Terrorist Network Analyzed with an Influence Spreading Model

  • Vesa Kuikka
Conference paper
Part of the Springer Proceedings in Complexity book series (SPCOM)


Al Qaeda’s network structure before the tragic events of 9/11/2001 is studied using a method of social network analysis. The method is based on a modeling framework to assess the influence of a node in a complex network with respect to spreading information via different paths between source and target nodes. The same framework is used consistently to compute closeness and betweenness centrality measures as well as to detect subcommunities. Centrality measures taking into account all possible paths between source and target nodes, not just the shortest paths, are useful in modeling resilience of covert networks. Along these lines, new versions of node and link betweenness centrality measures are proposed.


Social network Al Qaeda network Terrorist network Community detection Closeness centrality Betweenness centrality Influence spreading 


  1. 1.
    Agneessens, F., Borgatti, S.P., Everett, M.G.: Geodesic based centrality: unifying the local and the global. Soc. Netw. 49, 12–26 (2017)CrossRefGoogle Scholar
  2. 2.
    Baker, W.E., Faulkner, R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58(6), 837–860 (1993)CrossRefGoogle Scholar
  3. 3.
    Borgatti, S.P.: Identifying sets of key players in a social network. Comput. Math. Organ. Theor. 12, 21–34 (2006)CrossRefMATHGoogle Scholar
  4. 4.
    Borgatti, S.P., Everett, M.: A graph-theoretic perspective on centrality. Soc. Netw. 28, 466–484 (2006)CrossRefGoogle Scholar
  5. 5.
    Coscia, M., Giannotti, F., Pedreschi, D.: A classification for community discovery methods in complex networks. Stat. Anal. Data Min. 4(5), 512–546 (2011)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Freeman, L.C.: Centrality in social networks: conceptual clarification. Soc. Netw. 1, 215–239 (1979)CrossRefGoogle Scholar
  7. 7.
    Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. U S A 99(12), 7821–7826 (2002)Google Scholar
  8. 8.
    Karrer, B., Newman, M.E.J.: Stochastic blockmodels and community structure in networks. Phys. Rev. E 83(1), 016107 (2011)ADSMathSciNetCrossRefGoogle Scholar
  9. 9.
    Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partitioning graphs. Bell. Syst. Tech. J. 49, 291–307 (1970)CrossRefMATHGoogle Scholar
  10. 10.
    Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)Google Scholar
  11. 11.
    Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4) (2002)Google Scholar
  12. 12.
    Lancichinetti, A., Fortunato, S.: Community detection algorithms: a comparative analysis. Phys. Rev. E 80, 056117 (2009)ADSCrossRefGoogle Scholar
  13. 13.
    Newman, M.E.J.: A measure of betweenness centrality based on random walks. Soc. Netw. 27(1), 39–54 (2003)CrossRefGoogle Scholar
  14. 14.
    Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45, 167–256 (2003)ADSMathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Newman, M.E.J.: Detecting community structure in networks. Eur. Phys. J B38(2), 321 (2004)ADSCrossRefGoogle Scholar
  16. 16.
    Newman, M.E.J., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E 69, 026113 (2004)ADSCrossRefGoogle Scholar
  17. 17.
    Newman, M.E.J.: Networks. An Introduction. Oxford University Press, Oxford (2010)CrossRefMATHGoogle Scholar
  18. 18.
    Ouellet, M., Bouchard, M., Hart, M.: Criminal collaboration and risk: the drivers of Al Qaeda’s network structure before and after 9/11. Soc. Netw. 51, 171 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Finnish Defence Research AgencyRiihimäkiFinland

Personalised recommendations