Abstract
Dark networks such as terrorist networks and narcotics-trafficking networks are hidden from our view yet could have a devastating impact on our society and economy. Understanding the topology of these dark networks can reveal greater insight into these clandestine organizations and help develop effective disruptive strategies. Based on analysis of four real-world “dark” networks, we found that these covert networks share many common topological properties with other types of networks. Their efficiency in communication and flow of information, commands, and goods can be tied to their small-world structures characterized by small average path length (l) and high clustering coefficient (C). In addition, we found that because of the small-world properties, dark networks are more vulnerable to attacks on the bridges that connect different communities than to attacks on the hubs. This may provide authorities with insight for intelligence and security purposes. An interesting finding about the three human dark networks is their substantially high clustering coefficients, which are not always present in other empirical networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Albert, R. and Barabási, A.-L. Statistical mechanics of complex networks. Reviews of Modern Physics, 74 (1). 47–97, 2002.
Barabási, A.-L., Jeong, H., Zéda, Z., Ravasz, E., Schubert, A. and Vicsek, T. Evolution of the social network of scientific collaborations. Physica A, 311. 590–614, 2002.
Carlson, J.M. and Doyle, J. Highly optimized tolerance: A mechanism for power laws in designed systems. Physical Review E, 60 (2). 1412–1427, 1999.
Holme, P., Kim, B.J., Yoon, C.N. and Han, S.K. Attack vulnerability of complex networks. Physical Review E, 65. 056109, 2002.
Levitt, S.D. and Dubner, S.J. Freakonomics: A rogue economist explores the hidden side of everything. William Morrow, New York, NY, 2005.
Liben-Nowell, D. and Kleinberg, J. The link prediction problem for social networks. in Proceedings of the 12th International Conference on Information and Knowledge Management, (New Orleans, LA, USA, 2003).
Newman, M.E.J. Mixing patterns in networks. Physical Review E, 67 (2). 026126, 2003.
Sageman, M. Understanding Terror Networks. University of Pennsylvania Press, Philadelphia, PA, 2004.
Wasserman, S. and Faust, K. Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge, 1994.
Watts, D.J. and Strogatz, S.H. Collective dynamics of “small-world” networks. Nature. 393. 440–442, 1998.
Xu, J. and Chen, H. Untangling criminal networks: A case study. in Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics (ISI’03), (Tucson, AZ, 2003), 232–248.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chen, H. (2012). Dark Network Analysis. In: Dark Web. Integrated Series in Information Systems, vol 30. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1557-2_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1557-2_6
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1556-5
Online ISBN: 978-1-4614-1557-2
eBook Packages: Computer ScienceComputer Science (R0)