Structural Analysis and Destabilizing Terrorist Networks

نویسندگان

  • Nasrullah Memon
  • Henrik Legind Larsen
چکیده

This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analysis (such as cliques, n-cliques, n-clans and k-plex) to determine familiarity, robustness and reachability within subgroups in 9/11 terrorist network; (ii) role analysis (such as position role index) to determine critical nodes (gatekeepers or leaders) and their removal leads to the maximum disruption of the network; (iii) power analysis (such as degree centrality, Eigenvector centrality and dependence centrality) to uncover the hidden hierarchy of terrorist networks. The methods are implemented in the software prototype known as iMiner, which may provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will likely disrupt the terrorist network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks

Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorists’ attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of netwo...

متن کامل

Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence

Given the increasing threat of terrorism and spread of terrorist organizations, it is of vital importance to understand the properties of such organizations and to devise successful strategies for destabilizing them or decreasing their efficiency. However, intelligence information on these organizations is often incomplete, inaccurate or simply not available. This makes the study of terrorist n...

متن کامل

JoSS Article: Volume 6 Structural Knowledge and Success of Anti- Terrorist Activity: The Downside of Structural Equivalence

Given the increasing threat of terrorism and spread of terrorist organizations, it is of vital importance to understand the properties of such organizations and to devise successful strategies for destabilizing them or decreasing their efficiency. However, intelligence information on these organizations is often incomplete, inaccurate or simply not available. This makes the study of terrorist n...

متن کامل

Efficient Algorithm for Destabilization of Terrorist Networks

The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...

متن کامل

Network Structure Mining: Locating and isolating core members in covert terrorist networks

Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006