There is a pressing need to automatically collect data of terrorist networks, analyze such networks to find hidden relations and groups, prune datasets to locate regions of interest, detect key players, characterize the structure, trace points of vulnerability, and find efficiency (how fast communication is being made) of the network.
There is a pressing need to automatically collect data on social systems as rich network data, analyze such systems to find hidden relations and groups, prune the datasets to locate regions of interest, locate key actors, characterize the structure, locate points of vulnerability, and simulate change in a system as it evolves naturally or in response to strategic interventions over time or under certain impacts, including modifcation of data.
Only the last half-sentence is substantially different to the source, which is not mentioned anywhere in the thesis.
Taking an example of 9/11 attack, it is possible to show, that simple IDM techniques discussed above can be used to assist terrorist investigation. IDM techniques using government watch list information, airline reservation records, and aggregated public [record data, could have identified all 19 hijackers of 9/11 terrorists attacks before the attack. (DeRosa Mary, 2004):]
A hindsight analysis of the September 11 attacks provides an example of how simple, subject-based link analysis could be used effectively to assist investigations or analysis of terrorist plans. By using government watch list information, airline reservation records, and aggregated public record data, link analysis could have identified all 19 September 11 terrorists — for follow-up investigation — before September 11. [FN 16]
[FN 16] Of course, this kind of analysis will always appear neater and easier with hindsight, but it is a useful demonstration nonetheless.
Only a cursory reference to the source is made, and it is not clear if it refers to what has come before or to what will come; nothing is marked as a citation.