Automating social network analysis: a power tool for counter-terrorism

Leslie D. Ball

    Research output: Contribution to journalArticlepeer-review

    12 Citations (Scopus)

    Abstract

    High-profile terrorist attacks in the new millennium have made counter-terrorism a priority for many governments. The abundance of open source intelligence available after the 9/11/2001 attack, for example, enabled a comprehensive analysis of that terrorist network. The opportunity, thus, is to collect valuable and cost-effective information during the pre-attack phase to aid in the prevention of such atrocities in the future. This article positions social network analysis as a key tool for this type of intelligence analysis, with emphasis on the automated extraction of data relevant to the structural organisation of its actors and the attributes of their relationships in the network by using data and text mining techniques on open sources. The processes outlined are viewed as a layer that could complement and help to populate a terrorist behavioural activity model such as where the recognition of pre-incident indicators are linked to the likelihood of terrorist events.
    Original languageEnglish
    Pages (from-to)147-168
    Number of pages22
    JournalSecurity Journal
    Volume29
    Issue number2
    Early online date18 Feb 2013
    DOIs
    Publication statusPublished - Apr 2016

    Keywords

    • Social network analysis
    • Data mining
    • Text mining
    • Intelligence analysis
    • Open source intelligence

    Fingerprint

    Dive into the research topics of 'Automating social network analysis: a power tool for counter-terrorism'. Together they form a unique fingerprint.

    Cite this