CRIMEFIGHTER ASSISTANT - A Knowledge Management Tool for Terrorist Network Analysis

Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon

Abstract

A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks (consisting of nodes and links) need to be analyzed and visualized in order to gain a deeper knowledge and understanding that enables network destabilization. Previous research on terrorist network analysis has to a large degree focused on analysis of nodes. This paper presents the CrimeFighter Assistant, a novel knowledge management tool for terrorist network analysis. CrimeFighter Assistant treats links as first class objects and provides a better balance between network, node, and link analysis.

References

  1. Baccara, M., and Bar-Isaac, H. 2009. Interrogation methods and terror networks. Mathematical Methods in Counterterrorism, pp. 271-290. Springer.
  2. Batagelj, V., and Mrvar, A. 2010. Pajek - Program for large network analysis. http://pajek.imfm.si.
  3. Baker, W. E., and Faulkner, R. R. 1993. The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. American Sociological Review, 837-860.
  4. BBC News. 2008. The Bali bombing plot. http://news.bbc.co.uk/2/hi/asia-pacific/3157478.stm.
  5. Brandes, U., and Wagner, D. 2003. Analysis and visualization of social networks. Graph Drawing Software, pages 321-340.
  6. Carley, K. M., Lee, J. S., and Krackhardt, D. 2001. Destabilizing networks. Connections, 24(3):31-34.
  7. Di Battista, G., Eades, P., Tamassia, R., and Tollis. I. G. 1994. Algorithms for drawing graphs: an annotated bibliography. Computational Geometry-Theory and Application, 4(5):235-282.
  8. Enders, W., and Su, X. 2007. Rational terrorists and optimal network structure. Journal of Conflict Resolution, 51(1):33.
  9. Girvan, M., and Newman, M. E. J. 2002. Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99(12):7821-7826.
  10. Gloor, P. A., and Zhao, Y. 2006. Analyzing actors and their discussion topics by semantic social network analysis. Information Visualization (IV 2006), pp. 130-135.
  11. i2. 2010. http://www.i2group.com/template1.asp?id=5.
  12. Latora, V., and Marchiori, M. 2004. How the science of complex networks can help developing strategies against terrorism. Chaos, Solitons and Fractals, 20(1):69-75.
  13. Lindelauf, R., Borm, P., and Hamers, H. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks, 31, 126-137. Elsevier.
  14. Memon, N. 2007. Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks. PhD thesis, Aalborg University, Denmark.
  15. NetMiner. 2010. http://www.netminer.com.
  16. NWB Team. 2006. Network Workbench Tool. Indiana University, Northeastern University, and University of Michigan, http://nwb.slis.indiana.edu.
  17. O'Madadhain, J., Fisher, D., Smyth, P., White, S., and Boey, Y. B. 2005. Analysis and visualization of network data using JUNG. Journal of Statistical Software, VV:1-35.
  18. Rhodes, C. J. 2009. Inference approaches to constructing covert social network topologies. Mathematical Methods in Counterterrorism, pp. 127-140. Springer.
  19. SocNetV. 2010. http://socnetv.sourceforge.net.
  20. UCINET. 2010. http://www.analytictech.com/ucinet.
  21. VisuaLyzer. 2010. http://www.mdlogix.com/solutions.
  22. Wasserman, S., and Faust, K. 1994. Social network analysis: methods and applications. Cambridge University Press.
  23. Wiil, U. K., Gniadek, J., and Memon, N. 2010. Measuring link importance in terrorist networks. Accepted for the International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2010), (Odense, Denmark, August). IEEE Computer Society Press.
  24. Wiil, U. K., Memon, N., and Gniadek, J. 2009. Knowledge management processes, tools and techniques for counterterrorism. Proceedings of the International Conference on Knowledge Management and Information Sharing (KMIS 2009), (Funchal, Portugal, October), pp. 29-36. INSTICC Press.
  25. Wise, W. 2005. Indonesia's war on terror. United StatesIndonesia Society, pp. 1-107.
Download


Paper Citation


in Harvard Style

Kock Wiil U., Gniadek J. and Memon N. (2010). CRIMEFIGHTER ASSISTANT - A Knowledge Management Tool for Terrorist Network Analysis . In Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2010) ISBN 978-989-8425-30-0, pages 15-24. DOI: 10.5220/0003091500150024


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2010)
TI - CRIMEFIGHTER ASSISTANT - A Knowledge Management Tool for Terrorist Network Analysis
SN - 978-989-8425-30-0
AU - Kock Wiil U.
AU - Gniadek J.
AU - Memon N.
PY - 2010
SP - 15
EP - 24
DO - 10.5220/0003091500150024


in Bibtex Style

@conference{kmis10,
author={Uffe Kock Wiil and Jolanta Gniadek and Nasrullah Memon},
title={CRIMEFIGHTER ASSISTANT - A Knowledge Management Tool for Terrorist Network Analysis},
booktitle={Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2010)},
year={2010},
pages={15-24},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003091500150024},
isbn={978-989-8425-30-0},
}