Skip to main content
Book cover

Counterterrorism and Open Source Intelligence

  • Book
  • © 2011

Overview

  • Presents state-of-the-art research and practice concerning intelligence work
  • Detailed description of novel tools and techniques for counterterrorism open source intelligence
  • Provides perspectives on the use of open source intelligence in the future
  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Social Networks (LNSN)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (23 chapters)

  1. Models

  2. Tools and Techniques

  3. Case Studies

Keywords

About this book

Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.

Reviews

From the reviews:

“Informatics may be used to analyze open sources in the fight against terrorism. This state-of-the-art overview from an impressive group of international contributors is mandatory reading for criminologists and intelligence professionals. Many of the tools discussed have broad application to social network analysis. … I recommend this broad overview of state-of-the-art research.” (Brad Reid, ACM Computing Reviews, October, 2011)

Editors and Affiliations

  • The Maersk McKinney Moller Institute, University of Southern Denmark, Odense, Denmark

    Uffe Kock Wiil

Bibliographic Information

Publish with us