Skip to main content

Part of the book series: Advances in Soft Computing ((AINSC,volume 53))

Abstract

Since the end of the Cold War, the threat of large scale wars has been substituted by new threats: terrorism, organized crime, trafficking, smuggling, proliferation of weapons of mass destruction. The new criminals, especially the so called “jihadist” terrorists are using the new technologies, as those enhanced by Web2.0, to fight their war. Text mining is the most advanced knowledge management technology which allow intelligence analysts to automatically analyze the content of information rich online data banks, suspected web sites, blogs, emails, chat lines, instant messages and all other digital media detecting links between people and organizations, trends of social and economic actions, topics of interest also if they are “sunk” among terabytes of information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lisse, W.: The Economics of Information and the Internet. Competitive Intelligence Review 9(4) (1998)

    Google Scholar 

  2. Treverton, G.F.: Reshaping National Intelligence in an Age of Information. Cambridge University Press, Cambridge (2001)

    Google Scholar 

  3. Ronfeldt, D., Arquilla, J.: The Advent of Netwar –Rand Corporation (1996)

    Google Scholar 

  4. Goldfinger, C.: Travail et hors Travail: vers une societe fluide. In: Jacob, O. (ed.) (1998)

    Google Scholar 

  5. Kohlmann, E.: The Real Online Terrorist Threat – Foreign Affairs (September/October 2006)

    Google Scholar 

  6. Mueller, J.: Is There Still a Terrorist Threat? – Foreign Affairs (September/ October 2006)

    Google Scholar 

  7. Riedel, B.: Al Qaeda Strikes Back – Foreign Affairs (May/June 2007)

    Google Scholar 

  8. Zanasi, A. (ed.): Text Mining and its Applications to Intelligence, CRM and Knowledge Management. WIT Press, Southampton (2007)

    Google Scholar 

  9. Bobbitt, P.: The Shield of Achilles: War, Peace, and the Course of History, Knopf (2002)

    Google Scholar 

  10. Zanasi, A.: New forms of war, new forms of Intelligence: Text Mining. In: ITNS Conference, Riyadh (2007)

    Google Scholar 

  11. Steinberg, J.: In Protecting the Homeland 2006/2007 - The Brookings Institution (2006)

    Google Scholar 

  12. Rheingold, H.: The Virtual Community. MIT Press, Cambridge (2000)

    Google Scholar 

  13. Feldman, S.: Insider Trading and More, IDC Report, Doc#28651 (December 2002)

    Google Scholar 

  14. de Laat, M.: Network and content analysis in an online community discourse. University of Nijmegen (2002)

    Google Scholar 

  15. Benedetti, A.: Il linguaggio delle nuove Brigate Rosse, Erga Edizioni (2002)

    Google Scholar 

  16. Zanasi, A.: Competitive Intelligence Thru Data Mining Public Sources - Competitive Intelligence Review, vol. 9(1). John Wiley & Sons, Inc., Chichester (1998)

    Google Scholar 

  17. The Other War, The Economist March 26 (2003)

    Google Scholar 

  18. Campbell, D.: - World under Watch, Interception Capabilities in the 21st Century – ZDNet.co (2001) (updated version of Interception Capabilities 2000, A report to European Parlement - 1999)

    Google Scholar 

  19. Zanasi, A.: Email, chatlines, newsgroups: a continuous opinion surveys source thanks to text mining. In: Excellence in Int’l Research 2003 - ESOMAR (Nl) (2003)

    Google Scholar 

  20. Jones, C.W.: Online Impression Management. University of California paper (July 2005)

    Google Scholar 

  21. Degenne, A., Forse, M.: Introducing Social Networks. Sage Publications, London (1999)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zanasi, A. (2009). Virtual Weapons for Real Wars: Text Mining for National Security. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, Á. (eds) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08. Advances in Soft Computing, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88181-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88181-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88180-3

  • Online ISBN: 978-3-540-88181-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics