{"title":"Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal Intelligence","authors":"Junayed Islam, B. Wong","doi":"10.1109/EISIC.2017.30","DOIUrl":"https://doi.org/10.1109/EISIC.2017.30","url":null,"abstract":"Studying how intelligence analysts use interaction in visualization systems is an important part of evaluating how well these interactions support analysis needs, like generating insights or performing tasks. Intelligence analysis is inherently a fluid activity involving transitions between mental and interaction states through analytic processes. A gap exists to complement these transitions at micro-analytic level during data exploration or task performance. We propose Behavioural markers (BMs) which are representatives of the action choices that analysts make during their analytical processes as the bridge between human cognition and computation through semantic interaction. A low level semantic action sequence computation technique has been proposed to extract these BMs from captured process log. Our proposed computational technique can supplement the problems of existing qualitative approaches to extract such BMs.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Crime Scripts: One CCTV Footage—Twenty-One Scripts","authors":"H. Borrion, Hashem Dehghanniri, Yuanxi Li","doi":"10.1109/EISIC.2017.23","DOIUrl":"https://doi.org/10.1109/EISIC.2017.23","url":null,"abstract":"In recent years, there has been a growing interest in the modelling of crime commission processes, in particular crime scripting, in physical and cyber spaces. This article aims to demonstrate the limits of unstructured scripting approaches, and advocates the development of more systematic techniques. For this, we examined he differences and similarities between various scripts. Twenty-one participants were trained in crime scripting, and tasked to produce individual scripts based on the same video footage of a shop robbery. Content analysis was applied to the scripts, which involved classifying the different steps of the crime commission process and analyzing their distributions. A scoring system was then developed to assess the relative degree of completeness of each script, and linear regression computed using the number of activities included as the predictor variable. This research provides the first evidence of the limits of creating scripts using an intuitive approach, and the need for applying semi-structured goal-based methods.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Groenewald, B. Wong, S. Attfield, P. Passmore, N. Kodagoda
{"title":"How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information?","authors":"C. Groenewald, B. Wong, S. Attfield, P. Passmore, N. Kodagoda","doi":"10.1109/EISIC.2017.15","DOIUrl":"https://doi.org/10.1109/EISIC.2017.15","url":null,"abstract":"The Criminal Intelligence Analyst's role is to create exhibits which are relevant, accurate and unbiased. Exhibits can be used as input to assist decision-making in intelligence-led policing. It may also be used as evidence in a court of law. The aim of this study was to determine how Criminal Intelligence Analysts recognise and manage significant information as a method to determine what is relevant for their attention and for the creation of exhibits. This in turn may provide guidance on how to design and incorporate loose and flexible argumentation schemas into sense-making software. The objective is to be informed on how to design software, which affords Criminal Intelligence Analysts with the ability to effortlessly determine the relevance of information, which subsequently could assist with the process of assessing and defending the quality of exhibits.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bedek, A. Nussbaumer, Eva-Catherine Hillemann, D. Albert
{"title":"A Framework for Measuring Imagination in Visual Analytics Systems","authors":"M. Bedek, A. Nussbaumer, Eva-Catherine Hillemann, D. Albert","doi":"10.1109/EISIC.2017.31","DOIUrl":"https://doi.org/10.1109/EISIC.2017.31","url":null,"abstract":"This paper presents a framework for measuring imagination support in criminal analysis systems. Imagination is important for criminal analysts in their everyday work when they have to solve criminal cases. Typically, they are faced with a huge amount of information that is often ill-structured, do not contain all relationships, and are characterised by many uncertainties. In order to draw correct conclusions and to solve cases, analysts need imagination to find out facts from such data, or in other words: to detect the signals out from the noise. This paper describes a general framework for introducing imagination support in criminal analysis systems. The framework consists of two parts, first the operationalisation of imagination, and second, guidelines for an experimental setting of evaluating criminal analysis systems regarding their imagination support. This work is intended to serve as a baseline for future evaluation work of criminal analysis systems.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panos Kostakos, Miika Moilanen, Arttu Niemela, M. Oussalah
{"title":"Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching","authors":"Panos Kostakos, Miika Moilanen, Arttu Niemela, M. Oussalah","doi":"10.1109/EISIC.2017.28","DOIUrl":"https://doi.org/10.1109/EISIC.2017.28","url":null,"abstract":"The Panama Papers is a collection of 11.5 million leaked records that contain information for more than 214,488 offshore entities. This collection is growing rapidly as more leaked records become available online. In this paper, we present a work in progress on a web browser plugin that detects company names from the Panama Papers and alerts the user by means of unobtrusive visual cues. We matched a random sample of company names from the Public Works and Government Services Canada registry against the Panama Papers using three different string matching techniques. Monge-Elkan is found to provide the best matching results but at increased computational cost. Levenshtein-based approach is found to provide the best tradeoff between matching and computational cost, while Jacquard index like approach is found to be less sensitive to slight textual change.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled Khelif, Yann Mombrun, G. Backfried, Farhan Sahito, L. Scarpato, P. Motlícek, S. Madikeri, Damien Kelly, Gideon Hazzani, Emmanouil Chatzigavriil
{"title":"Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIP","authors":"Khaled Khelif, Yann Mombrun, G. Backfried, Farhan Sahito, L. Scarpato, P. Motlícek, S. Madikeri, Damien Kelly, Gideon Hazzani, Emmanouil Chatzigavriil","doi":"10.1109/EISIC.2017.14","DOIUrl":"https://doi.org/10.1109/EISIC.2017.14","url":null,"abstract":"This paper describes SIIP (Speaker Identification Integrated Project) a high performance innovative and sustainable Speaker Identification (SID) solution, running over large voice samples database. The solution is based on development, integration and fusion of a series of speech analytic algorithms which includes speaker model recognition, gender identification, age identification, language and accent identification, keyword and taxonomy spotting. A full integrated system is proposed ensuring multisource data management, advanced voice analysis, information sharing and efficient and consistent man-machine interactions.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pragya Paudyal, C. Rooney, N. Kodagoda, B. Wong, P. Duquenoy, Nadeem Qazi
{"title":"How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: A Pilot Study","authors":"Pragya Paudyal, C. Rooney, N. Kodagoda, B. Wong, P. Duquenoy, Nadeem Qazi","doi":"10.1109/EISIC.2017.35","DOIUrl":"https://doi.org/10.1109/EISIC.2017.35","url":null,"abstract":"Police analysts increasingly use data analysis techniques to make decisions that have an impact on society. Previous research shows that excluding ethically sensitive information (features) such as name, surname, address etc. during the data analysis process has implications for accuracy and decision-making, which may have negative consequences affecting individuals or a group within society. To assess whether the use of ethically sensitive features has implications for decision-making, we identified two important aspects: (i) transparency of the feature selection, and (ii) a way of assessing the impact of the selected features. In this paper, we define ethically sensitive information from two aspects: (a) features that identify an individual, known as personally identifiable information, and (b) sensitive features that discriminate against the individual, known as prejudice information. We investigate whether the selection of these features has an impact on accurately identifying co-offenders. For this, we propose a privacy scale, which consists of a value for each feature depending on the label of their sensitivity. To explore this, we used an anonymized dataset received from a UK law enforcement agency. Ground truths samples with known co-offender were selected for this study. We used the clustering algorithm K-MODE and included and excluded features that included personal, prejudice and other attributes to assess the relationship between the privacy score of the combined input attributes and the accuracy of the clustering. The results suggest that the use of ethically sensitive features does have an impact on correctly identifying potential co-offenders more accurately.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Inconvenient Truth: Algorithmic Transparency & Accountability in Criminal Intelligence Profiling","authors":"Erik T. Zouave, Thomas Marquenie","doi":"10.1109/EISIC.2017.12","DOIUrl":"https://doi.org/10.1109/EISIC.2017.12","url":null,"abstract":"In the hopes of making law enforcement more effective and efficient, police and intelligence analysts are increasingly relying on algorithms underpinning technologybased and data-driven policing. To achieve these objectives, algorithms must also be accurate, unbiased and just. In this paper, we examine how European data protection law regulates automated profiling and how this regulation impacts police and intelligence algorithms and algorithmic discrimination. In particular, we assess to what extent the regulatory frameworks address the challenges of algorithmic transparency and accountability. We argue that while the law regulates both algorithms and their discriminatory effects, the framework is insufficient in addressing the complex interactions that must take place between system developers, users, oversight and profiled individuals to fully guarantee algorithmic transparency and accountability.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence","authors":"Vasileios Mavroeidis, Siri Bromander","doi":"10.1109/EISIC.2017.20","DOIUrl":"https://doi.org/10.1109/EISIC.2017.20","url":null,"abstract":"Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security operations in terms of detective and preventive capabilities. Successful threat intelligence within the cyber domain demands a knowledge base of threat information and an expressive way to represent this knowledge. This purpose is served by the use of taxonomies, sharing standards, and ontologies.This paper introduces the Cyber Threat Intelligence (CTI) model, which enables cyber defenders to explore their threat intelligence capabilities and understand their position against the ever-changing cyber threat landscape. In addition, we use our model to analyze and evaluate several existing taxonomies, sharing standards, and ontologies relevant to cyber threat intelligence. Our results show that the cyber security community lacks an ontology covering the complete spectrum of threat intelligence. To conclude, we argue the importance of developing a multi-layered cyber threat intelligence ontology based on the CTI model and the steps should be taken under consideration, which are the foundation of our future work.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Torregrosa, Irene Gilpérez-López, R. Lara-Cabrera, David Garriga, David Camacho
{"title":"Can an Automatic Tool Assess Risk of Radicalization Online? A Case Study on Facebook","authors":"J. Torregrosa, Irene Gilpérez-López, R. Lara-Cabrera, David Garriga, David Camacho","doi":"10.1109/EISIC.2017.36","DOIUrl":"https://doi.org/10.1109/EISIC.2017.36","url":null,"abstract":"Can risk of radicalization be measured analyzing users' information on the Internet? Following the background from recent studies [1], [2], [3], [4], this work aims to test the viability of detecting and measuring risk factors of jihadist radicalization with a Facebook case. The work has been performed under the frame of RiskTrack project, which aim is to develop an automatic risk assessment tool for jihadist radicalization, using data from online social networks profiles.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}