Skip to main content

Beyond Keyword Filtering for Message and Conversation Detection

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

Keyword filtering is a commonly used way to select, from a set of intercepted messages, those that need further scrutiny. An obvious countermeasure is to replace words that might be on a keyword list by others. We show that this strategy itself creates a signature in the altered messages that makes them readily detectable using several forms of matrix decomposition. Not only can unusual messages be detected, but sets of related messages can be detected as conversations, even when their endpoints have been obscured (by using transient email addresses, stolen cell phones and so on).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baker, W.E., Faulkner, R.B.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review 58, 837–860 (1993)

    Article  Google Scholar 

  2. Coffman, T., Greenblatt, S., Marcus, S.: Graph-based technologies for intelligence analysis. CACM 47(3), 45–47 (2004)

    Google Scholar 

  3. European Parliament Temporary Committee on the ECHELON Interception System. Final report on the existence of a global system for the interception of private and commercial communications (echelon interception system) (2001)

    Google Scholar 

  4. Garton, L., Haythornthwaite, C., Wellman, B.: Studying online social networks. Journal of Computer-Mediated Communication 3(1) (1997)

    Google Scholar 

  5. Golub, G.H., van Loan, C.F.: Matrix Computations, 3rd edn. Johns Hopkins University Press, Baltimore (1996)

    MATH  Google Scholar 

  6. Hyvärinen, A.: Survey on independent component analysis. Neural Computing Surveys 2, 94–128 (1999)

    Google Scholar 

  7. Ferreri Cancho, R., Solé, R.V.: The small world of human language. In: Proceedings of the Royal Society of London Series B – Biological Sciences, pp. 2261–2265 (2001)

    Google Scholar 

  8. Keila, P.S., Skillicorn, D.B.: Structure in the Enron email dataset. In: Third Workshop on Link Analysis, Counterterrorism and Security, SIAM International Data Mining Conference, pp. 55–64 (2005)

    Google Scholar 

  9. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  10. Li, W.: Random texts exhibit Zipf’s-law-like word frequency distribution. IEEETIT: IEEE Transactions on Information Theory 38(6), 1842–1845 (1992)

    Article  Google Scholar 

  11. McArthur, R., Bruza, P.: Discovery of implicit and explicit connections between people using email utterance. In: Proceedings of the Eighth European Conference of Computer-supported Cooperative Work, Helsinki, pp. 21–40 (2003)

    Google Scholar 

  12. Tyler, J.R., Wilkinson, D.M., Huberman, B.A.: Email as spectroscopy: Automated discovery of community structure within organizations. HP Labs, Mill Road, Palo Alto CA, 94304, p. 1501 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Skillicorn, D.B. (2005). Beyond Keyword Filtering for Message and Conversation Detection. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_19

Download citation

  • DOI: https://doi.org/10.1007/11427995_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics