Abstract
It is very important for us to understand the functions and structures of terrorist networks to win the battle against terror. However, previous studies of terrorist network structure have generated little actionable results. This is mainly due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis methodologies in the field. To address these problems, we employed several advance network analysis techniques ranging from social network analysis to Web structural mining on a Global Salafi Jihad network dataset collected through a large scale empirical study. Our study demonstrated the effectiveness and usefulness of advanced network techniques in terrorist network analysis domain. We also introduced the Web structural mining technique into the terrorist network analysis field which, to the best our knowledge, has never been used in this domain. More importantly, the results from our analysis provide not only insights for terrorism research community but also empirical implications that may help law-reinforcement, intelligence, and security communities to make our nation safer.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Albert, R., Barabasi, A.-L.: Statistical Mechanics of Complex Networks. Reviews of Modern Physics 74(1), 47–97 (2002)
Albert, R., Jeong, H., Barabasi, A.-L.: Diameter of the World-Wide Web. Nature 401, 130–131 (1999)
Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)
Amaral, L.A.N., Scala, A., Stanley, H.E.: Classes of small-world networks. PNAS 97, 11149–11152 (2000)
Arabie, P., Boorman, S.A., Levitt, P.R.f.: Constructing blockmodels: How and why. Journal of Mathematical Psychology 17, 21–63 (1978)
Baker, W.E., Faulkner, R.R.: The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(12), 837–860 (1993)
Barabasi, A.-L., Alert, R.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)
Bollobas, B.: Random Graphs. Academic, London (1985)
Breiger, R.L., Boorman, S.A., Arabie, P.: An Algorithm for Clustering Relational Data, with Applications to Social Network Analysis and Comparison with Multidimensional Scaling. Journal of Mathematical Psychology 12, 328–383 (1975)
Brin, S., Page, L.: The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks and ISDN Systems 30, 1–7 (1998)
Burt, R.S.: Positions in networks. Social Forces 55, 93–122 (1976)
Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Bonillas, A.A., Sageman, M.: The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web. In: Proceedings of The 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004), Washington, D. C. (2004)
Cho, J., Garcia-Molina, H., Page, L.: Efficient Crawling through URL Ordering. In: Proceedings of the 7th International WWW Conference, Brisbane, Australia (1998)
Erdos, P., Renyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5, 17–61 (1960)
Evan, W.M.: An organization-set model of interorganizational relations. In: Tuite, M., Chisholm, R., Radnor, M. (eds.) Interorganizational Decision-making, Chicago, Aldine, pp. 181–200 (1972)
Freeman, L.C.: Centrality in Social Networks: Conceptual Clarification. Social Networks 1, 215–240 (1979)
Freeman, L.C.: Visualizing social networks. Journal of Social Structure 1(1) (2000)
Galaskiewicz, J., Krohn, K.: Positions, roles, and dependencies in a community interorganization system. Sociological Quarterly 25, 527–550 (1984)
Garton, L., Haythornthwaite, C., Wellman, B.: Studying online social networks. In: Jones, S. (ed.) Doing Internet Research, Sage, Thousand Oaks (1999)
Gibson, D., Kleinberg, J., Raghavan, P.: Inferring Web Communities from Link Topology. In: Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, Pittsburgh, Pennsylvania, USA (1998)
Jeong, H., Mason, S.P., Barabasi, A.-L., Oltvai, Z.N.: Lethality and centrality in protein networks. Nature 411(6833), 41 (2001)
Kleinberg, J.: Authoritative Sources in a Hyperlinked Environment. In: Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA (1998)
Klerks, P.: The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3), 53–65 (2001)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)
Liu, X., Bollen, J., Nelson, M.L., Van de Sompel, H.: All in the Family? In: A Co-Authorship Analysis of JCDL Conferences (1994-2003); Proceedings of the IEEE/ACM Joint Conference on Digital Libraries 2004, Tucson, AZ (2004)
Lorrain, F.P., White, H.C.: Structural Equivalence of Individuals in Social Networks. Journal of Mathematical Sociology 1, 49–80 (1971)
McAndrew, D.: The Structural Analysis of Criminal Networks. The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. D. Canter and L. Alison. Dartmouth, Aldershot (1999)
Newman, M.E.J.: The structure of scientific collaboration networks. PNAS 98, 404–409 (2001)
Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)
Ravasz, E., Somera, A.L., Mongru, D.A., Oltvai, Z.N., Barabasi, A.-L.: Hierarchical Organization of Modularity in Metabolic Networks. Science 297, 1551–1555 (2002)
Rives, A.W., Galitski, T.: Modular organization of cellular networks. PNAS 100(3), 1128–1133 (2003)
Ronfeldt, D., Arquilla, J.: What next for networks and netwars? Networks and Netwars: The Future of Terror, Crime, and Militancy. J. Arquilla and D. Ronfeldt (2001)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)
Saether, M., Canter, D.V.: A structural analysis of fraud and armed robbery networks in Norway. In: Proceedings of the 6th International Investigative Psychology Conference, Liverpool, England (2001)
Scott, J.: Social Network Analysis. Sage, London (1991)
Scott, M.: War’s new front. CIO Insight, 82–83 (2001)
Solé, R.V., Montoya, J.M.: Complexity and fragility in ecological networks. Proc. R. Soc. B 268, 2039–2045 (2001)
Sparrow, M.K.: The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)
Toyoda, M., Kitsuregawa, M.: Creating a Web Community Chart for Navigating Related Communities. In: Proceedings of ACM Conference on Hypertext and Hypermedia, Århus, Denmark (2001)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Watts, D.J., Strogatz, S.H.: Collective Dynamics of ’Small-World’ Networks. Nature 393, 440–442 (1998)
White, H.C., Boorman, S.A.: Social Structure from Multiple Networks: I. Blockmodels of Roles and Positions. American Journal of Sociology 81, 730–780 (1976)
Xu, J., Chen, H.: Untangling Criminal Networks: A Case Study. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 232–248. Springer, Heidelberg (2003)
Xu, J., Chen, H.: Criminal Network Analysis and Visualization: A Data Mining Perspective. Communications of the ACM (forthcoming)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qin, J., Xu, J.J., Hu, D., Sageman, M., Chen, H. (2005). Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_24
Download citation
DOI: https://doi.org/10.1007/11427995_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)