Skip to main content

Retracted: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining

  • Conference paper
Advanced Data Mining and Applications (ADMA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4093))

Included in the following conference series:

Abstract

This paper uses measures of structural cohesion from social network analysis (SNA) literature to discuss how to destabilize terrorist networks by visualizing participation index of various terrorists in the dataset. Structural cohesion is defined as the minimum number of terrorists, who if removed from the group, would disconnect the group. We tested bottom-up measures from SNA (cliques, n-cliques, n-clans and k-plex) using dataset of 9-11 terrorist network, and found that Mohamed Atta, who was known as ring leader of the plot, participated maximum number of groups generated by the structural cohesion measures.

We discuss the results of recently introduced algorithms for constructing hierarchy of terrorist networks, so that investigators can view the structure of non-hierarchical organizations, in order to destabilize terrorist networks. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also briefly discuss various roles in the network i.e., position role index, which discovers various positions in the network, for example, leaders / brokers and followers.

An Erratum for this chapter can be found at http://dx.doi.org/10.1007/11811305_120

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balasundaram, B., Butenko, S., Trukhanov, S.: Novel approaches for analyzing biological networks. Journal of Combinatorial Optimization 10, 23–39 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  2. Berry, N., Ko, T., Moy, T., Smrcka, J., Turnley, J., Wu, B.: Emergent clique formation in terrorist recruitment. In: The AAAI-04 Workshop on Agent Organizations: Theory and Practice, July 25, 2004, San Jose, California (2004)

    Google Scholar 

  3. Bonacich, P.: Power and Centrality. American Journal of Sociology 92, 1170–1184 (1987)

    Article  Google Scholar 

  4. Burt, R.S.: Structural Holes. Harvard University Press, Cambridge, MA (1992)

    Google Scholar 

  5. Burt, R.S.: Structure, A General Purpose Network Analysis Program. Reference Manual. Columbia University, Newyork (1990)

    Google Scholar 

  6. Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework and some examples. Computer 37(4), 50–56 (2004)

    Article  Google Scholar 

  7. Davis, R.H.: Social network analysis: An aid in conspiracy investigations. FBI Law Enforcement Bulletin, pp. 11–19 (1981)

    Google Scholar 

  8. Freeman, L.C.: The sociological concept of “group”: An empirical test of two models. American Journal of Sociology 98, 152–166 (1992)

    Article  Google Scholar 

  9. Grier, P.: The New Al Qa’ida: Local Franchiser. Christian Science Monitor (July 11, 2005) (accessed May 26, 2006), Online at http://www.csmonitor.com/2005/0711/p01s01-woeu.html

  10. Hanneman, R.E.: Introduction to Social Network Methods. Online Textbook Supporting Sociology 175. University of California, Riverside, CA (2000)

    Google Scholar 

  11. Felter, J., et al.: Harmony and Disharmony: Exploiting al-Qa’ida’s Organizational Vulnerabilities, pp. 7–9. United States Military Academy, West Point, NY (2006)

    Google Scholar 

  12. Windrem, R.: The Frightening Evolution of al-Qa’ida, MSNBC.com (June 24, 2005) (accessed May 26, 2006), Online at: http://msnbc.msn.com/id/8307333

  13. Krebs, V.: Mapping networks of terrorist cells. Connections 24, 45–52 (2002)

    Google Scholar 

  14. Latora, V., Marchiori, M.: How Science of Complex Networks can help in developing Strategy against Terrorism. Chaos, Solitons and Fractals 20, 69–75 (2004)

    Article  MATH  Google Scholar 

  15. Luce, R., Perry, A.: A method of matrix analysis of group structure. Psychometrika 14, 95–116 (1949)

    Article  MathSciNet  Google Scholar 

  16. Luce, R.: Connectivity and generalized cliques in sociometric group structure. Psychometrika 15, 169–190 (1950)

    Article  MathSciNet  Google Scholar 

  17. McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Aldershot, Dartmouth. Offender Profiling Series, vol. III (1999)

    Google Scholar 

  18. Memon, N.: Detecting Terrorist Related Activities using Investigative Data Mining Tool. In: Proceedings of Symposium 5, Data/Text Mining from Large Databases IFSR 2005, Kobe, Japan (2005)

    Google Scholar 

  19. Memon, N., Larsen, H.L.: Practical Algorithms for Destabilizing Terrorist Networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 389–400. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Mokken, R.: Cliques, clubs and clans. Quality and Quantity 13, 161–173 (1979)

    Article  Google Scholar 

  21. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  22. Scott, J.: Social Network Analysis: A Handbook, 2nd edn. Sage Publications, London (2000)

    Google Scholar 

  23. Seidman, S.B., Foster, B.L.: A graph theoretic generalization of the clique concept. Journal of Mathematical Sociology 6, 139–154 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  24. Sageman, M.: Understanding Terrorist Networks. University of Pennsylvania Press (2004)

    Google Scholar 

  25. Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, Cambridge (1994)

    Book  Google Scholar 

  26. Wiktorowicz, Q.: The New Global Threat: Transnational Salafis and Jihad. Middle East Policy 8(4), 18–38 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Memon, N., Larsen, H.L. (2006). Retracted: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining. In: Li, X., Zaïane, O.R., Li, Z. (eds) Advanced Data Mining and Applications. ADMA 2006. Lecture Notes in Computer Science(), vol 4093. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11811305_113

Download citation

  • DOI: https://doi.org/10.1007/11811305_113

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37025-3

  • Online ISBN: 978-3-540-37026-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics