Skip to main content

Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4632))

Abstract

A new model of dependence centrality is proposed. The centrality measure is based on shortest paths between the pair of nodes. We apply this measure with the demonstration of a small network example. The comparisons are made with betweenness centrality. We discuss how intelligence investigation agencies could benefit from the proposed measure. In addition to that we argue about the investigative data mining techniques we are using, and a comparison is provided with traditional data mining techniques.

An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-540-73871-8_61

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Monge, P.R., Contractor, N.: Theories of Communication Networks. Oxford University Press, New York (2003)

    Google Scholar 

  2. Granovetter, M.: The Strength of Weak Ties. American Journal of Sociology 81, 1287–1303 (1973)

    Article  Google Scholar 

  3. Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Collins, R. (ed.) Sociological Theory, pp. 105–130 (1982)

    Google Scholar 

  4. Baker, W.E., Faulkner, R.R.: The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(6), 837–860 (1993)

    Article  Google Scholar 

  5. McAndrew, D.: The Structural Analysis of Criminal Networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, Aldershot, Dartmouth. Offender Profiling Series, III, pp. 53–94 (1999)

    Google Scholar 

  6. Sparrow, M.: The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)

    Article  Google Scholar 

  7. Evan, W.M.: An Organization-set Model of Inter-organizational Relations. In: Tuite, M., Chisholm, R., Radnor, M. (eds.) Inter-organizational Decision-making, Aldine, Chicago, pp. 181–200 (1972)

    Google Scholar 

  8. Ronfeldt, D., Arquilla, J.: What Next for Networks and Netwars? In: Arquilla, J., Ronfeldt, D. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, Rand Press (2001)

    Google Scholar 

  9. Arquilla, J., Ronfeldt, D.: Swarming and a Future of Conflict. RAND National Defense Institute (2001)

    Google Scholar 

  10. Hoffman, B.: Terrorism evolves Toward Netwar. RAND Review 22(2) (1999)

    Google Scholar 

  11. DeRosa, M.: Data Mining and Data Analysis for Counterterrorism, CSIS Report (2004)

    Google Scholar 

  12. Nasrullah, M.: A First Look on iMiner’s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network. In: Proceedings of International Conference on Data Mining Applications, Hong Kong (March 21-23, 2007)

    Google Scholar 

  13. Memon, N., Larsen, H.L.: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1037–1048. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Degenne, A., Forse, M.: Introducing Social Networks. Sage Publications, London (1999)

    MATH  Google Scholar 

  15. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    Book  Google Scholar 

  16. Krebs, V.E.: Uncloaking Terrorist Networks (2002) (accessed 23/3/2005), http://www.firstmonday.org/issues/issue7_4/krebs

  17. Stewart, T.: Six Degrees of Mohamed Atta (2001) (accessed 24/1/2006), http://money.cnn.com/magazines/business2

  18. Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann (2003)

    Google Scholar 

  19. Hougham, V.: Sociological Skills Used in the Capture of Saddam Hussein (2005) (accessed 22/2/2005), http://www.asanet.org/footnotes/julyaugust05/fn3.html

  20. Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Proceedings of International Conference on Availability, Reliability, and Security 2007, Vienna, Austria (March 10-13, 2007)

    Google Scholar 

  21. Memon, N., Larsen, H.L.: Detecting Hidden Hierarchy from Terrorist Networks. Mathematical Models for Counterterrorism. Springer, Heidelberg (in press, 2007)

    Google Scholar 

  22. West, B.D.: Introduction to Graph Theory, 2nd edn. Prentice Hall, Englewood Cliffs (2001)

    Google Scholar 

  23. Freeman, L.C., Freeman, S.C., Michaelson, A.G.: On Human Social Intelligence. Journal of Social and Biological Structures 11, 415–425 (1988)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Memon, N., Hicks, D.L., Larsen, H.L. (2007). Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. In: Alhajj, R., Gao, H., Li, J., Li, X., Zaïane, O.R. (eds) Advanced Data Mining and Applications. ADMA 2007. Lecture Notes in Computer Science(), vol 4632. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73871-8_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73871-8_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73870-1

  • Online ISBN: 978-3-540-73871-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics