Results 1 to 2 of 2

Thread: Social networks may help find connections between people behind terrorist attacks

  1. #1
    Join Date
    Apr 2008
    Posts
    471

    Social networks may help find connections between people behind terrorist attacks

    Researchers have developed a new approach to analyzing social networks, which could help find the covert connections between the people behind terrorist attacks. The approach involves revealing the nodes that act as hubs in a terrorist network and tracing back to individual planners and perpetrators.

    Dr Yoshiharu Maeno, Founder Management Consultant of the Social Design Group and Dr Yukio Ohsawa, Associate Professor at the School of Engineering, University of Tokyo, Japan, explain that their analytical approach to understanding terrorist networks could ultimately help prevent future attacks. Terrorist attacks can cause significant loss of life, have intense social and environmental impacts, and large economic losses. Maeno and Ohsawa explain that responding to a terrorist attack is akin to dealing with a natural disaster, with one important difference.

    Disaster recovery management is required with both, but in the case of a terrorist attack, there is the added pressure of short-term responses to the terrorists themselves and in the long-term the need to identify and weaken the covert foundation underpinning an organized attack.

    According to the team, by combining the prior understanding of expert investigators with graph theory and computational data processing, it should be possible to analyze a terrorist network and reveal latent connections and patterns. The researchers have carried out such an analysis of the network responsible for the 9/11 attacks in 2001 in order to evaluate the performance of their approach.

  2. #2
    Join Date
    Apr 2008
    Posts
    513

    Re: Social networks may help find connections between people behind terrorist attacks

    Fundamentally, their technique is a mathematical one involving "node" discovery. The nodes of a network are the hubs at which different members of the network are connected. Usually, ordinary members have one or two connections, nodes can have several and the critical nodes, the hubs, have many more. Major hubs, such as the big search engine companies, such as Google and Yahoo, news sources like CNN and the BBC, and social media networks such as Facebook and MySpace have many connections.

    These big nodes act as the hubs through which individual and smaller sites are interconnected. The team's computational analysis of the terrorist network associated with the 9/11 attacks revealed nodes that were not apparent to security experts in advance of the attacks. Such latent nodes appear to have been critical to the attacks, but superficially do not appear to be particularly important individuals acting as hubs. Having network insights sooner rather than later would allow investigators to gather information on associates, friends, and relatives of a suspect terrorist and so bring the perpetrators to justice that much sooner or perhaps even unravel a network plotting future attacks.

Similar Threads

  1. How to Prevent Social Engineering Attacks
    By RedZot in forum Guides & Tutorials
    Replies: 1
    Last Post: 17-07-2012, 07:10 PM
  2. Why Do People Use Online Social Networks?
    By Kamalap in forum Technology & Internet
    Replies: 6
    Last Post: 09-09-2011, 07:58 PM
  3. what are the Active and passive attacks in a networks ?
    By Tufan in forum Networking & Security
    Replies: 6
    Last Post: 24-11-2010, 11:26 PM
  4. Nokia messaging for social networks on C6
    By Udyan in forum Portable Devices
    Replies: 6
    Last Post: 15-09-2010, 11:36 AM
  5. Understanding mobile social networks
    By kattman in forum Guides & Tutorials
    Replies: 5
    Last Post: 13-11-2008, 06:49 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,711,722,195.83340 seconds with 17 queries