Note: Page numbers followed by “f” and “t” indicate figures and tables respectively
Actionable information
Actionable information subclass,
86, 86fcontent-based image retrieval for,
47–48dynamic classification of Twitter content for,
46–47word cloud visualization for social media and,
46, 47fAdaptation, for real-time Big Data systems,
104Adaptive Robust Integrative Analysis for Finding Novel Associations (ARIANA),
204–205data repurposing and AD,
202implementation for biomedical applications,
193–200POLSA encoding fine-tuning,
198Adlerian Therapy as a Relational Constructivist Approach,
219 Alzheimer disease (AD),
202Amazon Elastic MapReduce,
11pattern analysis and visualization for,
63–64relevant evidence of,
59–61sentiment and stylometric analysis for,
61–62Amerithrax Task Force,
57Ammonium nitrate fertilizer,
24, 26Analytics
analysis compared to synthesis for,
151–152deep analytics subclass,
86fglobal analytics vision subclass,
86ffor real-time Big Data systems,
102–104flexibility and adaptation,
104Anthropology-based computing (ABC),
261, 262f, 267Application Program Interface (API),
45–46Artificially intelligent system (AIS)
Big Data concerns in autonomous,
209–210constructivist learning and,
218–221memory processing and encoding in,
212–217Assessment, of terror threats,
27–29
Association rule learning,
143Authority for Personal Data Protection, Italy,
242Authorship attribution,
61–62Automatic heading selection, for ARIANA implementation,
196–198, 196tAutonomous decision making,
209–210Babar, Mohammed Junaid,
25–26Bacterial pathogenomics,
59–60“Batch layer,” real-time Big Data systems,
93, 94fbatch processing into,
95machine learning and filtering into,
99–100Battlefield
intelligence for success on,
81interconnectivity of,
81–82“on the fly” processing for,
84–85in real-time Big Data systems,
91–93, 92fsuperscalar datacenter on,
104, 105fBayesian networks (BNs)
aggregation of structural and probabilistic data with,
166crime detection with social media extraction of,
167–169, 168fdependence relation extraction from text,
165–166probability information extraction and,
166variables identification for,
166Behavioral analysis
algorithmic techniques for,
59Big Data
actionable information from,
204advantages and applications of,
7–9on Amazon Web Services,
11anticipated growth of,
15fautonomous AIS concerns for,
209–210business needs and,
CI strategic landscape for applying,
69–73counterterrorism with,
34–35dynamic nature of, ,
health care applications of,
importance of,
public trust and confidence in EU with,
234–236purpose limitation in EU and,
233–234correlation over space and time for,
88–89digitalized world and,
89–91quality of data, metadata, and content for,
90–91real-time requirement of,
84–85simple to complex use cases of,
83–86, 86fpredictive modeling and,
10public safety concerns with,
51public trust challenged with,
36risk analysis with,
SCAF and application of,
77–78for building trust and common purpose,
77f, 78for cohesion and coherence and interoperability,
78, 78ffor shared safety, security, and resilience plan,
78, 79fsolutions overview of,
11–12
association rule learning for,
143insider threats and,
64–65natural language processing for,
143–144sentiment analysis for,
144signal processing for,
144advancement after 2001 of,
58–59analysis compared to synthesis for,
151–152cultural dependence in
cultural intelligence integration with,
257–258social media challenges for,
40–41cloudsourcing and crowdsourcing,
150Big Data architectures
capacity planning considerations for,
137cloud computing considerations for,
137data stack requirements for,
137, 138finfrastructure requirements for,
134–137network considerations,
136performance considerations,
136–137technological underpinning for,
132–134DW and data mart for,
134Big Data for law enforcement case study and workshop
alerting and prediction in,
44–45situation awareness and,
43–45social media for public interactions and,
44tools and prototypes during,
46–51content-based image retrieval,
47–48detecting anomalies,
49, 49fdynamic classification of Twitter content,
46–47geographic information maximization,
48influence and reach of messaging,
49–50technology integration,
50–51word cloud visualization,
46, 47fTwitter analysis for,
45–46Biological select agents or toxins (BSATs),
55–56, 59–60Boston Police Department, Twitter used by,
40Business intelligence (BI),
108, 132Center for the Elaboration of Data (CED),
244Chief information officers (CIOs),
149, 152Climate change, CI threats from,
69Cloud-based databases,
142Clouds
Big Data architecture considerations for,
137Collaborative phishing,
157Commercial motivated cyberattacks,
120Commodity hardware and software,
140–141Common operational picture (COP),
81–82Communities
Conceptual equivalence,
255Constructivist learning, AIS and,
218–221Content-based image retrieval,
47–48Co-reference resolution,
161, 177Corollary discharge cycle,
272Correlation uncertainty,
175Counterterrorism
Internet challenges for,
34–35with Operation STEPFORD,
30threats assessed by,
27–29UK’s strategic approach for,
32–33, 36vulnerabilities exposed with,
27CouNter-TErrorism STrategy (CONTEST)
Big Data analytics for,
35security and law enforcement uses of,
32, 35Court of Justice of European Union (ECJ),
232Credit Crunch, 2008-2009,
151Crime
BN extraction from social media for detecting,
167–169, 168fsocial networks mining for,
157–158alerting and prediction of,
44–45Crisis management, social media for,
40–41, 51Crisis response dashboard, social media,
50–51, 50fCritical infrastructure (CI),
68–69architecture supporting,
73–75Big Data and strategic landscape of,
69–73climate change threats and,
69natural disasters and,
71as system of systems,
68–69Cultural dependence, in Big Data analytics
Cultural equivalence,
253, 259Culture
informational/promotional,
121national security issues with,
117–118attack classification and parameters of,
111–113national security threat of,
111–113with social networks,
157
national security threats from,
120OSINT detecting motivations for,
122–123Cyberwarfare
Data collection equivalence,
254for Big Data analysis,
143in social networks for crime,
157–158Data of self-quantification,
58Data protection
EU legal framework for
Data Protection Directive 95/46/EC,
239–241Data Retention Directive 2006/24/EC,
241–242Italian legal framework for,
242–245Authority for Personal Data Protection,
242Data Protection Act (DPA),
152Data Protection Directive 95/46/EC,
239–241Data Retention Directive 2006/24/EC,
241–242Data streaming
Data to information, knowledge, and wisdom (DIKW),
Data warehouses (DW),
, 134Decision making, autonomous,
209–210Deep analytics subclass,
85, 86fDepartment of Homeland Security,
19Department of Information and Security (DIS),
247Department of Justice (DOJ),
55, 57, 59Dilemmas, of Big Data for law enforcement,
230, 236–237Dimensional approach, to DW,
134Direct attached storage (DAS),
133Discrete obfuscation (DO),
221Distributed databases,
141Distributed denial of service (DDoS),
113–114Distributed file systems,
142Document classification,
177Dynamic classification of Twitter content,
46–47Dynamic data-driven dictionary (DDD),
187, 198–200Dynamic nature, of Big Data, ,
Early Pursuit Against Organized Crime Using Environmental Scanning the Law and Intelligence Systems project (ePOOLICE),
109Ecosystem, community as,
70Emotional motivated cyberattacks,
120–121e-Privacy Directive 2002/58/EC,
239–240European Union (EU)
Big Data for law enforcement issues in
public trust and confidence with,
234–236data protection legal framework of
Data Protection Directive 95/46/EC,
239–241Data Retention Directive 2006/24/EC,
241–242European Union Data Protection Working Party,
229Evidential uncertainty,
175Expert Behavioral Analysis Panel (EBAP),
56, 59Exploitation motivated cyberattacks,
122Extract-transform-load (ETL),
134–135Extremism, violent
challenges confronting,
32Federal Bureau of Investigation (FBI),
55, 57Law Enforcement Bulletin,
272Federal Emergency Management Agency (FEMA),
41Fertilizer terrorist plot
executive action against,
26international element of,
25–26vulnerabilities exposed with,
27Filtering, of Big Data for military,
88, 98–100Financial motivated cyberattacks,
121Flexibility, for real-time Big Data systems,
104Functional equivalence,
255Fusion
Geographic information, maximizing,
48Geospatial analytics,
10–11Global analytics vision subclass,
85, 86fGlobal positioning systems (GPS),
, 173Google Earth, heat map on,
49–50Governance and compliance, information,
152–153velocity and volume addressed with,
145Hadoop distributed file system (HDFS),
95for Big Data architectures,
133capacity planning and,
137interconnections of nodes in,
136Harm and well-being spectrum,
73–74, 75fHashtags, Twitter and,
45, 49Health care, Big Data and,
Heat map, on Google Earth,
49–50High-performance analytics (HPA)
example scenarios using,
19Howard County Police Department (HCPD),
41Human rights, Big Data for law enforcement in EU and,
231–233
Hypothesis generation,
184IBM Infosphere BigInsights,
11Ideological motivated cyberattacks,
120Image sharing, on Twitter,
46of ARIANA for biomedical applications,
193–200POLSA encoding fine-tuning,
198IT project reference class and,
148project initiation and launch,
146–150project success mitigating factors for,
149, 149tImplicit biographical memory recall,
217In-database analytics techniques,
137Information governance and compliance,
152–153Information retrieval,
163, 185Information technology (IT),
17project reference class for,
148Informational/promotional motivated cyberattacks,
121Insider threats
Big Data analysis and,
64–65data collection needs and,
64–65safeguards against,
55–56Intelligence
for battlefield success,
81Internet
challenges created by,
155counterterrorism challenges with,
34–35radicalization and,
33–34security concerns with,
33–34terrorism threat landscape and,
33–34Internet Encyclopedia of Personal Construct Psychology,
218–219 Internet of Things (IOT),
, 6–7Investigation Systems,
244Islamic State (IS),
33–34Italy
data protection legal framework in,
242–245Authority for Personal Data Protection,
242opportunities and constraints for,
245–247processing and privacy with,
244–245Johns Hopkins Applied Physics Laboratory (JHU/APL),
41–42Joint Terrorism Analysis Centre (JTAC),
27–28Khan, Mohammed Siddique,
29–31Khawaja, Mohammed Momin,
25–27fertilizer plot of,
24–25Knowledge database (KDB),
167, 170fKnowledge relativity threads (KRT),
212Latent semantic analysis (LSA),
185public trust and confidence in EU with,
234–236purpose limitation in EU and,
233–234opportunities and constraints for,
245–247processing and privacy with,
244–245military working with,
83situation awareness and,
43–45social media for public interactions with,
44suicide terrorism challenges for,
33Law enforcement agencies (LEAs),
108, 230Legislation
in EU for data protection
Data Protection Directive 95/46/EC,
239–241Data Retention Directive 2006/24/EC,
241–242in EU for law enforcement and Big Data,
230–236in Italy for data protection,
242–245Authority for Personal Data Protection,
242Lethal drug interaction, KD case study,
201–202Apache Hive framework for,
96Apache Pig framework for,
96capacity planning and,
137Cascalog framework for,
96interconnections of nodes in,
136Massively parallel processing (MPP),
132, 141Matrix metalloproteinase (MMP),
202Metadata, quality of,
90–91Michigan Intelligence Operations Center (MIOC),
19Michigan State Police (MSP),
19actionable information and,
81correlation over space and time for,
88–89digitalized world and,
89–91quality of data, metadata, and content for,
90–91real-time requirement of,
84–85simple to complex use cases of,
83–86, 86flaw enforcement working with,
83situation awareness in,
176Moore’s law,
Named entity recognition,
161, 177National security
cyberterrorism threats for,
120financial transactions and,
SAS solution for Middle East intelligence and,
19terrorism threats and,
14National Security Agency (NSA),
247Natural disasters, CI and,
71Natural language data
for situation awareness,
176Natural language processing (NLP),
158, 177co-reference resolution,
161, 177document classification,
177named entity recognition,
161, 177connectionist approach,
159statistical approach,
159Network centric warfare (NCW),
82Next-Generation 911 system,
48Normalized approach, to DW,
134North Atlantic Treaty Organization (NATO),
179Nuclear industry, security and,
71Online analytical processing (OLAP),
134Online clustering, into “streaming layer”,
100Online Mendelian Inheritance in Man (OMIM),
188Online transaction processing (OLTP),
137biomedical application steps for,
189, 190fOpen source intelligence (OSINT),
90counterterrorism using,
35–36cybercrime and cyberterrorism motivation detection with,
122–123executive action phase of,
26international dimension of,
25–26success and vulnerabilities of,
27threat assessed by,
27–29Operations management,
Parameter optimized latent semantic analysis (POLSA),
186fine-tuning encoding for,
198Pattern analysis, for Amerithrax case,
63–64Personal Construct Psychology, Constructivism, and Postmodern Thought (Botella),
219
Personal motivated cyberattacks,
121–122Pictorial information fragments (PIFs),
217, 218fPlanning
shared safety, security, and resilience,
78, 79fPolitical motivated cyberattacks,
118Predictive analytics, Big Data and,
238–239Predictive modeling, Big Data and,
10Privacy
of AIS memory
trustworthiness and,
Project initiation and launch,
146–150Public trust, in Big Data for law enforcement in EU,
234–236“Publishing layer,” real-time Big Data systems,
93, 94f, 98Radicalization, Internet and,
33–34Real-time
data streaming,
information subclass,
86, 86fmilitary and Big Data requirements with,
84–85Real-time Big Data systems,
91–93flexibility and adaptation,
104application principles and constraints of,
91–93, 92f“batch layer” of,
93, 94fbatch processing into,
95machine learning and filtering into,
99–100“publishing layer” of,
93, 94falerts and notifications into,
98“streaming layer” of,
93, 94fdata stream processing into,
97–98filtering processing into,
98–99machine learning and filtering into,
99–100online clustering into,
100Resilient distributed dataset (RDD),
96–98Risk,
Big Data analysis of,
management,
of CI and communities,
70–71Internet concerns for,
33–34liberty sacrifices for,
36–37real-time Big Data systems and,
103SCAF and Big Data for shared,
78, 79f7/7 bombings accountability and lessons for,
30–32Semi-structured data,
Sense making
Sensitive data protection,
238, 243Sensory memories, in AIS,
210, 211fSentiment analysis
for Amerithrax case,
61–62for Big Data analysis,
144Short-term memories (STMs)
Singular Value Decomposition (SVD),
185law enforcement and,
43–45natural language data for,
176SMSHy Information Content Management,
221Big Data analytics challenges with,
40–41content-based image retrieval with,
47–48detecting anomalies with,
49, 49fgeographic information maximization with,
48influence and reach of messaging on,
49–50law enforcement public interactions with,
44word cloud visualization for active shooter event and,
46, 47fSocial networks
change and adaptation in,
156mutual relationships within,
155, 156fSociopolitical-economic systems, optimization of,
223–224, 224fSources
for law enforcement,
39–40cloudsourcing and crowdsourcing,
150quality and imperfection of,
90–91semi-structured data,
structured data,
unstructured data,
internal components of,
97Spectral decomposition mapping,
217Statistical analysis software (SAS)
for fusion centers,
18, 18fnational security Middle East intelligence with,
19for complex event processing,
97–98Strategic community architecture framework (SCAF),
74–75Big Data application with,
77–78for building trust and common purpose,
77f, 78for cohesion and coherence and interoperability,
78, 78ffor shared safety, security, and resilience plan,
78, 79fStrategic community requirement (SCR),
73–75“protection from harm and promotion of well-being” for,
73–74, 75funderpinning elements of,
76, 76f“Streaming layer,” real-time Big Data systems,
93, 94fdata stream processing into,
97–98filtering processing into,
98–99machine learning and filtering into,
99–100online clustering into,
100Structured data,
Stylometric analysis, for Amerithrax case,
61–62Superscalar datacenter, on battlefield,
104, 105fSurveillance, USA PATRIOT Act expanding,
58Techniques, for 3’Vs data challenges,
141–142Technology, introduction and expectations of,
146, 147t–148tTerm-Document Matrix,
185Terrorism
assessing threats of,
27–29Boston Marathon bombings,
40Internet changing landscape of,
33–34national security and,
14September 11th attacks,
237/7 bombings coordination of,
29–30training camps for,
24–33cybercrime motivation detection with,
122–123techniques for challenges of,
141–142Big Data for law enforcement case study and workshop analysis of,
45–46Boston Police Department using,
40detecting anomalies with,
49, 49fdynamic classification of,
46–47geographic information maximization with,
48hashtags used with,
45, 49influence and reach of messaging on,
49–50scale challenges with,
43word cloud visualization and,
46, 47fUncertainty, in sense making,
175United Kingdom (UK)
counterterrorism strategic approach of,
32–33, 36law enforcement integrating Big Data in,
109Unmanned aerial systems (UAS),
82Unstructured data
Validity, of Big Data analytics,
250, 256, 258
Value management,
Violence
alerting and prediction of,
44–45challenges confronting,
32Visualization,
for Amerithrax case and behavioral analysis,
63–64for Big Data analysis,
144Voice and video analytics,
10Volume,
representation and storage techniques for,
141–142Well-being and harm spectrum,
73–74, 75fWord cloud visualization,
46, 47f