79
Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 6
DOI: 10.4018/978-1-61350-513-7.ch006
Qiang Shen
Aberstwyth University, UK
Tossapon Boongoen
Royal Thai Air Force Academy, Thailand
Social Network Inspired
Approach to Intelligent
Monitoring of Intelligence Data
ABSTRACT
In the wake of recent terrorist atrocities, intelligence experts have commented that failures in detecting
terrorist and criminal activities are not so much due to a lack of data, as they are due to diffculties in
relating and interpreting the available intelligence. An intelligent tool for monitoring and interpreting
intelligence data will provide a helpful means for intelligence analysts to consider emerging scenarios
of plausible threats, thereby offering useful assistance in devising and deploying preventive measures
against such possibilities. One of the major problems in need of such attention is detecting false identity
that has become the common denominator of all serious crime, especially terrorism. Typical approaches
to this problem rely on the similarity measure of textual and other content-based characteristics, which
are usually not applicable in the case of deceptive and erroneous description. This barrier may be
overcome through link information presented in communication behaviors, fnancial interactions and
social networks. Quantitative link-based similarity measures have proven effective for identifying similar
problems in the Internet and publication domains. However, these numerical methods only concentrate
on link structures, and fail to achieve accurate and coherent interpretation of the information. Inspired
by this observation, the chapter presents a novel qualitative similarity measure that makes use of multiple
link properties to refne the underlying similarity estimation process and consequently derive semantic-
rich similarity descriptors. The approach is based on order-of-magnitude reasoning. Its performance is
empirically evaluated over a terrorism-related dataset, and compared against several state-of-the-art
link-based algorithms and other alternative methods.