Skip to main content

Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Abstract

It is very important for us to understand the functions and structures of terrorist networks to win the battle against terror. However, previous studies of terrorist network structure have generated little actionable results. This is mainly due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis methodologies in the field. To address these problems, we employed several advance network analysis techniques ranging from social network analysis to Web structural mining on a Global Salafi Jihad network dataset collected through a large scale empirical study. Our study demonstrated the effectiveness and usefulness of advanced network techniques in terrorist network analysis domain. We also introduced the Web structural mining technique into the terrorist network analysis field which, to the best our knowledge, has never been used in this domain. More importantly, the results from our analysis provide not only insights for terrorism research community but also empirical implications that may help law-reinforcement, intelligence, and security communities to make our nation safer.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albert, R., Barabasi, A.-L.: Statistical Mechanics of Complex Networks. Reviews of Modern Physics 74(1), 47–97 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  2. Albert, R., Jeong, H., Barabasi, A.-L.: Diameter of the World-Wide Web. Nature 401, 130–131 (1999)

    Article  Google Scholar 

  3. Albert, R., Jeong, H., Barabasi, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)

    Article  Google Scholar 

  4. Amaral, L.A.N., Scala, A., Stanley, H.E.: Classes of small-world networks. PNAS 97, 11149–11152 (2000)

    Article  Google Scholar 

  5. Arabie, P., Boorman, S.A., Levitt, P.R.f.: Constructing blockmodels: How and why. Journal of Mathematical Psychology 17, 21–63 (1978)

    Article  MATH  Google Scholar 

  6. Baker, W.E., Faulkner, R.R.: The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(12), 837–860 (1993)

    Article  Google Scholar 

  7. Barabasi, A.-L., Alert, R.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  8. Bollobas, B.: Random Graphs. Academic, London (1985)

    MATH  Google Scholar 

  9. Breiger, R.L., Boorman, S.A., Arabie, P.: An Algorithm for Clustering Relational Data, with Applications to Social Network Analysis and Comparison with Multidimensional Scaling. Journal of Mathematical Psychology 12, 328–383 (1975)

    Article  Google Scholar 

  10. Brin, S., Page, L.: The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks and ISDN Systems 30, 1–7 (1998)

    Article  Google Scholar 

  11. Burt, R.S.: Positions in networks. Social Forces 55, 93–122 (1976)

    Article  MathSciNet  Google Scholar 

  12. Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Bonillas, A.A., Sageman, M.: The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web. In: Proceedings of The 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004), Washington, D. C. (2004)

    Google Scholar 

  13. Cho, J., Garcia-Molina, H., Page, L.: Efficient Crawling through URL Ordering. In: Proceedings of the 7th International WWW Conference, Brisbane, Australia (1998)

    Google Scholar 

  14. Erdos, P., Renyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5, 17–61 (1960)

    MathSciNet  Google Scholar 

  15. Evan, W.M.: An organization-set model of interorganizational relations. In: Tuite, M., Chisholm, R., Radnor, M. (eds.) Interorganizational Decision-making, Chicago, Aldine, pp. 181–200 (1972)

    Google Scholar 

  16. Freeman, L.C.: Centrality in Social Networks: Conceptual Clarification. Social Networks 1, 215–240 (1979)

    Article  Google Scholar 

  17. Freeman, L.C.: Visualizing social networks. Journal of Social Structure 1(1) (2000)

    Google Scholar 

  18. Galaskiewicz, J., Krohn, K.: Positions, roles, and dependencies in a community interorganization system. Sociological Quarterly 25, 527–550 (1984)

    Article  Google Scholar 

  19. Garton, L., Haythornthwaite, C., Wellman, B.: Studying online social networks. In: Jones, S. (ed.) Doing Internet Research, Sage, Thousand Oaks (1999)

    Google Scholar 

  20. Gibson, D., Kleinberg, J., Raghavan, P.: Inferring Web Communities from Link Topology. In: Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, Pittsburgh, Pennsylvania, USA (1998)

    Google Scholar 

  21. Jeong, H., Mason, S.P., Barabasi, A.-L., Oltvai, Z.N.: Lethality and centrality in protein networks. Nature 411(6833), 41 (2001)

    Article  Google Scholar 

  22. Kleinberg, J.: Authoritative Sources in a Hyperlinked Environment. In: Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA (1998)

    Google Scholar 

  23. Klerks, P.: The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3), 53–65 (2001)

    Google Scholar 

  24. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)

    Google Scholar 

  25. Liu, X., Bollen, J., Nelson, M.L., Van de Sompel, H.: All in the Family? In: A Co-Authorship Analysis of JCDL Conferences (1994-2003); Proceedings of the IEEE/ACM Joint Conference on Digital Libraries 2004, Tucson, AZ (2004)

    Google Scholar 

  26. Lorrain, F.P., White, H.C.: Structural Equivalence of Individuals in Social Networks. Journal of Mathematical Sociology 1, 49–80 (1971)

    Article  Google Scholar 

  27. McAndrew, D.: The Structural Analysis of Criminal Networks. The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. D. Canter and L. Alison. Dartmouth, Aldershot (1999)

    Google Scholar 

  28. Newman, M.E.J.: The structure of scientific collaboration networks. PNAS 98, 404–409 (2001)

    Article  MATH  Google Scholar 

  29. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  30. Ravasz, E., Somera, A.L., Mongru, D.A., Oltvai, Z.N., Barabasi, A.-L.: Hierarchical Organization of Modularity in Metabolic Networks. Science 297, 1551–1555 (2002)

    Article  Google Scholar 

  31. Rives, A.W., Galitski, T.: Modular organization of cellular networks. PNAS 100(3), 1128–1133 (2003)

    Article  Google Scholar 

  32. Ronfeldt, D., Arquilla, J.: What next for networks and netwars? Networks and Netwars: The Future of Terror, Crime, and Militancy. J. Arquilla and D. Ronfeldt (2001)

    Google Scholar 

  33. Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)

    Google Scholar 

  34. Saether, M., Canter, D.V.: A structural analysis of fraud and armed robbery networks in Norway. In: Proceedings of the 6th International Investigative Psychology Conference, Liverpool, England (2001)

    Google Scholar 

  35. Scott, J.: Social Network Analysis. Sage, London (1991)

    Google Scholar 

  36. Scott, M.: War’s new front. CIO Insight, 82–83 (2001)

    Google Scholar 

  37. Solé, R.V., Montoya, J.M.: Complexity and fragility in ecological networks. Proc. R. Soc. B 268, 2039–2045 (2001)

    Article  Google Scholar 

  38. Sparrow, M.K.: The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)

    Article  Google Scholar 

  39. Toyoda, M., Kitsuregawa, M.: Creating a Web Community Chart for Navigating Related Communities. In: Proceedings of ACM Conference on Hypertext and Hypermedia, Århus, Denmark (2001)

    Google Scholar 

  40. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  41. Watts, D.J., Strogatz, S.H.: Collective Dynamics of ’Small-World’ Networks. Nature 393, 440–442 (1998)

    Article  Google Scholar 

  42. White, H.C., Boorman, S.A.: Social Structure from Multiple Networks: I. Blockmodels of Roles and Positions. American Journal of Sociology 81, 730–780 (1976)

    Google Scholar 

  43. Xu, J., Chen, H.: Untangling Criminal Networks: A Case Study. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 232–248. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  44. Xu, J., Chen, H.: Criminal Network Analysis and Visualization: A Data Mining Perspective. Communications of the ACM (forthcoming)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qin, J., Xu, J.J., Hu, D., Sageman, M., Chen, H. (2005). Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_24

Download citation

  • DOI: https://doi.org/10.1007/11427995_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics