Skip to content

Data Mining for Intelligence, Fraud and Criminal Detection Advanced Analytics and Information Sharing Technologies

Best in textbook rentals since 2012!

ISBN-10: 1420067230

ISBN-13: 9781420067231

Edition: 2008

Authors: Christopher Westphal, Christopher R. Westphal

List price: $105.00
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the types of patterns exposed in one domain can often be translated into another. This book reviews the commonality, framework, and infrastructures necessary to implement complex analytical systems. It addresses analytical approaches, technologies, and methodologies, as well as information sharing and how current fusion-centers are being architected.
Customers also bought

Book details

List price: $105.00
Copyright year: 2008
Publisher: CRC Press LLC
Publication date: 12/22/2008
Binding: Hardcover
Pages: 440
Size: 7.20" wide x 10.31" long x 0.94" tall
Weight: 2.398
Language: English

Foreword
Acknowledgments
The Author
Interpreting Patterns and Analytical Methodologies
Overview
Introduction
Sharing Data
Connect the Dots
Analytical Versus Referential Data
Information Sharing
Conclusion
The Quality of Data
Introduction
Value Errors
Missing Data and Bad Structures
Unique Adresses
Distinct Phone Numbers
Individual ID Numbers
Anomalous Accounts
One-of-a-Kind Transactions
Original Organizations
Perspicuous People
Entity Resolution
Anonymous Resolution
Conclusion
What Are Patterns?
Introduction
Which Pattern Is More Important?
Do These Patterns Make Sense?
Is This a Reliable Pattern?
Is This an Actionable Pattern?
Which Patterns Is More Valuable?
What Does this Pattern Show?
Who Is the Most Important Person?
Conclusion
Real-World Examples and Operations
Border Protection
Introduction
I-94 Arrival/Departure Records
Land Border Targeting
Cluster by Hour of the Day (HOD)
Cluster by Day of the Week (DOW)
Cluster by Date
Cluster by Port of Entry (POE)
Clusters by Lane
Cluster by Inspector
Cluster by City/State
Cluster by VIN
Putting It Together
Conclusion
Money Laundering and Financial Crimes
Introduction
Suspicious Activity Reports
Structuring Transactions
Bust-Out Schemes
A Consumer Bust-Out Scheme
Busting and Kiting
Identity Fraud
Large Connections
Attorneys and Law Firms
Cheap Motels
Location, Location, Location
Individual Taxpayer Identification Number
SAR Versus STR
Timing Is Everything
False Temporal Patterns
A Final Note
Conclusion
Money Service Businesses
Introduction
What Is a Money Service Business?
Why Wire Remitters?
Steps of a Wire Remittance
Structure of a Wire Transfer
Combating Human Smuggling
The Smuggling Process
Changing the Rules
Seizing Assets
Corridor States
Drug Dealers
Suspicious Activity Reports
Elder Abuse Pattern
Ornery Old Man
Other MSB Patterns
Multiple Locations
Minimal Overlaps
Official Deposits
Heavenly Offerings
Dirty Dancing
Conclusion
Fraud Analytics
Introduction
Warranty Fraud Anecdotes
Automobile Warranties
Hurricane Katrina
Corporate Frauds
Employees as Vendors
Vendors as Vendors
Corporate Expenses
Duplicate Payments
Human Resources
Gift Card Fraud
Additional Examples
Pharmaceutical
Phishing/Click Fraud
Tax Evasion
Medicare Claim Fraud
Conclusion
Information Sharing and Fusion Centers
Information-Sharing Protocols
Introduction
Global Justice XML Data Model (Global JXDM)
Data Dictionary
Data Model
Component Reuse Repository
National Information Exchange Model
28 CFR Part 23
Conclusion
Information-Sharing Systems
Introduction
Automated Regional Justice Information System (ARJIS)
Citizen and Law Enforcement Analysis and Reporting (CLEAR)
Comprehensive Regional Information Management Exchange System (CRIMES)
Factual Analysis Criminal Threat Solution (FACTS) System
Florida Information Network for Data Exchange and Retrieval (FINDER)
Ohio Local Law Enforcement Information Sharing Network (OLLEISN)
Law Enforcement Information Exchange (LInX)
OneDOJ, R-DEx, N-DEx
Law Enforcement Online (LEO)
Joint Regional Information Exchange System (JRIES)
Joint Terrorism Task Force (IJTTF)
StateLevel Fusion Centers
High Intensity Drug Trafficking Area (HIDTA)
High Intensity Financial Crime Area (HIFCA)
Regional Information Sharing System (RISS)
Conclusion
Summary
Index