Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack

B.G.M. Husslage, P.E.M. Borm, T. Burg, H.J.M. Hamers, R. Lindelauf

Research output: Working paperDiscussion paperOther research output

1368 Downloads (Pure)

Abstract

All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals. Unfortunately, it is nearly impossible to keep track of all individuals in the resulting complex network. Therefore, Lindelauf et al. (2013) introduced a methodology that ranks terrorists in a network. The rankings that result from this methodology can be used as a decision support system to efficiently allocate the scarce surveillance means of intelligence agencies. Moreover, usage of these rankings can improve the quality of surveillance which can in turn lead to prevention of attacks or destabilization of the networks under surveillance.
The methodology introduced by Lindelauf et al. (2013) is based on a game theoretic centrality measure, which is innovative in the sense that it takes into account not only the structure of the network but also individual and coalitional characteristics of the members of the network. In this paper we elaborate on this methodology by introducing a new game theoretic centrality measure that better takes into account the operational strength of connected subnetworks.
Moreover, we perform a sensitivity analysis on the rankings derived from this new centrality measure for the case of Al Qaeda’s 9/11 attack. In this sensitivity analysis we consider firstly the possible additional information available about members of the network, secondly, variations in relational strength and, finally, the absence or presence of a small percentage of links in the network. We also introduce a case specific method to compare the different rankings that result from the sensitivity analysis and show that the new centrality measure is robust to small changes in the data.
Original languageEnglish
Place of PublicationTilburg
PublisherOperations research
Number of pages12
Volume2014-028
Publication statusPublished - 16 Apr 2014

Publication series

NameCentER Discussion Paper
Volume2014-028

    Fingerprint

Keywords

  • terrorism
  • Network Analysis
  • Centrality measures
  • Cooperative game theory

Cite this

Husslage, B. G. M., Borm, P. E. M., Burg, T., Hamers, H. J. M., & Lindelauf, R. (2014). Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack. (CentER Discussion Paper; Vol. 2014-028). Tilburg: Operations research.