GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits

Sumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma
{"title":"GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits","authors":"Sumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma","doi":"10.1109/ICIS.2016.7550758","DOIUrl":null,"url":null,"abstract":"Terrorism is on the rise in the Indian Sub-Continent and application of data mining techniques to analyse terrorist attacks is the need of the hour. The Security Forces (SF) in this region still rely on traditional and manual analysis methods. Data mining in this field is in its budding stage and if utilised efficiently will greatly facilitate the SF in preventing any terrorist attacks. SF are constantly searching for latest data mining techniques to augment terror analytics and improve protection of the local civilians and self thereby reducing collateral damage. Predicting terror attacks can push the potential of SF to the beat of terrorist activities. It is significant to recognise the spatial and temporal patterns for a better learning of terror incidents and to conceive their correlation. Clustering and Association rule mining (ARM) thus become strong contenders for efficient terror strikes forecasting. The above techniques can be used for a systematic profiling of outfits thus leading to the discovery of a unique pattern of operations i.e. Modus Operandi (MO) of a particular terror outfit. After gaining knowledge from data mining it is essential to convert it into actionable intelligence in order to be used by foot soldiers. Therefore, the paper provides concrete intelligence about various terror outfits operating in the most active Jammu and Kashmir (J&K) region of the Indian sub-continent.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"469 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2016.7550758","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Terrorism is on the rise in the Indian Sub-Continent and application of data mining techniques to analyse terrorist attacks is the need of the hour. The Security Forces (SF) in this region still rely on traditional and manual analysis methods. Data mining in this field is in its budding stage and if utilised efficiently will greatly facilitate the SF in preventing any terrorist attacks. SF are constantly searching for latest data mining techniques to augment terror analytics and improve protection of the local civilians and self thereby reducing collateral damage. Predicting terror attacks can push the potential of SF to the beat of terrorist activities. It is significant to recognise the spatial and temporal patterns for a better learning of terror incidents and to conceive their correlation. Clustering and Association rule mining (ARM) thus become strong contenders for efficient terror strikes forecasting. The above techniques can be used for a systematic profiling of outfits thus leading to the discovery of a unique pattern of operations i.e. Modus Operandi (MO) of a particular terror outfit. After gaining knowledge from data mining it is essential to convert it into actionable intelligence in order to be used by foot soldiers. Therefore, the paper provides concrete intelligence about various terror outfits operating in the most active Jammu and Kashmir (J&K) region of the Indian sub-continent.
GenIt-e-MoTo:一代情报人员设想恐怖组织的运作方式
恐怖主义在印度次大陆呈上升趋势,应用数据挖掘技术分析恐怖袭击是当务之急。该地区的安全部队(SF)仍然依靠传统的人工分析方法。该领域的数据挖掘正处于萌芽阶段,如果有效利用,将极大地促进特种部队防止任何恐怖袭击。SF一直在寻找最新的数据挖掘技术,以增强恐怖分析,提高对当地平民和自己的保护,从而减少附带损害。预测恐怖袭击可以将SF的潜力推到恐怖活动的前面。认识到空间和时间模式对于更好地了解恐怖事件并设想它们的相关性是非常重要的。因此,聚类和关联规则挖掘(ARM)成为有效预测恐怖袭击的有力竞争者。上述技术可用于系统地分析恐怖组织,从而发现一种独特的行动模式,即特定恐怖组织的作案手法。从数据挖掘中获得知识后,必须将其转化为可操作的情报,以便步兵使用。因此,本文提供了在印度次大陆最活跃的查谟和克什米尔(J&K)地区活动的各种恐怖组织的具体情报。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信