Abstract
A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks (consisting of nodes and links) needs to be analyzed and visualized in order to gain a deeper knowledge and understanding that enable network destabilization. This paper presents two novel knowledge management tools for terrorist network analysis. CrimeFighter Investigator provides advanced support for human-centered, target-centric investigations aimed at constructing terrorist networks based on disparate pieces of terrorist information. CrimeFighter Assistant provides advanced support for network, node, and link analysis once a terrorist network has been constructed. The paper focuses primarily on the latter tool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baccara, M., Bar-Isaac, H.: Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, 271–290 (2009)
Lindelauf, R., Borm, P., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Social Networks 31, 126–137 (2009)
Enders, W., Su, X.: Rational terrorists and optimal network structure. Journal of Conflict Resolution 51(1), 33 (2007)
Baker, W.E., Faulkner, R.R.: The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. American Sociological Review, 837–860 (1993)
Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos, Solitons and Fractals 20(1), 69–75 (2004)
Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 29–36. INSTICC Press (2009)
Wasserman, S., Faust, K.: Social network analysis: methods and applications. Cambridge University Press (1994)
Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–34 (2001)
Gloor, P.A., Zhao, Y.: Analyzing actors and their discussion topics by semantic social network analysis. In: Information Visualization (IV 2006), pp. 130–135 (2006)
Petersen, R.R., Wiil, U.K.: Hypertext structures for investigative teams. Accepted for the Proceedings of the Conference on Hypertext. ACM Press (2011)
O’Madadhain, J., Fisher, D., Smyth, P., White, S., Boey, Y.B.: Analysis and visualization of network data using JUNG. Journal of Statistical Software VV, 1–35 (2005)
Memon, N.: Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks. PhD thesis, Aalborg University, Denmark (2007)
Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proceedings of the National Academy of Sciences 99(12), 7821–7826 (2002)
Wiil, U.K., Gniadek, J., Memon, N.: Measuring link importance in terrorist networks. In: Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, Odense, Denmark, pp. 225–232. IEEE CS Press (August 2010)
Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Algorithms for drawing graphs: an annotated bibliography. Computational Geometry-Theory and Application 4(5), 235–282 (1994)
Wise, W.: Indonesia’s war on terror. United States-Indonesia Society, 1–107 (2005)
BBC News, The Bali bombing plot (2008), http://news.bbc.co.uk/2/hi/asia-pacific/3157478.stm
NWB Team, Network Workbench Tool. Indiana University, Northeastern University, and University of Michigan (2006), http://nwb.slis.indiana.edu
SocNetV (2011), http://socnetv.sourceforge.net
UCINET (2011), http://www.analytictech.com/ucinet
Brandes, U., Wagner, D.: Analysis and visualization of social networks. Graph Drawing Software, 321–340 (2003)
VisuaLyzer (2011), http://www.mdlogix.com/solutions
Batagelj, V., Mrvar, A.: Pajek – Program for large network analysis (2011), http://pajek.imfm.si
NetMiner (2011), http://www.netminer.com
i2 (2011), http://www.i2group.com
Rhodes, C.J.: Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, 127–140 (2009)
Wiil, U.K., Gniadek, J., Memon, N.: CrimeFighter Assistant: a knowledge management tool for terrorist network analysis. In: Proceedings of the International Conference on Knowledge Management and Information Sharing, pp. 15–24. INSTICC Press (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wiil, U.K., Gniadek, J., Memon, N., Petersen, R.R. (2013). Knowledge Management Tools for Terrorist Network Analysis. In: Fred, A., Dietz, J.L.G., Liu, K., Filipe, J. (eds) Knowledge Discovery, Knowledge Engineering and Knowledge Management. IC3K 2010. Communications in Computer and Information Science, vol 272. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29764-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-29764-9_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29763-2
Online ISBN: 978-3-642-29764-9
eBook Packages: Computer ScienceComputer Science (R0)