Abstract
This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different AI techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiments showed on average a 60% success rate and at best a 68% success rate for correctly identifying deceptive behaviour. These figures indicate that, as part of an investigator support system, a neural network would be a valuable tool in the identification of terrorists prior to an attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dixon, S., Guest, E., Dixon, M., Elliott, J., Mullier, D.: DScent Final Report (2011). Available from: http://www.leedsmet.ac.uk/aet/computing/Computing_DScentFinalReport v2_0_2011.pdf Accessed 8 March 2011.
Markman, A., Rachkovskij, D., Misuno, I., Revunova, E.: Analogical Reasoning Techniques in Intelligent Counterterrorism Systems. International Journal “Information Theories & Applications” Volume 10 (2) (2003).
Marappan, K., Nallaperumal, K., Kannan, S., Bensujin, B.: A Soft Computing Model to Counter Terrorism. IJCSNS International Journal of Computer Science and Network Security, Volume 8 May 2008, p.141. (2008).
Schneier, B.: Why Data Mining Won’t Stop Terror. Wired (2006). Available from: http://www.wired.com/politics/security/commentary/securitymatters/2006/03/70357 Accessed 28 October 2010.
Rudmin, F.: Why Does the NSA Engage in Mass Surveillance of Americans When It's Statistically Impossible for Such Spying to Detect Terrorists? Counterpunch (2006). Available from:http://www.counterpunch.org/rudmin05242006.html Accessed 1 Aug 2011.
Jonas, J., Harper, J.: Effective counterterrorism and the limited role of predictive data mining. CATO Institute (2006) Available from: http://www.cato.org/pubs/pas/pa584.pdf Accessed 27 October 2010.
Ware, B.S., Beverina, A., Gong, L., Colder, B.: A Risk-Based Decision Support System for Antiterrorism (2002). Available from: http://www.dsbox.com/Documents/MSS_A_Risk- Based_Decision_Support_System_for_Antiterrorism.pdf Accessed 30 Jan 2009
Marrone, P.: An Object Oriented Neural Engine. SourceForge (2010). Available from: http://www.jooneworld.com Accessed 26 October 2010.
Neural Planner Software: EasyNN-plus - Neural Network Software. (2010). Available from: http://www.easynn.com Accessed 26 October 2010.
Mitchell, T.M.: Machine Learning, WCB-McGraw-Hill (1997).
Levinson, N.: The Wiener RMS (ROOT MEAN SQUARE) ERROR Criterion in Filter Design and Prediction. Journal of Mathematics and Physics (1946).
Sexton, R.S., Sikander, N.A.: Data mining using a genetic algorithm-trained neural network. Intelligent Systems in Accounting, Finance and Management 10(4):201-210. doi:10.1002/isaf.205 (2002).
Mann, H.B., Whitney, D.R.:On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics Volume 18 March 1947, p.50–60 (1947)
Avery, L.: Mann-Whitney U Test (2007). Available from: http://elegans.swmed.edu/~leon/stats/utest.html Accessed 27 October 2010.
Evertsz, R.: Populating VBS2 with Realistic Virtual Actors. Proceedings of the 18th Conference on Behavior Representation in Modeling and Simulation, p.1–8. (2009).
Ferreira, C.: Gene Expression Programming: Mathematical Modeling by an Artificial Intelligence (Studies in Computational Intelligence). 2nd ed. Springer (2006).
Petersen, U.: Emdros: a text database engine for analyzed or annotated text. Proceedings of the 20th international conference on Computational Linguistics (2004). Available from: http://emdros.org/petersen-emdros-COLING-2004.pdf Accessed 24 January 2011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this paper
Cite this paper
Dixon, S., Dixon, M., Elliott, J., Guest, E., Mullier, D.J. (2011). A Neural Network for Counter-Terrorism. In: Bramer, M., Petridis, M., Nolle, L. (eds) Research and Development in Intelligent Systems XXVIII. SGAI 2011. Springer, London. https://doi.org/10.1007/978-1-4471-2318-7_18
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2318-7_18
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2317-0
Online ISBN: 978-1-4471-2318-7
eBook Packages: Computer ScienceComputer Science (R0)