期刊文献+

基于社会网络理论的恐怖组织隐蔽网络分析方法 被引量:13

Study on the terrorist covert networks from the perspective of social network analysis
下载PDF
导出
摘要 针对以"基地"为典型的国际恐怖组织网络化运作的趋势,从组织行为学的角度分析恐怖组织网络特点及其带来的挑战,总结社会网络分析在描述恐怖分子静态网络特征,定位关键人物方面的基本方法,运用等价性分析从整体结构上评估恐怖组织隐蔽网络,对网络作基于人际交互流向的指挥控制结构脆弱性分析,利用网络中心度量化及派系参与分析方法找出网络中的核心人物,并以美国大使馆爆炸案为例进行实证分析。研究表明,结合网络结构等价分析,基于人际交互流向的指控结构分析、网络中心度量化及派系参与方法可以有效评估恐怖组织隐蔽网络并挖掘网络核心人物。 This paper is to present its research results on how to use the social network analysis method to analyze the terrorist network structure and detect the vulnerability of such covert networks. In proceeding with our study, we have given a brief recount of what the "new terrorism" is, how it has evolved, and how it interferes with any detective activities oriented on them in hoping to gain access to their network operations and insights into their activities so as to be able to work out tit-for-tat count measures in dealing with them. In doing so, we have divided our study into four stages: ( 1 ) the Contextual Background; (2) the Relational Data Study Stage; (3) Network Criteria Analysis, and ; (4) the Application of Destabilisation Analysis Techniques. The so-called contextual background analysis is aimed at making a comprehensive analysis of the physical environment of the network, the group itseff, the individual figures inside the network, and, particularly, the mutual connection and interaction among these figures. The so-called relational data stage intends to identify the individual figures within the nuclear cell. The information data on their relations can be stored in a binary one-to-one matrix form, in which A-to-B interaction can be represented with number 1, and number 0 (zero) to stand for either on-going interaction or no interaction between any two members, though it merely indicates if there exists any two-way connection between the terrorist elements. Here in this stage we may present a case study to introduce what data can be accessed from the center of Computational Analysis of Social and Organizational Systems. Here in the case study, the cell from the binary matrix can be used to construct a sociograph or a network analysis program named ORA 1.9.5, which helps to analyze the criteria of density, cohesion and the Core-Periphe situation. The next stage is to use the Structural Equivalence and the CONCOR approach to decypher the characteristics of the network by combining the centripetal measures, clique analysis and the degree centrality so as to make clear the betweenness centrality, the closeness'centrality communitation of C2 structure and the cliques-engaged method to locate the core member. Such criteria can be searched through ORA. Such counterterrorism techniques are traditionally used to neutralize members of the terrorist networks either through capture-alive or trace-analysis of the killed members. The removal of a node from a network can help to make a cell less usable and adaptable, and reduce its communicate activities or eventually crash down such networks and their terrorist activities.
作者 张海 孙多勇
出处 《安全与环境学报》 CAS CSCD 北大核心 2011年第3期259-264,共6页 Journal of Safety and Environment
基金 国家自然科学基金项目(70973138)
关键词 安全工程 社会网络分析 恐怖组织结构 蜂窝状网络 数据挖掘 打击策略 safety engineering social network analysis terrorist or ganization structure cellular network data mining combating strategies
  • 相关文献

参考文献14

  • 1STEWART T A.Six degrees of mohamed atta .Business 2.0,2001(9):63 .http://www.business2.com/Articles/mag/print/0,1643,35253,FF.html.
  • 2RONFELDT D,ARQUILLA J.Networks and netwars:the future of terror,crime and militancy[M].Santa Monica:RAND,2001.
  • 3KREBS V E.Mapping networks of terrorist cells[J].Connections,2002,24(3):43-52.
  • 4刘晓琴,李剑峰,庞磊,何卫峰.社会网络分析在恐怖袭击风险控制中的应用[J].安全与环境学报,2009,9(4):164-167. 被引量:3
  • 5LESSEER I O,HOFFMAN B,ARQUILLA J,et al,CHENG Kexiong(程克雄).Counterring the new terrorism(反新恐怖主义)[M]tran.Beijing:Xinhua Press,2002..
  • 6PENZAR D,SRBLJINOVI C ' A.About modelling of complex networks with applications to terrorist group modeling[J].Interdisciplinary Description of Complex System,2005,3(1):27-43.
  • 7FBI.Counterterrorism analytical lexicon.http://cryptome.org/fbi-ct-lexicon.pdf.
  • 8CARLEY K M.Estimating vulnerabilities in large covert networks // Proceedings of the 9th International Command and Control Research and Technology Symposium,2004.http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.150.3786 &rep=rep1&type=pdf.
  • 9MCCULLOH I M,WEBB M,CARLEY K M,et al.Change detection in social networks .Arlington,VA:U.S.Army Research Institute Technical Report 1235 .http://www.hqda.army.mil/ari/pdf/TR_1235.pdf.
  • 10WASSERMAN S,FAUST K.Social network analysis:methods and applications[M].Cambridge:Cambridge University Press,1994.

二级参考文献9

  • 1PENZAR D, SRBLJINOVIC A. About modeling of complex networks with applications to terrorist group modeling [ J ]. Interdisciplinary Description of Complex Systems, 2005, 3( 1 ) : 27 - 43.
  • 2WOO G. Insuring against al-Qaeda [R]. Newark: Risk Management Solutions Ltd, 2003.
  • 3LESSEER I O. The new terrorism(反新恐怖主义) [M]. CHENG Kexiong(程克雄), tran. Beijing: Xinhua Press, 2002.
  • 4HAMZA A. Allah' s governance on earth [ M ]. Deluxe Primers, 2002.
  • 5KENNEDY J F, EBERHART R C. Swarm intelligence [ M ]. NewYork: Morgan Kaufmann Publishers San Francisco (USA), 2001.
  • 6RONFELDT D, ARQUILLA J. Networks and netwars : the future of terror, crime and militancy [M]. Santa Monica: RAND Corporation, 2001.
  • 7LIUJun(刘军).Anintroductiontosocialnetworkanalysis(社会网络分析导论)[M].Beijing:SocialSciencesAcademicPress,2004.
  • 8CARLEY K M, SVOBODA D M. Modeling organizational adaptation as a simulated annealing process[J]. Sociological Methods and Research, 1996, 25( 1 ) : 138 - 168.
  • 9FARLEY J D. Breaking A1 Qaeda cells: a mathematical analysis of eounterterrorism operations (a guide for risk assessment and decision making)[J]. Studies in Conflict & Terrorism, 2003, 26(13): 399- 411.

共引文献2

同被引文献172

引证文献13

二级引证文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部