Network Structure Mining: Locating and isolating core members in covert terrorist networks

نویسندگان

  • MUHAMMAD AKRAM SHAIKH
  • WANG JIAXIN
چکیده

Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure mining is especially suitable for mining a large volume of association data to discover hidden structural patterns in criminal networks. Covert networks share some features with conventional (real world) networks, but they are harder to identify because they mostly hide their illicit activities. After the September 11, 2001 attacks, social network analysis (SNA) has increasingly been used to study criminal networks. However, Finding out who is related to whom on a large scale in a covert network is a complex problem. In this paper we will discuss how network structure mining is applied in the domain of terrorist networks using structural (indices) measures or properties from social network analysis (SNA) and web structural mining research and proposed an algorithm for network disruption. Structural properties are determined by the graph structure of the network. These structural properties are used for locating and isolating core members by using importance ranking score and thereby analyzing the effect to remove these members in terrorist networks. The discussion is supported with a case study of Jemma Islamiah (JI) terrorist network. Key-Words: Networks, Centrality, Dependency, Rank, Influence, and Destabilization.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mining for offender group detection and story of a police operation

Since discovery of an underlying organisational structure from crime data leads the investigation to terrorist cells or organised crime groups, detecting covert networks are important to crime investigation. As shown in application of Offender Group Detection Model (OGDM), which is developed and tested on a theft network in Bursa, Turkey, use of effective data mining methods can reveal offender...

متن کامل

Covert Network Detection

Network analysis has been a major research area over the last ten years, driven by interest in biological networks, cyber attacks, social networks, and criminal or terrorist organizations. This range of applications is illustrated in Figure 1. Detection of a covert community is most likely to be effective if the community exhibits high levels of connection activity. However, the covert networks...

متن کامل

Computational Modelling and Simulation of Core- Periphery Terrorist Network

Terrorism and terrorist organizations are becoming more vulnerable nowadays. Understanding the terrorism and the organizational structures of terrorist networks are most important to devise successful defensive strategies against the terrorist activities. Terrorist organizational network is a real world complex system which is the association of numerous entities and has significant structural ...

متن کامل

VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming

Intelligence operation against the terrorist network has been studied extensively with the aim to mine the clues and traces of terrorists. The contributions of this paper include: (1) introducing a new approach to classify terrorists based on Gene Expression Programming (GEP); (2) analyzing the characteristics of the terrorist organization, and proposing an algorithm called Create Virtual Commu...

متن کامل

Bouncing Back: Recovery Mechanisms of Covert Networks

In study of covert networks and destabilization strategies thereof, much attention has been paid to the task of locating and isolating key individuals within the organization. Metrics such as centrality, betweenness, cognitive load, and others, have all been used for that purpose. The isolation act was considered successful if it resulted in the network being separated into disconnected subpart...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008