Abstract
This paper discusses advancements and new trends in terrorist networks. We investigate a case regarding a recent terror plan that took place in Denmark and we present the analysis of the thwarted plot. Analyzing covert networks after an incident is practically easy for trial purposes. Mapping clandestine networks to thwarted terrorist activities is much more complicated. The network involved in the recent Danish terror plan is studied through publicly available information. Based on that information we mapped a part of the network centered on David Headley, who recently confessed to have planned a terrorist attack to take place on Danish soil. Despite its deficiencies, the map gives us an insight into new trends in terrorist organizations and people involved in terrorist plots.
An erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-7091-0388-3_23
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sami, A.: Story of David Headley-suspect of planning attacks on Danish newspaper. International The News, November 22, 2009 available online at http://www.thenews.com.pk/updates.asp?id=91981
An article published in a comprehensive Punjabi journal “Wichar”. http://www.wichaar.com/news/286/ARTICLE/17345/2009-11-20.html
An article published in Deccan Herald. http://www.deccanherald.com/content/40626/lashkar-e-taibas-us-connection.html
Barlow, M., Galloway, J., Abbass. H.: Mining evolution through visualization. In Proceedings of Workshop on Beyond Fitness: Visualization Evolution at the 8th International Conference on the Simulation and Synthesis of Living System. (2002) http://www.alife.org/alife8/workshops/15.pdf
Clauset, M.E.J. Newman, Moore, C.: Finding community structure in very large networks. Physical Review E, 70:066111, 2004. http://pre.aps.org/pdf/PRE/v70/i6/e066111
Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: “Crime Data Mining: A General Framework and Some Examples,” Computer, vol. 37, no. 4, pp. 50–56, Apr. 2004, doi:10.1109/MC.2004.1297301
DeRosa M.: Data Mining and Data Analysis for Counterterrorism, CSIS Report. (2004)
Fershtman, M.: Cohesive group detection in a social network by the segregation, Social Networks 19, 193–207 (1997)
Granovetter, M.: The Strength of Weak Ties. Am. J. Sociol. 81, 1287–1303 (1973)
Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Collins, R.(ed.) Sociological Theory, pp. 105–130 (1982)
Krebs, V.E.: Mapping network of terrorist cells. Connections 24(3): 43–52 (2202)
Memon, N., Larsen H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. In: The proceedings of ARES 2006: The First International Conference on Availability, Reliability and Security, Vienna, Austria, IEEE Computer Society, pp. 906–913 (2006)
Memon, N., Larsen, H.L.: Practical algorithms of destabilizing terrorist networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Vol. 3976: pp. 398–411. Springer, Berlin (2006)
Memon, N., Larsen, H.L.: Detecting Terrorist Activity Patterns using Investigative Data Mining Tool. International Journal of Knowledge and System Sciences, 3(1), 43–52 (2006)
Memon, N., Qureshi, A.R.: Destabilizing terrorist networks. In WSEAS Transactions on Computers. 11(4), 1649–1656 (2005)
Memon, N.: Investigative data mining: Mathematical models for analyzing, visualizing and destabilizing Terrorist Networks. PhD Dissertation, Aalborg University, Denmark. (2007)
Memon, N., Hicks D., Larsen H.L.: Harvesting Terrorist Information from Web. In proc. International Conference on Information Visualization (IV 2007), Zurich, Switzerland, July 4–6, 2007, pp. 664–671 (2007)
Memon, N., Hicks D., Larsen H.L.: How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. Advanced Data Mining and Applications. Lecture Notes in Computer Science, 2007, vol. 4632/2007, pp. 430–441 (2007). DOI: 10.1007/978-3-540-73871-8-40
Monge, P.R., Contractor, N.: Theories of Communication Networks. Oxford University Press, New York (2003)
Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Proceedings of International Conference on Availability, Reliability, and Security 2007, Vienna, Austria, March 10–13, 2007 (2007)
Taskar B., Abbeel, P., Wong, M.-F., Koller, D.: Label and link prediction. In relational data. In: IJCAI Workshop on Learning Statistical Models from Relational Data. (2003) http://kdl.cs.umass.edu/srl2003_upload/files/taskar-paper.pdf
Q&A with Professor Karen Stephenson, April 18, 2006 http://www.elearningpost.com/articles/archives/qa_with_professor_karen_stephenson/
U.S. Department of Justice Press Release, January 14, 2010 available at http://www.justice.gov/opa/pr/2010/January/10-nsd-038.html
Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48, 6 (June 2005), 100–107 2005 DOI=10.1145/1064830.1064834 http://doi.acm.org/10.1145/1064830.1064834
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2011 Springer-Verlag/Wien
About this chapter
Cite this chapter
Memon, N., Wiil, U.K., Qureshi, P.A.R., Karampelas, P. (2011). Retracted: Exploring the Evolution of Terrorist Network. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0388-3_20
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0387-6
Online ISBN: 978-3-7091-0388-3
eBook Packages: Computer ScienceComputer Science (R0)