Abstract
Since the end of the Cold War, the threat of large scale wars has been substituted by new threats: terrorism, organized crime, trafficking, smuggling, proliferation of weapons of mass destruction. The new criminals, especially the so called “jihadist” terrorists are using the new technologies, as those enhanced by Web2.0, to fight their war. Text mining is the most advanced knowledge management technology which allow intelligence analysts to automatically analyze the content of information rich online data banks, suspected web sites, blogs, emails, chat lines, instant messages and all other digital media detecting links between people and organizations, trends of social and economic actions, topics of interest also if they are “sunk” among terabytes of information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lisse, W.: The Economics of Information and the Internet. Competitive Intelligence Review 9(4) (1998)
Treverton, G.F.: Reshaping National Intelligence in an Age of Information. Cambridge University Press, Cambridge (2001)
Ronfeldt, D., Arquilla, J.: The Advent of Netwar –Rand Corporation (1996)
Goldfinger, C.: Travail et hors Travail: vers une societe fluide. In: Jacob, O. (ed.) (1998)
Kohlmann, E.: The Real Online Terrorist Threat – Foreign Affairs (September/October 2006)
Mueller, J.: Is There Still a Terrorist Threat? – Foreign Affairs (September/ October 2006)
Riedel, B.: Al Qaeda Strikes Back – Foreign Affairs (May/June 2007)
Zanasi, A. (ed.): Text Mining and its Applications to Intelligence, CRM and Knowledge Management. WIT Press, Southampton (2007)
Bobbitt, P.: The Shield of Achilles: War, Peace, and the Course of History, Knopf (2002)
Zanasi, A.: New forms of war, new forms of Intelligence: Text Mining. In: ITNS Conference, Riyadh (2007)
Steinberg, J.: In Protecting the Homeland 2006/2007 - The Brookings Institution (2006)
Rheingold, H.: The Virtual Community. MIT Press, Cambridge (2000)
Feldman, S.: Insider Trading and More, IDC Report, Doc#28651 (December 2002)
de Laat, M.: Network and content analysis in an online community discourse. University of Nijmegen (2002)
Benedetti, A.: Il linguaggio delle nuove Brigate Rosse, Erga Edizioni (2002)
Zanasi, A.: Competitive Intelligence Thru Data Mining Public Sources - Competitive Intelligence Review, vol. 9(1). John Wiley & Sons, Inc., Chichester (1998)
The Other War, The Economist March 26 (2003)
Campbell, D.: - World under Watch, Interception Capabilities in the 21st Century – ZDNet.co (2001) (updated version of Interception Capabilities 2000, A report to European Parlement - 1999)
Zanasi, A.: Email, chatlines, newsgroups: a continuous opinion surveys source thanks to text mining. In: Excellence in Int’l Research 2003 - ESOMAR (Nl) (2003)
Jones, C.W.: Online Impression Management. University of California paper (July 2005)
Degenne, A., Forse, M.: Introducing Social Networks. Sage Publications, London (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zanasi, A. (2009). Virtual Weapons for Real Wars: Text Mining for National Security. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, Á. (eds) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08. Advances in Soft Computing, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88181-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-88181-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88180-3
Online ISBN: 978-3-540-88181-0
eBook Packages: EngineeringEngineering (R0)