultrahigh Dimensions
105
Chapter 6 Semantic Web Technologies for Terrorist Network Analysis
125
Chapter 7 Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies
139
Chapter 8 Anonymized Semantic Directories and a PrivacyEnhancing Architecture for Enterprise Discovery
165
Chapter 14 AgentBased Simulations for Disaster Rescue Using the DEFACTO Coordination System
281
Chapter 15 Transcending the Tower of Babel Supporting Access to Multilingual Information with CrossLanguage Information Retrieval
299
Chapter 16 Journey from Analysis to Inquiry Technology and Transformation of CounterTerrorism Analysis
315
Chapter 17 Behavioral Network Analysis for Terrorist Detection
331
Chapter 18 Detecting Terrorist Activities in the TwentyFirst Century A Theory of Detection for Transactional Networks
349
Chapter 19 Social Network Analysis Via Matrix Decompositions
367
Chapter 20 Legal Standards for Data Mining
393
Chapter 21 Privacy and Consequences Legal and Policy Structures for Implementing New CounterTerrorism Technologies and Protecting Civil Liberty
421

Chapter 9 Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technolo...
175
Chapter 10 Applying Semantic Web Reasoning to CounterTerrorism
197
Chapter 11 Schemer ConsensusBased Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts
209
Chapter 12 Sharing Intelligence Using Information Supply Chains
231
Chapter 13 Supporting Knowledge Management In Emergency Crisis Management Domains Envisioned Designs for Collaborative Work
255
Chapter 22 Designing Technical Systems to Support Policy Enterprise Architecture Policy Appliances and Civil Liberties
439
Index
459
About the Editors
467
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 50 - The dogmas of the quiet past are inadequate to the stormy present. The occasion is piled high with difficulty, and we must rise with the occasion. As our case is new, so we must think anew and act anew.
Page 435 - I view the requirement of proof beyond a reasonable doubt in a criminal case as bottomed on a fundamental value determination of our society that it is far worse to convict an innocent man than to let a guilty man go free.
Page 397 - The depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government.
Page 413 - Safety from external danger is the most powerful director of national conduct. Even the ardent love of liberty will, after a time, give way to its dictates. The violent destruction of life and property incident to war, the continual effort and alarm attendant on a state of continual danger, will compel nations the most attached to liberty, to resort, for repose and security, to institutions which have a tendency to destroy their civil and political...
Page 425 - ... that the procedure of measurement has an essential influence on the conditions on which the very definition of the physical quantities in question rests. Since these conditions must be considered as an inherent element of any phenomenon to which the term "physical reality" can be unambiguously applied, the conclusion of the above-mentioned authors }EPR] would not appear to be justified.
Page 62 - Reduced to its simplest terms, intelligence is knowledge and foreknowledge of the world around us — the prelude to decision and action by US policymakers. Foreknowledge requires prediction of future events. The dominant ideology in organizations assumes that in any "system...
Page 14 - Every nation, in every region, now has a decision to make: Either you are with us, or you are with the terrorists. From this day forward, any nation that continues to harbor or support terrorism will be regarded by the United States as a hostile regime.

About the author (2006)

ROBERT L. POPP, PhD, is currently an Executive Vice President of Aptima, Inc., and formerly a senior executive within the Defense Department, serving in the Office of the Secretary of Defense and Defense Advanced Research Projects Agency (DARPA). He is an expert in national security and counter-terrorism, authoring numerous scientific papers and providing many technical briefings and interviews on the subject. He is a member of the Defense Science Board (DSB), Senior Associate for the Center for Strategic and International Studies (CSIS), Senior Member of the IEEE, member of ACM and AAAS, founding Fellow of the University of Connecticut Academy of Distinguished Engineers, and a lifetime member of HOG (the Harley Owners Group).

JOHN YEN, PhD, is currently University Professor of Information Sciences and Technology and Professor in Charge, College of Information Sciences and Technology at The Pennsylvania State University. He is the author of numerous papers, holds one patent, chairs IEEE FIPA standard working groups on human agent communications, and is a member and Fellow of IEEE.

Bibliographic information