Transforming open-source documents to terror networks: The arizona terrornet

Daniel M. McDonald, Hsinchun Chen, Robert P. Schumaker

Research output: Contribution to conferencePaper

4 Scopus citations

Abstract

Homeland security researchers and analysts more than ever must process large volumes of textual information. Information extraction techniques have been proposed to help alleviate the burden of information overload. Information extraction techniques, however, require retraining and/or knowledge re-engineering when document types vary as in the homeland security domain. Also, while effectively reducing the volume of the information, information extraction techniques do not point researchers to unanticipated interesting relationships identified within the text. We present the Arizona TerrorNet, a system that utilizes less specified information extraction rules to extract less choreographed relationships between known terrorists. Extracted relations are combined in a network and visualized using a network visualizer. We processed 200 unseen documents using the TerrorNet which extracted over 500 relationships between known terrorists. An Al Qaeda network expert made a preliminary inspection of the network and confirmed many of the network links.

Original languageEnglish (US)
Pages62-69
Number of pages8
StatePublished - Dec 1 2005
Event2005 AAAI Spring Symposium - Stanford, CA, United States
Duration: Mar 21 2005Mar 23 2005

Other

Other2005 AAAI Spring Symposium
CountryUnited States
CityStanford, CA
Period3/21/053/23/05

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Transforming open-source documents to terror networks: The arizona terrornet'. Together they form a unique fingerprint.

  • Cite this

    McDonald, D. M., Chen, H., & Schumaker, R. P. (2005). Transforming open-source documents to terror networks: The arizona terrornet. 62-69. Paper presented at 2005 AAAI Spring Symposium, Stanford, CA, United States.