Skip to main content

Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications

  • Chapter
  • First Online:
Exploring the Security Landscape: Non-Traditional Security Challenges

Abstract

The complexity of the current threat landscape associated with terrorism and criminal networks continues to be a top national and global security agenda item. With heightened awareness and concern regarding the proliferation and expansion of ISIL and connections to homegrown violent extremism, understanding the network structure and functional perspectives is a key enabler to supporting counter terrorism disruption strategies. Challenges associated with understanding these ‘dark networks’ stems both from contextualizing the information (plagued by uncertainty and ambiguity) and from the multiplex nature of the actors whereby they can share more than one type of relation. In this exploratory work, Counter-Terrorism Architectural Frameworks (CTAF) is introduced as an application of the Department of Defense Architectural Frameworks (DODAF) to support ‘opening the blackbox’ of terrorist activities to identify terrorist network vulnerabilities and to develop disruption strategies. The multiple views afforded by the application of DODAF provides a more comprehensive picture to support decision making and can highlight the complex organizational dynamics that are not readily observable through Social Network Analysis (SNA) alone. In this chapter the methodology is explained and applied to an analysis of the Lashkar-e-Taiba (LeT) terrorist network (Subrahmanian et al. in Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer, Berlin, 2013) and the Noordin Top terrorist network (Roberts and Everton in J Soc Struct 12(2), 2011).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Aghakhani S, Dawoud K, Alhajj R, Rokne J (2011) A global measure for estimating the degree of organization and effectiveness of individual actors with application to terrorist networks. In: Wiil UK (ed) Counterterrorism and open source intelligence. Springer, Wien, New York, pp 189–222

    Google Scholar 

  • Bakker RM, Raab J, Milward HB (2012) A preliminary theory of dark network resilience. J Policy Anal Manage 31:33–62

    Article  Google Scholar 

  • Boivin R (2014) Macrosocial network analysis: the case of transnational drug trafficking. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer, Berlin

    Google Scholar 

  • Bruinsma G, Bernasco W (2004) Criminal groups and transnational illegal markets. Crime, Law, Soc Change 41:79–94

    Article  Google Scholar 

  • Carrington PJ, Scott J, Wasserman S (eds) (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge

    Google Scholar 

  • Checkland P (1981) Systems thinking, systems practice. Wiley, Chichester

    Google Scholar 

  • Chiu Y-N, Leclerc B, Townsley M (2011) Crime script analysis of drug manufacturing in clandestine laboratories. Br J Criminol 51:355–374

    Article  Google Scholar 

  • Corman S (2006) Using activity focus networks to pressure terrorist organizations. Comput Math Organiz Theor 12:35–49

    Google Scholar 

  • DODAF (2015) DODAF V 2.0. volume II: architectural data and models. Available at: http://dodcio.defense.gov/Portals/0/Documents/DODAF2/DoDAF%20v2.02%20Chg%201%20Vol%20II%20Final%202015-01-19.pdf. Accessed 11 Oct 2015

  • Duijn PAC, Klerks PPHM (2014) Social network analysis applied to criminal networks: recent developments in dutch law enforcement. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer, Berlin

    Google Scholar 

  • Duijn PAC, Kashirin V, Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Scientific reports|4: 4238 available at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3937802/pdf/srep04238.pdf

  • Easley D, Kleinberg J (2010) Networks, crowds and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Everton SF (2011) Disrupting dark networks. Cambridge University Press, Cambridge

    Google Scholar 

  • Global Terrorism Index (2014) http://www.visionofhumanity.org/sites/default/files/Global%20Terrorism%20Index%20Report%202014_0.pdf

  • Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theor 1:201–233

    Google Scholar 

  • Gunduz-Oguducu S, Etaner-Uyar AS (2014) Social networks: analysis and case studies. Springer, Berlin

    Google Scholar 

  • Leclerc B (2014) Script analysis for crime controllers: extending the reach of situational crime prevention. In: Caneppele S, Caldroni F (eds) Organized crime, corruption and crime prevention. Springer Publishing, Berlin

    Google Scholar 

  • Leuprecht C, Hall K (2014) Why terror networks are dissimilar: how structure relates to function. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer Publishing, Berlin

    Google Scholar 

  • Levi M, Maguire M (2004) Reducing and preventing organised crime: an evidence-based critique. Crime, Law Soc Change 41:397–469

    Google Scholar 

  • Lindelauf R, Borm P, Hamers H (2011) Understanding terrorist network topologies and their resilience against disruption. In: Wiil UK (ed) Counterterrorism and open source intelligence. Springer, Berlin

    Google Scholar 

  • Masys AJ (ed) (2014a) Networks and network analysis for defence and security. Springer Publishing, Berlin

    Google Scholar 

  • Masys AJ (2014b) Radicalization and recruitment: a systems approach to understanding violent extremism. Int J Syst Soc 1(2):51–65

    Google Scholar 

  • Masys AJ, Vallerand A (2015) Major event security planning: secure by design—through the strategic use of integrated modeling and simulation. M&S J

    Google Scholar 

  • Rhodes CJ (2011) The use of open source intelligence in the construction of covert social networks. In: Wiil U (ed) Counterterrorism and open source intelligence. Springer, Berlin

    Google Scholar 

  • Rhodes CJ, Keefe EMJ (2007) Social network topology: a Bayesian approach. J Op Res Soc 58:1605–1611

    Article  Google Scholar 

  • Roberts N, Everton SF (2011) Strategies for combating dark networks. J Soc Struct 12(2). http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf

  • Strang S, Masys AJ (2015) Visual thinking for intelligence analysis. In: Masys AJ (ed) Applications of systems thinking and soft operations research in managing complexity. Springer Publishing, Berlin

    Google Scholar 

  • Subrahmanian VS, Mannes A, Siliva A, Shakarian J, Dickerson JP (2013) Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer Publishing, Berlin

    Google Scholar 

  • The Economist (2015) http://www.economist.com/news/leaders/21646750-though-islamic-state-still-spreading-terror-its-weaknesses-are-becoming-apparent

  • Wiil UK (ed) (2011) Counterterrorism and open source intelligence. Springer Publishing, Berlin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anthony J. Masys .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Masys, A.J. (2016). Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications. In: Masys, A. (eds) Exploring the Security Landscape: Non-Traditional Security Challenges. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-27914-5_11

Download citation

Publish with us

Policies and ethics