Corpus ID: 157231391

Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research

@article{Ressler2006SocialNA,
  title={Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research},
  author={Stephen J. Ressler},
  journal={Homeland Security Affairs},
  year={2006},
  volume={2}
}
IntroductionThe greatest security threat facing the United States is not from formal states, but from terrorist organizations that attack informally, using terror at any time and place, with the goal of undermining confidence in U.S. institutions and the American way of life. No longer a structured battle that can be fought with military power, the war against terrorism will be won with superior knowledge.Due to the changing nature of homeland security issues, a new type of intelligence is… Expand
Social Network Analysis: A case study of the Islamist terrorist network
TLDR
The Islamist terrorist network structure is found to be a resilient and efficient structure, even with important social nodes removed, and implications for counterterrorism are given from the results of each analysis. Expand
Social Network Analysis: A Methodology for Studying Terrorism
This chapter aims to bring to the reader an overview of the work done since the 9/11 terrorist attack, in the field of Social Network Analysis as a tool for understanding the underlying patternExpand
Automating social network analysis: A power tool for counter-terrorism
TLDR
Social network analysis is positioned as a layer that could complement and help to populate a terrorist behavioural activity model such as where the recognition of pre-incident indicators are linked to the likelihood of terrorist events. Expand
How Terrorist Groups Survive: A Dynamic Network Analysis Approach to the Resilience of Terrorist Organizations
Abstract : The purpose of this paper is to explore the question of how modern terrorist groups manage to survive in the face of aggressive counterterrorist operations by security forces. Al Qa'idaExpand
Identifying individuals associated with organized criminal networks: A social network analysis
TLDR
This paper presents a methodology based on the mathematical notion of Identifying Codes, which ensures reduction in resources on the part of law enforcement authorities, without compromising the ability to uniquely identify a suspect, when they become “active” in drug/terror related activities. Expand
Social Network Analysis to Combat Terrorism: 2015 Paris Attacks
TLDR
A series of attacks shook Paris in the year 2015 and an in-depth analysis of the attacks brought forward interesting facts such as who were the most important person(s) in the network and removing which person(S) would cripple the network. Expand
Analyzing Various Social Networking Approaches for Covert Networks
The world we live in is a complex socio-technical system and systematically thinking about, representing, modeling and analyzing these systems has been made possible by social network analysisExpand
A Survey on Social Network Analysis for Counter- Terrorism
TLDR
The study reviewed various SNA measures for predicting the key players/ main actors of terrorist network in terms of global as well as Indian perspective and demonstrated the applicability and feasibility for online and offline social networks. Expand
TOWARDS THE INVESTIGATION OF USING SOCIAL NETWORK ANALYSIS FOR COUNTER TERRORISM IN WEST AFRICA: CASE STUDY OF BOKO HARAM IN NIGERIA
In this paper, an investigative review of social network analysis (SNA) to counter terrorism is presented. Various measures used for predicting key players of terrorist networks are discussed. TheExpand
Covert or Convenient? Evolution of Terror Attack Networks
The concept of networks has become synonymous with terrorism in recent years. Despite the abundance of material engaging the concept of terrorist networks, there is a paucity of research that appliesExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 35 REFERENCES
Terrorists / Liberators : Researching and dealing with adversary social networks 1
We first describe the recent evolution in the definition of the term “terrorism” following the 11 September 2001 attacks. We presented two specific types of “link analysis” methods used to analyzeExpand
Destabilizing Terrorist Networks
TLDR
Analysis reveals that trying to destabilize a cellular distributed network using tactics designed for hierarchies is likely to be ineffective and a set of tools and an approach to assessing destabilization strategies in a decision context that takes these difficulties in to account and provides analysts with guidance in assessing alternative destabilization tactics is needed. Expand
From Whole Cloth : Making up the terrorist network
Little firm information exists about the global terrorist network, and the type of data used by network analysts—testimony of participants—is not available. Relying on newspaper and other mediaExpand
Practical Issues and Algorithms for Analyzing Terrorist Networks 1
TLDR
In social network analysis, graphs are used to model relationships between actors or participants in a social setting and to assess the roles or importance of the individual players. Expand
Estimating Vulnerabilities in Large Covert Networks
TLDR
An approach to estimating vulnerabilities and the impact of eliminating those vulnerabilities in covert networks is presented and is illustrated by contrasting the differential predictions for al-Qaida and Hamas as the top leaders are removed. Expand
The Development of Social Network Analysis: A Study in the Sociology of Science
There is plenty of evidence to suggest that social network analysis is a flourishing enterprise. Social network analysts have their own international organization, the International Network forExpand
What is Preventing Homeland Security
"I don't think you can win [the war on terror]."- George W. Bush"He was talking about winning it in the conventional sense ... about how this is a different kind of war and we face an unconventionalExpand
Mapping Networks of Terrorist Cells
TLDR
The network surrounding the tragic events of September 11th, 2001 is examined, and through public data, a portion of the network centered around the 19 dead hijackers is mapped. Expand
BioWar: A City-Scale Multi-Agent Network Model of Weaponized Biological Attacks
Abstract : BioWar is scalable city-wide simulation, capable of simultaneously simulating the impact of background diseases, natural outbreaks and bioterrorism attacks on the population s behaviorExpand
Estimating the Shape of Covert Networks
TLDR
The paper illustrates that if the model is built with careful consideration towards the network being predicted, it may assist in making better decisions regarding uncertain organizational phenomenon, and opens up new avenues in the development of models designed to make network predictions and use those predictions to make better decisions. Expand
...
1
2
3
4
...