By Topic

2012 European Intelligence and Security Informatics Conference

22-24 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 73
  • EISIC 2012 - 2012 European Intelligence and Security Informatics Conference [cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Proceedings - 2012 European Intelligence and Security Informatics Conference [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Message from the General Chairs of EISIC 2012

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Eisic 2012 message from the program co-chairs

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • EISIC 2012 Organization

    Publication Year: 2012, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • The Utilization of Forensic Evidence in IED Incidents

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    Recognition of Forensic evidence and laboratory analysis of physical evidence can be helpful in investigation of IED incidents. Not all types of physical evidence will be directly linked to or can identify a suspect. In fact, most common use of physical evidence found at IED incident scenes is to identify the substance or chemical present in the question sample. However, physical evidence could pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics

    Publication Year: 2012, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    Summary form only given. This talk will summarize the University of Arizona Artificial Intelligence Lab's Dark Web research and discuss current and future development of a new GeoPolitical Web research program, which aims to study the emerging geopolitical events using advanced social media analytics techniques. The GeoPolital Web project is collecting longitudinal multilingual social media conten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OSINT, the Internet and Privacy

    Publication Year: 2012, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    In just 17 years the Internet has transformed practically every facet of modern life. The launch of Mosaic, the first web browser in 1993 was the catalyst for a communication revolution, whose implications are still unraveling. The Web was always intended to be a two-way multi-user publishing system undermining state controlled one way broadcasting. Unleashing a mass worldwide communication networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks

    Publication Year: 2012, Page(s):5 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    Terrorist groups tend to develop unconventional ways to disrupt or destroy economic and critical infrastructures. Examples of unconventional methods include setting up cyberattack cells to disrupt critical infrastructures; using unmonitored financial resources to disrupt or bankrupt national economies; and establishing organizations within countries to desensitize the population to terrorist objec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Fraud in Financial Reports

    Publication Year: 2012, Page(s):7 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Fraud in public companies has a large financial impact, and yet is only weakly detected by those who look for it, many incidents have been detected only when whistleblowers have come forward. We examine the problem of detecting fraud from the textual component of the quarterly and annual reports that public companies are required to file. Using an empirically derived set of words, we achieve predi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Transparency Improves the Control of Law Enforcement Authorities' Activities?

    Publication Year: 2012, Page(s):14 - 21
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    When preventing and investigating crime the law enforcement authorities (LEAs) perform a variety of activities that affect civilians' privacy. Video surveillance, audio surveillance, technical monitoring and tracking are few to mention amongst many other activities. On various incidents, law enforcement is seeking more control rights that increases concern amongst citizens and also level of open d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community of Intelligence: The Secret Behind Intelligence-Led Policing

    Publication Year: 2012, Page(s):22 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Intelligence-led policing is the use of analyzed information by decision makers to decide on police resources. Analysis is very important in this and increasingly needs to be a collaborative effort: tools, techniques and the complexity of crimes far exceeds the capacity and expertise of any single analyst. Analysts have to collaborate to create an understanding. In this paper we describe how the D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framing the Attacker in Organized Cybercrime

    Publication Year: 2012, Page(s):30 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    When large values are at stake, the attacker and the attacker's motives cannot be easily modeled, since both the organization at stake and the possible attackers are unique and have complex motives. Hence, rather than using stereotypical attacker models, recent work proposes realistic profiling of the opponent by the use of user-centered design principles in form of the persona methodology. Today,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile

    Publication Year: 2012, Page(s):38 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    According to Crime Pattern Theory, individuals all have routine daily activities which require frequent travel between several nodes, with each used for various purposes, such as their home, work, or shopping location. As people move about, their familiarity with the spatial areas around, and in between, the nodes increases, eventually forming their Activity Space. Offenders have similar spatial m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To Incorporate Sequential Dynamic Features in Malware Detection Engines

    Publication Year: 2012, Page(s):46 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Currently, signature-based detection is a widely used method within commercial antivirus. Although this method is still used by the most commercial antivirus softwares and is capable of detecting specific malwares quickly, it fails to detect new malwares. Therefore, antivirus engines are not limited to static signature based detection, their intelligent detection subsystem can detect unknown malwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting and Networking Emotions in Extremist Propaganda

    Publication Year: 2012, Page(s):53 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    This paper presents a way to understand the relationship between emotive words or phrases in terrorist/extremist propaganda. The term "relationship" in this paper is defined as the degree of contact that emotional markers have in text. An ontology is used to identify emotional content before being analyzed in text networking software, specifically Automap and ORA (Organizational Risk Analyzer). Au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computational Model for Predicting the Location of Crime Attractors on a Road Network

    Publication Year: 2012, Page(s):60 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1729 KB) | HTML iconHTML

    Crime Pattern Theory argues that offenders often commit their crimes at major criminal attractors or along the routes that lead to these attractors from other activity nodes in their awareness space. Without knowledge about each offender's awareness space, however, it is not possible to know the nodes they travel to. In this paper, it is assumed that each offender commits their crime along the way... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics

    Publication Year: 2012, Page(s):68 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    This article examines some of the ethical issues that engineers face in developing bio-protection systems for smart buildings. An innovative approach based on four different containment strategies is used to identify these issues. Subsequent analysis shows that, whilst smart buildings have the potential to prioritize the safety of the group over that of individuals, the practical and ethical imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security

    Publication Year: 2012, Page(s):76 - 83
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1058 KB) | HTML iconHTML

    An important contribution to anti-fraud and supply-chain security comes from the development of Risk Analysis tools targeted to the discovery of suspicious containerized transportations. In this work we present the Anomalous Container Itinerary Detection (ACID) framework that analyses Container Status Messages to discover irregular container shipments. The system has been developed at JRC as part ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring a Warrior Paradigm to Design Out Cybercrime

    Publication Year: 2012, Page(s):84 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Cyber crime increases with the advent of new online Internet services (e.g., entertainment, commerce, payment, pubic administration, social networking services). Not only do cyber criminals target governmental or public institutions, they increasingly victimize individuals and smaller organizations. At the same time, we observe that individuals and organizations steadily join forces and take a mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering

    Publication Year: 2012, Page(s):91 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    This paper concentrates on cyber-pornography/obscenity, which encompasses online publications or distribution of sexually explicit material in breach of the English obscenity and indecency laws. After examining the major deficiencies of the attempts to restrict illegal pornographic representations, the authors aim to highlight that the debate regarding their availability in the Internet era neglec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Many Ways Do Offenders Travel -- Evaluating the Activity Paths of Offenders

    Publication Year: 2012, Page(s):99 - 106
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2038 KB) | HTML iconHTML

    According to the Journey to Crime theory, offenders have a directionality preference, in the form of an activity path, when they are moving about in their environment in search for criminal activities. Using clustering techniques, this theory is tested using crime data for the Province of British Columbia, Canada. The activities of 57,962 offenders who were either charged, chargeable, or for whom ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.