Skip to main content

2012 | OriginalPaper | Buchkapitel

17. Weapons of Mass Destruction (WMD) on Dark Web

verfasst von : Hsinchun Chen

Erschienen in: Dark Web

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The tragic events of September 11 have caused drastic effects on many aspects of society. Academics in the fields of natural sciences, computational science, information science, social sciences, engineering, medicine, and many others have been called upon to help enhance the government’s ability to fight terrorism and other crimes. In the area under defending against catastrophic terrorism, weapons of mass destruction (WMD), especially nuclear weapons, have been considered one of the most dangerous threats to US homeland security and international peace and prosperity. We believe the science of Intelligence and Security Informatics (ISI) can help with nuclear forensics and attribution. ISI research can help advance the intelligence collection, analytical techniques, and instrumentation used in determining the origin, capability, intent, and transit route of nuclear materials by selected hostile countries and (terrorist) groups. We propose a research framework that aims to investigate the capability, accessibility, and intent of critical high-risk countries, institutions, researchers, and extremist or terrorist groups. We propose to develop a knowledge base of the Nuclear Web that will collect, analyze, and pinpoint significant actors in the high-risk international nuclear physics and weapons communities. We also identify potential extremist or terrorist groups from our Dark Web test bed who might pose WMD threats to the USA and the international community. Selected knowledge mapping and focused web crawling techniques and findings from a preliminary study are presented in this chapter.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abbasi, A. and Chen, H. (2005). Identification and Comparison of Extremist-Group Web Forum Messages using Authorship Analysis. IEEE Intelligent Systems, 20(5), 67–75. CrossRef Abbasi, A. and Chen, H. (2005). Identification and Comparison of Extremist-Group Web Forum Messages using Authorship Analysis. IEEE Intelligent Systems, 20(5), 67–75. CrossRef
Zurück zum Zitat Baeza-Yates, R. (2003). Information Retrieval in the Web: Beyond Current Search Engines. International Journal of Approximate Reasoning, 34, 97–104.MathSciNetCrossRefMATH Baeza-Yates, R. (2003). Information Retrieval in the Web: Beyond Current Search Engines. International Journal of Approximate Reasoning, 34, 97–104.MathSciNetCrossRefMATH
Zurück zum Zitat Card, S. K., Mackinlay, J. D. and Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think, Morgan Kaufmann Publishers, Inc., San Francisco, CA. Card, S. K., Mackinlay, J. D. and Shneiderman, B. (1999). Readings in Information Visualization: Using Vision to Think, Morgan Kaufmann Publishers, Inc., San Francisco, CA.
Zurück zum Zitat Chakrabarti, S., Van Den Berg, M., and Dom, B. (1999). Focused Crawling: A New Approach to Topic-Specific Resource Discovery. In Proceedings of the Eight World Wide Web Conference, Toronto, Canada. Chakrabarti, S., Van Den Berg, M., and Dom, B. (1999). Focused Crawling: A New Approach to Topic-Specific Resource Discovery. In Proceedings of the Eight World Wide Web Conference, Toronto, Canada.
Zurück zum Zitat Chau, M. and Chen, H. (2003). Comparison of Three Vertical Search Spiders. IEEE Computer, 36(5), 56–62.CrossRef Chau, M. and Chen, H. (2003). Comparison of Three Vertical Search Spiders. IEEE Computer, 36(5), 56–62.CrossRef
Zurück zum Zitat Chen, C. (2003). Mapping Scientific Frontiers. London, UK, Springer-Verlag.CrossRef Chen, C. (2003). Mapping Scientific Frontiers. London, UK, Springer-Verlag.CrossRef
Zurück zum Zitat Chen, H. (2001). Knowledge Management Systems: A Text Mining Perspective, University of Arizona, Tucson, Arizona. Chen, H. (2001). Knowledge Management Systems: A Text Mining Perspective, University of Arizona, Tucson, Arizona.
Zurück zum Zitat Chen, H. (2006). Intelligence and Security Informatics, Springer-Verlag. Chen, H. (2006). Intelligence and Security Informatics, Springer-Verlag.
Zurück zum Zitat Cho, J., Garcia-Molina, H., and Page, L. (1998). Efficient Crawling Through URL Ordering. In Proceedings of the 7th World Wide Web Conference, Brisbane, Australia. Cho, J., Garcia-Molina, H., and Page, L. (1998). Efficient Crawling Through URL Ordering. In Proceedings of the 7th World Wide Web Conference, Brisbane, Australia.
Zurück zum Zitat Crane, D. (1972). Invisible Colleges: Diffusion of Knowledge in Scientific Communities. Chicago, University of Chicago Press. Crane, D. (1972). Invisible Colleges: Diffusion of Knowledge in Scientific Communities. Chicago, University of Chicago Press.
Zurück zum Zitat Glance, N., Hurst, M., Nigam, K. Siegler, M., Stockton, R. and Tomokiyo, T. (2005). Analyzing Online Discussion for Marketing Intelligence, In Proceedings of the 14th International World Wide Web Conference, Chicago, Illinois. Glance, N., Hurst, M., Nigam, K. Siegler, M., Stockton, R. and Tomokiyo, T. (2005). Analyzing Online Discussion for Marketing Intelligence, In Proceedings of the 14th International World Wide Web Conference, Chicago, Illinois.
Zurück zum Zitat Glaser, J., Dixit, J., and Green, D. P. (2002). Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence? Journal of Social Issues, 58(1), 177–193.CrossRef Glaser, J., Dixit, J., and Green, D. P. (2002). Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence? Journal of Social Issues, 58(1), 177–193.CrossRef
Zurück zum Zitat Lawrence, S. and Giles, C. L. (1998). Searching the World Wide Web. Science, 280(5360), 98–100.CrossRef Lawrence, S. and Giles, C. L. (1998). Searching the World Wide Web. Science, 280(5360), 98–100.CrossRef
Zurück zum Zitat Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security. Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.
Zurück zum Zitat Raghavan, S. and Garcia-Molina, H. (2001). Crawling the Hidden Web. In Proceedings of the 27th International Conference on Very Large Databases. Raghavan, S. and Garcia-Molina, H. (2001). Crawling the Hidden Web. In Proceedings of the 27th International Conference on Very Large Databases.
Zurück zum Zitat Schafer, J. (2002). Spinning the Web of Hate: Web-Based Hate Propagation by Extremist Organizations. Journal of Criminal Justice and Popular Culture, 9(2), 69–88. Schafer, J. (2002). Spinning the Web of Hate: Web-Based Hate Propagation by Extremist Organizations. Journal of Criminal Justice and Popular Culture, 9(2), 69–88.
Zurück zum Zitat Shneiderman, B. (1996). The Eyes Have It: A Task by Data Type Taxonomy for Information Visualization, Proceedings of IEEE Workshop on Visual Languages’96, 336–343. Shneiderman, B. (1996). The Eyes Have It: A Task by Data Type Taxonomy for Information Visualization, Proceedings of IEEE Workshop on Visual Languages’96, 336–343.
Zurück zum Zitat Shiffrin, R. M. and Börner, K., (2004). Mapping Knowledge Domains. Arthur M. Sackler Colloguia of the National Academy of Sciences, National Academies of Sciences. Shiffrin, R. M. and Börner, K., (2004). Mapping Knowledge Domains. Arthur M. Sackler Colloguia of the National Academy of Sciences, National Academies of Sciences.
Zurück zum Zitat Sparrow, M. K., (1991). The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects, Social Networks, 13, 251–274.CrossRef Sparrow, M. K., (1991). The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects, Social Networks, 13, 251–274.CrossRef
Zurück zum Zitat Xu, J. and Chen, H. (2005) CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems, 23(2), pp. 201–226.MathSciNetCrossRef Xu, J. and Chen, H. (2005) CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery. ACM Transactions on Information Systems, 23(2), pp. 201–226.MathSciNetCrossRef
Zurück zum Zitat Zhou, Y., Reid, E., Qin, J., Chen, H., and Lai, G. (2005). U.S. Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, 20(5), 44–51.CrossRef Zhou, Y., Reid, E., Qin, J., Chen, H., and Lai, G. (2005). U.S. Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, 20(5), 44–51.CrossRef
Metadaten
Titel
Weapons of Mass Destruction (WMD) on Dark Web
verfasst von
Hsinchun Chen
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_17

Premium Partner