Skip to main content

2011 | OriginalPaper | Buchkapitel

The Use of Open Source Intelligence in the Construction of Covert Social Networks

verfasst von : Christopher J. Rhodes

Erschienen in: Counterterrorism and Open Source Intelligence

Verlag: Springer Vienna

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Open source intelligence is playing an increasing role in helping agencies responsible for national security to determine the characteristics, motivations and intentions of adversary groups that threaten the stability of civil society. Analytic methods that are able to assimilate and process the emergent data from such rich sources in a timely fashion are required in order that predictive insights can be made by intelligence specialists. The methods of social network analysis (SNA) have proved particularly useful in organising and representing covert network organisations’s however, it is a particularly data-hungry technique. Here, we present recent work on a statistical inference method that seeks to maximise the insight that can be gained into the structure of covert social networks from the limited and fragmentary data gathered from intelligence operations or open sources. A protocol for predicting the existence of hidden “key-players” covert in social networks is given.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
1 The work presented in this section was undertaken with Dr S. Green (UK Home Office) and is currently unpublished.
 
Literatur
1.
Zurück zum Zitat Krebs, V.: Uncloaking Terrorist Networks. First Monday 7(4) (2002) Krebs, V.: Uncloaking Terrorist Networks. First Monday 7(4) (2002)
2.
Zurück zum Zitat Sparrow, M.K.: The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Netw. 13(3), 251–274 (1991)CrossRefMathSciNet Sparrow, M.K.: The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Netw. 13(3), 251–274 (1991)CrossRefMathSciNet
3.
Zurück zum Zitat Carley, K.M., Lee, J., Krackhardt, D.: Destabilising Networks. Connections 24(3), 31–34 (2001) Carley, K.M., Lee, J., Krackhardt, D.: Destabilising Networks. Connections 24(3), 31–34 (2001)
4.
Zurück zum Zitat Jansen, R., Yu, H., Greenbaum, D., Kluger, Y., Krogan, N.J., Chung, S., Emili, A., Snyder, M., Greenblatt, J.F., Gerstein, M.: A Bayesian networks approach to predicting protein–protein interactions from genomic data. Science 302, 449–451 (2003)CrossRef Jansen, R., Yu, H., Greenbaum, D., Kluger, Y., Krogan, N.J., Chung, S., Emili, A., Snyder, M., Greenblatt, J.F., Gerstein, M.: A Bayesian networks approach to predicting protein–protein interactions from genomic data. Science 302, 449–451 (2003)CrossRef
5.
Zurück zum Zitat Sivia, D.S.: Data Analysis: A Bayesian Tutorial. Oxford University Press, Oxford (2004) Sivia, D.S.: Data Analysis: A Bayesian Tutorial. Oxford University Press, Oxford (2004)
6.
Zurück zum Zitat Rhodes, C.J., Keefe, E.M.J.: Social network topology: a Bayesian approach. J. Op. Res. Soc. 58, 1605–1611 (2007)CrossRef Rhodes, C.J., Keefe, E.M.J.: Social network topology: a Bayesian approach. J. Op. Res. Soc. 58, 1605–1611 (2007)CrossRef
7.
Zurück zum Zitat Irwin, C., Roberts, C., Mee, N.: Counter Terrorism Overseas. Dstl Report, Dstl/CD053271/1.1 (2002) Irwin, C., Roberts, C., Mee, N.: Counter Terrorism Overseas. Dstl Report, Dstl/CD053271/1.1 (2002)
8.
Zurück zum Zitat Abram, P.J., Smith, J.D.: Modelling and analysis of terrorist network disruption. MSc thesis, Cranfield University, Shrivenham, United Kingdom (2004) Abram, P.J., Smith, J.D.: Modelling and analysis of terrorist network disruption. MSc thesis, Cranfield University, Shrivenham, United Kingdom (2004)
9.
Zurück zum Zitat Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60, 1373–1383 (2009)CrossRef Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60, 1373–1383 (2009)CrossRef
10.
Zurück zum Zitat Rhodes, C.J.: Inference approaches to constructing covert social network topologies. In: Memon, N., Farley, J.D., Hicks, D.L., Rosenoorn, T. (eds.) Mathematical Methods in Counter-Terrorism. Springer, Berlin (2009) Rhodes, C.J.: Inference approaches to constructing covert social network topologies. In: Memon, N., Farley, J.D., Hicks, D.L., Rosenoorn, T. (eds.) Mathematical Methods in Counter-Terrorism. Springer, Berlin (2009)
Metadaten
Titel
The Use of Open Source Intelligence in the Construction of Covert Social Networks
verfasst von
Christopher J. Rhodes
Copyright-Jahr
2011
Verlag
Springer Vienna
DOI
https://doi.org/10.1007/978-3-7091-0388-3_9