2012 4 No.4 2012 Journal of Chinese People s Public Security University Social Sciences Edition 158 Sum158 1 2 1 1. 410073 2. 100038 D918 A 1672-2140 2012 04-0117 - 09 21 7 5 9 11 2011 10-20 1 2002 9 11 9 11 2 1977-1968- 1964-117
3 4-5 Sharon Weinberger 6 Matthew M. Aid 7 Mary DeRosa 8 20 90 1. 9 17 1 10 9 11 11 12 143-159 13 Web 7 5 14 15 16 9 11 118
18-19 2 2 2008 11 10 2. 7 5 3. 7 5 9 11 119
WEB 4. 1. 3 3 2. 4 4 3. 120
121
4 1. 1 1 1 G HI!"# $%& %()%*+%,( -.&/ 012345-.678%9:;< =>? %@ABCDEF =>JK L MNDE%OPQR6STMUVW XY [Z%\] 01_>6-. %aab c%defg6hdde%ijklmnop6de% ZV Z^ qrstude%vt01_>wx6[zf 1 80% 20% 2 5 122
5 12 112-136 AutoMap 20 ORA 21 2. 6 6 AutoMap ORA AutoMap 3. ORA 1 2 7 Clustering k- means k- k- medoids k- 7 Web 123
23 24-25 4. 8 8 8 124
2010 7 4 1-8. 12. M. 2007. 13. J. 2007 126 2 24-29. 14. Web J. 2011 30 4 414-415. 15. J. 2011 30 2 219. 16. J. 2009 59 1 55-59. 17. J. 1 National strategy for counter terrorism R. RAND, 2011 1-10. 2005 2 33. 2. M. 19 2011 12-38. EB/OL. 2012-04- 10.http // 3. 9.11 J. www.cctv.com/oriental/sklx/jmnr/20020921/3.html. 2006 21 2 130-135. 4 Carley K. Destabilization of covert networks J. Computational and mathematical organization theory 2006 12 1 51-66. 5 Caley K. Destabilizing dynamic covert networks C. 8th i- nternational command and control research and technology sysmposium. 2003 20-39. 6 Sharon Weinberger. WEB of War J. Science 2011 471 31 566-568. 7 Matthew M. Aid. Intel Wars the secret history of the fight against terror M. Bloomsbury press. 2012 10-26. 8 Mary DeRosa.Data mining and data analysis for counterterrorism R. Department of defense appropriations Act 2004 1-24. 2006 36-37. 9. J. 2008 134 4 1-6. 10. J. 2005 3 135-138. 11. J. 2009 172 1 52-55. 18. J. 20 Kathleen M. Carley Jeff Reminga Jon Storrick and Matt DeReno. ORA user s Guide2011 R/OL. http //www.casos. cs.cmu.edu. 21 Kathleen M. Carley. AutoMap user s Guide 2011 R/OL. http //www.casos.cs.cmu.edu. 22. J. 2008 26 16 29-30. 23 Steve Ressler. Social network analysis as an approach to combat terrorism past present and future research J. Homeland security affairs 2006 2 1-4. 24 Kathleen M. Carly. Dynamic network analysis for counterterrorism R. 2006 1-19. 25 Steele R.D. The failure of 20th century intelligence M. 125