Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies

Hardcover
from $0.00

Author: Christopher Westphal

ISBN-10: 1420067230

ISBN-13: 9781420067231

Category: Data Warehousing & Mining

In 2004, the Government Accountability Office provided a report detailing approximately 200 government-based data-mining projects. While there is comfort in knowing that there are many effective systems, that comfort isn’t worth much unless we can determine that these systems are being effectively and responsibly employed.\ Written by one of the most respected consultants in the area of data mining and security, Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics...

Search in google:

In 2004, the Government Accountability Office provided a report detailing approximately 200 government-based data-mining projects. While there is comfort in knowing that there are many effective systems, that comfort isn’t worth much unless we can determine that these systems are being effectively and responsibly employed.Written by one of the most respected consultants in the area of data mining and security, Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies reviews the tangible results produced by these systems and evaluates their effectiveness. While CSI-type shows may depict information sharing and analysis that are accomplished with the push of a button, this sort of proficiency is more fiction than reality. Going beyond a discussion of the various technologies, the author outlines the issues of information sharing and the effective interpretation of results, which are critical to any integrated homeland security effort.Organized into three main sections, the book fully examines and outlines the future of this field with an insider’s perspective and a visionary’s insight. Section 1 provides a fundamental understanding of the types of data that can be used in current systems. It covers approaches to analyzing data and clearly delineates how to connect the dots among different data elementsSection 2 provides real-world examples derived from actual operational systems to show how data is used, manipulated, and interpreted in domains involving human smuggling, money laundering, narcotics trafficking, and corporate fraudSection 3 provides an overview of the many information-sharing systems, organizations, and task forces as well as data interchange formats. It also discusses optimal information-sharing and analytical architecturesCurrently, there is very little published literature that truly defines real-world systems. Although politics and other factors all play into how much one agency is willing to support the sharing of its resources, many now embrace the wisdom of that path. This book will provide those individuals with an understanding of what approaches are currently available and how they can be most effectively employed.

Foreword xiAcknowledgments xviiThe Author xxiPart 1 Interpreting Patterns and Analytical Methodologies1 Overview 3Introduction 4Sharing Data 5Connect the Dots 8Analytical Versus Referential Data 18Information Sharing 25Conclusion 322 The Quality of Data 33Introduction 34Value Errors 35Missing Data and Bad Structures 39Unique Adresses 42Distinct Phone Numbers 44Individual ID Numbers 45Anomalous Accounts 46One-of-a-Kind Transactions 46Original Organizations 47Perspicuous People 48Entity Resolution 50Anonymous Resolution 62Conclusion 663 What Are Patterns? 67Introduction 68Which Pattern Is More Important? 72Do These Patterns Make Sense? 78Is This a Reliable Pattern? 81Is This an Actionable Pattern? 85Which Patterns Is More Valuable? 87What Does this Pattern Show? 90Who Is the Most Important Person? 97Conclusion 101Part 2 Real-World Examples and Operations4 Border Protection 105Introduction 106I-94 Arrival/Departure Records 106Land Border Targeting 113Cluster by Hour of the Day (HOD) 130Cluster by Day of the Week (DOW) 133Cluster by Date 133Cluster by Port of Entry (POE) 137Clusters by Lane 137Cluster by Inspector 139Cluster by City/State 139Cluster by VIN 140Putting It Together 140Conclusion 1415 Money Laundering and Financial Crimes 143Introduction 144Suspicious Activity Reports 159Structuring Transactions 161Bust-Out Schemes 169A Consumer Bust-Out Scheme 173Busting and Kiting 175Identity Fraud 177Large Connections 181Attorneys and Law Firms 188Cheap Motels 191Location, Location, Location 194IndividualTaxpayer Identification Number 198SAR Versus STR 200Timing Is Everything 205False Temporal Patterns 213A Final Note 216Conclusion 2206 Money Service Businesses 223Introduction 224What Is a Money Service Business? 224Why Wire Remitters? 225Steps of a Wire Remittance 226Structure of a Wire Transfer 228Combating Human Smuggling 238The Smuggling Process 240Changing the Rules 250Seizing Assets 252Corridor States 254Drug Dealers 258Suspicious Activity Reports 262Elder Abuse Pattern 266Ornery Old Man 269Other MSB Patterns 272Multiple Locations 272Minimal Overlaps 274Official Deposits 274Heavenly Offerings 278Dirty Dancing 280Conclusion 2807 Fraud Analytics 283Introduction 284Warranty Fraud Anecdotes 286Automobile Warranties 287Hurricane Katrina 292Corporate Frauds 298Employees as Vendors 298Vendors as Vendors 300Corporate Expenses 304Duplicate Payments 308Human Resources 313Gift Card Fraud 317Additional Examples 324Pharmaceutical 325Phishing/Click Fraud 325Tax Evasion 329Medicare Claim Fraud 332Conclusion 346Part 3 Information Sharing and Fusion Centers8 Information-Sharing Protocols 349Introduction 350Global Justice XML Data Model (Global JXDM) 351Data Dictionary 352Data Model 353Component Reuse Repository 356National Information Exchange Model 36228 CFR Part 23 364Conclusion 3709 Information-Sharing Systems 371Introduction 372Automated Regional Justice Information System (ARJIS) 376Citizen and Law Enforcement Analysis and Reporting (CLEAR) 377Comprehensive Regional Information Management Exchange System (CRIMES) 379Factual Analysis Criminal Threat Solution (FACTS) System 381Florida Information Network for Data Exchange and Retrieval (FINDER) 382Ohio Local Law Enforcement Information Sharing Network (OLLEISN) 383Law Enforcement Information Exchange (LInX) 385OneDOJ, R-DEx, N-DEx 386Law Enforcement Online (LEO) 388Joint Regional Information Exchange System (JRIES) 389Joint Terrorism Task Force (IJTTF) 389StateLevel Fusion Centers 392High Intensity Drug Trafficking Area (HIDTA) 395High Intensity Financial Crime Area (HIFCA) 397Regional Information Sharing System (RISS) 404Conclusion 405Summary 407Index 411