Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Understanding the structure of terrorist networks
International Journal of Business Intelligence and Data Mining
Harvesting covert networks: a case study of the iMiner database
International Journal of Networking and Virtual Organisations
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
STONE: shaping terrorist organizational network efficiency
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Hi-index | 0.00 |
This paper uses centrality measures from complex networks to discuss how to destabilize terrorist networks. We propose newly introduced algorithms for constructing hierarchy of covert networks, so that investigators can view the structure of terrorist networks / non-hierarchical organizations, in order to destabilize the adversaries. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also propose two new centrality measures i.e., position role index (which discovers various positions in the network, for example, leaders / gatekeepers and followers) and dependence centrality (which determines who is depending on whom in a network). The dependence centrality has a number of advantages including that this measure can assist law enforcement agencies in capturing / eradicating of node (terrorist) which may disrupt the maximum of the network.