Automating social network analysis

a power tool for counter-terrorism

Leslie D. Ball

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

High-profile terrorist attacks in the new millennium have made counter-terrorism a priority for many governments. The abundance of open source intelligence available after the 9/11/2001 attack, for example, enabled a comprehensive analysis of that terrorist network. The opportunity, thus, is to collect valuable and cost-effective information during the pre-attack phase to aid in the prevention of such atrocities in the future. This article positions social network analysis as a key tool for this type of intelligence analysis, with emphasis on the automated extraction of data relevant to the structural organisation of its actors and the attributes of their relationships in the network by using data and text mining techniques on open sources. The processes outlined are viewed as a layer that could complement and help to populate a terrorist behavioural activity model such as where the recognition of pre-incident indicators are linked to the likelihood of terrorist events.
Original languageEnglish
Pages (from-to)147-168
Number of pages22
JournalSecurity Journal
Volume29
Issue number2
Early online date18 Feb 2013
DOIs
Publication statusPublished - Apr 2016

Fingerprint

Terrorism
Electric network analysis
network analysis
terrorism
social network
structural organization
Costs
intelligence
incident
event
costs
Violence
Counterterrorism
Open source
Attack
Social network analysis
Government
Data mining
Incidents
Terrorist attack

Cite this

Ball, Leslie D. / Automating social network analysis : a power tool for counter-terrorism. In: Security Journal. 2016 ; Vol. 29, No. 2. pp. 147-168.
@article{a773ed0013104c4cbb91b5053c738c7f,
title = "Automating social network analysis: a power tool for counter-terrorism",
abstract = "High-profile terrorist attacks in the new millennium have made counter-terrorism a priority for many governments. The abundance of open source intelligence available after the 9/11/2001 attack, for example, enabled a comprehensive analysis of that terrorist network. The opportunity, thus, is to collect valuable and cost-effective information during the pre-attack phase to aid in the prevention of such atrocities in the future. This article positions social network analysis as a key tool for this type of intelligence analysis, with emphasis on the automated extraction of data relevant to the structural organisation of its actors and the attributes of their relationships in the network by using data and text mining techniques on open sources. The processes outlined are viewed as a layer that could complement and help to populate a terrorist behavioural activity model such as where the recognition of pre-incident indicators are linked to the likelihood of terrorist events.",
author = "Ball, {Leslie D.}",
year = "2016",
month = "4",
doi = "10.1057/sj.2013.3",
language = "English",
volume = "29",
pages = "147--168",
journal = "Security Journal",
issn = "0955-1662",
publisher = "Palgrave Macmillan Ltd.",
number = "2",

}

Automating social network analysis : a power tool for counter-terrorism. / Ball, Leslie D.

In: Security Journal, Vol. 29, No. 2, 04.2016, p. 147-168.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Automating social network analysis

T2 - a power tool for counter-terrorism

AU - Ball, Leslie D.

PY - 2016/4

Y1 - 2016/4

N2 - High-profile terrorist attacks in the new millennium have made counter-terrorism a priority for many governments. The abundance of open source intelligence available after the 9/11/2001 attack, for example, enabled a comprehensive analysis of that terrorist network. The opportunity, thus, is to collect valuable and cost-effective information during the pre-attack phase to aid in the prevention of such atrocities in the future. This article positions social network analysis as a key tool for this type of intelligence analysis, with emphasis on the automated extraction of data relevant to the structural organisation of its actors and the attributes of their relationships in the network by using data and text mining techniques on open sources. The processes outlined are viewed as a layer that could complement and help to populate a terrorist behavioural activity model such as where the recognition of pre-incident indicators are linked to the likelihood of terrorist events.

AB - High-profile terrorist attacks in the new millennium have made counter-terrorism a priority for many governments. The abundance of open source intelligence available after the 9/11/2001 attack, for example, enabled a comprehensive analysis of that terrorist network. The opportunity, thus, is to collect valuable and cost-effective information during the pre-attack phase to aid in the prevention of such atrocities in the future. This article positions social network analysis as a key tool for this type of intelligence analysis, with emphasis on the automated extraction of data relevant to the structural organisation of its actors and the attributes of their relationships in the network by using data and text mining techniques on open sources. The processes outlined are viewed as a layer that could complement and help to populate a terrorist behavioural activity model such as where the recognition of pre-incident indicators are linked to the likelihood of terrorist events.

U2 - 10.1057/sj.2013.3

DO - 10.1057/sj.2013.3

M3 - Article

VL - 29

SP - 147

EP - 168

JO - Security Journal

JF - Security Journal

SN - 0955-1662

IS - 2

ER -