Retracted: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining
This paper uses measures of structural cohesion from social network analysis (SNA) literature to discuss how to destabilize terrorist networks by visualizing participation index of various terrorists in the dataset. Structural cohesion is defined as the minimum number of terrorists, who if removed from the group, would disconnect the group. We tested bottom-up measures from SNA (cliques, n-cliques, n-clans and k-plex) using dataset of 9-11 terrorist network, and found that Mohamed Atta, who was known as ring leader of the plot, participated maximum number of groups generated by the structural cohesion measures.
We discuss the results of recently introduced algorithms for constructing hierarchy of terrorist networks, so that investigators can view the structure of non-hierarchical organizations, in order to destabilize terrorist networks. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also briefly discuss various roles in the network i.e., position role index, which discovers various positions in the network, for example, leaders / brokers and followers.
KeywordsSocial Network Analysis Eigenvector Centrality Cohesion Analysis Structural Cohesion Participation Index
Unable to display preview. Download preview PDF.
- 2.Berry, N., Ko, T., Moy, T., Smrcka, J., Turnley, J., Wu, B.: Emergent clique formation in terrorist recruitment. In: The AAAI-04 Workshop on Agent Organizations: Theory and Practice, July 25, 2004, San Jose, California (2004)Google Scholar
- 4.Burt, R.S.: Structural Holes. Harvard University Press, Cambridge, MA (1992)Google Scholar
- 5.Burt, R.S.: Structure, A General Purpose Network Analysis Program. Reference Manual. Columbia University, Newyork (1990)Google Scholar
- 7.Davis, R.H.: Social network analysis: An aid in conspiracy investigations. FBI Law Enforcement Bulletin, pp. 11–19 (1981)Google Scholar
- 9.Grier, P.: The New Al Qa’ida: Local Franchiser. Christian Science Monitor (July 11, 2005) (accessed May 26, 2006), Online at http://www.csmonitor.com/2005/0711/p01s01-woeu.html
- 10.Hanneman, R.E.: Introduction to Social Network Methods. Online Textbook Supporting Sociology 175. University of California, Riverside, CA (2000)Google Scholar
- 11.Felter, J., et al.: Harmony and Disharmony: Exploiting al-Qa’ida’s Organizational Vulnerabilities, pp. 7–9. United States Military Academy, West Point, NY (2006)Google Scholar
- 12.Windrem, R.: The Frightening Evolution of al-Qa’ida, MSNBC.com (June 24, 2005) (accessed May 26, 2006), Online at: http://msnbc.msn.com/id/8307333
- 13.Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)Google Scholar
- 17.McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Aldershot, Dartmouth. Offender Profiling Series, vol. III (1999)Google Scholar
- 18.Memon, N.: Detecting Terrorist Related Activities using Investigative Data Mining Tool. In: Proceedings of Symposium 5, Data/Text Mining from Large Databases IFSR 2005, Kobe, Japan (2005)Google Scholar
- 22.Scott, J.: Social Network Analysis: A Handbook, 2nd edn. Sage Publications, London (2000)Google Scholar
- 24.Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press (2004)Google Scholar