Misplaced Pages

Tocsearch: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 17:41, 16 May 2010 editAcather96 (talk | contribs)32,535 edits Also remived this template, see below edit← Previous edit Revision as of 18:23, 16 May 2010 edit undoVernoWhitney (talk | contribs)Administrators45,132 edits blanked as permission inadequate - will explain at existing conversation at User talk:Acather96Next edit →
Line 1: Line 1:
<!-- Please do not remove or change this Copyvio message until the issue is settled -->

{{Nobots}}
{{Copyviocore
|url=http://tocsearch.com/index.php?action=about
|month = May
|day = 16
|year = 2010
|time = 18:23
|timestamp = 20100516182329}}
<!-- Do not use the "Copyviocore" template directly; the above line is generated by "subst:Copyvio|url" -->
The '''TOC search''' (Terrorist and ] Search) is a dynamic ] which offers comprehensive information on global ] network and help researchers, analysts, students and others working to prevent terrorism. It is result of a common project realized by the Faculty of Security Studies and Faculty of Mathematics, University of Belgrade, which had started in December 2007. The '''TOC search''' (Terrorist and ] Search) is a dynamic ] which offers comprehensive information on global ] network and help researchers, analysts, students and others working to prevent terrorism. It is result of a common project realized by the Faculty of Security Studies and Faculty of Mathematics, University of Belgrade, which had started in December 2007.



Revision as of 18:23, 16 May 2010


An editor has launched a copyright investigation involving this section. The text under investigation is currently hidden from public view, but is accessible in the page history. Please do not remove this notice or restore blanked content until the issue is resolved by an administrator, copyright clerk, or volunteer response agent.

The purported copyright violation copies text from http://tocsearch.com/index.php?action=about (Copyvios report); as such, this page has been listed on the copyright problems page.

Unless the copyright status of the text of this page or section is clarified and determined to be compatible with Misplaced Pages's content license, the problematic text and revisions or the entire page may be deleted one week after the time of its listing (i.e. after 18:23, 23 May 2010 (UTC)).

What can I do to resolve the issue?
  • If you hold the copyright to this text, you can license it in a manner that allows its use on Misplaced Pages.
    1. You must permit the use of your material under the terms of the Creative Commons Attribution-Sharealike 4.0 International License (CC BY-SA 4.0) and the GNU Free Documentation License (GFDL) (unversioned, with no invariant sections, front-cover texts, or back-cover texts).
    2. Explain your intent to license the content on this article's discussion page.
    3. To confirm your permission, you can either display a notice to this effect at the site of original publication or send an e-mail from an address associated with the original publication to permissions-en@wikimedia.org or a postal letter to the Wikimedia Foundation. These messages must explicitly permit use under CC BY-SA and the GFDL. See Misplaced Pages:Donating copyrighted materials.
    4. Note that articles on Misplaced Pages must be written from a neutral point of view and must be verifiable in published third-party sources; consider whether, copyright issues aside, your text is appropriate for inclusion in Misplaced Pages.
  • You can demonstrate that this text is in the public domain or is already under a license suitable for Misplaced Pages. Explain this on this article's discussion page, with reference to evidence. Misplaced Pages:Public domain and Misplaced Pages:Compatibly licensed may assist in determining the status.
  • Otherwise, you may rewrite this page without copyright-infringing material. Your rewrite should be placed on this page, where it will be available for an administrator or clerk to review it at the end of the listing period. Follow this link to create the temporary subpage. Please mention the rewrite upon completion on this article's discussion page.
    • Simply modifying copyrighted text is not sufficient to avoid copyright infringement—if the original copyright violation cannot be cleanly removed or the article reverted to a prior version, it is best to write the article from scratch. (See Misplaced Pages:Close paraphrasing.)
    • For license compliance, any content used from the original article must be properly attributed; if you use content from the original, please leave a note at the top of your rewrite saying as much. You may duplicate non-infringing text that you had contributed yourself.
    • It is always a good idea, if rewriting, to identify the point where the copyrighted content was imported to Misplaced Pages and to check to make sure that the contributor did not add content imported from other sources. When closing investigations, clerks and administrators may find other copyright problems than the one identified. If this material is in the proposed rewrite and cannot be easily removed, the rewrite may not be usable.

Steps to list an article at Misplaced Pages:Copyright problems:
  1. Add the following to the bottom of Misplaced Pages:Copyright problems/2010 May 16: * {{subst:article-cv|Tocsearch}} from http://tocsearch.com/index.php?action=about. ~~~~
  2. Add the following template to the talk page of the contributor of the material: {{subst:Nothanks-web|pg=Tocsearch|url=http://tocsearch.com/index.php?action=about}} ~~~~
  3. Place {{copyvio/bottom}} at the end of the portion you want to blank. If nominating the entire page, please place this template at the top of the page, set the "fullpage" parameter to "yes", and place {{copyvio/bottom}} at the very end of the article.

The TOC search (Terrorist and Organized Criminal Search) is a dynamic data base which offers comprehensive information on global terrorist network and help researchers, analysts, students and others working to prevent terrorism. It is result of a common project realized by the Faculty of Security Studies and Faculty of Mathematics, University of Belgrade, which had started in December 2007.

The scope of the TOC search data base is to provide in-depth research and analysis on terrorist incidents, terrorist groups, organizations, their members, leaders and also links and relations between the individuals and groups. The idea is to integrate data from variety of sources, including foreign and domestic news, professional security journals, reports and databases, academic works.

The starting point in the TOC searchearch project was the data presented on the map Al-Qaeda Network: Principals, Supporters, Selected Cells and Significant Activities (1992-2004). The map was prepared by J. L. Boesen, Raytheon Genesis Facility Institute Reston (2004), using the data derived from open sources. The data presented in the map were classified and stored in order to create backbone of the base.

The data in the base are classified in seven entities: individuals, groups, organizations, supporters, actions, links and GMC reports. The simple and advanced search features are implemented in the TOC search. The simple search enables the researcher to explore the chosen entity by given keyword or part of an entity name. The advanced search feature is implemented for individuals, groups, organizations, supporters and actions. It is performed by using different properties: alias, belongs to organization, belongs to group, leader, religion, in relation with, type or actors of the attack, etc. All search results are presented together with the basic information on the found subjects, enabling in-depth search to be performed as well. An important feature of the TOC search is the fact that links between the mentioned terrorist-related categories are stored and classified in the data base. The results of both simple and advance search provide information whether there is a link (active or inactive) from a particular item. The in-depth search feature gives more information on the found link. This is a unique feature of the TOC search which no other terrorist database has had up to this point.

One of the key advantages of the TOC search is the fact that its basic data source is verified information from the reports prepared and provided by George C Marshall European Center for Security Studies. The PTSS Reports are produced by special newsletter service supporting the counterterrorism course at The George C. Marshall European Center for Security Studies, and it is created for educational purposes only. The newsletter is produced from the open-source media reports by GMC postgraduate students and verified by senior experts and counter terrorism officers. This is the main reason why PTSS has been chosen as the main data source for TOC search. Besides PTSS Reports, GMC also publishes several other reports based on different open source data, such as: Department of Homeland Security Report (DHS), Terrorism Open Source Intelligence Report (TOSIR), Insurgency Literature Review (ILR) and Terrorism Literature Report (TLR).

The incoming reports are sorted and stored by date in GMC section of the TOC search database. The George Marshall Center provided us with their GMC reports archive and they keep sending us the daily PTSS and other GMC reports In this way, a constant refreshment of the base with up-to-date information has been provided. The TOC search simple search feature through GMC reports is implemented, which enables the exploration of GMC section by using keywords.

At each moment of using TOC search, one can immediately start a new search or switch to advanced search tool. While exploring the data base, a researcher usually performs multiple search. In order to help the user of the TOC search, we have implemented the “select tool”. This tool enables the user to put all the important results obtained from different search. In this way, all the data that are essential in the research are available during the further TOC search exploration. The data in the “selection” tool are easily added or removed. By using option “Feedback” the user may send a message on TOC search administrator on different topics (site bugs, error data, comments, suggestions, etc. )

The information in the TOC search database has been constantly updated from the GMC reports and other publicly available, open-source materials. These include electronic news archives, existing data sets, secondary source materials such as books and journals, and legal documents. TOC search team performs constant verification of the data by comparing it with other sources and by internal checking of the data and related records.

It is also important to provide the protection of data stored in the base. In this scope, two levels of data access are implemented in the TOC search. The first level is named “blue key” and it is available for students and researchers in academic institutions and research centers. The “blue key” enables the access to all open-source data stored in the base. The second level of data access, named “red key” is reserved for legal authorities, state institutions, and state government. The “red key” opens the part of the TOC search with confidential data. The owner of the “red key” also has access to the open source data, as the “blue key” owner. Only state institutions and agencies which have a contract with TOC search have an access to the red key data and they are red key members.

In the next phase of the TOC search project, several analytical features are to be incorporated in the database. Analytical tools will provide statistical information analysis of the global terrorist network. The researcher will be able to analyze terrorism trends over time and to compare different aspects of terrorism between countries, regions and terrorist groups (for example: type of terrorist attacks, level of organization, tactics, communication level, size of a terrorist group, age or race of its members, and many others). The results of statistical analysis will be presented graphically in various charts, showing the dependencies and/or the comparisons of the chosen aspects. The chart type can also be chosen by the user.

An analytical-purpose system will be used to understand the structure of different terrorist organizations with respect to particular attack types or regions of their activity. By using this system, the intelligence analysts will be able to develop hypotheses and then validate them (or not) against the data in the TOC search information space. In this way, it will be possible to provide certain predictions of international terrorism trends, seasonality, and periodicity of terrorist events.

In the future phase of the TOC searchearch project, we also plan to implement the image search feature. This tool will enable to search the image data base for related photographs of individuals or terrorist attacks by using keywords (individual’s name, group/organization name, or the part of the name, specific terrorist incident, date, etc.).

Regarding the practical aspects of the TOC search database, we emphasize the fact that the TOC search data were primarily collected by academic groups. This means that TOC search team was under no political or government pressure in terms of how to collect the data or how to classify them. Although the TOC search is still in its construction phase, it has already been used in the purpose of Security of the Olympic Games in Beijing 2008, and it is currently being used in the purpose of Security of the World Championship in Football 2010.

External links

Category: