Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda

The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding network. In this paper, we introduce a game theoretic approach to identify key players in terrorist networks. In particular we use the Shapley value as a measure of importance in cooperative games that are specifically designed to reflect the context of the terrorist organization at hand. The advantage of this approach is that both the structure of the terrorist network, which usually reflects a communication and interaction structure, as well as non-network features, i.e., individual based parameters such as financial means or bomb building skills, can be taken into account. The application of our methodology to the analysis results in rankings of the terrorists in the network. We illustrate our methodology through two case studies: Jemaah Islamiyah’s Bali bombing and Al Qaedas 9/11 attack, which lead to new insights in the operational networks responsible for these attacks.

[1]  J. Frey The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .

[2]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[3]  Merrick E. Krause The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States , 2004 .

[4]  Michael Boss Economic theory of democracy , 1974 .

[5]  Akhilesh Chandra,et al.  Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.

[6]  Guillermo Owen,et al.  Centrality and power in social networks: a game theoretic approach , 2003, Math. Soc. Sci..

[7]  Rafael Amer,et al.  A connectivity game for graphs , 2004, Math. Methods Oper. Res..

[8]  Zachary Abuza,et al.  Militant Islam in Southeast Asia: Crucible of Terror , 2003 .

[9]  Martin G. Everett,et al.  A Graph-theoretic perspective on centrality , 2006, Soc. Networks.

[10]  Bernadette Saunders,et al.  The New Zealand Herald , 2014 .

[11]  Herbert Hamers,et al.  The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.

[12]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[13]  J M Smith,et al.  Evolution and the theory of games , 1976 .

[14]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[15]  Jonathan David Farley,et al.  Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .

[16]  Kathleen M. Carley,et al.  Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..

[17]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[18]  Marilyn B. Peterson Applications in Criminal Analysis: A Sourcebook , 1994 .

[19]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[20]  Kathleen M. Carley,et al.  Destabilizing Terrorist Networks , 1998 .

[21]  J. Neumann,et al.  The Theory of Games and Economic Behaviour , 1944 .

[22]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[23]  Martin Shubik,et al.  Game theory models and methods in political economy , 1977 .

[24]  M. Newman Analysis of weighted networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[25]  Herbert Hamers,et al.  Understanding Terrorist Network Topologies and Their Resilience Against Disruption , 2011, Counterterrorism and Open Source Intelligence.

[26]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[27]  Werner Güth Game theory and the nuclear arms race - The strategic position of Western Europe - , 1988 .

[28]  S. Koschade A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .

[29]  Jenna Jordan,et al.  When Heads Roll: Assessing the Effectiveness of Leadership Decapitation , 2009 .

[30]  E. Kalai Proportional Solutions to Bargaining Situations: Interpersonal Utility Comparisons , 1977 .

[31]  Angela Lewis Hoax E-mails and Bonsai Kittens: Are You E-literate in the Docuverse? , 2002, First Monday.

[32]  L. S. Shapley,et al.  17. A Value for n-Person Games , 1953 .