Practical Algorithms for Destabilizing Terrorist Networks

This paper uses centrality measures from complex networks to discuss how to destabilize terrorist networks. We propose newly introduced algorithms for constructing hierarchy of covert networks, so that investigators can view the structure of terrorist networks / non-hierarchical organizations, in order to destabilize the adversaries. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also propose two new centrality measures i.e., position role index (which discovers various positions in the network, for example, leaders / gatekeepers and followers) and dependence centrality (which determines who is depending on whom in a network). The dependence centrality has a number of advantages including that this measure can assist law enforcement agencies in capturing / eradicating of node (terrorist) which may disrupt the maximum of the network.

[1]  Nasrullah Memon,et al.  Investigative Data Mining: A General Framework , 2004, International Conference on Computational Intelligence.

[2]  S. Strogatz Exploring complex networks , 2001, Nature.

[3]  Destabilizing networks , 2002 .

[4]  Jonathan David Farley,et al.  Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .

[5]  Sergei Maslov,et al.  Hierarchy measures in complex networks. , 2003, Physical review letters.

[6]  Hani Hanjour,et al.  Destabilizing Dynamic Covert Networks , 2003 .

[7]  Albert-László Barabási,et al.  Hierarchical organization in complex networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Albert,et al.  Dynamics of complex systems: scaling laws for the period of boolean networks , 2000, Physical review letters.

[9]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[10]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[11]  Sergei Maslov,et al.  Hierarchy and Anti-Hierarchy in Real and Scale Free networks , 2003 .

[12]  Massimo Marchiori,et al.  How the science of complex networks can help developing strategies against terrorism , 2004 .

[13]  S. N. Dorogovtsev,et al.  Evolution of networks , 2001, cond-mat/0106144.

[14]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[15]  Nasrullah Memon,et al.  Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).