Abstract
The world we live in is a complex socio-technical system and systematically thinking about, representing, modeling and analyzing these systems has been made possible by social network analysis approach. A lot of groups or communities do exist in the society but the terrorist network has been taken for study in this paper because they consist of networks of individuals that span countries, continents, the economic status, and form around specific ideology. In this paper we present a survey to study the terrorist network using the criminal network analysis which is based on dynamic network analysis, destabilizing covert networks, counter terrorism, key player, subgroup detection and criminal network analysis in homeland security. This paper will also discuss various open problems in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Xu, J.J., Chen, H.: CrimeNet Explorer: A framework for criminal network knowledge discovery. ACM Transactions on Information Systems 23(2), 201–226 (2005)
Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homeland Security Affairs II(2) (July 2006)
Chen, H., Chung, W., Xu, J.J., Qin, G.W.Y., Chau, M.: Crime Data Mining: A general framework and some examples. IEEE Computer Society 37(4), 50–56 (2004)
Memon, N., Larsen, H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. Presented at First International Conference on Availability, Reliability and Security (2006)
Schroeder, J., Chen, H., Xu, J., Chau, M.: Automated criminal link analysis based on domain knowledge. Journal of the American Society for Information Science and Technology 58(6), 842–855 (2007)
Duval, R.D., Christenseny, K., Spahiuz, A.: Bootstrapping a terrorist network. Presented in the Conference of Southern Illinois University Carbondale (2010)
Yang, C.C., Ng, T.D.: Terrorism and crime related weblog social network: link, content analysis and information visualization. Presented in IEEE International Conference on Intelligence and Security Informatics, New Brunswick, NJ (2007)
Xu, J.J., Chen, H.: Using shortest path algorithms to identify criminal associations. Decision Support Systems 38, 473–487 (2004)
Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. AI and Law (in press)
Maeno, Y., Ohsawa, Y.: Analyzing covert social network foundation behind terrorism disaster. Int. J. Services Sciences 2(2) (2007)
Maeno, Y.: Node discovery problem for a social network. Connections 29, 62–76 (2009)
Dombroski, M., Carley, K.M.: NETEST: Estimating a terrorist network’s structure. Computational & Mathematical Organization Theory 8, 235–241 (2002)
Hutchins, C.E., Benham-Hutchins, M.: Hiding in plain sight: criminal network analysis. Computational & Mathematical Organization Theory 16(1), 89–111 (2009)
Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. Presented in the Proceedings of 8th International Command and Control Research and Technology Symposium, Washington, DC (June 2003)
Appavu, S., Rajaram, R., Muthupandian, M., Athiappan, G., Kashmeera, K.S.: Data mining based on intelligent analysis of threatening e-mail. Knowledge-Based Systems 22, 392–393 (2009)
Carley, K.M.: A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. In: Visualizing Network Information. Meeting Proceedings RTO-MP-IST-063. Neuilly-sur-Seine, France: RTO, pp. KN1-1 – KN1-10 (2006)
McCulloh, I.A., Carley, K.M.: Social network change detection. Carnegie Mellon University, School of Computer Science, Technical Report, CMU-CS-08-116
Carley, K.M.: Estimating vulnerabilities in large covert networks. Presented in the Proceedings of 9th International Command and Control Research and Technology Symposium held at Loews Corornado Resort, CA. Evidence Based Research, Vienna, VA (2004)
Borgatti, S.: The key player problem. Presented in the Proceedings of the National Academy of Sciences Workshop on Terrorism. National Academy of Sciences, Washington DC (2002)
Lin, S.-d., Chalupsky, H.: Discovering and explaining abnormal nodes in semantic graphs. IEEE Transactions on Knowledge and Data Engineering 20(8), 1039–1052 (2008)
Memon, N., Harkiolakis, N., Hicks, D.L.: Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study. In: The Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, pp. 206–215 (2008)
Memon, N., Qureshi, A.R., Wiil, U.K., Hicks, D.L.: Novel algorithms for subgroup detection in terrorist networks. Presented in the International Conference on Availability, Reliability and Security, Fukuoka Institute of Technology, Fukuoka, Japan (2009)
Elovici, Y., Shapira, B., Last, M., Zaafrany, O., Friedman, M., Schneider, M., Kandel, A.: Detection of access to terror-related web sites using an Advanced Terror Detection System (ATDS). Journal of the American Society for Information Science and Technology 61(2), 405–418 (2010)
Basu, A.: Social network analysis of terrorist organizations in India. Paper Presented at the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, Notre Dame, Indiana, pp. 26–28 (2005)
Saxena, S., Santhanam, K., Basu, A.: Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic Analysis 28(1) (2004)
Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. Presented in the International Conference on Knowledge Management and Information Sharing, pp. 29–36 (2009)
Weinstein, C., Campbell, W., Delaney, B., O’Leary, J.: Modeling and detection techniques for counter-terror social network analysis and intent recognition. Presented in the Proceedings of the IEEE Aerospace Conference (2009)
Yang, C.C., Liu, N., Sageman, M.: Analyzing the terrorist social networks with visualization tools. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 331–342. Springer, Heidelberg (2006)
Goolsby, R.: Combating terrorist networks: An evolutionary approach. Presented in the Proceedings of the 8th International Command and Control Research and Technology Symposium held at National Defense War College Washington DC, Evidence Based Research Vienna VA (2003)
Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., Weimann, G.: Uncovering the dark web: A case study of Jihad on the web. Journal of the American Society for Information Science and Technology 59(8), 1347–1359 (2008)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karthika, S., Bose, S. (2011). Analyzing Various Social Networking Approaches for Covert Networks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_57
Download citation
DOI: https://doi.org/10.1007/978-3-642-22543-7_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22542-0
Online ISBN: 978-3-642-22543-7
eBook Packages: Computer ScienceComputer Science (R0)