Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Counterterrorism, Social Network Analysis in

Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_281

Synonyms

Glossary

Graph

A set of nodes connected by edges

Social Network

A graph in which the nodes are represented by actors and edges represent relationships

Anonymization

Removal of actor identities from a social network

Counterterrorism Application

A computerized program for using any kind of data in tracking or characterizing counterterrorist activity

Definition

Since terrorist organizations are organized groups of individuals with specific patterns of activity, it is natural that their activity may exhibit specific kinds of social patterns. Therefore, it is natural to leverage information about social activity patterns in counterterrorism applications.

Introduction

Most terrorist organizations require considerable communication between them in order to remain sufficiently organized and execute their plans. Such communication is typically not in the form of conventional social networks such as Facebook or LinkedIn. Rather, it takes...

This is a preview of subscription content, log in to check access.

References

  1. Aggarwal CC (2011) Social network data analytics. Springer, New YorkMATHCrossRefGoogle Scholar
  2. Aggarwal CC, Li Y, Yu P (2011) On the hardness of graph anonymization. In: ICDM conference, VancouverGoogle Scholar
  3. Al-Zaidy R, Fung BCM, Yousseff AM (2011) Towards discovering criminal communities from textual data. In: ACM KDD conference, San DiegoGoogle Scholar
  4. Baumes J, Goldberg M, Magdon-Ismail M, Wallace W (2007) Identification of hidden groups in communications. In: Handbooks in information systems. Elsevier, Amsterdam, pp 209–242Google Scholar
  5. Carley K, Dombroski M, Tsvetovat A, Reminga J, Kamneva N (2003) Destabilizing dynamic covert networks. In: Proceedings of the 8th international command and control research and technology symposium, Washington DCGoogle Scholar
  6. Dombroski M, Carley KM (2002) Netest: estimating a terrorist network’s structure. Comput Math Organ Theory 8:235–241CrossRefGoogle Scholar
  7. Faust K, Wasserman S (1994) Social network analysis: methods and applications (structural analysis in the social sciences). Cambridge University Press, CambridgeMATHGoogle Scholar
  8. Franz T, Carley K (2005) A formal characterization of cellular networks. Technical report CMU–ISRI–05–109, School of Computer Science, Carnegie Mellon UniversityGoogle Scholar
  9. Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008) Resisting structural re-identification in social networks. In: VLDB, AucklandGoogle Scholar
  10. Krebs V (2002a) Social network analysis of the 9–11 terror network. http://www.orgnet.com/hijackers.html
  11. Krebs V (2002b) Mapping networks of terrorist cells. Connect 24(3):43–52Google Scholar
  12. Xu J, Chen H (2005a) Criminal network analysis and visualization. Commun ACM 48(6):101–107CrossRefGoogle Scholar
  13. Xu J, Chen H (2005b) Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201–226MathSciNetCrossRefGoogle Scholar
  14. Xu J, Marshall B, Kaza S, Chen H (2004) Analyzing and visualizing criminal network dynamics: a case study. In: Proceedings of the 2nd NSF/NIJ symposium on intelligence and security informatics (ISI’04), Tucson, 10–11 June 2004CrossRefGoogle Scholar
  15. Xu J, Hu D, Chen H (2009) Dynamics of terrorist networks: understanding the survival mechanisms of global salafi jihad. J Homel Secur Emerg Manag 6(1):1–33Google Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.IBM T. J. Watson Research CenterYorktown HeightsUSA

Section editors and affiliations

  • Rosa M. Benito
    • 1
  • Juan Carlos Losada
    • 2
  1. 1.Universidad Politécnica de MadridMadridSpain
  2. 2.Universidad Politécnica de MadridMadridSpain