This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
The TOC search (Terrorist and Organized Criminal Search) is a dynamic data base which offers comprehensive information on global terrorist network and help researchers, analysts, students and others working to prevent terrorism. It is result of a common project realized by the Faculty of Security Studies and Faculty of Mathematics, University of Belgrade, which had started in December 2007. The scope of the TOC search data base is to provide in-depth research and analysis on terrorist incidents, terrorist groups, organizations, their members, leaders and also links and relations between the individuals and groups. The idea is to integrate data from variety of sources, including foreign and domestic news, professional security journals, reports and databases, academic works.
The starting point in the TOC searchearch project was the data presented on the map Al-Qaeda Network: Principals, Supporters, Selected Cells and Significant Activities (1992–2004). The map was prepared by J. L. Boesen, Raytheon Genesis Facility Institute Reston (2004), using the data derived from open sources. The data presented in the map were classified and stored in order to create backbone of the base.
The data in the base are classified in seven entities: individuals, groups, organizations, supporters, actions, links and GMC reports. The simple and advanced search features are implemented in the TOC search. The simple search enables the researcher to explore the chosen entity by given keyword or part of an entity name. The advanced search feature is implemented for individuals, groups, organizations, supporters and actions. It is performed by using different properties: alias, belongs to organization, belongs to group, leader, religion, in relation with, type or actors of the attack, etc. All search results are presented together with the basic information on the found subjects, enabling in-depth search to be performed as well. An important feature of the TOC search is the fact that links between the mentioned terrorist-related categories are stored and classified in the data base. The results of both simple and advance search provide information whether there is a link (active or inactive) from a particular item. The in-depth search feature gives more information on the found link. This is a unique feature of the TOC search which no other terrorist database has had up to this point.
The incoming reports are sorted and stored by date in GMC section of the TOC search database. The George Marshall Center provided us with their GMC reports archive and they keep sending us the daily PTSS and other GMC reports In this way, a constant refreshment of the base with up-to-date information has been provided. The TOC search simple search feature through GMC reports is implemented, which enables the exploration of GMC section by using keywords.
At each moment of using TOC search, one can immediately start a new search or switch to advanced search tool. While exploring the data base, a researcher usually performs multiple search. In order to help the user of the TOC search, we have implemented the “select tool”. This tool enables the user to put all the important results obtained from different search. In this way, all the data that are essential in the research are available during the further TOC search exploration. The data in the “selection” tool are easily added or removed. By using option “Feedback” the user may send a message on TOC search administrator on different topics (site bugs, error data, comments, suggestions, etc. )
One of the key advantages of the TOC search is the fact that its basic data source is verified information from the reports prepared and provided by George C Marshall European Center for Security Studies. The  Reports are produced by special newsletter service supporting the counterterrorism course at The George C. Marshall European Center for Security Studies, and it is created for educational purposes only. The newsletter is produced from the open-source media reports by GMC postgraduate students and verified by senior experts and counter terrorism officers. This is the main reason why PTSS has been chosen as the main data source for TOC search. Besides PTSS Reports, GMC also publishes several other reports based on different open source data, such as: Department of Homeland Security Report (DHS), Terrorism Open Source Intelligence Report (TOSIR), Insurgency Literature Review (ILR) and Terrorism Literature Report (TLR).
The information in the TOC search database has been constantly updated from the GMC reports and other publicly available, open-source materials. These include electronic news archives, existing data sets, secondary source materials such as books and journals, and legal documents. TOC search team performs constant verification of the data by comparing it with other sources and by internal checking of the data and related records.
It is also important to provide the protection of data stored in the base. In this scope, two levels of data access are implemented in the TOC search. The first level is named “blue key” and it is available for students and researchers in academic institutions and research centers. The “blue key” enables the access to all open-source data stored in the base. The second level of data access, named “red key” is reserved for legal authorities, state institutions, and state government. The “red key” opens the part of the TOC search with confidential data. The owner of the “red key” also has access to the open source data, as the “blue key” owner. Only state institutions and agencies which have a contract with TOC search have an access to the red key data and they are red key members.
In the next phase of the TOC search project, several analytical features are to be incorporated in the database. Analytical tools will provide statistical information analysis of the global terrorist network. The researcher will be able to analyze terrorism trends over time and to compare different aspects of terrorism between countries, regions and terrorist groups (for example: type of terrorist attacks, level of organization, tactics, communication level, size of a terrorist group, age or race of its members, and many others). The results of statistical analysis will be presented graphically in various charts, showing the dependencies and/or the comparisons of the chosen aspects. The chart type can also be chosen by the user.
An analytical-purpose system will be used to understand the structure of different terrorist organizations with respect to particular attack types or regions of their activity. By using this system, the intelligence analysts will be able to develop hypotheses and then validate them (or not) against the data in the TOC search information space. In this way, it will be possible to provide certain predictions of international terrorism trends, seasonality, and periodicity of terrorist events.
In the future phase of the TOC searchearch project, we also plan to implement the image search feature. This tool will enable to search the image data base for related photographs of individuals or terrorist attacks by using keywords (individual’s name, group/organization name, or the part of the name, specific terrorist incident, date, etc.).
Regarding the practical aspects of the TOC search database, the TOC search data were primarily collected by academic groups. This means that TOC search team was under no political or government pressure in terms of how to collect the data or how to classify them. Although the TOC search is still in its construction phase, it has already been used in the purpose of Security of the Olympic Games in Beijing 2008, and it is currently being used in the purpose of Security of the World Championship in Football 2010.
As of this edit, this article uses content from "Terrorist and Organized Criminal Search Data Base", which is licensed in a way that permits reuse under the Creative Commons Attribution-ShareAlike 3.0 Unported License, but not under the GFDL. All relevant terms must be followed.