Ranking Terrorists in Networks

A Sensitivity Analysis of Al Qaeda’s 9/11 Attack

B.G.M. Husslage, P.E.M. Borm, T. Burg, H.J.M. Hamers, R. Lindelauf

Research output: Working paperDiscussion paperOther research output

1366 Downloads (Pure)

Abstract

All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals. Unfortunately, it is nearly impossible to keep track of all individuals in the resulting complex network. Therefore, Lindelauf et al. (2013) introduced a methodology that ranks terrorists in a network. The rankings that result from this methodology can be used as a decision support system to efficiently allocate the scarce surveillance means of intelligence agencies. Moreover, usage of these rankings can improve the quality of surveillance which can in turn lead to prevention of attacks or destabilization of the networks under surveillance.
The methodology introduced by Lindelauf et al. (2013) is based on a game theoretic centrality measure, which is innovative in the sense that it takes into account not only the structure of the network but also individual and coalitional characteristics of the members of the network. In this paper we elaborate on this methodology by introducing a new game theoretic centrality measure that better takes into account the operational strength of connected subnetworks.
Moreover, we perform a sensitivity analysis on the rankings derived from this new centrality measure for the case of Al Qaeda’s 9/11 attack. In this sensitivity analysis we consider firstly the possible additional information available about members of the network, secondly, variations in relational strength and, finally, the absence or presence of a small percentage of links in the network. We also introduce a case specific method to compare the different rankings that result from the sensitivity analysis and show that the new centrality measure is robust to small changes in the data.
Original languageEnglish
Place of PublicationTilburg
PublisherOperations research
Number of pages12
Volume2014-028
Publication statusPublished - 16 Apr 2014

Publication series

NameCentER Discussion Paper
Volume2014-028

Fingerprint

Sensitivity analysis
Complex networks
Decision support systems

Keywords

  • terrorism
  • Network Analysis
  • Centrality measures
  • Cooperative game theory

Cite this

Husslage, B. G. M., Borm, P. E. M., Burg, T., Hamers, H. J. M., & Lindelauf, R. (2014). Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack. (CentER Discussion Paper; Vol. 2014-028). Tilburg: Operations research.
Husslage, B.G.M. ; Borm, P.E.M. ; Burg, T. ; Hamers, H.J.M. ; Lindelauf, R. / Ranking Terrorists in Networks : A Sensitivity Analysis of Al Qaeda’s 9/11 Attack. Tilburg : Operations research, 2014. (CentER Discussion Paper).
@techreport{191548ed34ba4abaabbf948ce9088809,
title = "Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack",
abstract = "All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals. Unfortunately, it is nearly impossible to keep track of all individuals in the resulting complex network. Therefore, Lindelauf et al. (2013) introduced a methodology that ranks terrorists in a network. The rankings that result from this methodology can be used as a decision support system to efficiently allocate the scarce surveillance means of intelligence agencies. Moreover, usage of these rankings can improve the quality of surveillance which can in turn lead to prevention of attacks or destabilization of the networks under surveillance.The methodology introduced by Lindelauf et al. (2013) is based on a game theoretic centrality measure, which is innovative in the sense that it takes into account not only the structure of the network but also individual and coalitional characteristics of the members of the network. In this paper we elaborate on this methodology by introducing a new game theoretic centrality measure that better takes into account the operational strength of connected subnetworks.Moreover, we perform a sensitivity analysis on the rankings derived from this new centrality measure for the case of Al Qaeda’s 9/11 attack. In this sensitivity analysis we consider firstly the possible additional information available about members of the network, secondly, variations in relational strength and, finally, the absence or presence of a small percentage of links in the network. We also introduce a case specific method to compare the different rankings that result from the sensitivity analysis and show that the new centrality measure is robust to small changes in the data.",
keywords = "terrorism, Network Analysis, Centrality measures, Cooperative game theory",
author = "B.G.M. Husslage and P.E.M. Borm and T. Burg and H.J.M. Hamers and R. Lindelauf",
year = "2014",
month = "4",
day = "16",
language = "English",
volume = "2014-028",
series = "CentER Discussion Paper",
publisher = "Operations research",
type = "WorkingPaper",
institution = "Operations research",

}

Husslage, BGM, Borm, PEM, Burg, T, Hamers, HJM & Lindelauf, R 2014 'Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack' CentER Discussion Paper, vol. 2014-028, Operations research, Tilburg.

Ranking Terrorists in Networks : A Sensitivity Analysis of Al Qaeda’s 9/11 Attack. / Husslage, B.G.M.; Borm, P.E.M.; Burg, T.; Hamers, H.J.M.; Lindelauf, R.

Tilburg : Operations research, 2014. (CentER Discussion Paper; Vol. 2014-028).

Research output: Working paperDiscussion paperOther research output

TY - UNPB

T1 - Ranking Terrorists in Networks

T2 - A Sensitivity Analysis of Al Qaeda’s 9/11 Attack

AU - Husslage, B.G.M.

AU - Borm, P.E.M.

AU - Burg, T.

AU - Hamers, H.J.M.

AU - Lindelauf, R.

PY - 2014/4/16

Y1 - 2014/4/16

N2 - All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals. Unfortunately, it is nearly impossible to keep track of all individuals in the resulting complex network. Therefore, Lindelauf et al. (2013) introduced a methodology that ranks terrorists in a network. The rankings that result from this methodology can be used as a decision support system to efficiently allocate the scarce surveillance means of intelligence agencies. Moreover, usage of these rankings can improve the quality of surveillance which can in turn lead to prevention of attacks or destabilization of the networks under surveillance.The methodology introduced by Lindelauf et al. (2013) is based on a game theoretic centrality measure, which is innovative in the sense that it takes into account not only the structure of the network but also individual and coalitional characteristics of the members of the network. In this paper we elaborate on this methodology by introducing a new game theoretic centrality measure that better takes into account the operational strength of connected subnetworks.Moreover, we perform a sensitivity analysis on the rankings derived from this new centrality measure for the case of Al Qaeda’s 9/11 attack. In this sensitivity analysis we consider firstly the possible additional information available about members of the network, secondly, variations in relational strength and, finally, the absence or presence of a small percentage of links in the network. We also introduce a case specific method to compare the different rankings that result from the sensitivity analysis and show that the new centrality measure is robust to small changes in the data.

AB - All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals. Unfortunately, it is nearly impossible to keep track of all individuals in the resulting complex network. Therefore, Lindelauf et al. (2013) introduced a methodology that ranks terrorists in a network. The rankings that result from this methodology can be used as a decision support system to efficiently allocate the scarce surveillance means of intelligence agencies. Moreover, usage of these rankings can improve the quality of surveillance which can in turn lead to prevention of attacks or destabilization of the networks under surveillance.The methodology introduced by Lindelauf et al. (2013) is based on a game theoretic centrality measure, which is innovative in the sense that it takes into account not only the structure of the network but also individual and coalitional characteristics of the members of the network. In this paper we elaborate on this methodology by introducing a new game theoretic centrality measure that better takes into account the operational strength of connected subnetworks.Moreover, we perform a sensitivity analysis on the rankings derived from this new centrality measure for the case of Al Qaeda’s 9/11 attack. In this sensitivity analysis we consider firstly the possible additional information available about members of the network, secondly, variations in relational strength and, finally, the absence or presence of a small percentage of links in the network. We also introduce a case specific method to compare the different rankings that result from the sensitivity analysis and show that the new centrality measure is robust to small changes in the data.

KW - terrorism

KW - Network Analysis

KW - Centrality measures

KW - Cooperative game theory

M3 - Discussion paper

VL - 2014-028

T3 - CentER Discussion Paper

BT - Ranking Terrorists in Networks

PB - Operations research

CY - Tilburg

ER -

Husslage BGM, Borm PEM, Burg T, Hamers HJM, Lindelauf R. Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack. Tilburg: Operations research. 2014 Apr 16. (CentER Discussion Paper).