Skip to main content

Dynamic, Covert Network Simulation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7227))

Abstract

Covert networks are nearly impossible to fully describe due to inherent difficulties in obtaining data. To have complete information on a covert network, it is necessary to simulate such data. The simulation presented in this paper dynamically builds a covert network off of an existing network structure. Through parameter tuning, the user is able to generate a wide variety of networks which mimic real world covert networks. Due to the dynamic nature of the simulation, changes in network structure can be analyzed over time. Additionally, network response to intervention, such as the killing of members, can be modeled and compared with real world findings. As the simulation can generate a wide variety of networks, its use can help with testing intervention strategies in different situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Erdos, P., Renyi, A.: On the Evolution of Random Graphs. Publication of Mathematics Institute of Hungian Academy of Sciences 5(1761) (1960)

    Google Scholar 

  2. Tsvetovat, M., Carley, K.M.: Generation of Realistic Social Network Datasets for Testing of Analysis and Simulation Tools. CMU-ISRI-05-130 (2005)

    Google Scholar 

  3. Albert, R., Barabasi, A.-L.: Statistical Mechanics of Complex Networks. Reviews of Modern Physics 74 (2002)

    Google Scholar 

  4. Atran, S.: John Jay & ARTIS Transnational Terrorism Database. Technical report, John Jay College of Criminal Justice (2009)

    Google Scholar 

  5. Enders, W., Jindapon, P.: Network Externalities and Terrorist Network Structure. Journal of Conflict Resolution 54(2), 262–280 (2009)

    Article  Google Scholar 

  6. Takeyh, R., Gvosdev, N.: Do Terrorist Networks Need a Home. The Washington Quarterly 25(3), 97–108 (2002)

    Article  Google Scholar 

  7. Henke, M.G.A.: How Terrorist Groups Survive: A Dynamic Network Analysis Approach to the Resilience of Terrorist Organizations. School of Advanced Military Studies Monographs (2009)

    Google Scholar 

  8. Borm, P., Lindelauf, R., Hamers, H.: The Influence of Secrecy on the Communication Structure of Covert Networks. CentER Discussion Paper No. 2008-23 (2008)

    Google Scholar 

  9. Enders, W., Su, X.: Rational Terrorists and Optimal Network Structure. Journal of Conflict Resolution 51(1), 33–57 (2006)

    Article  Google Scholar 

  10. Hussain, S.E.: Impact of Terrorist Arrest on Terrorism: Defiance, Deterrence, or Irrelevance. PhD thesis, University of Pennsylvania (2010)

    Google Scholar 

  11. Sherman, L.W.: Defiance, Deterrence, and Irrelevance: A Theory of the Criminal Sanction. Journal of Research in Crime and Delinquency 30, 445–473 (1993)

    Article  Google Scholar 

  12. Don, B.W., et al.: Network Technologies for Networked Terrorists. Technical report, RAND Corperation (2007)

    Google Scholar 

  13. Fighel, J.: Al Qaeda - Mombassa Attacks November 28, 2002. Technical report, The Meir Amit Intelligence and Terrorism Information Center (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

O’Neil, P. (2012). Dynamic, Covert Network Simulation. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds) Social Computing, Behavioral - Cultural Modeling and Prediction. SBP 2012. Lecture Notes in Computer Science, vol 7227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29047-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29047-3_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29046-6

  • Online ISBN: 978-3-642-29047-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics