Retracted: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining

  • Nasrullah Memon
  • Henrik Legind Larsen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4093)


This paper uses measures of structural cohesion from social network analysis (SNA) literature to discuss how to destabilize terrorist networks by visualizing participation index of various terrorists in the dataset. Structural cohesion is defined as the minimum number of terrorists, who if removed from the group, would disconnect the group. We tested bottom-up measures from SNA (cliques, n-cliques, n-clans and k-plex) using dataset of 9-11 terrorist network, and found that Mohamed Atta, who was known as ring leader of the plot, participated maximum number of groups generated by the structural cohesion measures.

We discuss the results of recently introduced algorithms for constructing hierarchy of terrorist networks, so that investigators can view the structure of non-hierarchical organizations, in order to destabilize terrorist networks. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also briefly discuss various roles in the network i.e., position role index, which discovers various positions in the network, for example, leaders / brokers and followers.


Social Network Analysis Eigenvector Centrality Cohesion Analysis Structural Cohesion Participation Index 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Balasundaram, B., Butenko, S., Trukhanov, S.: Novel approaches for analyzing biological networks. Journal of Combinatorial Optimization 10, 23–39 (2005)CrossRefMATHMathSciNetGoogle Scholar
  2. 2.
    Berry, N., Ko, T., Moy, T., Smrcka, J., Turnley, J., Wu, B.: Emergent clique formation in terrorist recruitment. In: The AAAI-04 Workshop on Agent Organizations: Theory and Practice, July 25, 2004, San Jose, California (2004)Google Scholar
  3. 3.
    Bonacich, P.: Power and Centrality. American Journal of Sociology 92, 1170–1184 (1987)CrossRefGoogle Scholar
  4. 4.
    Burt, R.S.: Structural Holes. Harvard University Press, Cambridge, MA (1992)Google Scholar
  5. 5.
    Burt, R.S.: Structure, A General Purpose Network Analysis Program. Reference Manual. Columbia University, Newyork (1990)Google Scholar
  6. 6.
    Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework and some examples. Computer 37(4), 50–56 (2004)CrossRefGoogle Scholar
  7. 7.
    Davis, R.H.: Social network analysis: An aid in conspiracy investigations. FBI Law Enforcement Bulletin, pp. 11–19 (1981)Google Scholar
  8. 8.
    Freeman, L.C.: The sociological concept of “group”: An empirical test of two models. American Journal of Sociology 98, 152–166 (1992)CrossRefGoogle Scholar
  9. 9.
    Grier, P.: The New Al Qa’ida: Local Franchiser. Christian Science Monitor (July 11, 2005) (accessed May 26, 2006), Online at
  10. 10.
    Hanneman, R.E.: Introduction to Social Network Methods. Online Textbook Supporting Sociology 175. University of California, Riverside, CA (2000)Google Scholar
  11. 11.
    Felter, J., et al.: Harmony and Disharmony: Exploiting al-Qa’ida’s Organizational Vulnerabilities, pp. 7–9. United States Military Academy, West Point, NY (2006)Google Scholar
  12. 12.
    Windrem, R.: The Frightening Evolution of al-Qa’ida, (June 24, 2005) (accessed May 26, 2006), Online at:
  13. 13.
    Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)Google Scholar
  14. 14.
    Latora, V., Marchiori, M.: How Science of Complex Networks can help in developing Strategy against Terrorism. Chaos, Solitons and Fractals 20, 69–75 (2004)CrossRefMATHGoogle Scholar
  15. 15.
    Luce, R., Perry, A.: A method of matrix analysis of group structure. Psychometrika 14, 95–116 (1949)CrossRefMathSciNetGoogle Scholar
  16. 16.
    Luce, R.: Connectivity and generalized cliques in sociometric group structure. Psychometrika 15, 169–190 (1950)CrossRefMathSciNetGoogle Scholar
  17. 17.
    McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Aldershot, Dartmouth. Offender Profiling Series, vol. III (1999)Google Scholar
  18. 18.
    Memon, N.: Detecting Terrorist Related Activities using Investigative Data Mining Tool. In: Proceedings of Symposium 5, Data/Text Mining from Large Databases IFSR 2005, Kobe, Japan (2005)Google Scholar
  19. 19.
    Memon, N., Larsen, H.L.: Practical Algorithms for Destabilizing Terrorist Networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 389–400. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  20. 20.
    Mokken, R.: Cliques, clubs and clans. Quality and Quantity 13, 161–173 (1979)CrossRefGoogle Scholar
  21. 21.
    Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)CrossRefMATHMathSciNetGoogle Scholar
  22. 22.
    Scott, J.: Social Network Analysis: A Handbook, 2nd edn. Sage Publications, London (2000)Google Scholar
  23. 23.
    Seidman, S.B., Foster, B.L.: A graph theoretic generalization of the clique concept. Journal of Mathematical Sociology 6, 139–154 (1978)CrossRefMATHMathSciNetGoogle Scholar
  24. 24.
    Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press (2004)Google Scholar
  25. 25.
    Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, Cambridge (1994)CrossRefGoogle Scholar
  26. 26.
    Wiktorowicz, Q.: The New Global Threat: Transnational Salafis and Jihad. Middle East Policy 8(4), 18–38 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Nasrullah Memon
    • 1
  • Henrik Legind Larsen
    • 1
  1. 1.Software Intelligence Security Research Center, Department of Software, Electronics and Media TechnologyAalborg Universitet EsbjergEsbjergDenmark

Personalised recommendations