Abstract
Modeling and analyzing criminal and terrorists networks is a challenging problem that has attracted considerable attention in the academia, industry and government institutions, especially intelligence services. Criminals try to keep their communications and interactions uncovered as much as possible in order not to be discovered and resolved. Their success is our society failure and vice versa. Hence, it is essential to thoroughly study such networks to investigate their details. However, incompleteness of criminal networks is one of the main problems facing investigators, due to missing links in the network; and social network methods could be effectively used to analyze and hopefully prevent, avoid or stop criminal activities. Social network analysis can be applied to criminal networks in order to elaborate on good strategies to prosecute or prevent criminal activities. Having all this in mind, our research provides a method to identify hidden links between nodes in a network using the current information available to investigators. The method presented generates networks that represent all the possible hidden links, and the links of these generated networks represent the number of times the two entities are indirectly connected in each relationship type. The method was tested on multiple small terrorism data sets and the results demonstrate that the proposed method is capable of finding interesting hidden links. This is a valuable technique in criminal network analysis, because it can assist investigators in finding hidden links in the network and reduce the amount of missing data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
We will interchangeably use criminal and terrorist networks, though the two are different and have different targets, but the same analysis applies to both networks.
References
Baker, W., Faulkner, R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58(6), 837–860 (1993)
Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W.: Discovering hidden groups in communication networks. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 3073, pp. 378–389. Springer, Berlin/Heidelberg (2004)
Farely, D.: Breaking al qaeda cells: A mathematical analysis of counterterrorism operations. Stud. Confl. Terrorism 26(6), 399–411 (2003)
Dawoud, K., Alhajj, R., Rokne, J.: A global measure for estimating the degree of organization of terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 421–427. 9–11 Aug 2010
Krebs, V.: Mapping networks of terrorist cells. Connections 24, 43–52 (2002)
Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69–75 (2004)
Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58(7), 1019–1031 (2007)
Shaikh, M., Wang, J.: Discovering hierarchical structure in terrorist networks. In: Proceedings of the International Conference on Emerging Technologies, pp. 238–244. (2006)
Magdon-Ismail, M., Goldberg, M., Wallace, W., Siebecker, D.: Locating hidden groups in communication networks using hidden markov models. In: Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol.2665, pp.958. Springer, Berlin/Heidelberg (2010)
Memon, N., Wiil, U., Qureshi, A.: Design and development of an early warning system to prevent terrorist attacks. In: Proceedings of the International Conference on Artificial Intelligence and Neural Networks, pp. 222–226. (2009)
Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3), 53–65 (2001)
Qin, J., Xu, J., Hu, D., Sageman, M., Chen, H.: Analyzing terrorist networks: A case study of the global salafi jihad network. pp. 287–304 (2005)
Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60(10), 1373–1383 (2009)
Strogatz, S.: Exploring complex networks. Nature 6825(410), 268–276 (2002)
Sparrow, M.: The application of network analysis to criminal intelligence: An assessment of the prospects. Soc. Networks 13(3), 251–274 (1991)
Tsvetovat, M., Carley, K.: Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. J. Soc. Struct. 6(2) (2005)
Xu, J., Chen, H.: Crimenet explorer: A framework for criminal network knowledge discovery. CM Trans. Inform. Syst. 23(2), 201–226 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag/Wien
About this chapter
Cite this chapter
Chen, A., Gao, S., Karampelas, P., Alhajj, R., Rokne, J. (2011). Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0388-3_8
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0387-6
Online ISBN: 978-3-7091-0388-3
eBook Packages: Computer ScienceComputer Science (R0)