Estimating Vulnerabilities in Large Covert Networks

Abstract : Covert organizations, such as terrorist groups, have network structures that are distinct from those in typical hierarchical organizations; e.g., they are cellular and distributed. Reasoning about how to attack dynamic networked organizations, let alone figuring out how they are likely to evolve, change, and adapt is terribly difficult. In this paper, an approach to estimating vulnerabilities and the impact of eliminating those vulnerabilities in covert networks is presented. Key features of this work include: using detailed network data to supplement high level views of organizations to create a composite image, using network metrics for multi-mode, multi-plex data to characterize key actors and the network itself, and using multi-agent simulation to predict change in the composite network view over time. Uncertainty is handled by using two types of data to reduce uncertainty, running the model in a Monte-Carlo fashion to determine the robustness of the results, and examining the robustness of the results under adding and dropping nodes and edges in the underlying networks. This approach is illustrated by contrasting the differential predictions for al-Qaida and Hamas as the top leaders are removed.

[1]  Kathleen M. Carley Smart Agents and Organizations of the Future , 2001 .

[2]  Kathleen M. Carley,et al.  DyNetML: Interchange Format for Rich Social Network Data , 2004 .

[3]  S. Borgatti The Key Player Problem , 2002 .

[4]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[5]  Kathleen M. Carley,et al.  Destabilizing dynamic networks under conditions of uncertainty , 2003, IEMC '03 Proceedings. Managing Technologically Driven Organizations: The Human Side of Innovation and Change (IEEE Cat. No.03CH37502).

[6]  Destabilizing networks , 2002 .

[7]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[8]  Kathleen M. Carley,et al.  AutoMap 1.2 : extract, analyze, represent, and compare mental models from texts , 2004 .

[9]  Kathleen M. Carley,et al.  A network optimization approach for improving organizational design , 2004 .

[10]  Kathleen M. Carley,et al.  ORA: Organization Risk Analyzer , 2004 .

[11]  Kathleen M. Carley,et al.  Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers , 2004 .

[12]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[13]  Kathleen M. Carley Dynamic Network Analysis , 2003 .

[14]  Hani Hanjour,et al.  Destabilizing Dynamic Covert Networks , 2003 .

[15]  John Arquilla,et al.  Networks, Netwars, and the Fight for the Future , 2001, First Monday.