Skip to main content

Practical Algorithms for Destabilizing Terrorist Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Abstract

This paper uses centrality measures from complex networks to discuss how to destabilize terrorist networks. We propose newly introduced algorithms for constructing hierarchy of covert networks, so that investigators can view the structure of terrorist networks / non-hierarchical organizations, in order to destabilize the adversaries. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also propose two new centrality measures i.e., position role index (which discovers various positions in the network, for example, leaders / gatekeepers and followers) and dependence centrality (which determines who is depending on whom in a network). The dependence centrality has a number of advantages including that this measure can assist law enforcement agencies in capturing / eradicating of node (terrorist) which may disrupt the maximum of the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albert, R., Barabási, A.L.: Dynamics of complex systems: scaling laws for the period of boolean networks, Physics Reviews 47 (2002)

    Google Scholar 

  2. Albert, R., Barabási, A.L.: Emergence of scaling in random networks. Science 286, 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  3. Carley, K.M., Lee, J.-S., Krackhardt, D.: Destabilizing Networks. Connections 24(3), 79–92 (2002)

    Google Scholar 

  4. Carley, K.M., et al.: Destabilizing Dynamic Covert Networks. In: Proceedings of 8th International Command and Control Research and Technology Symposium, Conference held at National Defense War College, Washington, DC. Evidence Based Research Vienna, VA (2003)

    Google Scholar 

  5. Dorogovtsev, S.N., Mendes, J.F.F.: Evolution of Networks Adv. Phys. 51, 1079 (2002)

    Google Scholar 

  6. Farely, D.J.: Breaking Al Qaeda Cells: a Mathematical analysis of counterterrorism Operations Studies in conflict terrorism 26, 399–411 (2003)

    Google Scholar 

  7. Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3) (2001)

    Google Scholar 

  8. Krebs, V.: Mapping Terrorist Networks. Connections 24(3) (2002)

    Google Scholar 

  9. Latora, V., Marchiori, M.: How Science of Complex Networks can help in developing Strategy against Terrorism. Chaos, Solitons and Fractals 20, 69–75 (2004)

    Article  MATH  Google Scholar 

  10. Nasrullah, M., Arroyo, D.O., Larsen, H.L.: Investigative Data Mining: A General Framework. In: Proceedings of International Conference on Computational Intelligence, Istanbul, Turkey, pp. 384–387 (2004)

    Google Scholar 

  11. Nasrullah, M., Larsen, H.L.: Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. In: Proceedings of ARES 2006: The First International Conference on Availability, Reliability and Security, Vienna University of Technology Austria (2006)

    Google Scholar 

  12. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  13. Ravasz, E., Barabási, A.L.: Hierarchical organization in complex networks. Phys. Rev. E 67, 261121 (2003)

    Article  Google Scholar 

  14. Strogatz, S.H.: Exploring Complex Networks. Nature 410, 268–276 (2002)

    Article  Google Scholar 

  15. Trusina, A.S., Maslov, P.M., Sneppen, K.: Hierarchy and Anti-Hierarchy in Real and Scale Free Networks. Phys. Rev. Lett. 92, 178702 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Memon, N., Larsen, H.L. (2006). Practical Algorithms for Destabilizing Terrorist Networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_34

Download citation

  • DOI: https://doi.org/10.1007/11760146_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics