Major McCulloh,
Please send power point slides
on the social network monitoring
of Al-Qaeda for LTC Snuffy NLT COB today.
Thank you.
Very Respectfully,
G.I.
Joe
From: Joe, G. SGT S2
Sent: Monday, February 12,
2007 12:27 AM
To: McCulloh, I. MAJ MATH;
Subject: Social Network
Analysis of Al-Qaeda (UNCLASSIFIED)
Classification:
UNCLASSIFIED
Caveats: NONE
Major McCulloh,
Please send power point slides on
the social network monitoring
of Al-Qaeda for LTC Snuffy NLT COB today.
Thank you.
Very Respectfully,
G.I. Joe
Transforming raw-email data into
social-network information
School of Computer Science, ISR, CASOS
This work is supported by the Department of Defense and
National Science Foundation under MKIDS program (IIS0218466) and the Office of
Naval Research under Dynamic Network Analysis program
(N00014-02-1-0973) and WVHTCFTAVI071375 and N00014-06-1-0104, with additional
support from the Air Force Office of Sponsored Research (MURI: Computational
Modeling of Cultural Dimensions in Adversary
Organizations, FA9550-05-1-0388), TAVI, HEINZ-IGERT TRAINING
PROGRAM(NSF,DGE-9972762), VIBES (ARMY DAAD19-01C0065), Dynamic Network
Analysis Applications to
Counter-Narcotic Investigations Related to Marijuana (ONR, N00014-06-1-0104
(Mod#2)), MOAT Phase II, C2 Insight (DARPA, N0000610921), Network Analysis and
Computational Modeling for Combating Terrorist Threats
(DYNET:MMVOIA Quick Reaction Fund) (ONR, N000140610921), and Determine Ability
to Model Terrorist Networks Unit (SPAWAR). The views and conclusions
contained in this document are those of the authors and should not be
interpreted as representing the official policies, either expressed or
implied, of the Department of Defense, the National
Science Foundation, the Office of Naval Research, or the U.S. government.
A social network
representation is extracted from your own email data send information: the
sender, to, cc, bcc, etc. The text of your email message is also extracted and
prepared for processing in AutoMap.
Automap extracts unstructured data and converts it into a network
representational form. These networks
can be combined and are readily available for analysis using ORA.
CEMAP
CEMAP
From: Joe, G. SGT S2
Sent: Monday, February 12, 2007
12:27 AM
To: McCulloh, I. MAJ MATH;
Subject: Social Network Analysis of
Al-Qaeda (UNCLASSIFIED)
Classification: UNCLASSIFIED
Caveats: NONE
Major McCulloh,
Please send power point slides on
the social network monitoring of Al-Qaeda for LTC
Snuffy NLT COB today.
Thank you.
Very Respectfully,
G.I. Joe
From: Joe, G. SGT S2
Sent: Monday, February 12,
2007 12:27 AM
To: McCulloh, I. MAJ
MATH;
Subject: Social Network
Analysis of Al-Qaeda (UNCLASSIFIED)
Classification:
UNCLASSIFIED
Caveats: NONE
Major McCulloh,
Please send power point slides
on the social network monitoring
of Al-Qaeda for LTC Snuffy NLT COB today.
Thank you.
Very Respectfully,
G.I. Joe
Major McCulloh,
Please send power point slides
on the social network monitoring
of Al-Qaeda for LTC Snuffy NLT COB today.
Thank you.
Very Respectfully,
G.I.
Joe
Major McCulloh,
Please send power point slides
on the social network monitoring
of Al-Qaeda for LTC Snuffy NLT COB today.
Thank you.
Very Respectfully,
G.I.
Joe
ORA, the Organizational Risk
Analyzer (ORA) is a pc-based software tool that is essential to analyzing
multi-network social networks. ORA
provides features that facilitate the feature-rich visualization of the network
data into node-link diagrams, and provides extensive reporting
capabilities. ORA also provides a
multitude of rich features that are essential to the analysis of multi-network
data – emails, for example.
ORA
What
does your email network look like?
CMU has developed a powerful,
automated
process for capturing raw, real-world E-Mail data and
transforming it into structured
social-network and unstructured
text data. This data can then be readily analyzed using social network
analysis software, i.e., ORA, and further processed using natural language
processing software, i.e., AutoMap.
AutoMap
* ORA is freely available via
www.casos.cs.cmu.edu
* CEMAP functionality is a
menu-item in ORA software