Abstract
A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks are intentionally structured to ensure efficient communication between members without being detected. A terrorist network can be modeled as a generalized network (graph) consisting of nodes and links. Techniques from social network analysis (SNA) and graph theory can be used to identify key entities in the network, which is helpful for network destabilization purposes. Research on terrorist network analysis (TNA) has mainly focuses on analysis of nodes, which is in contrast to the fact that the links between the nodes provide at least as much relevant information about the network as the nodes themselves. This paper presents a novel method to analyze the importance of links in terrorist networks inspired by research on transportation networks. The12.6pc]The first author has been considered as corresponding author. Please check. link importance measure is implemented in CrimeFighter Assistant and evaluated on known terrorist networks harvested from open sources.
An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-7091-0388-3_22
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baccara, M., Bar-Isaac, H.: Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, pp. 271–290. Springer, Berlin (2009)
Lindelauf, R., Borm, P., Hamers, H.: On heterogeneous covert networks. Mathematical Methods in Counterterrorism, pp. 215–228. Springer, Berlin (2009)
Lindelauf, R., Borm, P., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Soc. Netw. 31, 126–137 (2009)
Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 29–36. INSTICC Press, Funchal, Portugal, Oct 2009
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting covert networks: The case study of the iMiner database. Int. J. Netw. Virtual Organ. 8(1/2), 52–74 (2011)
Gloor, P.A., Zhao, Y.: Analyzing actors and their discussion topics by semantic social network analysis. Inform. Vis. 130–135 (2006)
Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4–1) (2002)
Enders, W., Su, X.: Rational terrorists and optimal network structure. J. Confl. Resolut. 51(1), 33 (2007)
Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)
Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 837–860 (1993)
Memon, N.: Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. thesis, Aalborg University, Denmark (2007)
Rhodes, C.J.: Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, pp. 127–140. Springer, Berlin (2009)
Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821–7826 (2002)
Newman, M.E.J.: A measure of betweenness centrality based on random walks. Soc. Netw. 27(1), 39–54 (2005)
Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–34 (2001)
Fischer, M.M., Lände, R.: GIS and network analysis. Handbook of Transport Geography and Spatial Systems, vol. 5, pp. 391-408. Pergamon Press, Amsterdam (2004)
Bell, M.G.H., Iida, Y.: Transportation Network Analysis. Wiley, New York (1997)
Jenelius, E., Petersen, T., Mattsson, L.G.: Importance and exposure in road network vulnerability analysis. Transport. Res. Part A 40(7), 537–560 (2006)
Bienenstock, E.J., Bonacich, P.: Balancing efficiency and vulnerability in social networks. Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 253–264. The National Academies Press (2003)
Wiil, U.K., Gniadek, J., Memon, N.: CrimeFighter Assistant: A knowledge management tool for terrorist network analysis. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 15–24. INSTICC Press, Valencia, Spain Oct 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2011 Springer-Verlag/Wien
About this chapter
Cite this chapter
Wiil, U.K., Gniadek, J., Memon, N. (2011). Retracted: A Novel Method to Analyze the Importance of Links in Terrorist Networks. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0388-3_10
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0387-6
Online ISBN: 978-3-7091-0388-3
eBook Packages: Computer ScienceComputer Science (R0)