Skip to main content

Knowledge Management Tools for Terrorist Network Analysis

  • Conference paper
Book cover Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2010)

Abstract

A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks (consisting of nodes and links) needs to be analyzed and visualized in order to gain a deeper knowledge and understanding that enable network destabilization. This paper presents two novel knowledge management tools for terrorist network analysis. CrimeFighter Investigator provides advanced support for human-centered, target-centric investigations aimed at constructing terrorist networks based on disparate pieces of terrorist information. CrimeFighter Assistant provides advanced support for network, node, and link analysis once a terrorist network has been constructed. The paper focuses primarily on the latter tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baccara, M., Bar-Isaac, H.: Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, 271–290 (2009)

    Google Scholar 

  2. Lindelauf, R., Borm, P., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Social Networks 31, 126–137 (2009)

    Article  Google Scholar 

  3. Enders, W., Su, X.: Rational terrorists and optimal network structure. Journal of Conflict Resolution 51(1), 33 (2007)

    Article  Google Scholar 

  4. Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. American Sociological Review, 837–860 (1993)

    Google Scholar 

  5. Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos, Solitons and Fractals 20(1), 69–75 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 29–36. INSTICC Press (2009)

    Google Scholar 

  7. Wasserman, S., Faust, K.: Social network analysis: methods and applications. Cambridge University Press (1994)

    Google Scholar 

  8. Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–34 (2001)

    Google Scholar 

  9. Gloor, P.A., Zhao, Y.: Analyzing actors and their discussion topics by semantic social network analysis. In: Information Visualization (IV 2006), pp. 130–135 (2006)

    Google Scholar 

  10. Petersen, R.R., Wiil, U.K.: Hypertext structures for investigative teams. Accepted for the Proceedings of the Conference on Hypertext. ACM Press (2011)

    Google Scholar 

  11. O’Madadhain, J., Fisher, D., Smyth, P., White, S., Boey, Y.B.: Analysis and visualization of network data using JUNG. Journal of Statistical Software VV, 1–35 (2005)

    Google Scholar 

  12. Memon, N.: Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks. PhD thesis, Aalborg University, Denmark (2007)

    Google Scholar 

  13. Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proceedings of the National Academy of Sciences 99(12), 7821–7826 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  14. Wiil, U.K., Gniadek, J., Memon, N.: Measuring link importance in terrorist networks. In: Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, Odense, Denmark, pp. 225–232. IEEE CS Press (August 2010)

    Google Scholar 

  15. Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Algorithms for drawing graphs: an annotated bibliography. Computational Geometry-Theory and Application 4(5), 235–282 (1994)

    Article  MATH  Google Scholar 

  16. Wise, W.: Indonesia’s war on terror. United States-Indonesia Society, 1–107 (2005)

    Google Scholar 

  17. BBC News, The Bali bombing plot (2008), http://news.bbc.co.uk/2/hi/asia-pacific/3157478.stm

  18. NWB Team, Network Workbench Tool. Indiana University, Northeastern University, and University of Michigan (2006), http://nwb.slis.indiana.edu

  19. SocNetV (2011), http://socnetv.sourceforge.net

  20. UCINET (2011), http://www.analytictech.com/ucinet

  21. Brandes, U., Wagner, D.: Analysis and visualization of social networks. Graph Drawing Software, 321–340 (2003)

    Google Scholar 

  22. VisuaLyzer (2011), http://www.mdlogix.com/solutions

  23. Batagelj, V., Mrvar, A.: Pajek – Program for large network analysis (2011), http://pajek.imfm.si

  24. NetMiner (2011), http://www.netminer.com

  25. i2 (2011), http://www.i2group.com

  26. Rhodes, C.J.: Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, 127–140 (2009)

    Google Scholar 

  27. Wiil, U.K., Gniadek, J., Memon, N.: CrimeFighter Assistant: a knowledge management tool for terrorist network analysis. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 15–24. INSTICC Press (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wiil, U.K., Gniadek, J., Memon, N., Petersen, R.R. (2013). Knowledge Management Tools for Terrorist Network Analysis. In: Fred, A., Dietz, J.L.G., Liu, K., Filipe, J. (eds) Knowledge Discovery, Knowledge Engineering and Knowledge Management. IC3K 2010. Communications in Computer and Information Science, vol 272. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29764-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29764-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29763-2

  • Online ISBN: 978-3-642-29764-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics