News Archive

Mining Book

by msecadm4921

Data Mining for Intelligence, Fraud & Criminal Detection – Advanced Analytics & Information Sharing Technologies is the title of a new American book by Christopher Westphal.

ISBN: 1420061569 • $69.95 / £36.99  out December 2008 • Pages: 432: Hardcover.
 
In 2004, the Government Accountability Office provided a report detailing approximately 200 government-based data-mining projects. While there is comfort in knowing that there are many effective systems, that comfort isn’t worth much unless we can determine that these systems are being effectively and responsibly employed.

Written by one of the most respected experts in the area of data mining and security, Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies reviews the tangible results produced by these systems and evaluates their effectiveness. Going beyond a discussion of the various technologies, the author discusses the issues of information sharing and the effective interpretation of results, which are critical to any integrated homeland security effort. While CSI/NCIS-type television shows may depict information sharing and analysis that are accomplished with the push of a button, this sort of proficiency is more fiction than reality.

Organized into three main sections, the book examines and outlines the future of this field with an insider’s perspective and a visionary’s insight. This book provides those individuals with an understanding of what approaches are currently available and how they can be most effectively implemented.

Key Features:

*  Offers analytical applications for use in detecting money laundering schemes, human smuggling operations, narcotics trafficking, and exposing fraud patterns
*  Identifies the principles of integration using multiple sources of data, and compares virtual and traditional information and data warehousing techniques
*  Provides numerous examples based on real-world data, systems, and operations

All the book’s royalty proceeds go to benefit the National Law Enforcement Officers Memorial Fund (NLEOMF).
 
CONTENTS:

Part I: Interpreting Patterns and Analytical Methodologies • 1 Overview • 2 The Quality of Data  • 3 What Are Patterns?  •  Part II:  Real-World Examples and Operations • 4 Border Protection • 5 Money Laundering and Financial Crimes • 6 Money Service Businesses • 7 Fraud Analytics • Part III Information Sharing and Fusion Centers • 8 Information-Sharing Protocols • 9 Information Sharing-Systems • Summary

ABOUT THE AUTHOR:

Mr Westphal is co-founder and CEO of Visual Analytics. He guided the growth of the company from launch into a provider of critical data analytic and information sharing capabilities. The flagship application, VisuaLinks, has steadily expanded, leading to its adoption by federal and local law enforcement, all major US intelligence agencies, the Department of Defense, civilian agencies, international governments and businesses. He received his B.S.E. from Tulane University and has over 22 years of experience in advanced analytics utilizing data mining, visualization, and artificial intelligence technologies  Mr. Westphal has applied his expertise in commercial domains including forensic accounting, embezzlement, and fraud. He works with government programs addressing financial crimes, as well as agencies countering narco-terrorism, money laundering, and insider trading. He has also authored numerous papers for symposia, conferences, professional journals, and newsletters addressing data visualization, expert systems, and other advanced analytical issues.

Related News

  • News Archive

    Video Command

    by msecadm4921

    Mango DSP, a provider of video solutions for the video surveillance, homeland security and defence markets, at IFSEC announced the launch of…

  • News Archive

    Cooper Signs

    by msecadm4921

    Reading-based distributor Norbain has signed up Cooper Security, the name behind the electronic security brands Scantronic and Menvier. The range includes intruder…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing