Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet211/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   207   208   209   210   211   212   213   214   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

206
CHAPTER 15
Social media and its role for LEAs: Review and applications
reports, the use of an algorithmic approach based on the calculation of Euclidean 
Distances for the identification of identity deceptions by criminals, the tracing of identi-
ties of criminals from posted messages on the Web using learning algorithms, such as 
Support Vector Machines, and the use of Social Network Analysis for uncovering struc-
tural patterns from criminal networks can all aid in improving the quality and diversity of 
information being fed into the intelligence operations of LEAs.
SOCIAL MEDIA IN “LONE-WOLF” SCENARIOS FOR EARLY 
ASSESSMENT AND IDENTIFICATION OF THREATS
Currently, policing intelligence relies on reports from the public, or the recipients 
of threats in order to take appropriate action in response to the posts made online 
indicating possible criminal behavior. Due to this reliance on public reporting, there 
is potential for these threats to go ignored, or to be drowned out by the noise of the 
sheer unquantifiable amount of information being posted to social media sites each 
day. Often in cases such as those identified, the perpetrators are not acting on behalf 
of a wider criminal organization, or executing a planned course of action. Instead, 
these threats are regularly instinctive attacks that are unplanned and irrational, and 
in response to events that draw emotion, executed by individuals out for vengeance, 
often with histories of social instability and psychological problems. In cases such as 
this LEAs are unable to draw upon robust intelligence sources to identify a current 
or emergent threat from the individual as, one off, unplanned events such as the lone-
wolf school shooting scenarios identified previously rarely have a bread-crumb trail 
of evidence that can be picked up by LEA's existing intelligence operations.
Recent reviews of the US intelligence infrastructure have led to the development 
and formation of “fusion centers” aiming to coordinate intelligence and serve law 
enforcement agencies (LEAs) across entire states in the acquisition, analysis and dis-
semination of intelligence (U.S. 
Department of Justice, 2005
). Within these fusion 
centers, there is potential for the application and integration of social media analytics 
in the crawling and analysis of social media as an open-source intelligence repository 
in response to emergent, unplanned “lone-wolf” scenarios such as those discussed in 
Chapter 10. In these situations, there are two potential streams of information that 
is of potential value to LEAs. Firstly, there is the identification of posts made by 
the perpetrator containing explicit signals of intent to cause harm, and secondly, the 
sentiment being expressed by situational stakeholders in regards to the threats and 
actions of the individual.
Through the application of technologies such as Natural Language Processing 
(NLP) and sentiment analysis techniques, it is possible to identify specific postings 
that (a) contain criminal intent and (b) contain references to specific concepts such 
as target locations, and methods to be used by the individual(s). Named entity and 
concept extraction techniques provide the user (in this case envisaged to be an ana-
lyst within the fusion centre setting) with explicit reference to the location and na-
ture of the threat being made, in addition to the name and location of the individual 
making the threat. From this information, the threat can then be analyzed and cross 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   207   208   209   210   211   212   213   214   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish