Analyzing Terrorist Networks - Theories & Techniques

Similar documents
WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

A Behavioral Perspective on Money Laundering

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

Following the Money to Combat Terrorism, Crime and Corruption

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

August 2013 Security Threat to Americans Abroad

Follow this and additional works at: Part of the International Law Commons

Radicalization/De-radicalization:

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

Modern Terrorism and Counter-Terrorism Strategies

Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes

Social Network Analysis in the Study of Terrorism and Insurgency: From Organization to Politics 1

confronting terrorism in the pursuit of power

Al Qaeda: Corporate hierarchy or biological entity?

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

An Assessment of 516 Combatant Status Review Tribunal (CSRT) Unclassified Summaries. 25 July 2007

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION

Protecting Australia Against Terrorism 2006

Any response to Uri must factor in the Pakistani state s relationship with non-state actors.

NATIONAL STRATEGY FOR COUNTERTERRORISM

India-US Counterterrorism Cooperation: The Way Forward

Terrorism and New Security Challenges Implications for European-Japanese Security Cooperation

Terrorism in South Asia; Challenges for the West. Junaid Qureshi

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0

INTERNATIONAL TERRORISM AND COUNTERTERRORISM. Spring Political Science MWF , Maybank 316. Dr. Mary Desjeans

Pakistan on the Brink: The Future of America, Pakistan, and Afghanistan. By Ahmed Rashid. New York, N.Y.: Viking, 2012.

Transnational Justice on the Example of Countering the Financing of Terrorism in the USA and in Europe

The Importance of Internal Security for Outlier Nations

the notion that poverty causes terrorism. Certainly, economic theory suggests that it would be

Building Global Alliances in the Fight against Terrorism

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

WINTER. March 24. Template

2014 GLOBAL TERRORISM INDEX

Counter Terrorism Committee (CTC)

REPUBLICAN NATIONAL COMMITTEE RESEARCH BRIEFING BOOK AUGUST 7, 2015

What the Trump Administration Needs to Know: Lessons Learned from Fifteen Years of Counterterrorism Campaigns

Terrorism in Africa: Challenges and perspectives

Hyo-Shin Kwon & Yi-Yi Chen

After the Cold War. Europe and North America Section 4. Main Idea

The Terror OCTOBER 18, 2001

Joe Wippl Spring 2017

Criminological Theories

Civil War and Political Violence. Paul Staniland University of Chicago

Severing the Web of Terrorist Financing

Counter-Terrorism as Crime Prevention: A Holistic Approach

Joint open briefing for interested Member States, international, regional and subregional organizations on Central Asia

Support RAND. For More Information RAND-INITIATED RESEARCH

Transnational Terrorism: The Threat to Australia

A Bayesian Model for Determining Crew Affiliation with Terrorist Organizations

Building Global Alliances in the Fight Against Terrorism

U.S. TREASURY DEPARTMENT OFFICE OF PUBLIC AFFAIRS

The following text is an edited transcript of Professor. Fisher s remarks at the November 13 meeting. Afghanistan: Negotiation in the Face of Terror

Freedom vs. Security: Guaranteeing Civil Liberties in a World of Terrorist Threats

Foreign Fighter Interdiction: Stability Operations as Countermeasures

Disrupting & Dismantling Transnational Criminal Organizations

PC.DEL/764/08 15 September ENGLISH only

Crisis Watch: An Assessment of Al Qaeda and Recommendations for the United Kingdom s Overseas Counter Terrorism Strategy

M.S. in Criminology. B.S. in Criminology OFF CAMPUS CRIMINOLOGY DEGREE PROGRAMS

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL

PSC/IR 273 The Politics of Terrorism Fall :40am-10:55am, Dewey Alexander Lee

US DRONE ATTACKS INSIDE PAKISTAN TERRITORY: UN CHARTER

The Department of State s Annual Report on Terrorism

Global Interdependence. Chapter Present

Stopping the banned groups

one time. Any additional use of this file, whether for

The Transnational Threats Project at CSIS, in cooperation with the Center on Global Counterterrorism Cooperation. 5 June 2008

EPP Policy Paper 1 A Secure Europe

Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset.

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

strategic asia asian aftershocks Richard J. Ellings and Aaron L. Friedberg with Michael Wills

Weekly Geopolitical Report

Second Interim Report of the National Commission on Terrorist Attacks Upon the United States. Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair

Continuing Conflict in SW Asia. EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement?

National Strategy. for. of the United States of America

Press Conference June

INTERNATIONAL JOURNAL OF RESEARCH AND ANALYSIS VOLUME 4 ISSUE 2 ISSN

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

Government Research Priorities for TSAS

Democracy Corps - Third Way Frequency Questionnaire

CRS Report for Congress

Addressing Emerging Terrorist Threats and the Role of UNODC

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld

Soft Power and the War on Terror Remarks by Joseph S. Nye, Jr. May 10, 2004

International Legal Framework on Counter-Terrorism As applicable to Pakistan

Southeast Asia and the Brotherhood of Terrorism

Weekly Geopolitical Report

Conference on Use of the Internet to Counter the Appeal of Extremist Violence AGENDA

Blockmodels/Positional Analysis Implementation and Application. By Yulia Tyshchuk Tracey Dilacsio

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

Authorizing the Use of Military Force: S.J. Res. 59

Testimony of Lee S. Wolosky, Esq. Of Counsel, Boies, Schiller & Flexner LLP. U.S. Senate Committee on Banking, Housing, and Urban Affairs

CIVILIAN TREATMENT AND THE WAR ON TERRORISM 2

After the Fall of Daesh in Syria and Iraq: Counter-Radicalisation

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Confronting the Terror Finance Challenge in Today s Middle East

UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters

Stuxnet, 2010 Target: Iranian Reactor, Natanz

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

PRESS BRIEFING BY SECRETARY OF STATE HILLARY CLINTON ON HUMANITARIAN AID TO PAKISTAN James S. Brady Press Briefing Room

Good afternoon. I want to thank Dr. Robert Satloff for his invitation to speak to you today.

Transcription:

NYU Department of Politics April 10, 2012

What We Will Discuss Why I am talking to you? Where I used to work What I used to do How I used to do it Theories of terrorist organizations Sageman and Hoffman schools Empirical observations Who s right? Basic network analysis techniques used in CT Key actor analysis Detecting community structure Block modeling Exploring with real networks Illicit drug network in Hartford, CT Covert terrorist network Conclusions & Departing Thoughts New paradigms in network organization Using network analysis to address them

My experience in the Intelligence Community DISCLAIMER: All views and opinions expressed today are my own, and not those of U.S. Department of Defense or Office of the Director of National Intelligence Currently, a fourth year PhD student in Politics, research interests include... Terrorism, low-intensity conflict, and cyber warfare Agent-based modeling, machine learning, and network analysis Prior to entering graduate school... Worked in DC in the defense and intelligence communities for four years Official title was All-source analyst, specific role was to apply statistical and computational methods to problems of social dynamics and organization of interest to the DoD/IC. NO: If I tell what I really did I will not have to kill you...they never have the analysts do the killing

Organization of the IC & Where I Worked Defense Intelligence Agency Getting intelligence to the war fighter National Security Agency SIGINT and cryptology

The Sageman and Hoffman Schools on Terrorist Organizations Sageman School Marc Sageman - former CIA case officer for Islamabad Currently Scholar in Residence at the NYPD Terrorist groups are independent, or loosely connected cells Organization driven by a group process; result of circumstance, motivation and opportunity The types of social ties are extremely important: kinship, friendship and religious From Leaderless Jihad... The links are very interesting because it turned out that 68% joined the Jihad out of friendship, they either grew up with somebody who was already a terrorist, or there was a bunch of guys who collectively decided to join. Hoffman School Bruce Hoffman - History professor at Georgetown University Respected academic in terrorism studies, published widely read Inside Terrorism Terrorist groups are hierarchical structures Global terrorist organization are well-formed and lethal Critical information and resources flow down from the leadership to low-level operatives From Foreign Affairs Al Qaeda is much like a shark, which must keep moving forward, no matter how slowly or incrementally, or die. Al Qaeda must constantly adapt and adjust to its enemies efforts to stymie its plans while simultaneously identifying new targets.

Evidence in support of Sageman The Hamburg Cell Late 1998, future 9/11 hijackers Mohammed Atta, Marwan al-shehhi, and Ramzi Binalshibh moved into a three-bedroom apartment Originally intending to fight jihad in Chechnya, a chance meeting on a train in Germany caused the group to travel to Afghanistan instead. Several more contemporary examples 2004 Madrid Train Bombing al-qaeda inspired cell July 7, 2005 London bombings 4 British, 3 Pakistani and 1 Jamaican motivated by British involvement in Iraq War Alexandria 5 N. VA students travel to Pakistan to join Taliban Excerpt from The Pact This is a story about the power of friendship. Of joining forces and beating the odds...

Evidence in Support of Hoffman 2002 Bali Bombings Coordinated attack carried out by Jemaah Islamiyah (JI), Southeast Asian militant Islamic group Deadliest attack in Indonesia s history, killed 202 people Organized as a hierarchy, though many leaders have since been killed or captured International terrorist organizations remain lethal 2008 Mumbai attacks 10 coordinated attacks perpetrated by Lashkar-e-Taiba militants from Pakistan Beslan school hostage crisis Chechan militants seize school with 1,100 people (including 777 children) for three days. Ultimately, 334 hostages were killed, including 186 children. Richard Reid (shoe bomber) admitted member of al-qaeda 2007 NIE The Terrorist Threat to the US Homeland Al-Qaida is and will remain the most serious terrorist threat to the Homeland, as its central leadership continues to plan high-impact plots, while pushing others in extremist Sunni communities to mimic its efforts and to supplement its capabilities.

Sorting out the debate Who s right? Spoiler: Both men are correct, and wrong Karen J. Greenberg, Executive Director of NYU Center on Law and Security Sometimes it seems like this entire field is stepping into a boys-with-toys conversation. Here are two guys, both of them respected, saying that there is only one truth and only one occupant of the sandbox. Thats ridiculous. Both of them are valuable. Since 9/11, the persistent, coordinated and international effort to kill or capture terrorist leaders has decimated the structure of transnational terrorist organization For those left, movement, communication and planning has become incredibly strained Enter the age of the al-qaeda Affiliates Model has moved away from strictly hierarchical or cellular to a franchise Leadership provide inspiration, rather than resources and ideas Umar Farouk Abdulmutallab and the al-qaeda in the Arabian Peninsula

Why study networks for CT? 9/11 Commission Report - Chapter 12 Our enemy is twofold: al Qaeda, a stateless network of terrorists that struck us on 9/11; and a radical ideological movement in the Islamic world, inspired in part by al Qaeda, which has spawned terrorist groups and violence across the globe. The first enemy is weakened, but continues to pose a grave threat. The second enemy is gathering, and will menace Americans and American interests long after Usama Bin Ladin and his cohorts are killed or captured. Thus our strategy must match our means to two ends: dismantling the al Qaeda network and prevailing in the longer term over the ideology that gives rise to Islamist terrorism. After 9/11, the IC becomes focused on understanding networked organizations, with a specific focus on dismantling and disrupting Primary focus is one three aspects of network analysis 1. Identifying leadership and key actors 2. Revealing underlying structure and intra-network community structure 3. Evolution and decay of social networks We will review 1-2; however, 3 is where most cutting edge network research is focused

Comparing two network metrics to find key actors Often social network analysis is used to identify key actors within a social group. To identify these actors, various centrality metrics can be computed based on a network s structure Degree (number of connections) Betweenness (number of shortest paths an actor is on) Closeness (relative distance to all other actors) Eigenvector centrality (leading eigenvector of sociomatrix) One method for using these metrics to identify key actors is to plot actors scores for Eigenvector centrality versus Betweenness. Theoretically, these metrics should be approximately linear; therefore, any non-linear outliers will be of note. An actor with very high betweenness but low EC may be a critical gatekeeper to a central actor Likewise, an actor with low betweenness but high EC may have unique access to central actors

Highlighting Key Actors Using data collected on a network of drug users in Hartford, CT we will attempt to identify the identity and location of the key actors First, visualize the data 1. Clear bifurcation within the network 2. Each region of the network appears to cluster around central communities 3. Sparse peripheral structure with long pendant chains Given these structural features we will want to identify actors both inside the network s core, but also those with unique structural positions

63 894 105 77 55 87 54 64 165 33 101 49 86 36177 170 17416821 52 111 27 42 68 6 12 69 148 169 181 183 149 110 172 25 124 150 182 185 26 138 11 39 51 59 15 3132 37 40 38 46 5 66 107 109 112 119 122 125 128 133 134 135 145 146 152 161 163 164 166 179 167 171 175 180 186 187 188 194 108 74 81 83 92 96 98 129 103 9576 127 173 178 193 71 82132 90 137 142 106 123 9988151 729760 73 118 24 16 176 130 184 93 91 162 9 Finding Key Actors with R Perform a linear regression of Eig Bet Capture residuals from regression Use this data to resize and color the actors in the plot Identify key actors: Pulse takers Gate-keepers Actor 44 is a significant outlier, and likely part of the central leadership, while actors 50, 28 and 53 are pulse takers and 67, 102, and 79 are gate-keepers....now add this visualizations together Eigenvector Centrality 1.0 0.8 0.6 0.4 0.2 0.0 141 20 155 58 147 23 140 7565 139 4184 136 85 48 17 Key Actor Analysis for Hartford Drug Users 44 28 53 50 47 56 43 22 100 126 57 18 104 19 78 45 79 1 2 61 189 13 7 3 62 120 153 156 158 113 121 191190 114 143 159 192 157144 154 8 116 4 160 131 34 115 117 70 30 14 29 35 102 0 1000 2000 3000 4000 5000 6000 Betweenness Centrality 67 res 0.2 0 0.2 0.4 0.6 abs(res) 0.1 0.2 0.3 0.4 0.5 0.6 0.7

Key Actor Plot 20 28 44 47 50 53 58 79 102 141 155 Plot with key actor data Good Very easily identify core leadership Mid-level actors, pulse-takers, layer Highlight some bridges, gate-keepers Bad Several key actors not highlighted Over-emphasis on one community due to data asymmetry

Identifying Network Sub-Structure The Hoffman School posits that terrorist networks will contain layers of connectivity and leadership. To identify these layers, we will examine an actual covert network Covert networks often exhibit a core-periphery structure We may want to identify clusters of actors based on various structural features

Methods for Community Detection Identifying community structure within a network is an entire sub-discipline of network science. Google Scholar search for [ community detection networks] returns 3,380 articles since 2001 There is an incredible diversity of methods Statistical Spectral Node and edge context and/or attributes We will be using a very basic method from the statistical category: hierarchical clustering of geodesic distance Clusters nodes together based on their distance (closer nodes clustered together) Returns several possible partitions Method is both art and science

Hierarchical Clustering of Geodesic Distance First, we will generate a matrix of the distance between all node pairs Clustering this data hierarchically, we can produce a dendrogram of all the community cuts within our covert network Each break in the tree represents a cut in the community structure Further down the tree, the more granular the communities To find a good set of community partitions we can step through them visually

Introduction Theories of terrorist organizations Network Analysis and CT Stepping through the partitions We will now visualize each community cut. Partition: 123456789 Conclusions

Block Modeling Covert Network To reveal the underlying structure of these communities, we will collapse these communities into single nodes using a technique know as block modeling Suppose we wanted to view partition 8 as a block model In the block model, each colored group will become a single node We can also take advantage of additional data generated by the block model Each block represents some number of nodes with ties to each other, as well as actors in other blocks We can use that data to uncover both the underlying structure, as well as the tie dynamics within and among blocks in the model This is best revealed by combining this data into a visualization

Block Model of Partition 8 With the added data we can alter the visualization Blocks sized by internal density Edges sized by tie strength We can now see some distinct underlying structural dynamics Ignore block 8 Central leadership very tightly connected Middle layer sparsely, but strongly connected

Developing New Theories of Terrorist Organizations What is the influence of information technology on terrorism and terrorist organizations? Cyber-terrorism blurs the lines among transnational terrorism, state-sponsored attacks, rogue actors and homegrown threats Is it possible to distinguish among these threat? Is attribution possibly in cyber? The barriers to influence approach zero through the Internet Recruitment still primarily through in-person connections, but significant push to online How does the franchise model change theories of organization? With the vanishing operational importance of terrorist leadership, how can resources be maximized for CT? Is there more value in disrupting communication networks (e.g., inspiration/influence) than operation (e.g., franchise cells)? Can network analysis mitigate these new problems?

subsection new theories(end)

Thank you Thank you! Email: drew.conway@nyu.edu