10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

132 • CUBAN NATIONAL LIBERATION FRONTCUBAN NATIONAL LIBERATION FRONT (FLNC). The Frentede Liberación Nacional Cubana was a nonstate Cuban émigrégroup with the revolutionary goal <strong>of</strong> overthrowing the government<strong>of</strong> President Fidel Castro in Cuba. It was one <strong>of</strong> the six main anti-Castro Cuban exile groups in the United States, the others being Alpha 66, Brigade 2506, the Cuban-American National Foundation,the Cuban Nationalist Movement, and Omega-7.The FLNC was active mainly in the late 1960s and early 1970sand engaged in assaults and bombings against people or institutionsperceived to be pro-Castro. The group had ceased to function by the1980s, due to the diminished hopes among the Cuban exile communitythat Castro’s government would ever be overthrown.CYBERTERRORISM. See INFORMATION WARFARE; INTER-NET; NETWAR.– D –DAL KHALSA. See SIKH MILITANTS.DASHMESH REGIMENT. See SIKH MILITANTS.DATA MINING. This term refers to the process <strong>of</strong> automaticallysearching large volumes <strong>of</strong> data to select desired information accordingto some criteria. Due to the increasing use <strong>of</strong> the Internet andother telecommunications by terrorist and extremist groups, data mining<strong>of</strong> open-source intelligence (OSINT) materials might allow counterterrorismintelligence analysts to identify patterns <strong>of</strong> networks,threat indicators, and operations characteristic <strong>of</strong> terrorist groups andtheir sponsors. A related topic that is easily confused with data miningis that <strong>of</strong> electronic eavesdropping <strong>of</strong> suspected terrorists. While datamining could be used to select out telephone calls suspected <strong>of</strong> carryingterrorist communications, the actual eavesdropping itself would becovert surveillance rather than data mining as such.An example <strong>of</strong> data mining in counterterrorism efforts was theAble Danger program, begun in October 1999 by the U.S. SpecialOperations Command to use data mining <strong>of</strong> open-source informationtogether with classified information in order to identify individualmembers <strong>of</strong> terrorist cells, specifically with regard to al Qa’eda.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!