Analyzing the Terrorist Social Networks with Visualization Tools

Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective combating strategies against terrorism. Visualization of a network with the support of social network analysis techniques greatly facilitates the inspection of the network global structure. However, its usefulness becomes limited when the size and complexity of the network increase. In this work, we develop two interactive visualization techniques for complex terrorist social networks: fisheye views and fractal views. Both techniques facilitate the exploration of complex networks by allowing a user to select one or more focus points and dynamically adjusting the graphical layout and abstraction level to enhance the view of regions of interest. Combining the two techniques can effectively help an investigator to recognize patterns previously unreadable in the normal display due to the network complexity. Case studies are presented to illustrate how such visualization tools are capable to extract the hidden relationships among terrorists in the network through user interactions. Experiment was conducted to evaluate the performance of the visualization techniques.

[1]  Peter Eades,et al.  A Heuristic for Graph Drawing , 1984 .

[2]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[3]  John Arquilla,et al.  What Next for Networks and Netwars , 2001 .

[4]  Hideki Koike,et al.  Fractal views: a fractal-based method for controlling information display , 1995, TOIS.

[5]  Daniel Cohen-Or,et al.  Displaying data in multidimensional relevance space with 2D visualization maps , 1997, Proceedings. Visualization '97 (Cat. No. 97CB36155).

[6]  Hsinchun Chen,et al.  Analyzing and Visualizing Criminal Network Dynamics: A Case Study , 2004, ISI.

[7]  Manojit Sarkar,et al.  Graphical fisheye views , 1994, CACM.

[8]  G. W. Furnas,et al.  Generalized fisheye views , 1986, CHI '86.

[9]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[10]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[11]  Varvara Mitliaga,et al.  Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..

[12]  Jeffrey Scott McIllwain,et al.  Organized crime: A social network approach , 1999 .

[13]  Christopher C. Yang,et al.  Exploring the World Wide Web with Self-Organizing Map , 2002 .

[14]  Mark D. Apperley,et al.  A review and taxonomy of distortion-oriented presentation techniques , 1994, TCHI.

[15]  Hsinchun Chen,et al.  Visualization of large category map for Internet browsing , 2003, Decis. Support Syst..

[16]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[17]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[18]  K. J. Lynch,et al.  Automatic construction of networks of concepts characterizing document databases , 1992, IEEE Trans. Syst. Man Cybern..