IDEAS home Printed from https://ideas.repec.org/a/spr/comaot/v16y2010i1d10.1007_s10588-009-9058-2.html
   My bibliography  Save this article

Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations

Author

Listed:
  • Katya Drozdova

    (Hoover Institution, and NSI)

  • Michael Samoilov

    (University of California)

Abstract

Terrorist threat prevention and counteraction require timely detection of hostile plans. However, adversary efforts at concealment and other challenges involved in monitoring terrorist organizations may impede timely intelligence acquisition or interpretation. This study develops an approach to analyzing technological means rather than content of communications produced within the social networks comprising covert organizations, and shows how it can be applied towards detecting terrorist attack precursors. We find that differential usage patterns of hi-tech versus low-tech communication solutions could reveal significant information about organizational activities, which may be further used to detect signals of impending terrorist attacks. (Such potential practical utility of our method is supported by the detailed empirical analysis of available al Qaeda communications.) The described approach thus provides a common framework for utilizing diverse activity records from heterogeneous sources as well as contributes new tools for their rapid analysis aimed at better informing operational and policy decision-making.

Suggested Citation

  • Katya Drozdova & Michael Samoilov, 2010. "Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations," Computational and Mathematical Organization Theory, Springer, vol. 16(1), pages 61-88, March.
  • Handle: RePEc:spr:comaot:v:16:y:2010:i:1:d:10.1007_s10588-009-9058-2
    DOI: 10.1007/s10588-009-9058-2
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10588-009-9058-2
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10588-009-9058-2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Eli Berman & Jacob N. Shapiro & Joseph H. Felter, 2011. "Can Hearts and Minds Be Bought? The Economics of Counterinsurgency in Iraq," Journal of Political Economy, University of Chicago Press, vol. 119(4), pages 766-819.
    2. Roger L. M. Dunbar & William H. Starbuck, 2006. "Learning to Design Organizations and Learning from Designing Them," Organization Science, INFORMS, vol. 17(2), pages 171-178, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ivano Bongiovanni & Cameron Newton, 2019. "Toward an Epidemiology of Safety and Security Risks: An Organizational Vulnerability Assessment in International Airports," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1281-1297, June.
    2. Torsten Reimer & Nathanael Johnson, 2023. "When Those With Privacy Concerns Show Stronger In-Group Favoritism: Using Personal Information From In-Group and Out-Group Members to Identify Terrorist Threats," SAGE Open, , vol. 13(3), pages 21582440231, July.
    3. Vito D'Orazio & James E Yonamine, 2015. "Kickoff to Conflict: A Sequence Analysis of Intra-State Conflict-Preceding Event Structures," PLOS ONE, Public Library of Science, vol. 10(5), pages 1-21, May.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Luis R. Martinez & Jonas Jessen & Guo Xu, 2023. "A Glimpse of Freedom: Allied Occupation and Political Resistance in East Germany," American Economic Journal: Applied Economics, American Economic Association, vol. 15(1), pages 68-106, January.
    2. Vincent A. Floreani & Gladys López-Acevedo & Martín Rama, 2021. "Conflict and Poverty in Afghanistan’s Transition," Journal of Development Studies, Taylor & Francis Journals, vol. 57(10), pages 1776-1790, October.
    3. Benjamin Crost & Joseph H Felter, 2020. "Export Crops and Civil Conflict," Journal of the European Economic Association, European Economic Association, vol. 18(3), pages 1484-1520.
    4. Clemens, Michael A., 2021. "Violence, development, and migration waves: Evidence from Central American child migrant apprehensions," Journal of Urban Economics, Elsevier, vol. 124(C).
    5. Thiemo Fetzer & Pedro C. L. Souza & Oliver Vanden Eynde & Austin L. Wright, 2021. "Security Transitions," American Economic Review, American Economic Association, vol. 111(7), pages 2275-2308, July.
    6. Wong, Pui-Hang, 2017. "How development aid explains (or not) the rise and fall of insurgent attacks in Iraq," MERIT Working Papers 2017-006, United Nations University - Maastricht Economic and Social Research Institute on Innovation and Technology (MERIT).
    7. Aqib Aslam & Enrico Berkes & Martin Fukac & Jeta Menkulasi & Axel Schimmelpfennig, 2014. "Afghanistan: Balancing Social and Security Spending in the Context of a Shrinking Resource Envelope," Asian Development Review, MIT Press, vol. 31(2), pages 165-197, September.
    8. Gehring, Kai & Kaplan, Lennart C. & Wong, Melvin H.L., 2022. "China and the World Bank—How contrasting development approaches affect the stability of African states," Journal of Development Economics, Elsevier, vol. 158(C).
    9. Crost, Benjamin & Felter, Joseph H. & Johnston, Patrick B., 2016. "Conditional cash transfers, civil conflict and insurgent influence: Experimental evidence from the Philippines," Journal of Development Economics, Elsevier, vol. 118(C), pages 171-182.
    10. Mohamed Abdel Jelil & Kartika Bhatia & Anne Brockmeyer & Quy-Toan Do & CleÌ ment Joubert, 2018. "Unemployment and Violent Extremism: Evidence from Daesh Foreign Recruits," HiCN Working Papers 273, Households in Conflict Network.
    11. Ceren Baysan & Marshall Burke & Felipe González & Solomon Hsiang & Edward Miguel, 2018. "Economic and Non-Economic Factors in Violence: Evidence from Organized Crime, Suicides and Climate in Mexico," NBER Working Papers 24897, National Bureau of Economic Research, Inc.
    12. Radha Iyengar, 2010. "The Impact of Asymmetric Information Among Competing Insurgent Groups: Estimating an 'Emboldenment' Effect," CEP Discussion Papers dp1018, Centre for Economic Performance, LSE.
    13. Mara Redlich Revkin, 2021. "Competitive Governance and Displacement Decisions Under Rebel Rule: Evidence from the Islamic State in Iraq," Journal of Conflict Resolution, Peace Science Society (International), vol. 65(1), pages 46-80, January.
    14. Leonardo Bursztyn & Michael Callen & Bruno Ferman & Saad Gulzar & Ali Hasanain & Noam Yuchtman, 2014. "Identifying Ideology: Experimental Evidence on Anti-Americanism in Pakistan," NBER Working Papers 20153, National Bureau of Economic Research, Inc.
    15. Luke N. Condra & Michael Callen & Radha K. Iyengar & James D. Long & Jacob N. Shapiro, 2019. "Damaging democracy? Security provision and turnout in Afghan elections†," Economics and Politics, Wiley Blackwell, vol. 31(2), pages 163-193, July.
    16. Christophe Muller & Pierre Pecher, 2021. "Terrorism, Insurgency, State Repression, and Cycles of Violence," Working Papers halshs-03134347, HAL.
    17. Mirko Draca & Jason Garred & Leanne Stickland & Nele Warrinnier, 2023. "On Target? Sanctions and the Economic Interests of Elite Policymakers in Iran," The Economic Journal, Royal Economic Society, vol. 133(649), pages 159-200.
    18. Gustav Agneman, 2022. "Conflict Victimization and Civilian Obedience: Evidence from Colombia," HiCN Working Papers 379, Households in Conflict Network.
    19. Draca, Mirko & Garred, Jason & Stickland, Leanne & Warrinnier, Nele, 2018. "On Target? The Incidence of Sanctions Across Listed Firms in Iran," CAGE Online Working Paper Series 372, Competitive Advantage in the Global Economy (CAGE).
    20. González, Felipe & Muñoz, Pablo & Prem, Mounu, 2021. "Lost in transition? The persistence of dictatorship mayors," Journal of Development Economics, Elsevier, vol. 151(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:comaot:v:16:y:2010:i:1:d:10.1007_s10588-009-9058-2. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.