Connecting the Dots of Sensitive Terrorism Information for Homeland Security
DOI:
https://doi.org/10.14738/tmlai.23.220Keywords:
Data mining, homeland security, threats, profiling, data setAbstract
As society becomes more and more dependent on information and as criminals are increasing their cyber activities in their daily life, it becomes necessary to connect their dots together to track them in this information age. Terrorism is not confined to one country and it has no borders or boundaries. The escalating magnitude of this threat is evident from the increasing rate of terrorist attacks against innocent people, especially in the Northern part of Nigeria. As we are seeing, one of the major concerns of many nations today is to identify and foil terrorist attacks emanating from different angles. Consequently, data mining which is being used for almost everything from improving service or performance to detecting specific identifiable terrorist threats is employed. Defeating terrorism requires quick intelligence machinery that operates more effectively and makes use of advanced information technology such as data mining and automated data-analysis techniques for a successful fight against terrorist as well as collaboration in data-sharing program between the three levels of government: federal, state and local. In this paper, we are looking at the need to design support information sharing among these levels of government. So that the government, as a whole will use its power to affect the lives of individuals increasingly with regards to safeguarding lives and properties.
References
. Alohan, J., Terrorism: Nigeria, Chad, Benin , Cameroon, Niger In Joint Border Patrol Deal, Page 4, Thursday, march 27, 2014. http://www.leadership.ng , No. 2160.
. DeRosa, M., Data Mining and Data Analysis for Counterterrorism, Center for Strategic and International Studies (CSIS) Press, 2004.
. DHS Privacy Office, Data Mining: Technology and Policy: 2008 Report to Congress, pp. 31-32
. Department of Homeland Security, Privacy Policy Guidance Memorandum, No. 2008-01, Dec. 29, 2008, available at http://www.dhs.gov/xlibrary/assets/privacy/privacy_policyguide_2008-01.pdf (memorializing DHS adoption of the FIPPs).
. Kumar, V., Lazarevic, A., and Srivastava, J., Workshop on Data Mining for Cyber Threat Analysis, IEEE International Conference on Data Mining, Maebashi TERRSA, Maebashi City, Japan, 2002.
. Minow, N. N. and Cate, F. H., Government Data Mining, at 4, http://ssrn.com/abstract=1156989, in McGraw Handbook of Homeland Security (2008); National Research Council, Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, at 22 (National Academies Press), 2008.
. Seifert, J. W., Data Mining: An Overview, CRS Report for Congress Received through the CRS Web, December 16, 2004.
. Shenon, P., Inspection Notes Errors in Terror List, 2007.
. Sloan, V. E., and Sharon B. F., Principles for Government Data Mining Preserving Civil Liberties in the Information Age. 2010.
. Thuraisingham, B., Data Mining for Counter-Terrorism, The MITRE Corporation Burlington Road, Bedford, MA, USA., 2011.