Network structure mining: locating and isolating core members in covert terrorist networks

Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure mining is especially suitable for mining a large volume of association data to discover hidden structural patterns in criminal networks. Covert networks share some features with conventional (real world) networks, but they are harder to identify because they mostly hide their illicit activities. After the September 11, 2001 attacks, social network analysis (SNA) has increasingly been used to study criminal networks. However, Finding out who is related to whom on a large scale in a covert network is a complex problem. In this paper we will discuss how network structure mining is applied in the domain of terrorist networks using structural (indices) measures or properties from social network analysis (SNA) and web structural mining research and proposed an algorithm for network disruption. Structural properties are determined by the graph structure of the network. These structural properties are used for locating and isolating core members by using importance ranking score and thereby analyzing the effect to remove these members in terrorist networks. The discussion is supported with a case study of Jemma Islamiah (JI) terrorist network.

[1]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[2]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[3]  Nasrullah Memon,et al.  Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining , 2006, ADMA.

[4]  Jeffrey Scott McIllwain,et al.  Organized crime: A social network approach , 1999 .

[5]  Destabilizing networks , 2002 .

[6]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[7]  S. Borgatti The Key Player Problem , 2002 .

[8]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[9]  Hector Garcia-Molina,et al.  Efficient Crawling Through URL Ordering , 1998, Comput. Networks.

[10]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[11]  H. Van de Sompel,et al.  Toolkits for visualizing co-authorship graph , 2004, Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries, 2004..

[12]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[13]  P. Bonacich Factoring and weighting approaches to status scores and clique identification , 1972 .

[14]  Ilir Bytyci Monitoring Changes in the Stability of Networks Using Eigenvector Centrality , 2006 .

[15]  V. Hougham Sociological Skills Used in the Capture of Saddam Hussein , 2005 .

[16]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[17]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[18]  Hsinchun Chen,et al.  Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network , 2005, ISI.

[19]  Linton C. Freeman,et al.  The gatekeeper, pair-dependency and structural centrality , 1980 .

[20]  Jay Liebowitz,et al.  The synergy of social network analysis and knowledge mapping: a case study , 2006 .

[21]  Alain Degenne,et al.  Introducing Social Networks , 1999 .

[22]  Mark Burgess Analytical Network and System Administration: Managing Human-Computer Networks , 2004 .

[23]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.