@article{Onwudebelu_Akpojaro_2014, title={Connecting the Dots of Sensitive Terrorism Information for Homeland Security}, volume={2}, url={https://journals.scholarpublishing.org/index.php/TMLAI/article/view/220}, DOI={10.14738/tmlai.23.220}, abstractNote={<p>As society becomes more and more dependent on information and as criminals are increasing their cyber activities in their daily life, it becomes necessary to connect their dots together to track them in this information age. Terrorism is not confined to one country and it has no borders or boundaries. The escalating magnitude of this threat is evident from the increasing rate of terrorist attacks against innocent people, especially in the Northern part of Nigeria. As we are seeing, one of the major concerns of many nations today is to identify and foil terrorist attacks emanating from different angles. Consequently, data mining which is being used for almost everything from improving service or performance to detecting specific identifiable terrorist threats is employed. Defeating terrorism requires quick intelligence machinery that operates more effectively and makes use of advanced information technology such as data mining and automated data-analysis techniques for a successful fight against terrorist as well as collaboration in data-sharing program between the three levels of government: federal, state and local. In this paper, we are looking at the need to design support information sharing among these levels of government. So that the government, as a whole will use its power to affect the lives of individuals increasingly with regards to safeguarding lives and properties.</p>}, number={3}, journal={Transactions on Engineering and Computing Sciences}, author={Onwudebelu, Ugochukwu and Akpojaro, Jackson}, year={2014}, month={Jun.}, pages={35–47} }