Skip to main content

Retracted: Exploring the Evolution of Terrorist Network

  • Chapter
  • First Online:
Counterterrorism and Open Source Intelligence

Part of the book series: Lecture Notes in Social Networks ((LNSN))

  • 2012 Accesses

Abstract

This paper discusses advancements and new trends in terrorist networks. We investigate a case regarding a recent terror plan that took place in Denmark and we present the analysis of the thwarted plot. Analyzing covert networks after an incident is practically easy for trial purposes. Mapping clandestine networks to thwarted terrorist activities is much more complicated. The network involved in the recent Danish terror plan is studied through publicly available information. Based on that information we mapped a part of the network centered on David Headley, who recently confessed to have planned a terrorist attack to take place on Danish soil. Despite its deficiencies, the map gives us an insight into new trends in terrorist organizations and people involved in terrorist plots.

An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-7091-0388-3_23

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sami, A.: Story of David Headley-suspect of planning attacks on Danish newspaper. International The News, November 22, 2009 available online at http://www.thenews.com.pk/updates.asp?id=91981

  2. An article published in a comprehensive Punjabi journal “Wichar”. http://www.wichaar.com/news/286/ARTICLE/17345/2009-11-20.html

  3. An article published in Deccan Herald. http://www.deccanherald.com/content/40626/lashkar-e-taibas-us-connection.html

  4. Barlow, M., Galloway, J., Abbass. H.: Mining evolution through visualization. In Proceedings of Workshop on Beyond Fitness: Visualization Evolution at the 8th International Conference on the Simulation and Synthesis of Living System. (2002) http://www.alife.org/alife8/workshops/15.pdf

  5. Clauset, M.E.J. Newman, Moore, C.: Finding community structure in very large networks. Physical Review E, 70:066111, 2004. http://pre.aps.org/pdf/PRE/v70/i6/e066111

  6. Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: “Crime Data Mining: A General Framework and Some Examples,” Computer, vol. 37, no. 4, pp. 50–56, Apr. 2004, doi:10.1109/MC.2004.1297301

    Article  Google Scholar 

  7. DeRosa M.: Data Mining and Data Analysis for Counterterrorism, CSIS Report. (2004)

    Google Scholar 

  8. Fershtman, M.: Cohesive group detection in a social network by the segregation, Social Networks 19, 193–207 (1997)

    Article  Google Scholar 

  9. Granovetter, M.: The Strength of Weak Ties. Am. J. Sociol. 81, 1287–1303 (1973)

    Article  Google Scholar 

  10. Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Collins, R.(ed.) Sociological Theory, pp. 105–130 (1982)

    Google Scholar 

  11. Krebs, V.E.: Mapping network of terrorist cells. Connections 24(3): 43–52 (2202)

    Google Scholar 

  12. Memon, N., Larsen H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. In: The proceedings of ARES 2006: The First International Conference on Availability, Reliability and Security, Vienna, Austria, IEEE Computer Society, pp. 906–913 (2006)

    Google Scholar 

  13. Memon, N., Larsen, H.L.: Practical algorithms of destabilizing terrorist networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Vol. 3976: pp. 398–411. Springer, Berlin (2006)

    Google Scholar 

  14. Memon, N., Larsen, H.L.: Detecting Terrorist Activity Patterns using Investigative Data Mining Tool. International Journal of Knowledge and System Sciences, 3(1), 43–52 (2006)

    Google Scholar 

  15. Memon, N., Qureshi, A.R.: Destabilizing terrorist networks. In WSEAS Transactions on Computers. 11(4), 1649–1656 (2005)

    Google Scholar 

  16. Memon, N.: Investigative data mining: Mathematical models for analyzing, visualizing and destabilizing Terrorist Networks. PhD Dissertation, Aalborg University, Denmark. (2007)

    Google Scholar 

  17. Memon, N., Hicks D., Larsen H.L.: Harvesting Terrorist Information from Web. In proc. International Conference on Information Visualization (IV 2007), Zurich, Switzerland, July 4–6, 2007, pp. 664–671 (2007)

    Google Scholar 

  18. Memon, N., Hicks D., Larsen H.L.: How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. Advanced Data Mining and Applications. Lecture Notes in Computer Science, 2007, vol. 4632/2007, pp. 430–441 (2007). DOI: 10.1007/978-3-540-73871-8-40

    Google Scholar 

  19. Monge, P.R., Contractor, N.: Theories of Communication Networks. Oxford University Press, New York (2003)

    Google Scholar 

  20. Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Proceedings of International Conference on Availability, Reliability, and Security 2007, Vienna, Austria, March 10–13, 2007 (2007)

    Google Scholar 

  21. Taskar B., Abbeel, P., Wong, M.-F., Koller, D.: Label and link prediction. In relational data. In: IJCAI Workshop on Learning Statistical Models from Relational Data. (2003) http://kdl.cs.umass.edu/srl2003_upload/files/taskar-paper.pdf

  22. Q&A with Professor Karen Stephenson, April 18, 2006 http://www.elearningpost.com/articles/archives/qa_with_professor_karen_stephenson/

  23. U.S. Department of Justice Press Release, January 14, 2010 available at http://www.justice.gov/opa/pr/2010/January/10-nsd-038.html

  24. Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48, 6 (June 2005), 100–107 2005 DOI=10.1145/1064830.1064834 http://doi.acm.org/10.1145/1064830.1064834

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nasrullah Memon .

Editor information

Editors and Affiliations

Copyright information

© 2011 Springer-Verlag/Wien

About this chapter

Cite this chapter

Memon, N., Wiil, U.K., Qureshi, P.A.R., Karampelas, P. (2011). Retracted: Exploring the Evolution of Terrorist Network. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0388-3_20

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0387-6

  • Online ISBN: 978-3-7091-0388-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics