Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism

A key issue in tracking transnational terror trends is the utility of social network analysis, both as a theoretical perspective and as a methodological toolkit, for understanding and assessing terror organizations, and for developing counterterror policies and practices to detect and disrupt terror attacks. Foundational efforts were case studies of particular groups or operations, culling data from newspaper reports and court trial documents, then creating matrix files for analysis with social network computer programs. Mathematicians, game theorists, and computer scientists are dramatically expanding research beyond foundational case studies of terrorist networks. Much of their work centers on devising strategies for counterterror organizations to destabilize clandestine organizations. They develop elegant and precise mathematical models and computer algorithms, then systematically change parameters to assess capabilities of detecting and disrupting terrorist activities under varying conditions. Key issues for future network research include: conducting rigorous comparative analyses of four historical waves of modern terrorism for clues about the present and future waves; building more comprehensive, cohesive, and integrated theoretical models capable of explaining the formation, structure, and consequences of terrorist networks; developing new methods of measuring network relations among terrorists; performing more laboratory experiments as an alternative to collecting inaccessible and dangerous field observation data; and creating large, high-quality relational datasets to test social network theories of terrorism. Keywords: social network analysis; transnational terrorism; counterterror organization; cell structure; matrix; graph theory; computational methods; agent-based modeling

[1]  Sean F. Everton Disrupting Dark Networks , 2012 .

[2]  G. Curtis,et al.  The Nexus Among Terrorists, Narcotics Traffickers, Weapons Proliferators, and Organized Crime Networks in Western Europe , 2002 .

[3]  Nicola Horsburgh,et al.  Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings , 2008 .

[4]  Doug Bond,et al.  Using Hidden Markov Models to Predict Terror Before it Hits (Again) , 2013 .

[5]  Brian A. Jackson Groups, Networks, or Movements: A Command-and-Control-Driven Approach to Classifying Terrorist Organizations and Its Application to Al Qaeda , 2006 .

[6]  Jonathan David Farley,et al.  Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .

[7]  Kathleen M. Carley A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .

[8]  A. Perliger,et al.  The Changing Nature of Suicide Attacks - A Social Network Perspective , 2006, Social Forces.

[9]  Brian Delaney,et al.  Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition , 2009, 2009 IEEE Aerospace conference.

[10]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[12]  S. Koschade A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .

[13]  Shandon Harris-Hogan Australian Neo-Jihadist Terrorism: Mapping the Network and Cell Analysis Using Wiretap Evidence , 2012 .

[14]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[15]  Sam Mullins Social network analysis and terrorism: an introduction to the special issue , 2013 .

[16]  Lauren McGough Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes , 2009 .

[17]  Herbert Hamers,et al.  The Influence of Secrecy on the Communication Structure of Covert Networks , 2008, Soc. Networks.

[18]  Kevin C. Desouza,et al.  Dismantling terrorist networks: Evaluating strategic options using agent-based modeling , 2010 .

[19]  V. S. Subrahmanian,et al.  A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and Kashmir , 2011, 2011 European Intelligence and Security Informatics Conference.

[20]  Naim Kapucu,et al.  Anatomy of a dark network: the case of the Turkish Ergenekon terrorist organization , 2012 .

[21]  V. S. Subrahmanian,et al.  Handbook of Computational Approaches to Counterterrorism , 2013, Springer New York.

[22]  S Mahesh USING DATA MINING TECHNIQUES FOR DETECTING TERROR- RELATED ACTIVITIES ON THE WEB , 2010 .

[23]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[24]  David C. Rapoport The Fourth Wave: September 11 in the History of Terrorism , 2001 .

[25]  E. Chadwick It's War, Jim, But Not As We Know It: A ``Reality-Check'' for International Laws of War? , 2013 .

[26]  Marc Sageman,et al.  Connecting Terrorist Networks , 2008 .

[27]  Ersun N. Kurtulus The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel , 2012 .

[28]  C. Sterling The terror network : the secret war of international terrorism , 1981 .

[29]  Bruce A. Desmarais,et al.  Forecasting the locational dynamics of transnational terrorism: a network analytic approach , 2011, 2011 European Intelligence and Security Informatics Conference.

[30]  V. S. Subrahmanian,et al.  The SOMA Terror Organization Portal (STOP): social network and analytic tools for the real-time analysis of terror groups , 2008 .

[31]  Herbert Hamers,et al.  One-Mode Projection Analysis and Design of Covert Affiliation Networks , 2010, Soc. Networks.

[32]  David L. Hicks,et al.  Mathematical Methods in Counterterrorism , 2009 .

[33]  Nisha Chaurasia,et al.  A Survey on Terrorist Network Mining: Current Trends and Opportunities , 2012 .

[34]  Magnus Ranstorp Mapping Terrorism Research : State of the art, gaps and future direction , 2006 .

[35]  Richard M. Medina,et al.  Social Network Analysis: A case study of the Islamist terrorist network , 2012, Security Journal.

[36]  Kathleen M. Carley Dynamic Network Analysis , 2003 .

[37]  J. Horgan,et al.  Methodological Triangulation in the Analysis of Terrorist Networks , 2012 .

[38]  Helen Armstrong,et al.  Social Network Analysis with Applications , 2013 .

[39]  A. Perliger,et al.  Jewish Terrorism in Israel , 2009 .

[40]  Jonathan David Farley,et al.  Toward a Mathematical Theory of Counterterrorism: Building the Perfect Terrorist Cell , 2007 .

[41]  Chris Dishman,et al.  Terrorism, Crime, and Transformation , 2001 .

[42]  Herbert Hamers,et al.  On Heterogeneous Covert Networks , 2008 .

[43]  R. Borum,et al.  A dimensional approach to analyzing lone offender terrorism , 2012 .