ABSTRACT

Much of Part III has focused on Web mining and data mining for counterterrorism. In Chapter 18, we discussed various security threats and counter-measures. Chapters 19 through 24 focused on applying Web mining and data mining technologies for counter-terrorism. Essentially, we examined the technologies discussed in Part II and how they may be applied to detect and possibly prevent terrorist attacks. In this chapter, we revisit the threats discussed in Chapter 18, and summarize the countermeasures based on Web and data mining for the various threats. We also briefly summarize our discussions on privacy given in Chapter 25.