Network Structure Mining: Locating and isolating core members in covert terrorist networks
نویسندگان
چکیده
Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure mining is especially suitable for mining a large volume of association data to discover hidden structural patterns in criminal networks. Covert networks share some features with conventional (real world) networks, but they are harder to identify because they mostly hide their illicit activities. After the September 11, 2001 attacks, social network analysis (SNA) has increasingly been used to study criminal networks. However, Finding out who is related to whom on a large scale in a covert network is a complex problem. In this paper we will discuss how network structure mining is applied in the domain of terrorist networks using structural (indices) measures or properties from social network analysis (SNA) and web structural mining research and proposed an algorithm for network disruption. Structural properties are determined by the graph structure of the network. These structural properties are used for locating and isolating core members by using importance ranking score and thereby analyzing the effect to remove these members in terrorist networks. The discussion is supported with a case study of Jemma Islamiah (JI) terrorist network. Key-Words: Networks, Centrality, Dependency, Rank, Influence, and Destabilization.
منابع مشابه
Mining for offender group detection and story of a police operation
Since discovery of an underlying organisational structure from crime data leads the investigation to terrorist cells or organised crime groups, detecting covert networks are important to crime investigation. As shown in application of Offender Group Detection Model (OGDM), which is developed and tested on a theft network in Bursa, Turkey, use of effective data mining methods can reveal offender...
متن کاملCovert Network Detection
Network analysis has been a major research area over the last ten years, driven by interest in biological networks, cyber attacks, social networks, and criminal or terrorist organizations. This range of applications is illustrated in Figure 1. Detection of a covert community is most likely to be effective if the community exhibits high levels of connection activity. However, the covert networks...
متن کاملComputational Modelling and Simulation of Core- Periphery Terrorist Network
Terrorism and terrorist organizations are becoming more vulnerable nowadays. Understanding the terrorism and the organizational structures of terrorist networks are most important to devise successful defensive strategies against the terrorist activities. Terrorist organizational network is a real world complex system which is the association of numerous entities and has significant structural ...
متن کاملVCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming
Intelligence operation against the terrorist network has been studied extensively with the aim to mine the clues and traces of terrorists. The contributions of this paper include: (1) introducing a new approach to classify terrorists based on Gene Expression Programming (GEP); (2) analyzing the characteristics of the terrorist organization, and proposing an algorithm called Create Virtual Commu...
متن کاملBouncing Back: Recovery Mechanisms of Covert Networks
In study of covert networks and destabilization strategies thereof, much attention has been paid to the task of locating and isolating key individuals within the organization. Metrics such as centrality, betweenness, cognitive load, and others, have all been used for that purpose. The isolation act was considered successful if it resulted in the network being separated into disconnected subpart...
متن کامل