Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Analysis of Weak Signals for Detecting Lone Wolf Terrorists
Swedish Defence Research Agency.ORCID iD: 0000-0002-2677-9759
Swedish Defence Research Agency.
Swedish Defence Research Agency.
Swedish Defence Research Agency.
Show others and affiliations
2012 (English)In: Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012), 2012, 197-204 p.Conference paper, Published paper (Refereed)
Abstract [en]

Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kind of terrorists before they commit a terror act is limited since they are very hard to detect using traditional methods. However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge to plan an attack. Therefore, there is a good possibility that they leave digital traces in the form of weak signals that can be gathered, fused, and analyzed.

In this work we present an analysis method that can be used to analyze extremist forums to profile possible lone wolf terrorists. This method is conceptually demonstrated using the FOI Impactorium fusion platform. We also present a number of different technologies that can be used to harvest and analyze information from Internet, serving as weak digital traces that can be fused using the suggested analysis method, in order to discover possible lone wolf terrorists.

Place, publisher, year, edition, pages
2012. 197-204 p.
Keyword [en]
intelligence analysis, natural language processing, NLP, text mining, affect analysis, weak signals
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-109269DOI: 10.1109/EISIC.2012.20Scopus ID: 2-s2.0-84868530799OAI: oai:DiVA.org:kth-109269DiVA: diva2:580731
Conference
IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012)
Note

QC 20130114

Available from: 2012-12-26 Created: 2012-12-26 Last updated: 2013-01-14Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Brynielsson, Joel

Search in DiVA

By author/editor
Brynielsson, Joel
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 74 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf