Estimating the Importance of Terrorists in a Terror Network

While criminals may start their activities at individual level, the same is in general not true for terrorists who are mostly organized in well established networks. The effectiveness of a terror network could be realized by watching many factors, including the volume of activities accomplished by its members, the capabilities of its members to hide, and the ability of the network to grow and to maintain its influence even after the loss of some members, even leaders. Social network analysis, data mining and machine learning techniques could play important role in measuring the effectiveness of a network in general and in particular a terror network in support of the work presented in this chapter. We present a framework that employs clustering, frequent pattern mining and some social network analysis measures to determine the effectiveness of a network. The clustering and frequent pattern mining techniques start with the adjacency matrix of the network. For clustering, we utilize entries in the table by considering each row as an object and each column as a feature. Thus features of a network member are his/her direct neighbors. We maintain the weight of links in case of weighted network links. For frequent pattern mining, we consider each row of the adjacency matrix as a transaction and each column as an item. Further, we map entries into a 0/1 scale such that every entry whose value is greater than zero is assigned the value one; entries keep the value zero otherwise. This way we can apply frequent pattern mining algorithms to determine the most influential members in a network as well as the effect of removing some members or even links between members of a network. We also investigate the effect of adding some links between members. The target is to study how the various members in the network change role as the network evolves. This is measured by applying some social network analysis measures on the network at each stage during the development. We report some interesting results related to two benchmark networks: the first is 9/11 and the second is Madrid bombing.

[1]  Linton C. Freeman,et al.  The gatekeeper, pair-dependency and structural centrality , 1980 .

[2]  Kathleen M. Carley,et al.  Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..

[3]  Reda Alhajj,et al.  Multi-objective genetic algorithms based automated clustering for fuzzy association rules mining , 2008, Journal of Intelligent Information Systems.

[4]  L. Freeman Research Methods in Social Network Analysis , 1991 .

[5]  Jonathan David Farley,et al.  Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .

[6]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[7]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD 2000.

[8]  S. Wasserman,et al.  Models and methods in social network analysis , 2005 .

[9]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[10]  Wang Jiaxin,et al.  Discovering Hierarchical Structure in Terrorist Networks , 2006, 2006 International Conference on Emerging Technologies.

[11]  Hsinchun Chen,et al.  Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network , 2005, ISI.

[12]  Jon Kleinberg,et al.  Authoritative sources in a hyperlinked environment , 1999, SODA '98.

[13]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[14]  Tansel Özyer,et al.  From Alternative Clustering to Robust Clustering and Its Application to Gene Expression Data , 2011, IDEAL.

[15]  R. Alhajj,et al.  Achieving Natural Clustering by Validating Results of Iterative Evolutionary Clustering Approach , 2006, 2006 3rd International IEEE Conference Intelligent Systems.

[16]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[17]  Kathleen M. Carley,et al.  Destabilizing Terrorist Networks , 1998 .

[18]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[19]  Francisco Herrera,et al.  Tackling Real-Coded Genetic Algorithms: Operators and Tools for Behavioural Analysis , 1998, Artificial Intelligence Review.

[20]  Zbigniew Michalewicz,et al.  Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.

[21]  Rami Puzis,et al.  Finding the most prominent group in complex networks , 2007, AI Commun..

[22]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[23]  S. Strogatz Exploring complex networks , 2001, Nature.