Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies

Hardcover (Print)
Rent from
(Save 68%)
Est. Return Date: 07/23/2015
Used and New from Other Sellers
Used and New from Other Sellers
from $49.77
Usually ships in 1-2 business days
(Save 46%)
Other sellers (Hardcover)
  • All (12) from $49.77   
  • New (7) from $78.85   
  • Used (5) from $49.75   


In 2004, the Government Accountability Office provided a report detailing approximately 200 government-based data-mining projects. While there is comfort in knowing that there are many effective systems, that comfort isn’t worth much unless we can determine that these systems are being effectively and responsibly employed.

Written by one of the most respected consultants in the area of data mining and security, Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies reviews the tangible results produced by these systems and evaluates their effectiveness. While CSI-type shows may depict information sharing and analysis that are accomplished with the push of a button, this sort of proficiency is more fiction than reality. Going beyond a discussion of the various technologies, the author outlines the issues of information sharing and the effective interpretation of results, which are critical to any integrated homeland security effort.

Organized into three main sections, the book fully examines and outlines the future of this field with an insider’s perspective and a visionary’s insight.

  • Section 1 provides a fundamental understanding of the types of data that can be used in current systems. It covers approaches to analyzing data and clearly delineates how to connect the dots among different data elements
  • Section 2 provides real-world examples derived from actual operational systems to show how data is used, manipulated, and interpreted in domains involving human smuggling, money laundering, narcotics trafficking, and corporate fraud
  • Section 3 provides an overview of the many information-sharing systems, organizations, and task forces as well as data interchange formats. It also discusses optimal information-sharing and analytical architectures

Currently, there is very little published literature that truly defines real-world'systems. Although politics and other factors all play into how much one agency is willing to support the sharing of its resources, many now embrace the wisdom of that path. This book will provide those individuals with an understanding of what approaches are currently available and how they can be most effectively employed.

Read More Show Less

Product Details

  • ISBN-13: 9781420067231
  • Publisher: Taylor & Francis
  • Publication date: 12/16/2008
  • Edition description: New Edition
  • Pages: 448
  • Sales rank: 1,134,806
  • Product dimensions: 7.00 (w) x 10.10 (h) x 0.90 (d)

Table of Contents



Sharing Data

Connect the Dots

Analytical Versus Referential Data

Information Sharing


The Quality of Data


Value Errors

Missing Data and Bad Structures

Unique Addresses

Distinct Phone Numbers

Individual ID Numbers

Anomalous Accounts

One-of-a-Kind Transactions

Original Organizations

Perspicuous People

Entity Resolution

Anonymous Resolution


What Are Patterns?


Which Pattern Is More Important?

Do These Patterns Make Sense?

Is This a Reliable Pattern?

Is This an Actionable Pattern?

Which Pattern Is More Valuable?

What Does this Pattern Show?

Who Is the Most Important Person?


Border Protection


I-94 Arrival/Departure Records

Land Border Targeting

Cluster by Hour of the Day (HOD)

Cluster by Day of the Week (DOW)

Cluster by Date

Cluster by Port of Entry (POE)

Clusters by Lane

Cluster by Inspector

Cluster by City/State

Cluster by VIN

Putting It Together


Money Laundering and Financial Crimes


Suspicious Activity Reports

Structuring Transactions

Bust-Out Schemes

A Consumer Bust-Out Scheme

Busting and Kiting

Identity Fraud

Large Connections

Attorneys and Law Firms

Cheap Motels

Location, Location, Location

Individual Taxpayer Identification Number

SAR Versus STR

Timing Is Everything

False Temporal Patterns

A Final Note


Money Service Businesses


What Is a Money Service Business?

Why Wire Remitters?

Steps of a Wire Remittance

Structure of a Wire Transfer

Combating Human Smuggling

The Smuggling Process

Changing the Rules

Seizing Assets

Corridor States

Drug Dealers

Suspicious Activity Reports

Elder Abuse Pattern

Ornery Old Man

Other MSB Patterns

Multiple Locations

Minimal Overlaps

Official Deposits

Heavenly Offerings

Dirty Dancing


Fraud Analytics


Warranty Fraud Anecdotes

Automobile Warranties

Hurricane Katrina

Corporate Frauds

Employees as Vendors

Vendors as Vendors

Corporate Expenses

Duplicate Payments

Human Resources

Gift Card Fraud

Additional Examples


Phishing/Click Fraud

Tax Evasion

Medicare Claim Fraud


Information-Sharing Protocols


Global Justice XML Data Model (Global JXDM)

Data Dictionary

Data Model

Component Reuse Repository

National Information Exchange Model

28 CFR Part 23


Information-Sharing Systems


Automated Regional Justice Information System (ARJIS)

Citizen and Law Enforcement Analysis and Reporting (CLEAR)

Comprehensive Regional Information Management Exchange System


Factual Analysis Criminal Threat Solution (FACTS) System

Florida Information Network for Data Exchange and Retrieval (FINDER)

Ohio Local Law Enforcement Information Sharing Network (OLLEISN)

Law Enforcement Information Exchange (LInX)

OneDOJ, R-DEx, N-DEx

Law Enforcement Online (LEO)

Joint Regional Information Exchange System (JRIES)

Joint Terrorism Task Force (JTTF)

State-Level Fusion Centers

High Intensity Drug Trafficking Area (HIDTA)

High Intensity Financial Crime Area (HIFCA)

Regional Information Sharing System (RISSs)



Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted December 26, 2009

    Data Mining for Intelligence, Fraud & Criminal Detection by Christopher Westphal

    Its very Useful for the Reseachers, Professionals, scholars, students etc.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)