12.07.2015 Views

Editorial Board Contents - Bureau of Police Research and ...

Editorial Board Contents - Bureau of Police Research and ...

Editorial Board Contents - Bureau of Police Research and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 6: Open Source Information on A1 Qaeda <strong>and</strong> affiliate terroristOrganizations on websites (Bottom left: regarding IED makingtechniques, Bottom Right: Radical comments posting alongwith planning etc.), YouTube, Facebook (Radical Material <strong>and</strong>recruitment information) etc.This vast amount <strong>of</strong> information, in most <strong>of</strong> thecases, holds the key to a potential crime whichthe only challenge is to extract these in patternsfrom this plethora <strong>of</strong> information. Here again,technology is playing the key role in extractingthese patterns almost equivalent to the extraction<strong>of</strong> a needle in a haystack. The first step is toextract target information from the internet/otheropen sources, one <strong>of</strong> the key technologies usedin it is, crawler engine (Figure 7).Figure 7: Social Network analysis <strong>of</strong> Al Qaeda <strong>and</strong> affiliate terroristOrganizations. Source: FMS Advanced Systems Group 24The Indian <strong>Police</strong> Journal, October - December, 2012, Special Issue 99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!