Skip to main content

2011 | OriginalPaper | Buchkapitel

Retracted: Exploring the Evolution of Terrorist Network

verfasst von : Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas

Erschienen in: Counterterrorism and Open Source Intelligence

Verlag: Springer Vienna

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper discusses advancements and new trends in terrorist networks. We investigate a case regarding a recent terror plan that took place in Denmark and we present the analysis of the thwarted plot. Analyzing covert networks after an incident is practically easy for trial purposes. Mapping clandestine networks to thwarted terrorist activities is much more complicated. The network involved in the recent Danish terror plan is studied through publicly available information. Based on that information we mapped a part of the network centered on David Headley, who recently confessed to have planned a terrorist attack to take place on Danish soil. Despite its deficiencies, the map gives us an insight into new trends in terrorist organizations and people involved in terrorist plots.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: “Crime Data Mining: A General Framework and Some Examples,” Computer, vol. 37, no. 4, pp. 50–56, Apr. 2004, doi:10.1109/MC.2004.1297301CrossRef Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: “Crime Data Mining: A General Framework and Some Examples,” Computer, vol. 37, no. 4, pp. 50–56, Apr. 2004, doi:10.1109/MC.2004.1297301CrossRef
7.
Zurück zum Zitat DeRosa M.: Data Mining and Data Analysis for Counterterrorism, CSIS Report. (2004) DeRosa M.: Data Mining and Data Analysis for Counterterrorism, CSIS Report. (2004)
8.
Zurück zum Zitat Fershtman, M.: Cohesive group detection in a social network by the segregation, Social Networks 19, 193–207 (1997)CrossRef Fershtman, M.: Cohesive group detection in a social network by the segregation, Social Networks 19, 193–207 (1997)CrossRef
9.
Zurück zum Zitat Granovetter, M.: The Strength of Weak Ties. Am. J. Sociol. 81, 1287–1303 (1973)CrossRef Granovetter, M.: The Strength of Weak Ties. Am. J. Sociol. 81, 1287–1303 (1973)CrossRef
10.
Zurück zum Zitat Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Collins, R.(ed.) Sociological Theory, pp. 105–130 (1982) Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Collins, R.(ed.) Sociological Theory, pp. 105–130 (1982)
11.
Zurück zum Zitat Krebs, V.E.: Mapping network of terrorist cells. Connections 24(3): 43–52 (2202) Krebs, V.E.: Mapping network of terrorist cells. Connections 24(3): 43–52 (2202)
12.
Zurück zum Zitat Memon, N., Larsen H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. In: The proceedings of ARES 2006: The First International Conference on Availability, Reliability and Security, Vienna, Austria, IEEE Computer Society, pp. 906–913 (2006) Memon, N., Larsen H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. In: The proceedings of ARES 2006: The First International Conference on Availability, Reliability and Security, Vienna, Austria, IEEE Computer Society, pp. 906–913 (2006)
13.
Zurück zum Zitat Memon, N., Larsen, H.L.: Practical algorithms of destabilizing terrorist networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Vol. 3976: pp. 398–411. Springer, Berlin (2006) Memon, N., Larsen, H.L.: Practical algorithms of destabilizing terrorist networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Vol. 3976: pp. 398–411. Springer, Berlin (2006)
14.
Zurück zum Zitat Memon, N., Larsen, H.L.: Detecting Terrorist Activity Patterns using Investigative Data Mining Tool. International Journal of Knowledge and System Sciences, 3(1), 43–52 (2006) Memon, N., Larsen, H.L.: Detecting Terrorist Activity Patterns using Investigative Data Mining Tool. International Journal of Knowledge and System Sciences, 3(1), 43–52 (2006)
15.
Zurück zum Zitat Memon, N., Qureshi, A.R.: Destabilizing terrorist networks. In WSEAS Transactions on Computers. 11(4), 1649–1656 (2005) Memon, N., Qureshi, A.R.: Destabilizing terrorist networks. In WSEAS Transactions on Computers. 11(4), 1649–1656 (2005)
16.
Zurück zum Zitat Memon, N.: Investigative data mining: Mathematical models for analyzing, visualizing and destabilizing Terrorist Networks. PhD Dissertation, Aalborg University, Denmark. (2007) Memon, N.: Investigative data mining: Mathematical models for analyzing, visualizing and destabilizing Terrorist Networks. PhD Dissertation, Aalborg University, Denmark. (2007)
17.
Zurück zum Zitat Memon, N., Hicks D., Larsen H.L.: Harvesting Terrorist Information from Web. In proc. International Conference on Information Visualization (IV 2007), Zurich, Switzerland, July 4–6, 2007, pp. 664–671 (2007) Memon, N., Hicks D., Larsen H.L.: Harvesting Terrorist Information from Web. In proc. International Conference on Information Visualization (IV 2007), Zurich, Switzerland, July 4–6, 2007, pp. 664–671 (2007)
18.
Zurück zum Zitat Memon, N., Hicks D., Larsen H.L.: How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. Advanced Data Mining and Applications. Lecture Notes in Computer Science, 2007, vol. 4632/2007, pp. 430–441 (2007). DOI: 10.1007/978-3-540-73871-8-40 Memon, N., Hicks D., Larsen H.L.: How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. Advanced Data Mining and Applications. Lecture Notes in Computer Science, 2007, vol. 4632/2007, pp. 430–441 (2007). DOI: 10.1007/978-3-540-73871-8-40
19.
Zurück zum Zitat Monge, P.R., Contractor, N.: Theories of Communication Networks. Oxford University Press, New York (2003) Monge, P.R., Contractor, N.: Theories of Communication Networks. Oxford University Press, New York (2003)
20.
Zurück zum Zitat Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Proceedings of International Conference on Availability, Reliability, and Security 2007, Vienna, Austria, March 10–13, 2007 (2007) Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Proceedings of International Conference on Availability, Reliability, and Security 2007, Vienna, Austria, March 10–13, 2007 (2007)
Metadaten
Titel
Retracted: Exploring the Evolution of Terrorist Network
verfasst von
Nasrullah Memon
Uffe Kock Wiil
Pir Abdul Rasool Qureshi
Panagiotis Karampelas
Copyright-Jahr
2011
Verlag
Springer Vienna
DOI
https://doi.org/10.1007/978-3-7091-0388-3_20