Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations
- Author(s): Drozdova, Katya
- Samoilov, Michael
- et al.
Published Web Locationhttps://doi.org/10.1007/s10588-009-9058-2
Terrorist threat prevention and counteraction require timely detection of hostile plans. However, adversary efforts at concealment and other challenges involved in monitoring terrorist organizations may impede timely intelligence acquisition or interpretation. This study develops an approach to analyzing technological means rather than content of communications produced within the social networks comprising covert organizations, and shows how it can be applied towards detecting terrorist attack precursors. We find that differential usage patterns of hi-tech versus low-tech communication solutions could reveal significant information about organizational activities, which may be further used to detect signals of impending terrorist attacks. (Such potential practical utility of our method is supported by the detailed empirical analysis of available al Qaeda communications.) The described approach thus provides a common framework for utilizing diverse activity records from heterogeneous sources as well as contributes new tools for their rapid analysis aimed at better informing operational and policy decision-making.
Many UC-authored scholarly publications are freely available on this site because of the UC Academic Senate's Open Access Policy. Let us know how this access is important for you.