Structural Analysis and Destabilizing Terrorist Networks
نویسندگان
چکیده
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analysis (such as cliques, n-cliques, n-clans and k-plex) to determine familiarity, robustness and reachability within subgroups in 9/11 terrorist network; (ii) role analysis (such as position role index) to determine critical nodes (gatekeepers or leaders) and their removal leads to the maximum disruption of the network; (iii) power analysis (such as degree centrality, Eigenvector centrality and dependence centrality) to uncover the hidden hierarchy of terrorist networks. The methods are implemented in the software prototype known as iMiner, which may provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will likely disrupt the terrorist network.
منابع مشابه
Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks
Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorists’ attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of netwo...
متن کاملStructural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence
Given the increasing threat of terrorism and spread of terrorist organizations, it is of vital importance to understand the properties of such organizations and to devise successful strategies for destabilizing them or decreasing their efficiency. However, intelligence information on these organizations is often incomplete, inaccurate or simply not available. This makes the study of terrorist n...
متن کاملJoSS Article: Volume 6 Structural Knowledge and Success of Anti- Terrorist Activity: The Downside of Structural Equivalence
Given the increasing threat of terrorism and spread of terrorist organizations, it is of vital importance to understand the properties of such organizations and to devise successful strategies for destabilizing them or decreasing their efficiency. However, intelligence information on these organizations is often incomplete, inaccurate or simply not available. This makes the study of terrorist n...
متن کاملEfficient Algorithm for Destabilization of Terrorist Networks
The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...
متن کاملNetwork Structure Mining: Locating and isolating core members in covert terrorist networks
Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure...
متن کامل