Analyzing covert social network foundation behind terrorism disaster
نویسندگان
چکیده
This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator’s prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing. The social network responsible for the 9/11 attack in 2001 is used to execute simulation experiment to evaluate the performance of the method.
منابع مشابه
SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the p...
متن کاملAn Outlier Analysis to Tag Elites in Clandestine Social Networks
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the p...
متن کاملOne-mode projection analysis and design of covert affiliation networks
Decision makers in the field of national security, counterterrorism and counterinsurgency are faced with an uncertain, adaptive and asymmetrical threat. It should come as no surprise that a great need exists to understand covert organizations, the structure of which becomes known partially only after an attack or operation has occurred. What is known however is that many covert networks are org...
متن کاملA Survey on Social Network Analysis for Counter-Terrorism
Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key players/ main actors of terrorist netw...
متن کاملThe Spider-man Behavior Protocol: Exploring Both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics
Hiding true personality behind a façade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a façade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide a dangerous activity, possibly illegal, behind an ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0710.4231 شماره
صفحات -
تاریخ انتشار 2007