Skip to main content

Retracted: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

  • Conference paper
Intelligence and Security Informatics (ISI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5075))

Included in the following conference series:

Abstract

This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.

An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-540-69304-8_56

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Penzar, D., Srbljinović, A.: About Modeling of Complex Networks with Applications to Terrorist Group Modeling. J. Interdisciplinary Description of Complex Systems 3(1), 27–43 (2005)

    Google Scholar 

  2. Grier, P.: The New Al Qa’ida: Local Franchiser, Christian Science Monitor (2005) (July 11, 2005), http://www.csmonitor.com/2005/0711/p01s01-woeu.html (Accessed on May 26, 2006)

  3. Wiktorowicz, Q.: The New Global Threat: Transnational Salafis and Jihad. Middle East Policy 8(4), 18–38 (2001)

    Article  Google Scholar 

  4. Felter, J., et al.: Harmony and Disharmony: Exploiting al-Qa’ida’s Organizational Vulnerabilities, pp. 7–9. United States Military Academy, West Point (2006)

    Google Scholar 

  5. Ravasz, E., Barabasi, A.L.: Hierarchical Organization in Complex Networks. J. Physical Review E 67, 026112

    Google Scholar 

  6. Costa, L.D.F.: Hierarchical Backbone of Complex Networks. Physical Review Lett. 93, 098702 (2004)

    Article  Google Scholar 

  7. Trusina, A., Maslov, S., Minnhagen, P., Sneppen, K.: Hierarchy Measures in Complex Networks. Physical Review Lett. 92, 178702

    Google Scholar 

  8. Variano, E.A., et al.: Networks Dynamics and Modularity. Physical Review Lett. 92, 188701 (2004)

    Article  Google Scholar 

  9. Freeman, L.C., Freeman, S.C., Michaelson, A.G.: On Human Social Intelligence. Journal of Social and Biological Structures 11, 415–425 (1988)

    Article  Google Scholar 

  10. William, P., et al.: Numerical Recipes: The Art of Scientific Computing. Cambridge University Press, Cambridge (2002)

    Google Scholar 

  11. Hotelling, H.: Simplified calculation of principal components. Psychometrika 1, 27–35 (1936)

    Article  MATH  Google Scholar 

  12. Memon, N., Hicks, D.L., Larsen, H.L.: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. In: Alhajj, R., Gao, H., Li, X., Li, J., Zaïane, O.R. (eds.) ADMA 2007. LNCS (LNAI), vol. 4632, pp. 430–441. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. 11 March Madrid Train Bombing, http://en.wikipedia.org/wiki/2004_Madrid_train_bombings (Accessed on December 22, 2007)

  14. John Loftus On Fox TV Claims London Bombings ’Mastermind’ Is MI6 Double Agent, http://www.btinternet.com/~nlpWESSEX/Documents/WATLoftusMI6.htm

  15. Ressler, S.: Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research (2006)

    Google Scholar 

  16. Krebs, V.E.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  17. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press, Philadelphia (2004)

    Book  Google Scholar 

  18. Rodriquez, J.A.: The March 11th Terrorist Network: In its weakness lies its strength. In: Proc. XXV International Sunbelt Conference, Los Angeles (2005)

    Google Scholar 

  19. Reid, E., et al.: Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Memon, N., et al.: Harvesting Terrorists Information from Web. In: Proc. 11th International Conference Information Visualization (IV 2007). IEEE Press, Los Alamitos (2007)

    Google Scholar 

  21. Thompson, J.D.: Organizations in Action. McGraw-Hill, New York (1967)

    Google Scholar 

  22. Williamson, O.E.: The Economic Institutions of Capitalism. The Free Press, New York (1985)

    Google Scholar 

  23. Garicano, L.: Hierarchies and Organization of Knowledge in Production. J. Political Econom. 108(5), 874–905 (2000)

    Article  Google Scholar 

  24. Bower, J.L.: Managing the Resource Allocation Process. Harvard Business School Press, Boston (1974)

    Google Scholar 

  25. Simon, H.A.: The Architecture of Complexity. Proc. Amer. Philos. Soc. 106, 467–482 (1962)

    Google Scholar 

  26. Jacobides, M.: The Architecture and Design of Organizational Capabilities. Indust. Corporate Change 15(1), 115–169 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Memon, N., Larsen, H.L., Hicks, D.L., Harkiolakis, N. (2008). Retracted: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69304-8_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69136-5

  • Online ISBN: 978-3-540-69304-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics