The “six-element” analysis method for the research on the characteristics of terrorist activities

The rapid development of social network theory provides a new perspective for the research on counter-terrorism, however, current research mostly relates to terrorists and terrorist organizations. Firstly, the “six-element” analysis method for terrorist activities based on social network is proposed in this paper, namely, a variety of sub-networks are constructed according to the correlation among the six elements—people, organization, time, location, manner and event. These sub-networks are assessed through using centrality analysis, cohesive subgroup analysis, spatial correlation analysis, invulnerability analysis and descriptive statistic analysis; the characteristics and laws of terrorist activities are revealed from several different perspectives. Then, the “six-element” analysis method is applied to conduct empirical research on “East Turkistan” terrorist activities since the founding of the People’s Republic of China, so as to effectively identify core people and key organizations of the “East Turkistan” terrorist activity network, to assess the invulnerability of the “East Turkistan” terrorist network and to reveal the temporal and spatial distribution rules as well as the characteristics of the means and manners adopted in all previous terrorist activities. Lastly, the analysis results are interpreted qualitatively. This research can provide a basis for decision making and an analysis method for the identification of core terrorists and key terrorist organizations, determination of the key alert period, location of counter-terrorism and the early warning of the means of major terrorist activities.

[1]  S. Wasserman,et al.  Models and Methods in Social Network Analysis , 2005 .

[2]  John Bohannon Investigating networks: the dark side. , 2009, Science.

[3]  Edoardo M. Airoldi,et al.  Network sampling and classification: An investigation of network model representations , 2011, Decis. Support Syst..

[4]  John Bohannon,et al.  Counterterrorism's new tool: 'metanetwork' analysis. , 2009, Science.

[5]  Daniel J. Brass,et al.  Network Analysis in the Social Sciences , 2009, Science.

[6]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[7]  Kathleen M. Carley,et al.  Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..

[8]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[9]  Hsinchun Chen,et al.  Uncovering the dark Web: A case study of Jihad on the Web , 2008 .

[10]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[11]  David L. Hicks,et al.  Notice of Violation of IEEE Publication PrinciplesDetecting high-value individuals in covert networks: 7/7 London bombing case study , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[12]  Kathleen M. Carley,et al.  Destabilizing Terrorist Networks , 1998 .

[13]  Jukka-Pekka Onnela,et al.  Community Structure in Time-Dependent, Multiscale, and Multiplex Networks , 2009, Science.

[14]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[15]  Alexander H. Levis,et al.  Vulnerability Assessment on Adversarial Organization: Unifying Command and Control Structure Analysis and Social Network Analysis , 2008, SDM 2008.

[16]  John Arquilla,et al.  COUNTERING NEW TERRORISM , 1998 .

[17]  Eva K. Lee,et al.  Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks , 2006, Ann. Oper. Res..

[18]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[19]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[20]  Martha Saboyá,et al.  The cohesiveness of subgroups in social networks: A view from game theory , 2008, Ann. Oper. Res..

[21]  Kathleen M. Carley,et al.  On the robustness of centrality measures under conditions of imperfect data , 2006, Soc. Networks.

[22]  Kathleen M. Carley,et al.  Clearing the FOG: Fuzzy, overlapping groups for social networks , 2008, Soc. Networks.

[23]  Kathleen M. Carley,et al.  Toward an interoperable dynamic network analysis toolkit , 2007, Decis. Support Syst..

[24]  Kjell Hausken,et al.  Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures , 2011, Ann. Oper. Res..

[25]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.