Knowing the structure of criminal and terrorist networks could provide the technical insight needed to disrupt their activities.
Hsinchun Chen
Author Archives
Evaluating the Efficacy of a Terrorism Question/Answer System
The TARA Project examined how a trio of modified chatterbots could be used to disseminate terrorism-related information to the general public.
From Fingerprint to Writeprint
Identifying the key features to help identify and trace online authorship.
Criminal Network Analysis and Visualization
A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data.
Automatically Detecting Deceptive Criminal Identities
The criminal mind is no match for some of the latest technology designed to determine fact from fiction in suspect identities.
Coplink: Managing Law Enforcement Data and Knowledge
In response to the September 11 terrorist attacks, major government efforts to modernize federal law enforcement authorities' intelligence collection and processing capabilities have been initiated. At the state and local levels, crime and police report data is rapidly migrating from paper records to automated records management systems in recent years, making them increasingly accessible.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved