Terrorist groups tend to develop unconventional ways to disrupt or destroy economic and critical infrastructures. Examples of unconventional methods include setting up cyberattack cells to disrupt critical infrastructures, using unmonitored financial resources to disrupt or bankrupt national economies, and establishing organizations within countries to desensitize the population to terrorist objectives. Sometimes there are patterns, but most often there are no obvious patterns. This presentation addresses the detection of emergent terrorist events by finding critical pieces of information buried in large volumes of data spanning many disparate data sources.
展开▼