Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks

  • Alan Chen
  • Shang Gao
  • Panagiotis Karampelas
  • Reda Alhajj
  • Jon Rokne


Modeling and analyzing criminal and terrorists networks is a challenging problem that has attracted considerable attention in the academia, industry and government institutions, especially intelligence services. Criminals try to keep their communications and interactions uncovered as much as possible in order not to be discovered and resolved. Their success is our society failure and vice versa. Hence, it is essential to thoroughly study such networks to investigate their details. However, incompleteness of criminal networks is one of the main problems facing investigators, due to missing links in the network; and social network methods could be effectively used to analyze and hopefully prevent, avoid or stop criminal activities. Social network analysis can be applied to criminal networks in order to elaborate on good strategies to prosecute or prevent criminal activities. Having all this in mind, our research provides a method to identify hidden links between nodes in a network using the current information available to investigators. The method presented generates networks that represent all the possible hidden links, and the links of these generated networks represent the number of times the two entities are indirectly connected in each relationship type. The method was tested on multiple small terrorism data sets and the results demonstrate that the proposed method is capable of finding interesting hidden links. This is a valuable technique in criminal network analysis, because it can assist investigators in finding hidden links in the network and reduce the amount of missing data.


  1. 1.
    Baker, W., Faulkner, R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58(6), 837–860 (1993)CrossRefGoogle Scholar
  2. 2.
    Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W.: Discovering hidden groups in communication networks. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 3073, pp. 378–389. Springer, Berlin/Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Farely, D.: Breaking al qaeda cells: A mathematical analysis of counterterrorism operations. Stud. Confl. Terrorism 26(6), 399–411 (2003)CrossRefGoogle Scholar
  4. 4.
    Dawoud, K., Alhajj, R., Rokne, J.: A global measure for estimating the degree of organization of terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 421–427. 9–11 Aug 2010Google Scholar
  5. 5.
    Krebs, V.: Mapping networks of terrorist cells. Connections 24, 43–52 (2002)Google Scholar
  6. 6.
    Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)CrossRefMATHMathSciNetGoogle Scholar
  7. 7.
    Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58(7), 1019–1031 (2007)CrossRefGoogle Scholar
  8. 8.
    Shaikh, M., Wang, J.: Discovering hierarchical structure in terrorist networks. In: Proceedings of the International Conference on Emerging Technologies, pp. 238–244. (2006)Google Scholar
  9. 9.
    Magdon-Ismail, M., Goldberg, M., Wallace, W., Siebecker, D.: Locating hidden groups in communication networks using hidden markov models. In: Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol.2665, pp.958. Springer, Berlin/Heidelberg (2010)Google Scholar
  10. 10.
    Memon, N., Wiil, U., Qureshi, A.: Design and development of an early warning system to prevent terrorist attacks. In: Proceedings of the International Conference on Artificial Intelligence and Neural Networks, pp. 222–226. (2009)Google Scholar
  11. 11.
    Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3), 53–65 (2001)Google Scholar
  12. 12.
    Qin, J., Xu, J., Hu, D., Sageman, M., Chen, H.: Analyzing terrorist networks: A case study of the global salafi jihad network. pp. 287–304 (2005)Google Scholar
  13. 13.
    Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60(10), 1373–1383 (2009)CrossRefGoogle Scholar
  14. 14.
    Strogatz, S.: Exploring complex networks. Nature 6825(410), 268–276 (2002)Google Scholar
  15. 15.
    Sparrow, M.: The application of network analysis to criminal intelligence: An assessment of the prospects. Soc. Networks 13(3), 251–274 (1991)CrossRefMathSciNetGoogle Scholar
  16. 16.
    Tsvetovat, M., Carley, K.: Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. J. Soc. Struct. 6(2) (2005)Google Scholar
  17. 17.
    Xu, J., Chen, H.: Crimenet explorer: A framework for criminal network knowledge discovery. CM Trans. Inform. Syst. 23(2), 201–226 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag/Wien 2011

Authors and Affiliations

  • Alan Chen
    • 1
  • Shang Gao
    • 1
  • Panagiotis Karampelas
    • 2
    • 3
  • Reda Alhajj
    • 1
    • 4
    • 2
  • Jon Rokne
    • 1
  1. 1.Computer Science DepartmentUniversity of CalgaryCalgaryCanada
  2. 2.Department of Information TechnologyHellenic American UniversityManchesterUSA
  3. 3.Hellenic Air Force AcademyAthensGreece
  4. 4.Department of Computer ScienceGlobal UniversityBeirutLebanon

Personalised recommendations