Abstract
Terrorist threat prevention and counteraction require timely detection of hostile plans. However, adversary efforts at concealment and other challenges involved in monitoring terrorist organizations may impede timely intelligence acquisition or interpretation. This study develops an approach to analyzing technological means rather than content of communications produced within the social networks comprising covert organizations, and shows how it can be applied towards detecting terrorist attack precursors. We find that differential usage patterns of hi-tech versus low-tech communication solutions could reveal significant information about organizational activities, which may be further used to detect signals of impending terrorist attacks. (Such potential practical utility of our method is supported by the detailed empirical analysis of available al Qaeda communications.) The described approach thus provides a common framework for utilizing diverse activity records from heterogeneous sources as well as contributes new tools for their rapid analysis aimed at better informing operational and policy decision-making.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Al Qaeda (circa 2001) The Al Qaeda manual located by the Manchester (England) Metropolitan Police during a search of an Al Qaeda member’s home and introduced as evidence in the United States of America v. Usama Bin Laden et al. trial, United States District Court, Southern District of New York
Arquilla J, Ronfeldt D (2001) Networks and netwars: the future of terror, crime and militancy. RAND, Santa Monica
Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6): 837–860
Barabási AL (2002) Linked: the new science of networks. Perseus Publications, Cambridge
Berman E, Shapiro JN, Felter JH (2008) Can hearts and minds be bought? The economics of counterinsurgency in Iraq. NBER, working paper no 14606, December
Bueno de Mesquita B, Smith A, Siverson RM, Morrow JD (2003) The logic of political survival. MIT Press, Cambridge
Burt RS (1992) Structural holes. Harvard University Press, Cambridge
Burt RS (2004) Structural holes and good ideas. Am J Sociol 110(2):349–399
Burt RS (2007) Secondhand brokerage: evidence on the importance of local structure for managers, bankers, and analysts. Acad Manag J 50(1):119–148
Burton R, Obel B (2004) Strategic organizational diagnosis and design: the dynamics of fit, 3rd edn. Springer, New York
Carley K, Prietula M (1994) Computational organization theory. Lawrence Erlbaum Associates, Hillsdale
Carley K, Lee JS, Krackhardt D (2002) Destabilizing networks. Connections 24(3):79–92
Carlson JM, Doyle J (1999) Highly optimized tolerance: a mechanism for power laws in designed systems. Phys Rev E 60(2):1412–1427
Carlson JM, Doyle J (2002) Complexity and robustness. Proc Natl Acad Sci USA 99(suppl. 1):2538–2545
Cioffi-Revilla C (1998) Politics and uncertainty: theory, models and applications. Cambridge University Press, Cambridge
Crenshaw M (ed) (1995) Terrorism in context. Penn State Press, University Park
Drozdova K (2008) Organizations, technology, and network risks: how and why organizations use technology to counter or cloak their human network vulnerabilities. PhD dissertation, New York University
Drozdova K (2009) Intelligence design. Hoover Dig 2009(3):72–78
Dunbar RM, Starbuck WH (2006) Learning to design organizations and learning from designing them. Organ Sci 17(2):171–178
Erickson BH (1981) Secret societies and social structure. Soc Forces 60(1):188–210
FBIS (2004) Compilation of Usama Bin Ladin Statements 1994–January 2004. Foreign Broadcast Information Service (FBIS) report available from Federation of American Scientists website, last accessed on June 7, 2009, http://www.fas.org/irp/world.para/ubl-fbis.pdf
Ganor B (2008) Terrorist organization typologies and the probability of a boomerang effect. Stud Confl Terror 31:269–283
Granovetter M (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380
Granovetter M (1985) Economic action and social structure: the problem of embeddedness. Am J Sociol 91(3):481–510
Hoffman B (2006) Inside terrorism, 2nd edn. Columbia University Press, New York
Hogg RV, Tanis EA (1977) Probability and statistical inference. Macmillan, New York
Hull J (1997) Options, futures, and other derivatives, 3rd edn. Prentice Hall, Upper Saddle River
Katzenstein PJ, Keohane RO, Krasner SD (eds) (1999) Exploration and contestation in the study of world politics. MIT Press, Cambridge
Kuwahara H, Myers C, Samoilov M, Barker N, Arkin A (2006) Automated abstraction methodology for generic regulatory networks. Trans Comput Syst Biol VI LNBI 4220:150–175
Kuwahara H, Myers C, Samoilov MS (2009) Temperature control of fimbriation circuits switch in uropathogenic Escherichia coli: quantitative analysis via automated model abstraction (submitted)
Lawrence PR, Lorsch JW (1967) Organization and environment: managing differentiation and integration. Harvard University Press, Cambridge
March JG, Simon HA (1993) Organizations, 2nd edn. Wiley-Blackwell, Cambridge
McAdams HH, Arkin A (1999) It’s a noisy business! Genetic regulation at the nanomolar scale. Trends Genet 15:65–69
Mueller RS (2002) Statement for the record, FBI Director Robert S. Mueller III. Joint Intelligence Committee Inquiry JICI 09/25/02 FBI24003
National Commission on Terrorist Attacks Upon the United States (2004) The 9/11 Commission report: final report of the national commission on terrorist attacks upon the United States
Newman M, Barabási AL, Watts DJ (2006) The structure and dynamics of networks. Princeton University Press, Princeton
Office of the director of national intelligence (ODNI) (2005) ODNI announces establishment of open source center. November 8, ODNI news release no 6-05
Orlov A (1963) Handbook of intelligence and guerilla warfare. University of Michigan Press, Ann Arbor
Podolny JM, Page KL (1998) Network forms of organization. Annu Rev Sociol 24:57–76
Powell W (1990) Neither market nor hierarchy: network forms of organization. Res Organ Behav 12:295–336
Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia
Samoilov MS, Arkin A (2006) Deviant effects in molecular reaction pathways. Nat Biotechnol 24:1235–1240
Samoilov MS, Price G, Arkin A (2006) From fluctuations to phenotypes: the physiology of noise. Science’s STKE 2006, re17
Scott WR, Davis GF (2007) Organizations and organizing: rational, natural and open systems perspectives, 6th edn. Prentice Hall, Upper Saddle River
Simmel G (1908) The Secret and the Secret Society. Part four of Wolff KH ed. and trans. (1950) The sociology of Georg Simmel. Free Press, New York
Sudoplatov A, Sudoplatov P, Schecter J, Schecter LP (1994) Special tasks: the memoirs of an unwanted witness—a soviet spymaster. Little, Brown and Company, Boston
Sveshnikov AA, Gelbaum BR (1978) Problems in probability theory, mathematical statistics and theory of random functions. Dover, New York
Taleb N (1997) Dynamic hedging: managing vanilla and exotic options. Wiley, New York
Taylor JR, Van Every EJ (2000) The emergent organization: communication as its site and surface. Erlbaum, Mahwah
United States of America v. Usama Bin Laden, et al. (1998) Indictment and updates. United States District Court, Southern District of New York. S(9) 98 Cr. 1023 (LBS) version was used for coding the data
United States of America v. Usama Bin Laden, et al. (2001) Superseding indictment and trial proceedings, United States District Court, Southern District of New York
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This is an open access article distributed under the terms of the Creative Commons Attribution Noncommercial License (https://creativecommons.org/licenses/by-nc/2.0), which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
About this article
Cite this article
Drozdova, K., Samoilov, M. Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations. Comput Math Organ Theory 16, 61–88 (2010). https://doi.org/10.1007/s10588-009-9058-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10588-009-9058-2