Skip to main content
Log in

NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference

  • Published:
Computational & Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

Since the events of September 11, 2001, the United States has found itself engaged in an unconventional and asymmetric form of warfare against elusive terrorist organizations. Defense and investigative organizations require innovative solutions that will assist them in determining the membership and structure of these organizations. Data on covert organizations are often in the form of disparate and incomplete inferences of memberships and connections between members. NETEST is a tool that combines multi-agent technology with hierarchical Bayesian inference models and biased net models to produce accurate posterior representations of a network. Bayesian inference models produce representations of a network's structure and informant accuracy by combining prior network and accuracy data with informant perceptions of a network. Biased net theory examines and captures the biases that may exist in a specific network or set of networks. Using NETEST, an investigator has the power to estimate a network's size, determine its membership and structure, determine areas of the network where data is missing, perform cost/benefit analysis of additional information, assess group level capabilities embedded in the network, and pose “what if” scenarios to destabilize a network and predict its evolution over time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Butts, C. (2002), “Network Inference, Error, and Informant (In)Accuracy:ABayesian Approach,” Social Networks, in press.

  • Krackhardt, D. (1987), “Cognitive Social Structures,” Social Networks, 9, 104–134.

    Google Scholar 

  • Krebs, V. (2002), “Mapping Networks of Terrorist Cells,” Connections, 24(3), 43–52.

    Google Scholar 

  • Ronfeldt, D. and J. Arquilla (September 21, 2001), “Networks, Netwars, and the Fight for the Future,” First Monday, Issue 6, No. 10. Available online at http://firstmonday.org/issues/issue6 10/ronfeldt/index.htm

  • Skvoretz, J. (1990), “Biased Net Theory: Approximations, Simulations, and Observations,” Social Networks, 12, 217–238.

    Google Scholar 

  • Smith, D., M. Corbin and C. Hellman (2001), “Reforging the Sword: Forces for a 21st Century Security Strategy,” Center for Defense Information. Available online at http://www.cdi.org/mrp/reforging-full.pdf

  • TRADOC Pam 525-5. (August 1, 1994), “Force XXI Operations,” Department of the Army, Headquarters, United States Army, Training and Doctrine Command, Fort Monroe, VA.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dombroski, M.J., Carley, K.M. NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference. Computational & Mathematical Organization Theory 8, 235–241 (2002). https://doi.org/10.1023/A:1020723730930

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1020723730930

Navigation