ABSTRACT

We have all heard stories about advanced computing and analytical systems being capable of exposing hidden patterns contained in datawhether it is for uncovering credit card frauds, identifying money launderers, or tracking terrorists. The process is usually very mysterious and avant-garde, where the specifi c parameters, values, and conditions of the patterns are closely guarded secrets for the agencies and organizations that have placed them into operation.