Font Size: a A A

Research On The Counterterrorism Intelligence Acquisition Based On Open Source Information Integration

Posted on:2014-03-21Degree:DoctorType:Dissertation
Country:ChinaCandidate:X Y BuFull Text:PDF
GTID:1108330425467581Subject:Information Science
Abstract/Summary:PDF Full Text Request
The internet opened a new era of the information society. Network tends to be utilized by the terrorist organization and the terrorist to become their new carrier for connecting organizers, disseminating information, raising funds and scheming attracts while covenanting the people to spread and communicate information. Especially in recent years, the terrorist organization and the terrorist which are in an adverse environment take internet as important tools and means for organizing and implementing terrorism after the strong blows from international society. They appear in the virtual network space sometimes to give enormous publicity to extremism, call to launch bloody attracts and extensive their position on the internet rapidly. The terrorist organization and the terrorist recently utilize network for crazy wrecking activities better and better, which compels governments to take relative measures to increase their input for "information counterterrorism war" on internet. At the same time, the intelligence and academic institutions also participate in the "new network position" of counterterrorism and counterterrorism war is developing towards the direction of information, network, intelligence and stealth. So counterterrorism intelligence acquisition and information intelligent processing have become urgent and important research subjects.Open source information is that obtained through public or semipublic channels. With the development of information technology and network technology, open source information is easier and quicker to be acquired, and its number rises dramatically. All kinds of open source information spread on the internet quickly and extensively, which brings new opportunities and challenges to the intelligence and the information security. How can researchers know the public sentiments and opinions on some major policies of a country or a region well and construct harmonious society? How can researchers find out some undiscovered rules from massive and seemingly disconnected information to assure the tendency of things? All these problems put forward new challenges to researchers. Internet gives terrorists and their terrorisms a covert environment so that network intelligence resources are becoming the first "mineral resource" as scarce resources like land, oil and mineral deposits. Various vital intelligence that is related to national security, social security and personal security can be widely acquired from open source information, which is important for guiding practical work to go well.Open source information generally consists of polytypic data which can be structured, semi-structured or unstructured. So it is impossible to draw and organize semantic information efficiently and acquire deep counterterrorism intelligence with high quality if open source information is not integrated efficiently.Research on counterterrorism intelligence acquisition based on open source information integration in big data assimilates the research achievements from intelligence, computer science, ontology, and artificial intelligence. It also takes many advanced theories and technologies to support the acquisition and innovation of counterterrorism intelligence and the promotion of counterterrorism decision, such as knowledge engineering, data mining, speech recognition, social network, visualization technique, etc. The research of this paper contains six parts.The first part starts with analyzing the topic background of this paper to illustrate the research significance, current study situations both at home and abroad, main contents, methods and innovations of this paper.In the second part, this paper first analyses the concepts, features and functions of counterterrorism intelligence. Then it introduces the concepts of open source information and its value, status and influence to public security and analyses the rules and technology features of open source information integration, emphasizing the three models of open source information integration—physical integration model, logical integration model and semantically integration model. Lastly, this paper elaborates on the basic theories and technologies of counterterrorism intelligence acquisition from information retrieval and knowledge retrieval, data mining and knowledge discovery, speech recognition, information analysis.In the third part, this paper separately proposes the strategies of open source information based on intelligence source, Deep Web intelligence resource, ontology technology and XML technology. It also analyses these integration in detail and illustrate the related theories.In the fourth part, this paper mainly discusses the process and model of counterterrorism intelligence acquisition based on open source information integration. It analyses the requirement recognition and representation, the search and integration of open source information, the mining and acquisition of counterterrorism intelligence at length. This part suggests and constructs counterterrorism intelligence acquisition model based on open source information integration after the analysis of the existing ones and gives estimates on it. The proposed model contains five modules—open source information collection, open source information integration, counterterrorism intelligence acquisition, counterterrorism intelligence credibility judgment and counterterrorism intelligence visualization output. Theoretical analysis showed that this model can promote the degrees of counterterrorism intelligence integration and counterterrorism intelligence intelligent acquisition.In the fifth part, the key technologies and methods of counterterrorism intelligence acquisition are analyzed and discussed in detail. They are information knowledge retrieval, counterterrorism intelligence acquisition methods based on data mining, human intelligence network and speech recognition, counterterrorism intelligence discovery technology based on intelligence analysis. These methods and technologies not only are the sticking points of counterterrorism intelligence acquisition, but also can improve the intelligence, comprehensiveness and accuracy of counterterrorism intelligence acquisition.In the sixth part, there are conclusions for the full paper, suggestions for the counterterrorism intelligence works and system construction, further works in future.This paper is one research achievement of major project of the ministry of education for the major research base of human social science-research on knowledge mining technology based on intelligent information processing and its application(Granted Number:08JJD870225) and the National Natural Science Foundation of China-research enterprise competitive intelligence intelligent analysis model and method(Granted Number:71073121).
Keywords/Search Tags:open source information integration, counterterrorismintelligence acquisition, intelligence mining
PDF Full Text Request
Related items