Abstract
Keyword filtering is a commonly used way to select, from a set of intercepted messages, those that need further scrutiny. An obvious countermeasure is to replace words that might be on a keyword list by others. We show that this strategy itself creates a signature in the altered messages that makes them readily detectable using several forms of matrix decomposition. Not only can unusual messages be detected, but sets of related messages can be detected as conversations, even when their endpoints have been obscured (by using transient email addresses, stolen cell phones and so on).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baker, W.E., Faulkner, R.B.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review 58, 837–860 (1993)
Coffman, T., Greenblatt, S., Marcus, S.: Graph-based technologies for intelligence analysis. CACM 47(3), 45–47 (2004)
European Parliament Temporary Committee on the ECHELON Interception System. Final report on the existence of a global system for the interception of private and commercial communications (echelon interception system) (2001)
Garton, L., Haythornthwaite, C., Wellman, B.: Studying online social networks. Journal of Computer-Mediated Communication 3(1) (1997)
Golub, G.H., van Loan, C.F.: Matrix Computations, 3rd edn. Johns Hopkins University Press, Baltimore (1996)
Hyvärinen, A.: Survey on independent component analysis. Neural Computing Surveys 2, 94–128 (1999)
Ferreri Cancho, R., Solé, R.V.: The small world of human language. In: Proceedings of the Royal Society of London Series B – Biological Sciences, pp. 2261–2265 (2001)
Keila, P.S., Skillicorn, D.B.: Structure in the Enron email dataset. In: Third Workshop on Link Analysis, Counterterrorism and Security, SIAM International Data Mining Conference, pp. 55–64 (2005)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Li, W.: Random texts exhibit Zipf’s-law-like word frequency distribution. IEEETIT: IEEE Transactions on Information Theory 38(6), 1842–1845 (1992)
McArthur, R., Bruza, P.: Discovery of implicit and explicit connections between people using email utterance. In: Proceedings of the Eighth European Conference of Computer-supported Cooperative Work, Helsinki, pp. 21–40 (2003)
Tyler, J.R., Wilkinson, D.M., Huberman, B.A.: Email as spectroscopy: Automated discovery of community structure within organizations. HP Labs, Mill Road, Palo Alto CA, 94304, p. 1501 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Skillicorn, D.B. (2005). Beyond Keyword Filtering for Message and Conversation Detection. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_19
Download citation
DOI: https://doi.org/10.1007/11427995_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)