Skip to main content

Retracted: A Novel Method to Analyze the Importance of Links in Terrorist Networks

  • Chapter
  • First Online:
Counterterrorism and Open Source Intelligence

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks are intentionally structured to ensure efficient communication between members without being detected. A terrorist network can be modeled as a generalized network (graph) consisting of nodes and links. Techniques from social network analysis (SNA) and graph theory can be used to identify key entities in the network, which is helpful for network destabilization purposes. Research on terrorist network analysis (TNA) has mainly focuses on analysis of nodes, which is in contrast to the fact that the links between the nodes provide at least as much relevant information about the network as the nodes themselves. This paper presents a novel method to analyze the importance of links in terrorist networks inspired by research on transportation networks. The12.6pc]The first author has been considered as corresponding author. Please check. link importance measure is implemented in CrimeFighter Assistant and evaluated on known terrorist networks harvested from open sources.

An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-7091-0388-3_22

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baccara, M., Bar-Isaac, H.: Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, pp. 271–290. Springer, Berlin (2009)

    Google Scholar 

  2. Lindelauf, R., Borm, P., Hamers, H.: On heterogeneous covert networks. Mathematical Methods in Counterterrorism, pp. 215–228. Springer, Berlin (2009)

    Google Scholar 

  3. Lindelauf, R., Borm, P., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Soc. Netw. 31, 126–137 (2009)

    Article  Google Scholar 

  4. Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 29–36. INSTICC Press, Funchal, Portugal, Oct 2009

    Google Scholar 

  5. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    Book  Google Scholar 

  6. Memon, N., Wiil, U.K., Alhajj, R., Atzenbeck, C., Harkiolakis, N.: Harvesting covert networks: The case study of the iMiner database. Int. J. Netw. Virtual Organ. 8(1/2), 52–74 (2011)

    Article  Google Scholar 

  7. Gloor, P.A., Zhao, Y.: Analyzing actors and their discussion topics by semantic social network analysis. Inform. Vis. 130–135 (2006)

    Google Scholar 

  8. Krebs, V.E.: Uncloaking terrorist networks. First Monday 7(4–1) (2002)

    Google Scholar 

  9. Enders, W., Su, X.: Rational terrorists and optimal network structure. J. Confl. Resolut. 51(1), 33 (2007)

    Article  Google Scholar 

  10. Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  11. Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 837–860 (1993)

    Google Scholar 

  12. Memon, N.: Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks. Ph.D. thesis, Aalborg University, Denmark (2007)

    Google Scholar 

  13. Rhodes, C.J.: Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, pp. 127–140. Springer, Berlin (2009)

    Google Scholar 

  14. Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821–7826 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  15. Newman, M.E.J.: A measure of betweenness centrality based on random walks. Soc. Netw. 27(1), 39–54 (2005)

    Article  Google Scholar 

  16. Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–34 (2001)

    Google Scholar 

  17. Fischer, M.M., Lände, R.: GIS and network analysis. Handbook of Transport Geography and Spatial Systems, vol. 5, pp. 391-408. Pergamon Press, Amsterdam (2004)

    Google Scholar 

  18. Bell, M.G.H., Iida, Y.: Transportation Network Analysis. Wiley, New York (1997)

    Book  Google Scholar 

  19. Jenelius, E., Petersen, T., Mattsson, L.G.: Importance and exposure in road network vulnerability analysis. Transport. Res. Part A 40(7), 537–560 (2006)

    Google Scholar 

  20. Bienenstock, E.J., Bonacich, P.: Balancing efficiency and vulnerability in social networks. Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 253–264. The National Academies Press (2003)

    Google Scholar 

  21. Wiil, U.K., Gniadek, J., Memon, N.: CrimeFighter Assistant: A knowledge management tool for terrorist network analysis. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 15–24. INSTICC Press, Valencia, Spain Oct 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uffe Kock Wiil .

Editor information

Editors and Affiliations

Copyright information

© 2011 Springer-Verlag/Wien

About this chapter

Cite this chapter

Wiil, U.K., Gniadek, J., Memon, N. (2011). Retracted: A Novel Method to Analyze the Importance of Links in Terrorist Networks. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0388-3_10

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0387-6

  • Online ISBN: 978-3-7091-0388-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics