Determining Critical Members of Layered Operational Terrorist Networks

被引:9
|
作者
Geffre, Jennifer L. [1 ]
Deckro, Richard F. [1 ]
Knighton, Shane A. [1 ]
机构
[1] Air Force Inst Technol, ENS, Dept Operat Sci, FOIL, Bldg 641,2950 Hobson Way, Wright Patterson AFB, OH 45433 USA
关键词
social network; event tree; terrorism;
D O I
10.1177/1548512909348383
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This study provides a quantitative method for destabilizing clandestine network operations, by determining which critical members to remove or influence in order to impact operations. The quantitative value of criticality is established by three measures: (1) the members' social connectedness across multi-layered affiliations, (2) their involvement in operations, and (3) their emergence during periods and at locations of interest. Various techniques, including centrality, risk analysis, system reliability, and decision analysis, are incorporated to determine a member's criticality to the group's operations. The advantage of synergistically leveraging the social, operational, and temporal local criticality of group members allows for the maximum disruption of the group's structure and operations, thus diminishing its effectiveness.
引用
收藏
页码:97 / 109
页数:13
相关论文
共 50 条
  • [1] Comparing operational terrorist networks
    Matteo Gregori
    Ugo Merlone
    Trends in Organized Crime, 2020, 23 : 263 - 288
  • [2] Comparing operational terrorist networks
    Gregori, Matteo
    Merlone, Ugo
    TRENDS IN ORGANIZED CRIME, 2020, 23 (03) : 263 - 288
  • [3] Critical Terrorist Organizations and Terrorist Organization Alliance Networks Based on Key Nodes Founding
    Hu, Jun
    Chu, Chengbin
    Xu, Ling
    Wu, Peng
    Lia, Hui-jia
    FRONTIERS IN PHYSICS, 2021, 9
  • [4] Multi-modal Networks Reveal Patterns of Operational Similarity of Terrorist Organizations
    Campedelli, Gian Maria
    Cruickshank, Iain
    Carley, Kathleen M.
    TERRORISM AND POLITICAL VIOLENCE, 2023, 35 (05) : 1065 - 1084
  • [5] Network structure mining: Locating and isolating core members in covert terrorist networks
    State Key Laboratory of Intelligent Technology and Systems, Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    WSEAS Trans. Inf. Sci. Appl., 2008, 6 (1011-1020):
  • [6] THE USE OF NEURAL NETWORKS IN DETERMINING OPERATIONAL POLICIES FOR MANUFACTURING SYSTEMS
    CHRYSSOLOURIS, G
    LEE, M
    DOMROESE, M
    JOURNAL OF MANUFACTURING SYSTEMS, 1991, 10 (02) : 166 - 175
  • [7] Layered Defense: Modeling Terrorist Transfer Threat Networks and Optimizing Network Risk Reduction
    Taquechel, Eric
    IEEE NETWORK, 2010, 24 (06): : 30 - 35
  • [8] Terrorist Networks as Social Networks
    Stanculescu, Diana
    INNOVATIVE MODELS TO REVIVE THE GLOBAL ECONOMY, 2020, : 917 - 925
  • [9] The complexity of terrorist networks
    Fellman P.V.
    International Journal of Networking and Virtual Organisations, 2011, 8 (1-2) : 4 - 14
  • [10] Destabilization of terrorist networks
    Eiselt, H. A.
    CHAOS SOLITONS & FRACTALS, 2018, 108 : 111 - 118