2002
DOI: 10.5210/fm.v7i4.941
|View full text |Cite
|
Sign up to set email alerts
|

Uncloaking Terrorist Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
215
1
6

Year Published

2005
2005
2017
2017

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 263 publications
(222 citation statements)
references
References 0 publications
0
215
1
6
Order By: Relevance
“…modify to changing circumstances) (Bouchard 2007). Networks are also more effective if they have access not only to actors and ties, but also to resources, and if these actors, ties and resources are multiple (Krebs 2002); and, if they are embedded in overt and legitimate networks (Gimenez-Salinas Framis 2013). The distribution network shows a good level of elasticity, as it seems that once the North route was disrupted, the Delivery Ltd. route was put in place to restore the connection between the jurisdictions.…”
Section: Guardianship and Situational Interventionmentioning
confidence: 99%
“…modify to changing circumstances) (Bouchard 2007). Networks are also more effective if they have access not only to actors and ties, but also to resources, and if these actors, ties and resources are multiple (Krebs 2002); and, if they are embedded in overt and legitimate networks (Gimenez-Salinas Framis 2013). The distribution network shows a good level of elasticity, as it seems that once the North route was disrupted, the Delivery Ltd. route was put in place to restore the connection between the jurisdictions.…”
Section: Guardianship and Situational Interventionmentioning
confidence: 99%
“…Contemporary uses of social network analysis include the mapping of terrorist networks [3], the effect of a government's science policy on communication between inter-disciplinary scientists [4], and information dissemination in commercial arenas [5] and public health [6][7][8]. Network analyses commonly address questions such as the following: Who influences whom?…”
Section: Introductionmentioning
confidence: 99%
“…These centralities may reveal information about links between individuals and their roles in network structures. Morselli et al (2007) investigate Kreb's terrorist network (V. Krebs, 2002) and the Caviar network (UCINET, 2017) in order to analyze the effects of degree, betweenness, and closeness centrality criteria, and how they can be used for the detection of terrorist networks and criminal enterprise networks. The Kreb's terrorist network data consists of 37 participants in which 19 of them are hijackers who executed the attacks and other 18 additional contributing criminals.…”
Section: Network Structure Analysismentioning
confidence: 99%
“…Finally, a manual analysis was performed on these profiles to detect many public criminal groups on Facebook. The data (email addresses) were collected from BestRecovery (V. Krebs, 2002), an online data theft service. Centrality measures and community detection techniques were used to determine criminals having a central position in the graph, subgroups and communities found in the network, criminals acting as brokers of collaboration and information in the network, and the ranking of criminals based on their importance and influence on the network.…”
Section: Ranking Individuals and Relationships In Crime Networkmentioning
confidence: 99%