Analyzing covert social network foundation behind terrorism disaster

نویسندگان

  • Yoshiharu Maeno
  • Yukio Ohsawa
چکیده

This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator’s prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing. The social network responsible for the 9/11 attack in 2001 is used to execute simulation experiment to evaluate the performance of the method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks

The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the p...

متن کامل

An Outlier Analysis to Tag Elites in Clandestine Social Networks

The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the p...

متن کامل

One-mode projection analysis and design of covert affiliation networks

Decision makers in the field of national security, counterterrorism and counterinsurgency are faced with an uncertain, adaptive and asymmetrical threat. It should come as no surprise that a great need exists to understand covert organizations, the structure of which becomes known partially only after an attack or operation has occurred. What is known however is that many covert networks are org...

متن کامل

A Survey on Social Network Analysis for Counter-Terrorism

Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key players/ main actors of terrorist netw...

متن کامل

The Spider-man Behavior Protocol: Exploring Both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics

Hiding true personality behind a façade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a façade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide a dangerous activity, possibly illegal, behind an ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0710.4231  شماره 

صفحات  -

تاریخ انتشار 2007