Abstract
Social networks play a critical role in the formation of criminal and radical groups. However, understanding of these formations relies on difficult to collect data. We present an approach where narrative data from the trial of the 1995 Paris Metro and RER bombings was used to extract actors, places, groups and actions that led to the formation of the radical group. This data was dynamically visualized and allowed one to follow the process of terrorist group formation. An important part of the approach is the inclusion of the individuals who were parts of the social network of the radicalized individuals but who did not get radicalized (e.g. members of a soccer team). We emphasize the importance of the Natural Language Processing (NLP) in timely information extraction followed by dynamic visualization.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Morris, M.: Local rules and global properties: modeling the emergence of network structure. In: Breiger, R., Carley, K., Pattison, P. (eds.) Dynamic Social Network Modeling and Analysis, pp. 174–186. National Academy Press, Washington, DC (2003)
Morris, M., Handcock, M.S., Hunter, D.R.: Specification of exponential-family random graph models: terms and computational aspects. J. Stat. Softw. 24(4), 1548 (2008)
Carley, K.M.: Destabilizing dynamic terrorist networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication (2003). http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf
Carley, K.M., Pfeffer, J., Liu, H., Morstatter, F., Goolsby, R.: Near real time assessment of social media using geo-temporal network analytics. In: 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 517–524. IEEE (2013)
Carley, K.M.: ORA: a toolkit for dynamic network analysis and visualization. In: Alhajj, R., Rokne, J. (eds.) Encyclopedia of Social Network Analysis and Mining, pp. 1219–1228. Springer, New York (2014). https://doi.org/10.1007/978-1-4614-6170-8
Borgatti, S.P.: Identifying sets of key players in a network. Comput. Math. Organ. Theory 12, 21–34 (2006)
Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892–895 (2009)
Cranmer, S.J., Leifeld, P., McClurg, S.D., Rolfe, M.: Navigating the range of statistical tools for inferential network analysis. Am. J. Polit. Sci. 61(1), 237–251 (2017)
De Marchi, S.: Computational and Mathematical Modeling in the Social Sciences. Cambridge University Press, Cambridge (2005)
Gunturi, V.M., Shekhar, S., Joseph, K., Carley, K.M.: Scalable computational techniques for centrality metrics on temporally detailed social network. Mach. Learn. 106(8), 1133–1169 (2017)
Handcock, M.S., Hunter, D.R., Butts, C.T., Goodreau, S.M., Morris, M.: statnet: software tools for the representation, visualization, analysis and simulation of network data. J. Stat. Softw. 24(1), 1548 (2008)
Hunter, D.R., Handcock, M.S., Butts, C.T., Goodreau, S.M., Morris, M.: ergm: a package to fit, simulate and diagnose exponential-family models for networks. J. Stat. Softw. 24(3), nihpa54860 (2008)
Wei, W., Carley, K.M.: Measuring temporal patterns in dynamic social networks. ACM Trans. Knowl. Discov. Data (TKDD) 10(1), 9 (2015)
Carley, K.M.: A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. In: Visualising Network Information (pp. KN1-1–KN1-10). Meeting Proceedings RTO-MP-IST-063, Keynote 1. RTO, Neuilly-sur-Seine (2006). http://www.rto.nato.int/abstracts.asp
Reed, B.J., Segal, D.R.: Social network analysis and counterinsurgency operations: the capture of Saddam Hussein. Sociol. Focus 39(4), 251–264 (2006)
de Bie, J.L., de Poot, C.J., Freilich, J.D., Chermak, S.M.: Changing organizational structures of jihadist networks in the Netherlands. Soc. Netw. 48, 270–283 (2017)
Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homel. Secur. Aff. 2(2) (2006). https://www.hsaj.org/articles/171
Rodríguez, J.A., Rodríguez, J.A.: The March 11 th terrorist network: in its weakness lies its strength (2005)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)
Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium, June 2003
Carley, K.M.: Estimating vulnerabilities in large covert networks. Institute of Software Research Internat, Carnegie-Mellon University, Pittsburgh (2004)
Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, vol. 3. NAACSOS, July 2004
Borum, R.: Psychology of terrorism. Department of Mental Health Law and Policy, University of South Florida, Tampa (2007)
Githens-Mazer, J., Lambert, R.: Why conventional wisdom on radicalization fails: the persistence of a failed discourse. Int. Aff. 86(4), 889–901 (2010)
Crossett, C., Spitaletta, J.: Radicalization: relevant psychological and sociological concepts. The John Hopkins University (2010)
Wheeler, S.J.: Complex environments—an alternative approach to the assessment of insurgencies and their social terrain, part 1: identifying decisive factors. National Ground Intelligence Center Assessment (2009)
Post, J.M.: The Mind of the Terrorist: The Psychology of Terrorism from the IRA to Al-Qaeda. St. Martin’s Press, New York (2007)
Perliger, A., Milton, D.: From cradle to grave: the lifecycle of foreign fighters in Iraq and Syria. US Military Academy-Combating Terrorism Center West Point United States (2016)
Jasko, K., LaFree, G., Kruglanski, A.: Quest for significance and violent extremism: the case of domestic radicalization. Polit. Psychol. 38(5), 815–831 (2017)
Perliger, A., Pedahzur, A.: Counter cultures, group dynamics and religious terrorism. Polit. Stud. 64(2), 297–314 (2016)
Stern, J.: Mind over martyr: how to deradicalize Islamist extremists. Foreign Aff. 89, 95–108 (2010)
Asal, V., Rethemeyer, R.K.: Dilettantes, ideologues, and the weak: terrorists who don’t kill. Confl. Manag. Peace Sci. 3, 244–263 (2008)
Asal, V., Rethemeyer, R.K.: The nature of the beast: terrorist organizational characteristics and organizational lethality. J. Polit. 70(2), 437–449 (2008)
Lustick, I.O., Miodownik, D.: Abstractions, ensembles, and virtualizations: simplicity and complexity in agent-based modeling. Comp. Polit. 41(2), 223–244 (2009)
MacKerrow, E.P.: Understanding why: dissecting radical Islamic terrorism with agent-based simulation. Los Alamos Sci. 28, 184–191 (2003)
Fernández, B., Murty, V.V., Chang, W.R.: DyNet: Dynamic Network, User Manual (1989)
Moody, J., McFarland, D., Bender-deMoll, S.: Dynamic network visualization. Am. J. Sociol. 110(4), 1206–1241 (2005)
Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for exploring and manipulating networks. ICWSM 8, 361–362 (2009)
Bender-deMoll, S.: NDTV: Network Dynamic Temporal Visualizations. R Package Version 0.10.0 (2016)
Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58, 837–860 (1993)
Bright, D.A., Hughes, C.E., Chalmers, J.: Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime Law Soc. Change 57(2), 151–176 (2012)
Sageman, M.: Leaderless Jihad: Terror Networks in the Twenty-First Century. University of Pennsylvania Press, Philadelphia (2008)
Wiktorowicz, Q.: Radical Islam rising: Muslim extremism in the West. Rowman & Littlefield Publishers, Lanham (2005)
Carley, K.M., Columbus, D., Azoulay, A.: Automap user’s guide 2012 (No. CMU-ISR-12-106). Institute of Software Research Internat, Carnegie-Mellon University, Pittsburgh (2012)
Niu, F., Zhang, C., Ré, C., Shavlik, J.W.: DeepDive: web-scale knowledge-base construction using statistical learning and inference. In: VLDS, vol. 12, pp. 25–28 (2012)
Mintz, M., Bills, S., Snow, R., Jurafsky, D.: Distant supervision for relation extraction without labeled data. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, vol. 2, pp. 1003–1011. Association for Computational Linguistics, August 2009
Ratner, A., Bach, S.H., Ehrenberg, H., Fries, J., Wu, S., Ré, C.: Snorkel: rapid training data creation with weak supervision. arXiv preprint arXiv:1711.10160 (2017)
Kumar, S.: A survey of deep learning methods for relation extraction. arXiv preprint arXiv:1705.03645 (2017)
Lin, Y., Shen, S., Liu, Z., Luan, H., Sun, M.: Neural relation extraction with selective attention over instances. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, vol. 1: Long Papers, pp. 2124–2133 (2016)
Zeng, D., Liu, K., Chen, Y., Zhao, J.: Distant supervision for relation extraction via piecewise convolutional neural networks. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 1753–1762 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Bobashev, G., Sageman, M., Evans, A.L., Wittenborn, J., Chew, R.F. (2018). Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group Dynamics. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2018. Lecture Notes in Computer Science(), vol 10899. Springer, Cham. https://doi.org/10.1007/978-3-319-93372-6_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-93372-6_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93371-9
Online ISBN: 978-3-319-93372-6
eBook Packages: Computer ScienceComputer Science (R0)