How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

A new model of dependence centrality is proposed. The centrality measure is based on shortest paths between the pair of nodes. We apply this measure with the demonstration of a small network example. The comparisons are made with betweenness centrality. We discuss how intelligence investigation agencies could benefit from the proposed measure. In addition to that we argue about the investigative data mining techniques we are using, and a comparison is provided with traditional data mining techniques.

[1]  Nasrullah Memon,et al.  Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining , 2006, ADMA.

[2]  David L. Hicks,et al.  Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies , 2008, ISI Workshops.

[3]  David L. Hicks,et al.  Notice of Violation of IEEE Publication PrinciplesDetecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[4]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[5]  Nasrullah Memon A First Look on iMiner' s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network , 2007, IMECS.

[6]  Mary Derosa,et al.  Data mining and data analysis for counterterrorism , 2004 .

[7]  Alain Degenne,et al.  Introducing Social Networks , 1999 .

[8]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[9]  Peter R. Monge,et al.  Theories of Communication Networks , 2003 .

[10]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[11]  L. Freeman,et al.  On human social intelligence , 1988 .

[12]  Mark S. Granovetter Network Sampling: Some First Steps , 1976, American Journal of Sociology.

[13]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[14]  John Arquilla,et al.  What Next for Networks and Netwars , 2001 .

[15]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[16]  D. West Introduction to Graph Theory , 1995 .

[17]  Mark S. Granovetter T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .

[18]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[19]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .