Social Network Analysis as Counter Terrorism Tool
DOI:
https://doi.org/10.26438/ijcse/v6i9.655661Keywords:
Social Network Analysis, Counter Terrorism, Information Analysis, Intelligence analysisAbstract
Social network analysis is no more only bound to studying the relationship between the actors to discover the hidden trends and find scope in them but there is a darker side as well. The deep ocean of network has allowed people to counter attack on different countries via acting from various locations by issuing fake identities. The cycle of events that take place with the evil intentions to disrupt and cause fear not only physically but mentally too is referred to terrorism. SNA allows this act to counter prevent and associate the links by identifying the intentions and working of the actors. Various studies have been conducted after 9/11 attack and people all over the world are monitored so as to track the status and if any conviction is predicted, the complete network is examined. The sole purpose of these studies is to prevent thwarting and prepare oneself to counter terrorism. This paper outlines certain methods that recognize the terrorist activities which need to be monitored so as to detect the pre-event occurrence and counter attack on their planning.
References
D.Charabarti and C. Faloutsos. “Graph Mining: Laws, Generators, and Algorithms.” ACM Computing Surveys 38:1(2006) p.4.
J.R.Tyler, D.M.Wilkinson, and B.A. Huberman. “Email as Spectroscopy: Automated discovery of community structure within organizations.” In Communities And Technologies (2003) pp. 81- 96.
J.G. Augustson and J.Minker. “An Analysis Of Some Graph Theoretical Cluster Techniques.” Journal of ACM 17:4 (1970) pp. 571-588.
A. Calvo-Armengol and Y. Zenou. “Social networks and crime decisions: The Role Of Social Structure In Faciliating Delinquent Behaviour.” CEPR Discussion papers (2003) 3966.
A.L. Barabasi. “Linked: The New Science ofNetworks”. Cambridge, MA: Perseus Publishing, 2002.
R. Cross and A. Parker. “The Hidden Power ofSocial Networks.” Cambridge, MA, Harvard Business School Press, 2004. [7] D. Knoke and S. Yang. ” Social network analysis (Quantitative applications in the social sciences).” New York: Sage Publications. (2008)
S. Koschade. (2006). “A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence”. Studies in Conflict and Terrorism, 29(6), 559–575.
S.F. Everton. (2012). “Disrupting dark networks”. New York: Cambridge University Press.
S.F. Everton & D. Cunningham. (2012). “Detecting significant changes in dark networks”. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94–114.
G. Bichler & S. Bush. (2015). Networks in a nutshell. In G. Bichler & A. Malm (Eds.), Disrupting criminal networks: Network analysis in crime prevention (pp. 233–244). Boulder, CO: Lynne Reinner Publishers, Inc.
M. Granovetter (1973). “The strength of weak ties.” American Journal of Sociology, 78(6), 1360–1380.
R. Burt. (1992). “Structural holes: The social structure of competition.” Cambridge, MA: Harvard University Press.
D.J. Watts. (2003). “Six degrees: The science of a connected age”. New York: W.W. Norton & Company.
V.E. Krebs. (2001). “Mapping networks of terrorist cells”. Connections, 24(3), 43–52.
M. Sageman. (2004). “Understanding terror networks.” Philadelphia, PA: University of Pennsylvania Press.
J. Xu & H. Chen. (2008). “The topology of dark networks.” Communications of the ACM, 51(10), 58-65.
J. Magouirk, S. Atran, & M. Sageman. (2008). Connecting terrorist networks. Studies in Conflict and Terrorism, 31(1), 1–16. [19] D. M. Akbar Hussain. “Terrorist Networks Analysis through Argument Driven Hypotheses Model”. In Second International Conference on Availability, Reliability and Security (ARES'07). IEEE 0-7695-2775-2. 2007.
Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference (2004)
Tsvetovat, M., Carley, K.M.: On effectiveness of wiretap programs in mapping social networks. Computational and Mathematical Organization Theory 13(1), 63–87 (2006).
NETEST: Estimating a Terrorist Network’s Structure. In: 11th
European Intelligence and Security Informatics Conference (EISIC), Athens (2011).
Aparna Basu. “Social Network Analysis: A Methodology for
Studying Terrorism”. M. Panda, S. Dehuri, and G.-N. Wang (eds.), Social Networking Intelligent Systems Reference Library 65, Springer International Publishing Switzerland 10.1007/978-3319-05164-2_9. (2014). pp.215-242.
Clifford Weinstein, William Campbell, Brian Delaney, Gerald
O’Leary.” Modeling and Detection Techniques for Counter-
Terror Social Network Analysis and Intent Recognition” IEEE. 978-1-4244-2622-5 (2009) . pp. 1-16.
Richard M. Adler,” A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support” IEEE. 1-42441330-3. (2007). Pp. 47-54.
Julei Fu and Jian Chai “Multi-factor analysis of terrorist activities based on social network” In Fifth International Conference on Business Intelligence and Financial Engineering, IEEE 978-07695-4750-3. (2012) pp. 476-480.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
