Abstract
The rapid development of social network theory provides a new perspective for the research on counter-terrorism, however, current research mostly relates to terrorists and terrorist organizations. Firstly, the “six-element” analysis method for terrorist activities based on social network is proposed in this paper, namely, a variety of sub-networks are constructed according to the correlation among the six elements—people, organization, time, location, manner and event. These sub-networks are assessed through using centrality analysis, cohesive subgroup analysis, spatial correlation analysis, invulnerability analysis and descriptive statistic analysis; the characteristics and laws of terrorist activities are revealed from several different perspectives. Then, the “six-element” analysis method is applied to conduct empirical research on “East Turkistan” terrorist activities since the founding of the People’s Republic of China, so as to effectively identify core people and key organizations of the “East Turkistan” terrorist activity network, to assess the invulnerability of the “East Turkistan” terrorist network and to reveal the temporal and spatial distribution rules as well as the characteristics of the means and manners adopted in all previous terrorist activities. Lastly, the analysis results are interpreted qualitatively. This research can provide a basis for decision making and an analysis method for the identification of core terrorists and key terrorist organizations, determination of the key alert period, location of counter-terrorism and the early warning of the means of major terrorist activities.
Similar content being viewed by others
References
Airoldi, E. M., Bai, X., & Carley, K. M. (2011). Network sampling and classification: an investigation of network model representations. Decision Support Systems, 51(3), 506–518.
Albert, R., Jeong, H., & Barabási, A. L. (2000). Error and attack tolerance of complex networks. Nature, 406(6794), 378–382.
Basu, A. (2005). Social network analysis of terrorist organizations in India. In Conference of the North American association for computational social and organizational science.
Bier, V. M., & Hausken, K. (2011). Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures. Annals of Operations Research, 186(1), 39–59.
Bohannon, J. (2009a). Counterterrorism’s new tool: ‘metanetwork’ analysis. Science, 325(5939), 409.
Bohannon, J. (2009b). Investigating networks: the dark side. Science, 325(5939), 410–411.
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for windows: software for social network analysis. Harvard: Analytic Technologies.
Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124–136.
Borgatti, S. P., Mehra, A., Brass, D. J., & Labianca, G. (2009). Network analysis in the social sciences. Science, 323(5916), 892–895.
Carley, K. M., & Dereno, M. (2011). ORA: organization risk analyzer, ORA user’s guide (Technical Report). Carnegie Mellon University, School of Computer Science, Institute for Software Research.
Carley, K. M., Lee, J., & Krackhardt, D. (2002). Destabilizing terrorist networks. Connections, 24(3), 79–92.
Carley, K. M., Diesner, J., & Reminga, J. (2006). Toward an interoperable dynamic analysis toolkit. Decision Support Systems, 43(4), 1324–1347.
Carrington, P. J., Scott, J., & Wasserman, S. (2005). Models and methods in social network analysis. New York: Cambridge University Press.
Chen, H., Chung, W., & Qin, J. (2008). Uncovering the dark Web: a case study of Jihad on the web. Journal of the American Society for Information Science and Technology, 59(8), 1347–1359.
Davis, G. B., & Carley, K. M. (2008). Clearing the FOG: fuzzy, overlapping groups for social networks. Social Networks, 30(3), 201–212.
Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–239.
Gómez, D., González–Arangüena, E., Manuel, C., Owen, G., del Pozo, M., & Saboyá, M. (2008). The cohesiveness of subgroups in social networks: a view from game theory. Annals of Operations Research, 158(1), 33–46.
Krebs, V. E. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52.
Lee, K. L., Maheshwary, S., Mason, J., & Glisson, W. (2006). Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks. Annals of Operations Research, 148(1), 25–53.
Lesser, I. O., Hoffman, B., & Arquilla, J. (1999). Countering the new terrorism. Santa Monica: Rand Corporation.
Li, Z. J. (2011). The terrorism threat faced by China and a preview on security situation. In The third session of the international forum on crime and criminal law in the global ear, Beijing.
Liu, J. (2009). Lectures on whole network approach: a practical guide to UCINET. Shanghai: Shanghai People’s Publishing House.
Memon, N., Harkiolakis, N., & Hicks, D. L. (2008). Detecting high-value individuals in covert networks: 7/7 London bombing case study. In AICCSA 08-6th IEEE/ACS international conference on computer systems and applications (pp. 206–215).
Moon, I. C., Carley, K. M., & Levis, A. H. (2008). Vulnerability assessment on adversarial organization: unifying command and control structure analysis and social network analysis. In SIAM international conference on data mining workshop on link analysis counterterrorism and security.
Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–153.
Mucha, P. J., Richardson, T., Macon, K., Porter, M. A., & Onnela, J. P. (2010). Community structure in time-dependent, multiscale, and multiplex networks. Science, 328(5980), 876–878.
Rodríguez, J. A. (2005). The March 11th terrorist network: in its weakness lies its strength. In Proc. XXV international sunbelt conference, Los Angeles.
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.
Tsvetovat, M., & Carley, K. M. (2005). Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence. Journal of Social Structure, 6.
Wasserman, S., & Faust, K. (1994). Social network analysis: methods and applications. Cambridge: Cambridge University Press.
Xu, J. J., & Chen, H. (2005). CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems, 23(2), 201–226.
Zheng, X. Y. (2011). The basic situation and strategic measures of counter-terrorism in China. In The third session of the international forum on crime and criminal law in the global ear, Beijing.
Acknowledgement
This research is supported by the Natural Science Foundation of China under Grant No. 70973138.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fu, J., Sun, D., Chai, J. et al. The “six-element” analysis method for the research on the characteristics of terrorist activities. Ann Oper Res 234, 17–35 (2015). https://doi.org/10.1007/s10479-013-1444-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10479-013-1444-y