Skip to main content

Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group Dynamics

  • Conference paper
  • First Online:
  • 3346 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10899))

Abstract

Social networks play a critical role in the formation of criminal and radical groups. However, understanding of these formations relies on difficult to collect data. We present an approach where narrative data from the trial of the 1995 Paris Metro and RER bombings was used to extract actors, places, groups and actions that led to the formation of the radical group. This data was dynamically visualized and allowed one to follow the process of terrorist group formation. An important part of the approach is the inclusion of the individuals who were parts of the social network of the radicalized individuals but who did not get radicalized (e.g. members of a soccer team). We emphasize the importance of the Natural Language Processing (NLP) in timely information extraction followed by dynamic visualization.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Morris, M.: Local rules and global properties: modeling the emergence of network structure. In: Breiger, R., Carley, K., Pattison, P. (eds.) Dynamic Social Network Modeling and Analysis, pp. 174–186. National Academy Press, Washington, DC (2003)

    Google Scholar 

  2. Morris, M., Handcock, M.S., Hunter, D.R.: Specification of exponential-family random graph models: terms and computational aspects. J. Stat. Softw. 24(4), 1548 (2008)

    Article  Google Scholar 

  3. Carley, K.M.: Destabilizing dynamic terrorist networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication (2003). http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf

  4. Carley, K.M., Pfeffer, J., Liu, H., Morstatter, F., Goolsby, R.: Near real time assessment of social media using geo-temporal network analytics. In: 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 517–524. IEEE (2013)

    Google Scholar 

  5. Carley, K.M.: ORA: a toolkit for dynamic network analysis and visualization. In: Alhajj, R., Rokne, J. (eds.) Encyclopedia of Social Network Analysis and Mining, pp. 1219–1228. Springer, New York (2014). https://doi.org/10.1007/978-1-4614-6170-8

    Chapter  Google Scholar 

  6. Borgatti, S.P.: Identifying sets of key players in a network. Comput. Math. Organ. Theory 12, 21–34 (2006)

    Article  Google Scholar 

  7. Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892–895 (2009)

    Article  Google Scholar 

  8. Cranmer, S.J., Leifeld, P., McClurg, S.D., Rolfe, M.: Navigating the range of statistical tools for inferential network analysis. Am. J. Polit. Sci. 61(1), 237–251 (2017)

    Article  Google Scholar 

  9. De Marchi, S.: Computational and Mathematical Modeling in the Social Sciences. Cambridge University Press, Cambridge (2005)

    Book  Google Scholar 

  10. Gunturi, V.M., Shekhar, S., Joseph, K., Carley, K.M.: Scalable computational techniques for centrality metrics on temporally detailed social network. Mach. Learn. 106(8), 1133–1169 (2017)

    Article  MathSciNet  Google Scholar 

  11. Handcock, M.S., Hunter, D.R., Butts, C.T., Goodreau, S.M., Morris, M.: statnet: software tools for the representation, visualization, analysis and simulation of network data. J. Stat. Softw. 24(1), 1548 (2008)

    Article  Google Scholar 

  12. Hunter, D.R., Handcock, M.S., Butts, C.T., Goodreau, S.M., Morris, M.: ergm: a package to fit, simulate and diagnose exponential-family models for networks. J. Stat. Softw. 24(3), nihpa54860 (2008)

    Google Scholar 

  13. Wei, W., Carley, K.M.: Measuring temporal patterns in dynamic social networks. ACM Trans. Knowl. Discov. Data (TKDD) 10(1), 9 (2015)

    Google Scholar 

  14. Carley, K.M.: A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. In: Visualising Network Information (pp. KN1-1–KN1-10). Meeting Proceedings RTO-MP-IST-063, Keynote 1. RTO, Neuilly-sur-Seine (2006). http://www.rto.nato.int/abstracts.asp

  15. Reed, B.J., Segal, D.R.: Social network analysis and counterinsurgency operations: the capture of Saddam Hussein. Sociol. Focus 39(4), 251–264 (2006)

    Article  Google Scholar 

  16. de Bie, J.L., de Poot, C.J., Freilich, J.D., Chermak, S.M.: Changing organizational structures of jihadist networks in the Netherlands. Soc. Netw. 48, 270–283 (2017)

    Article  Google Scholar 

  17. Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homel. Secur. Aff. 2(2) (2006). https://www.hsaj.org/articles/171

  18. Rodríguez, J.A., Rodríguez, J.A.: The March 11 th terrorist network: in its weakness lies its strength (2005)

    Google Scholar 

  19. Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Philadelphia (2004)

    Book  Google Scholar 

  20. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  21. Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium, June 2003

    Google Scholar 

  22. Carley, K.M.: Estimating vulnerabilities in large covert networks. Institute of Software Research Internat, Carnegie-Mellon University, Pittsburgh (2004)

    Google Scholar 

  23. Diesner, J., Carley, K.M.: Using network text analysis to detect the organizational structure of covert networks. In: Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, vol. 3. NAACSOS, July 2004

    Google Scholar 

  24. Borum, R.: Psychology of terrorism. Department of Mental Health Law and Policy, University of South Florida, Tampa (2007)

    Google Scholar 

  25. Githens-Mazer, J., Lambert, R.: Why conventional wisdom on radicalization fails: the persistence of a failed discourse. Int. Aff. 86(4), 889–901 (2010)

    Article  Google Scholar 

  26. Crossett, C., Spitaletta, J.: Radicalization: relevant psychological and sociological concepts. The John Hopkins University (2010)

    Google Scholar 

  27. Wheeler, S.J.: Complex environments—an alternative approach to the assessment of insurgencies and their social terrain, part 1: identifying decisive factors. National Ground Intelligence Center Assessment (2009)

    Google Scholar 

  28. Post, J.M.: The Mind of the Terrorist: The Psychology of Terrorism from the IRA to Al-Qaeda. St. Martin’s Press, New York (2007)

    Google Scholar 

  29. Perliger, A., Milton, D.: From cradle to grave: the lifecycle of foreign fighters in Iraq and Syria. US Military Academy-Combating Terrorism Center West Point United States (2016)

    Google Scholar 

  30. Jasko, K., LaFree, G., Kruglanski, A.: Quest for significance and violent extremism: the case of domestic radicalization. Polit. Psychol. 38(5), 815–831 (2017)

    Article  Google Scholar 

  31. Perliger, A., Pedahzur, A.: Counter cultures, group dynamics and religious terrorism. Polit. Stud. 64(2), 297–314 (2016)

    Article  Google Scholar 

  32. Stern, J.: Mind over martyr: how to deradicalize Islamist extremists. Foreign Aff. 89, 95–108 (2010)

    Google Scholar 

  33. Asal, V., Rethemeyer, R.K.: Dilettantes, ideologues, and the weak: terrorists who don’t kill. Confl. Manag. Peace Sci. 3, 244–263 (2008)

    Article  Google Scholar 

  34. Asal, V., Rethemeyer, R.K.: The nature of the beast: terrorist organizational characteristics and organizational lethality. J. Polit. 70(2), 437–449 (2008)

    Article  Google Scholar 

  35. Lustick, I.O., Miodownik, D.: Abstractions, ensembles, and virtualizations: simplicity and complexity in agent-based modeling. Comp. Polit. 41(2), 223–244 (2009)

    Article  Google Scholar 

  36. MacKerrow, E.P.: Understanding why: dissecting radical Islamic terrorism with agent-based simulation. Los Alamos Sci. 28, 184–191 (2003)

    Google Scholar 

  37. Fernández, B., Murty, V.V., Chang, W.R.: DyNet: Dynamic Network, User Manual (1989)

    Google Scholar 

  38. Moody, J., McFarland, D., Bender-deMoll, S.: Dynamic network visualization. Am. J. Sociol. 110(4), 1206–1241 (2005)

    Article  Google Scholar 

  39. Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for exploring and manipulating networks. ICWSM 8, 361–362 (2009)

    Google Scholar 

  40. Bender-deMoll, S.: NDTV: Network Dynamic Temporal Visualizations. R Package Version 0.10.0 (2016)

    Google Scholar 

  41. Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58, 837–860 (1993)

    Article  Google Scholar 

  42. Bright, D.A., Hughes, C.E., Chalmers, J.: Illuminating dark networks: a social network analysis of an Australian drug trafficking syndicate. Crime Law Soc. Change 57(2), 151–176 (2012)

    Article  Google Scholar 

  43. Sageman, M.: Leaderless Jihad: Terror Networks in the Twenty-First Century. University of Pennsylvania Press, Philadelphia (2008)

    Book  Google Scholar 

  44. Wiktorowicz, Q.: Radical Islam rising: Muslim extremism in the West. Rowman & Littlefield Publishers, Lanham (2005)

    Google Scholar 

  45. Carley, K.M., Columbus, D., Azoulay, A.: Automap user’s guide 2012 (No. CMU-ISR-12-106). Institute of Software Research Internat, Carnegie-Mellon University, Pittsburgh (2012)

    Google Scholar 

  46. Niu, F., Zhang, C., Ré, C., Shavlik, J.W.: DeepDive: web-scale knowledge-base construction using statistical learning and inference. In: VLDS, vol. 12, pp. 25–28 (2012)

    Google Scholar 

  47. Mintz, M., Bills, S., Snow, R., Jurafsky, D.: Distant supervision for relation extraction without labeled data. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, vol. 2, pp. 1003–1011. Association for Computational Linguistics, August 2009

    Google Scholar 

  48. Ratner, A., Bach, S.H., Ehrenberg, H., Fries, J., Wu, S., Ré, C.: Snorkel: rapid training data creation with weak supervision. arXiv preprint arXiv:1711.10160 (2017)

    Article  Google Scholar 

  49. Kumar, S.: A survey of deep learning methods for relation extraction. arXiv preprint arXiv:1705.03645 (2017)

  50. Lin, Y., Shen, S., Liu, Z., Luan, H., Sun, M.: Neural relation extraction with selective attention over instances. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, vol. 1: Long Papers, pp. 2124–2133 (2016)

    Google Scholar 

  51. Zeng, D., Liu, K., Chen, Y., Zhao, J.: Distant supervision for relation extraction via piecewise convolutional neural networks. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 1753–1762 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert F. Chew .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bobashev, G., Sageman, M., Evans, A.L., Wittenborn, J., Chew, R.F. (2018). Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group Dynamics. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2018. Lecture Notes in Computer Science(), vol 10899. Springer, Cham. https://doi.org/10.1007/978-3-319-93372-6_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93372-6_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93371-9

  • Online ISBN: 978-3-319-93372-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics