Abstract
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.
An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-540-69304-8_56
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Penzar, D., Srbljinović, A.: About Modeling of Complex Networks with Applications to Terrorist Group Modeling. J. Interdisciplinary Description of Complex Systems 3(1), 27–43 (2005)
Grier, P.: The New Al Qa’ida: Local Franchiser, Christian Science Monitor (2005) (July 11, 2005), http://www.csmonitor.com/2005/0711/p01s01-woeu.html (Accessed on May 26, 2006)
Wiktorowicz, Q.: The New Global Threat: Transnational Salafis and Jihad. Middle East Policy 8(4), 18–38 (2001)
Felter, J., et al.: Harmony and Disharmony: Exploiting al-Qa’ida’s Organizational Vulnerabilities, pp. 7–9. United States Military Academy, West Point (2006)
Ravasz, E., Barabasi, A.L.: Hierarchical Organization in Complex Networks. J. Physical Review E 67, 026112
Costa, L.D.F.: Hierarchical Backbone of Complex Networks. Physical Review Lett. 93, 098702 (2004)
Trusina, A., Maslov, S., Minnhagen, P., Sneppen, K.: Hierarchy Measures in Complex Networks. Physical Review Lett. 92, 178702
Variano, E.A., et al.: Networks Dynamics and Modularity. Physical Review Lett. 92, 188701 (2004)
Freeman, L.C., Freeman, S.C., Michaelson, A.G.: On Human Social Intelligence. Journal of Social and Biological Structures 11, 415–425 (1988)
William, P., et al.: Numerical Recipes: The Art of Scientific Computing. Cambridge University Press, Cambridge (2002)
Hotelling, H.: Simplified calculation of principal components. Psychometrika 1, 27–35 (1936)
Memon, N., Hicks, D.L., Larsen, H.L.: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. In: Alhajj, R., Gao, H., Li, X., Li, J., Zaïane, O.R. (eds.) ADMA 2007. LNCS (LNAI), vol. 4632, pp. 430–441. Springer, Heidelberg (2007)
11 March Madrid Train Bombing, http://en.wikipedia.org/wiki/2004_Madrid_train_bombings (Accessed on December 22, 2007)
John Loftus On Fox TV Claims London Bombings ’Mastermind’ Is MI6 Double Agent, http://www.btinternet.com/~nlpWESSEX/Documents/WATLoftusMI6.htm
Ressler, S.: Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research (2006)
Krebs, V.E.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002)
Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press, Philadelphia (2004)
Rodriquez, J.A.: The March 11th Terrorist Network: In its weakness lies its strength. In: Proc. XXV International Sunbelt Conference, Los Angeles (2005)
Reid, E., et al.: Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)
Memon, N., et al.: Harvesting Terrorists Information from Web. In: Proc. 11th International Conference Information Visualization (IV 2007). IEEE Press, Los Alamitos (2007)
Thompson, J.D.: Organizations in Action. McGraw-Hill, New York (1967)
Williamson, O.E.: The Economic Institutions of Capitalism. The Free Press, New York (1985)
Garicano, L.: Hierarchies and Organization of Knowledge in Production. J. Political Econom. 108(5), 874–905 (2000)
Bower, J.L.: Managing the Resource Allocation Process. Harvard Business School Press, Boston (1974)
Simon, H.A.: The Architecture of Complexity. Proc. Amer. Philos. Soc. 106, 467–482 (1962)
Jacobides, M.: The Architecture and Design of Organizational Capabilities. Indust. Corporate Change 15(1), 115–169 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Memon, N., Larsen, H.L., Hicks, D.L., Harkiolakis, N. (2008). Retracted: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_50
Download citation
DOI: https://doi.org/10.1007/978-3-540-69304-8_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69136-5
Online ISBN: 978-3-540-69304-8
eBook Packages: Computer ScienceComputer Science (R0)