Investigative Data Mining: Identifying Key Nodes in Terrorist Networks

The concern about national security has increased significantly since the 9/11 attacks. However, information overload and lack of advanced, automated techniques hinders the effective analysis of criminal and terrorist activities. Data mining applied in the context of law enforcement and intelligence analysis, called investigative data mining (IDM), holds the promise of alleviating such problems. In this paper, we present an understanding to show how IDM works and the importance of this approach in identifying key nodes in terrorist networks.

[1]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[2]  Nasrullah Memon,et al.  Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[3]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[4]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[5]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[6]  Jonathan David Farley,et al.  Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .

[7]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[8]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[9]  Jeffrey Scott McIllwain,et al.  Organized crime: A social network approach , 1999 .

[10]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[11]  Paul R. Pillar Counterterrorism after Al Qaeda , 2004 .

[12]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[13]  S. Borgatti The Key Player Problem , 2002 .

[14]  V. Hougham Sociological Skills Used in the Capture of Saddam Hussein , 2005 .

[15]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[16]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[17]  Kathleen M. Carley Estimating Vulnerabilities in Large Covert Networks , 2004 .

[18]  Jay Liebowitz,et al.  The synergy of social network analysis and knowledge mapping: a case study , 2006 .

[19]  Alain Degenne,et al.  Introducing Social Networks , 1999 .

[20]  Padhraic Smyth,et al.  Algorithms for estimating relative importance in networks , 2003, KDD '03.