A graph database framework for covert network analysis: An application to the Islamic State network in Europe

Abstract This paper proposes a new framework, based on graph database theory, for encoding complex data on covert networks, mapping their structure, and conducting a sensitivity analysis. The framework is then applied to reconstruct the terrorist network of the 2015–2016 attacks in Paris and Brussels, and related plots in Europe by the Islamic State group. The resulting network was found to be qualitatively different from the ideologically-related Al-Qaeda network, having a lower secrecy and a lower mean degree, under different network-generating assumptions.

[1]  Thomas W. Valente,et al.  The stability of centrality measures when networks are sampled , 2003, Soc. Networks.

[2]  Vagelis Hristidis,et al.  Templated Search over Relational Databases , 2014, CIKM.

[3]  Claudio Gutierrez,et al.  Survey of graph database models , 2008, CSUR.

[4]  Ove Frank,et al.  Survey sampling in networks , 2011 .

[5]  Jim Webber,et al.  Graph Databases: New Opportunities for Connected Data , 2015 .

[6]  Justin J. Miller,et al.  Graph Database Applications and Concepts with Neo4j , 2013 .

[7]  G. Robins Doing Social Network Research: Network-based Research Design for Social Scientists , 2015 .

[8]  Martin G. Everett,et al.  Analyzing social networks , 2013 .

[9]  Richard M. Medina,et al.  Social Network Analysis: A case study of the Islamist terrorist network , 2012, Security Journal.

[10]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[11]  David Melamed,et al.  Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade , 2014, Soc. Networks.

[12]  Alexander Gutfraind,et al.  Optimizing Topological Cascade Resilience Based on the Structure of Terrorist Networks , 2009, PloS one.

[13]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[14]  Herbert Hamers,et al.  One-Mode Projection Analysis and Design of Covert Affiliation Networks , 2010, Soc. Networks.

[15]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[16]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[17]  Herbert Hamers,et al.  The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.

[18]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[19]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[20]  Sean F. Everton Disrupting Dark Networks , 2012 .

[21]  Scott Helfstein,et al.  Covert or Convenient? Evolution of Terror Attack Networks , 2011 .

[22]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[23]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[24]  Gueorgi Kossinets Effects of missing data in social networks , 2006, Soc. Networks.

[25]  Martina Morris,et al.  statnet: Software Tools for the Representation, Visualization, Analysis and Simulation of Network Data. , 2008, Journal of statistical software.

[26]  Jim Webber,et al.  A programmatic introduction to Neo4j , 2018, SPLASH '12.

[27]  Luke M. Gerdes Illuminating dark networks : the study of clandestine groups and organizations , 2015 .