MAPPing dark networks: A data transformation method to study clandestine organizations 1

There is a growing consensus that dark networks require special methodological considerations, but little attention has been devoted to determining which data transformation processes are best suited to the study of dark networks. Standard approaches to the transformation of multi-modal data “fold” matrices, by binarizing the network and multiplying it against its transpose. Unfortunately, this process produces exaggerated results when applied to weighted networks, and consequently researchers often disregard information on tie-strength when transforming data. This paper evaluates previous attempts to overcome this limitation and assesses projection methods discovered by biologists and physicists, who have studied the problem of transforming weighted multi-modal networks within the specific context of these disciplines. However, the assumptions underlying these transformation processes limit their applicability to dark networks. This paper, therefore, offers the Median Additive Projection Process (MAPP), an approach to data transformation specifically designed for implementation in weighted, multi-modal dark networks. MAPP accounts for the ambiguity inherent to clandestine subject matter by treating relationship strength in a probabilistic fashion. Because agents' one-mode centrality rankings change significantly when different projection processes are applied to the same two-mode network, MAPP allows researchers to more accurately identify central actors in dark networks.

[1]  Philip H. Ramsey Critical Values for Spearman’s Rank Order Correlation , 1989 .

[2]  M. Zelen,et al.  Rethinking centrality: Methods and examples☆ , 1989 .

[3]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[4]  Nancy Roberts,et al.  Strategies for Combating Dark Networks , 2011, J. Soc. Struct..

[5]  M. Newman Analysis of weighted networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[7]  Burleigh B. Gardner,et al.  Deep South: A Social Anthropological Study of Caste and Class , 1942 .

[8]  G. Berlusconi Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps , 2013 .

[9]  H. Milward,et al.  Dark Networks as Problems , 2003 .

[10]  Tore Opsahl Triadic closure in two-mode networks: Redefining the global and local clustering coefficients , 2013, Soc. Networks.

[11]  John Skvoretz,et al.  Node centrality in weighted networks: Generalizing degree and shortest paths , 2010, Soc. Networks.

[12]  Stephen P. Borgatti,et al.  Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.

[13]  Charles Tilly,et al.  Trust and Rule: Contents , 2005 .

[14]  John Scott,et al.  The SAGE Handbook of Social Network Analysis , 2011 .

[15]  Anna Traveset,et al.  Alternative approaches of transforming bimodal into unimodal mutualistic networks. The usefulness of preserving weighted information , 2011 .

[16]  J. Bolland,et al.  Sorting out centrality: An analysis of the performance of four centrality models in real and simulated networks , 1988 .

[17]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[18]  Sean F. Everton Disrupting Dark Networks , 2012 .

[19]  Yi-Cheng Zhang,et al.  Bipartite network projection and personal recommendation. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[20]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[21]  A. Vespignani,et al.  The architecture of complex weighted networks. , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[22]  Marc Sageman,et al.  Leaderless Jihad , 2011 .

[23]  Gábor Csárdi,et al.  The igraph software package for complex network research , 2006 .

[24]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[25]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[26]  M. Newman,et al.  Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[27]  Katherine Faust Centrality in affiliation networks , 1997 .

[28]  Sean F. Everton Network Topography, Key Players and Terrorist Networks , 2009 .

[29]  Cynthia M. Lakon,et al.  How Correlated Are Network Centrality Measures? , 2008, Connections.

[30]  Charles Tilly,et al.  Trust and rule , 2004 .

[31]  Thomas W. Valente,et al.  Social Networks and Health: Models, Methods, and Applications , 2010 .

[32]  Kathleen M. Carley,et al.  Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..

[33]  Thomas W. Valente,et al.  Social Networks and Health , 2010 .