Abstract
Developing the information-analysis tools for an effective multi-agency information-sharing effort.
- Benjamin, D. and Simon, S. The Age of Sacred Terror. Random House, New York, 2002.Google Scholar
- Goldszmidt, M. and Jensen, D. EELD recommendations report. In Proceedings of the DARPA Workshop on Knowledge Discovery, Data Mining, and Machine Learning (KDD-ML), Arlington, VA, 1998.Google Scholar
- Heuer, R. Psychology of Intelligence Analysis. Center for the Study of Intelligence, Central Intelligence Agency, 1999.Google Scholar
- Jensen, D. and Goldberg, H., Eds. Artificial Intelligence and Link Analysis: Papers from the 1998 AAAI Fall Symposium, AAAI Press, Menlo Park, CA, 1998.Google Scholar
- Jonietz, E. Total information overload. MIT Technology Review (Aug. 2003).Google Scholar
- Lazaroff, M. and Sickels, S. Human Augmentation of Reasoning Through Patterning (HARP). DARPA Genoa II PI Meeting, Austin, TX, May 2003.Google Scholar
- National Strategy for Combating Terrorism. Submitted by the White House, Feb. 2003.Google Scholar
- Report to Congress Regarding the Terrorism Information Awareness (TIA) Program. Submitted by the Secretary of Defense, Director of Central Intelligence and Attorney General, May 2003.Google Scholar
- Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001. Submitted by the House Permanent Select Committee on Intelligence (HPSCI) and the Senate Select Committee on Intelligence (SSCI), July 2003.Google Scholar
- Shanker, T. For military intelligence, a new favorite commando. New York Times (Apr. 11, 2003).Google Scholar
- Schum, D. The Evidential Foundations of Probabilistic Reasoning. Wiley, New York, 1994.Google Scholar
- Young, S. Large Vocabulary Continuous Speech Recognition: A Review. Technical Report, Cambridge University Engineering Department, Cambridge, U.K., 1996.Google Scholar
Index Terms
- Countering terrorism through information technology
Recommendations
Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil Liberties
EISIC '11: Proceedings of the 2011 European Intelligence and Security Informatics ConferencePublic trust in government efforts to combat terrorism is of central importance to policy makers and terrorists alike. Undermining the public's confidence in its government is a central aim of any strategy of terrorism, while public support is critical ...
Countering Terrorism through Information and Privacy Protection Technologies
Security and privacy aren't dichotomous or conflicting concerns--the solution lies in developing and integrating advanced information technologies for counterterrorism along with privacy-protection technologies to safeguard civil liberties. Coordinated ...
Comments