Tuesday, September 11, 2007

9.11 from Ann Arbor


2001: World Trade Center and Pentagon attacked by terrorists
On this day in 2001, 19 militants associated with the terrorist group al-Qaeda hijacked four planes in the United States, crashing three into buildings (the fourth crashed in Pennsylvania) and killing some 3,000 people.

Ann Arbor is in Michigan and here at 8:43 some people recall from memory that day, worst than Pearl Harbor day in American recent history.

Beyond September 11th: An Account of Post-Disaster Research

NSF Media Briefing

Engineers Week
Monday, February 23, 2004
National Science Foundation
Arlington, Virginia

Insight into Research at Ground Zero, Presented by the Researchers Who Were There
On Monday, February 23, the National Science Foundation hosted six of the nation's top rapid-response researchers to report on their experiences at Ground Zero.
Read about this event
.

Scientists Use the "Dark Web" to Snag Extremists and Terrorists Online

Team from the University of Arizona identifies and tracks terrorists on the Web

Representation of computer technology, with a circuit board and the silhouette of a computer user.
The Dark Web project team catalogues and studies places online where terrorists operate.

Funded by the National Science Foundation and other federal agencies, Hsinchun Chen and his Artificial Intelligence Lab at the University of Arizona have created the Dark Web project, which aims to systematically collect and analyze all terrorist-generated content on the Web.
... A recent report estimates that there are more than 5,000 Web sites created and maintained by known international terrorist groups, including Al-Qaeda, the Iraqi insurgencies, and many home-grown terrorist cells in Europe....

Techniques:

  • Social network analysis
  • The technologies used are statistical analysis, cluster analysis, social network analysis (SNA), visualization, and various other approaches. SNA has recently been recognized as a promising technology for studying criminal and terrorist networks. Specifically, we use the centrality and structural equivalence measures from SNA to measure the importance of each network member. Centralities such as degree, prestige, betweenness, and closeness can automatically identify the leaders, gatekeepers, and outliers from a network. To detect terrorist groups in a network we employ traditional hierarchical clustering algorithms. In addition, with a rich set of approaches and metrics from SNA, we extract interaction patterns between groups using blockmodeling approach, analyze and predict the stability of a terrorist group using group density and cohesion measures. Moreover, we examine its topological characteristics in terms of level of centralization and degree of hierarchy. These structural properties found can be of great help in revealing the vulnerability of a terrorist organization.

    ....

    ...The book, in the end, is an invitation to critical thinking of some of the major myths of American History. Woods does not attempt to denigrate his targets or examine the issues in minute detail, instead offering a second look at American history. Even though everyone may not agree with Woods’ on all of the issues, it is more important to him that people know that there is another side to many of the best-known stories of America, and draw their own conclusions, rather than take the official public school-taught propaganda at face value.
    or
    A Review of "33 Questions about American History You're Not Supposed to Ask"

    Technorati Cosmos: other blogs commenting on this post

    No comments: