Skip to main content
Top

2011 | OriginalPaper | Chapter

Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks

Authors : Alan Chen, Shang Gao, Panagiotis Karampelas, Reda Alhajj, Jon Rokne

Published in: Counterterrorism and Open Source Intelligence

Publisher: Springer Vienna

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Modeling and analyzing criminal and terrorists networks is a challenging problem that has attracted considerable attention in the academia, industry and government institutions, especially intelligence services. Criminals try to keep their communications and interactions uncovered as much as possible in order not to be discovered and resolved. Their success is our society failure and vice versa. Hence, it is essential to thoroughly study such networks to investigate their details. However, incompleteness of criminal networks is one of the main problems facing investigators, due to missing links in the network; and social network methods could be effectively used to analyze and hopefully prevent, avoid or stop criminal activities. Social network analysis can be applied to criminal networks in order to elaborate on good strategies to prosecute or prevent criminal activities. Having all this in mind, our research provides a method to identify hidden links between nodes in a network using the current information available to investigators. The method presented generates networks that represent all the possible hidden links, and the links of these generated networks represent the number of times the two entities are indirectly connected in each relationship type. The method was tested on multiple small terrorism data sets and the results demonstrate that the proposed method is capable of finding interesting hidden links. This is a valuable technique in criminal network analysis, because it can assist investigators in finding hidden links in the network and reduce the amount of missing data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
We will interchangeably use criminal and terrorist networks, though the two are different and have different targets, but the same analysis applies to both networks.
 
Literature
1.
go back to reference Baker, W., Faulkner, R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58(6), 837–860 (1993)CrossRef Baker, W., Faulkner, R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58(6), 837–860 (1993)CrossRef
2.
go back to reference Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W.: Discovering hidden groups in communication networks. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 3073, pp. 378–389. Springer, Berlin/Heidelberg (2004)CrossRef Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W.: Discovering hidden groups in communication networks. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 3073, pp. 378–389. Springer, Berlin/Heidelberg (2004)CrossRef
3.
go back to reference Farely, D.: Breaking al qaeda cells: A mathematical analysis of counterterrorism operations. Stud. Confl. Terrorism 26(6), 399–411 (2003)CrossRef Farely, D.: Breaking al qaeda cells: A mathematical analysis of counterterrorism operations. Stud. Confl. Terrorism 26(6), 399–411 (2003)CrossRef
4.
go back to reference Dawoud, K., Alhajj, R., Rokne, J.: A global measure for estimating the degree of organization of terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 421–427. 9–11 Aug 2010 Dawoud, K., Alhajj, R., Rokne, J.: A global measure for estimating the degree of organization of terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 421–427. 9–11 Aug 2010
5.
go back to reference Krebs, V.: Mapping networks of terrorist cells. Connections 24, 43–52 (2002) Krebs, V.: Mapping networks of terrorist cells. Connections 24, 43–52 (2002)
6.
go back to reference Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)CrossRefMATHMathSciNet Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)CrossRefMATHMathSciNet
7.
go back to reference Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58(7), 1019–1031 (2007)CrossRef Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58(7), 1019–1031 (2007)CrossRef
8.
go back to reference Shaikh, M., Wang, J.: Discovering hierarchical structure in terrorist networks. In: Proceedings of the International Conference on Emerging Technologies, pp. 238–244. (2006) Shaikh, M., Wang, J.: Discovering hierarchical structure in terrorist networks. In: Proceedings of the International Conference on Emerging Technologies, pp. 238–244. (2006)
9.
go back to reference Magdon-Ismail, M., Goldberg, M., Wallace, W., Siebecker, D.: Locating hidden groups in communication networks using hidden markov models. In: Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol.2665, pp.958. Springer, Berlin/Heidelberg (2010) Magdon-Ismail, M., Goldberg, M., Wallace, W., Siebecker, D.: Locating hidden groups in communication networks using hidden markov models. In: Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol.2665, pp.958. Springer, Berlin/Heidelberg (2010)
10.
go back to reference Memon, N., Wiil, U., Qureshi, A.: Design and development of an early warning system to prevent terrorist attacks. In: Proceedings of the International Conference on Artificial Intelligence and Neural Networks, pp. 222–226. (2009) Memon, N., Wiil, U., Qureshi, A.: Design and development of an early warning system to prevent terrorist attacks. In: Proceedings of the International Conference on Artificial Intelligence and Neural Networks, pp. 222–226. (2009)
11.
go back to reference Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3), 53–65 (2001) Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3), 53–65 (2001)
12.
go back to reference Qin, J., Xu, J., Hu, D., Sageman, M., Chen, H.: Analyzing terrorist networks: A case study of the global salafi jihad network. pp. 287–304 (2005) Qin, J., Xu, J., Hu, D., Sageman, M., Chen, H.: Analyzing terrorist networks: A case study of the global salafi jihad network. pp. 287–304 (2005)
13.
go back to reference Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60(10), 1373–1383 (2009)CrossRef Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60(10), 1373–1383 (2009)CrossRef
14.
go back to reference Strogatz, S.: Exploring complex networks. Nature 6825(410), 268–276 (2002) Strogatz, S.: Exploring complex networks. Nature 6825(410), 268–276 (2002)
15.
go back to reference Sparrow, M.: The application of network analysis to criminal intelligence: An assessment of the prospects. Soc. Networks 13(3), 251–274 (1991)CrossRefMathSciNet Sparrow, M.: The application of network analysis to criminal intelligence: An assessment of the prospects. Soc. Networks 13(3), 251–274 (1991)CrossRefMathSciNet
16.
go back to reference Tsvetovat, M., Carley, K.: Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. J. Soc. Struct. 6(2) (2005) Tsvetovat, M., Carley, K.: Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. J. Soc. Struct. 6(2) (2005)
17.
go back to reference Xu, J., Chen, H.: Crimenet explorer: A framework for criminal network knowledge discovery. CM Trans. Inform. Syst. 23(2), 201–226 (2005)CrossRef Xu, J., Chen, H.: Crimenet explorer: A framework for criminal network knowledge discovery. CM Trans. Inform. Syst. 23(2), 201–226 (2005)CrossRef
Metadata
Title
Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks
Authors
Alan Chen
Shang Gao
Panagiotis Karampelas
Reda Alhajj
Jon Rokne
Copyright Year
2011
Publisher
Springer Vienna
DOI
https://doi.org/10.1007/978-3-7091-0388-3_8

Premium Partner