Abstract
This chapter aims to bring to the reader an overview of the work done since the 9/11 terrorist attack, in the field of Social Network Analysis as a tool for understanding the underlying pattern /dynamics of terrorism and terrorist networks. SNA is particularly suitable for analyzing terrorist networks as it takes relationships into account rather than merely attributes, which are difficult to obtain for covert networks. Using graph theoretic methods and measures and open source data it has been possible to map terrorist networks and examine roles of different actors, as well as identify groups and structures within the network. The methodology is illustrated by reviewing two case studies: the 9/11 terrorist network study by Krebs, that used data from a single terrorist attack, and a study by Basu that used data from about 200 terrorist incidents in India to create a network of terrorist organizations for predictive purposes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Defining terrorism. Transnational Terrorism, Security and the Rule of law, European Commission Working Paper 3 (2008), http://www.transnationalterrorism.eu/tekst/publications/WP3%20Del%204.pdf
Ressler, S.: Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs 2(2), 1–10 (2006)
van der Hulst, R.C.: Terrorist networks: the threat of connectivity, The SAGE Handbook of Social Network Analysis, p. 256 (2011)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Basu, A.: Social network analysis of terrorist organizations in india. In: North American Association for Computational Social and Organizational Science (NAACSOS) Conference, pp. 26–28 (2005)
Scott, J.: Social network analysis: A Handbook. Sage Publications (1994)
Wasserman, S.: Social network analysis: Methods and applications. Cambridge University Press (1994)
Freeman, L.C.: The development of social network analysis. Empirical Press Vancouver (2004)
Harary, F.: Graph theory. Addison-Wesley (1969)
Milgram, S.: The small world problem. Psychology Today 2(1), 60–67 (1967)
Granovetter, M.S.: The strength of weak ties. American Journal of Sociology 78(6), 1360–1380 (1973)
Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature 393(6684), 440–442 (1998)
Watts, D.J.: Networks, dynamics, and the small-world phenomenon 1. American Journal of Sociology 105(2), 493–527 (1999)
Brandes, U., Erlebach, T. (eds.): Network Analysis. LNCS, vol. 3418. Springer, Heidelberg (2005)
Freeman, L.C.: Going the wrong way on a one-way street: Centrality in physics and biology. Journal of Social Structure 9(2) (2008)
Arquilla, J., Ronfeldt, D.: Networks and netwars: The future of terror, crime, and militancy. Rand Corporation (2001)
Sparrow, M.K.: The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13(3), 251–274 (1991)
Barabási, A.L., Frangos, J.: Linked: The New Science of Networks. Basic Books (2002)
Krebs, V.E.: Network metrics. Flow 3.0 Users’ Manual (2001)
Carley, K.M., Reminga, J., Kamneva, N.: Destabilizing Networks. Connections 24(3), 79–92 (2001)
Rothenberg, R.: From whole cloth: Making up the terrorist network. Connections 24(3), 36–42 (2001)
Sageman, M.: Understanding terror networks. Univ. of Pennsylvania Press (2004)
RodrÃguez, J.A.: The th Terrorist Network: In its Weakness Lies Its Strength. In: XXV International Sunbelt Conference, Los Angeles (2005)
Koschade, S.: A social network analysis of Jemmah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism 29(6), 559–575 (2006)
Azad, S., Gupta, A.: A quantitative assessment on 26/11 mumbai attack using social network analysis. Journal of Terrorism Research 2(2), .4-1-4 (2011)
Perliger, A., Pedahzur, A.: Social network analysis in the study of terrorism and political violence. Political Science and Politics 44(1), 45 (2011)
Dark web and geopolitical web research, AI Laboratory, University of Arizona, http://ai.arizona.edu/research/terror
National consortium for the study of terrorism and responses to terrorism (START), http://www.start.umd.edu/start/about/overview/
Global terrorism database, http://www.start.umd.edu/gtd/
Terrorist organization profiles, http://www.start.umd.edu/start/data_collections/tops/
Terrorism and preparedness data resource center, http://www.start.umd.edu/start/data_collections/tpdrc/
Defense Intelligence Agency (USA). Criminal Network Analysis Training Course (2000)
Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference (2004)
Tsvetovat, M., Carley, K.M.: On effectiveness of wiretap programs in mapping social networks. Computational and Mathematical Organization Theory 13(1), 63–87 (2006)
NETEST: Estimating a Terrorist Network’s Structure. In: 11th European Intelligence and Security Informatics Conference (EISIC), Athens (2011)
Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intelligent Systems 20(5), 67–75 (2005)
Carpenter, T., Karakostas, G., Shallcross, D.: Practical issues and algorithms for analyzing terrorist networks. In: Proceedings of the Western Simulation Multi Conference (2002)
Gupta, A., Kumaraguru, P.: Twitter explodes with activity in mumbai blasts! a lifeline or an unmonitored daemon in the lurking? Mumbai (2012)
Sliva, A., Subrahmanian, V., Martinez, V., Simari, G.I.: The soma terror organization portal (STOP): Social network and analytic tools for the real-time analysis of terror groups. In: Social Computing, Behavioral Modeling, and Prediction, pp. 9–18. Springer, Heidelberg (2008)
Dickerson, J.P., Mannes, A., Subrahmanian, V.: Dealing with Lashkar-e-taiba: A multi-player game-theoretic perspective. In: European Intelligence and Security Informatics Conference (EISIC), pp. 354–359. IEEE (2011)
Subrahmanian, V. (ed.): Handbook of Computational Approaches to Counterterrorism. Springer (2013)
Mannes, A.: Qualitative analysis & computational techniques for the counter-terror analyst. In: Handbook of Computational Approaches to Counterterrorism, pp. 83–97. Springer (2013)
Freeman, L.C.: Centrality in social networks: Conceptual clarification. Social Networks 1(3), 215–239 (1979)
Bonacich, P.: Power and centrality: A family of measures. American Journal of Sociology 92(5), 1170–1182 (1987)
Networks / Pajek: Program for large network analysis, http://vlado.fmf.uni-lj.si/pub/networks/pajek/
Borgatti, S.P., Everett, M.G., Freeman, L.C.: Ucinet for windows: Software for social network analysis. Analytic Technologies, Harvard (2002)
Huisman, M., van Djuin, M.A.J.: A readers guide to SNA Softwares. In: Sage Handbook on Social Network Analysis, pp. 578–600 (2011)
Saxena, S., Santhanam, K., Basu, A.: Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic Analysis 28(1), 84–101 (2004)
The hijackers.... and how they were connected, Sydney Morning Herald (Septembr 22, 2001), http://www.smh.com.au
Erickson, B.H.: Secret societies and social structure. Social Forces 60(1), 188–210 (1981)
The Plot: A Web of Connections, Washington Post (September 24, 2001), http://www.washingtonpost.com/wp-srv/nation/graphics/attack/investigation_24.html
Indictment of Zacarias Moussaoui. U.S. Department of Justice (December 11, 2001), http://www.usdoj.gov/ag/moussaouiindictment.htm
Friedkin, N.E.: Horizons of observability and limits of informal control in organizations. Social Forces 62(1), 54–77 (1983)
Transcript of bin Laden Video Tape, United States Department of Defense (December 13, 2001), http://www.defense.gov/news/Dec2001/d20011213ubl.pdf
Morselli, C., Giguère, C., Petit, K.: The efficiency/security trade-off in criminal networks. Social Networks 29(1), 143–153 (2007)
Borgatti, S.P.: Identifying sets of key players in a social network. Computational & Mathematical Organization Theory 12(1), 21–34 (2006)
Borgatti, S.P., Carley, K.M., Krackhardt, D.: On the robustness of centrality measures under conditions of imperfect data. Social Networks 28(2), 124–136 (2006)
Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos, Solitons & Fractals 20(1), 69–75 (2004)
Krebs, V.: Uncloaking terrorist networks. First Monday 7(4) (2002)
Chellaney, B.: Fighting terrorism in southern asia: The lessons of history. International Security 26(3) (2001)
START: Global terrorism database, http://www.start.umd.edu/gtd/search/Results.aspx?country=92
CNN: Suspected hijack bankroller freed by india in 1999 (2001), http://www.cnn.com/2001/US/10/05/inv.terror.investigation/index.html
Saxena, S., Santhanam, K.: Design approach to creating a terrorism database with open source information. IDSA Internal Report (2001)
Santhanam, K.: Jihadis in Jammu and Kashmir: A Portrait Gallery. Sage (2003)
Leydesdorff, L., Vaughan, L.: Co-occurrence matrices and their applications in information science: Extending ACA to the web environment. Journal of the American Society for Information Science and Technology 57(12), 1616–1628 (2006)
Pitel, G., Millet, C., Grefenstette, G.: Deriving a priori co-occurrence probability estimates for object recognition from social networks and text processing. In: Bebis, G., Boyle, R., Parvin, B., Koracin, D., Paragios, N., Tanveer, S.-M., Ju, T., Liu, Z., Coquillart, S., Cruz-Neira, C., Müller, T., Malzbender, T. (eds.) ISVC 2007, Part II. LNCS, vol. 4842, pp. 509–518. Springer, Heidelberg (2007)
Brandes, U., Wagner, D.: Analysis and visualization of social networks. In: Jansen, K., Margraf, M., Mastrolli, M., Rolim, J.D.P. (eds.) WEA 2003. LNCS, vol. 2647, pp. 321–340. Springer, Heidelberg (2003)
Borgatti, S.P., Everett, M.G., Freeman, L.C.: Ucinet for windows: Software for social network analysis. Harvard Analytic Technologies (2002)
Lorrain, F., White, H.C.: Structural equivalence of individuals in social networks. The Journal of Mathematical Sociology 1(1), 49–80 (1971)
Faust, K., Wasserman, S.: Blockmodels: Interpretation and evaluation. Social Networks 14(1), 5–61 (1992)
Moody, J., White, D.R.: Structural cohesion and embeddedness: A hierarchical concept of social groups. American Sociological Review, 103–127 (2000)
Kruskal, J., Wish, M.: Multidimensional scaling. Sage (1978)
Borg, I., Groenen, P.J.F.: Modern Multidimensional Scaling: Theory and Applications. Springer (2005)
Breiger, R.L., Boorman, S.A., Arabie, P.: An algorithm for clustering relational data with applications to social network analysis and comparison with multidimensional scaling. Journal of Mathematical Psychology 12(3), 328–383 (1975)
Bhalla, A.: India submits proof that Pakistan funds terror activities, builds international pressure for action, India Today (2013), http://indiatoday.intoday.in/story/india-builds-pressure-against-pakistan-isi-let-terrorism-counterfeit-currency/1/284080.html
Pakistan Intelligence services aided Mumbai terror attacks. The Guradian (October 18, 2010), www.guradian.co.uk/world/2010/Oct/18/pakistan-isi-mumbai-terror-attacks
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Basu, A. (2014). Social Network Analysis: A Methodology for Studying Terrorism. In: Panda, M., Dehuri, S., Wang, GN. (eds) Social Networking. Intelligent Systems Reference Library, vol 65. Springer, Cham. https://doi.org/10.1007/978-3-319-05164-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-05164-2_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05163-5
Online ISBN: 978-3-319-05164-2
eBook Packages: EngineeringEngineering (R0)