One of the fundamental problems facing
the modern world is terrorism. This is a global threat that requires a
significant new approach to address. One of the ways this can be examined is
through social network analysis (SNA). This is the mapping and measurement of
the relationships and flows that exist between people, groups and organizations
(Perliger
and Pedahzur, 2011). The
people and groups are the nodes in the network while the relationships and
flows are the links in the networks. To solve a problem using social network
analysis, there is need to collect data. This might be difficult or easy to
acquire depending on its nature. There is also a need to implement network
measures that help evaluate the success of the analysis. Specifically, social
network analysis helps in diagnosing problems that can help in the development
of solutions. This can be applied to a variety of issues. As this paper
demonstrates, social network analysis can be used in addressing the issue of
terrorism.
Using
SNA to Address Terrorism
The importance of using social network
analysis when dealing with terrorism came to the fore after the 9/11 terrorist
attacks in the United States (Ressler, 2006).
Terrorist organizations mostly use networks to carry out their activities. This
is opposed to the conventional enemy states that use hierarchical and formal
methods of engagement. Instead, the terrorist groups now have networked
organizational structures (Ressler, 2006).
This allows them to have the ability to plan and launch attacks more quickly.
Social network analysis can be an important tool that can help in fighting
terrorism. They help the authorities in mapping out the terrorist networks with
a view to dismantling them (Perliger and Pedahzur, 2011).
Data
Needed and the Ability to Get It
The most important data in the social
network analysis is to combat terror in information records (Ressler, 2006). The technological advancements mean
that terrorists are also advancing on communication technology. Since they are spread
out thinly in small groupings rather than the formal armies that have barracks
and other identified installations, telephony communication is important (Perliger and Pedahzur,
2011). There has also been a rise in the use
of social media among the terrorists. Groups such as the Al-Shabaab, Boko
Haram, and ISIS have frequently used social media sites such as Facebook,
Twitter and YouTube to spread their messages (Perliger and Pedahzur,
2011). If the authorities can get data from
the communications companies, they would be a step ahead in creating the
analyzes that can help dealing with the problem of terrorism.
However, there are some difficulties in
getting this data. While the government can devise ways of tapping into
communication, it would be easier if the companies just voluntarily gave the
information. Opponents sharing this information raise the issue of ethics as a
reason companies should not breach the privacy of their customers (Ressler, 2006). The opponents argue that governments
should respect the privacy of citizens to communicate freely since it is within
their rights. However, a counter-argument can be made that the practice of
analysis happens daily in commercial life. Online retailers use the information
they get from customers to analyze their trends with an aim of predicting their
future behavior. This means that while the privacy concerns are genuine, the
pros brought about by winning the war against terrorism far outweigh the cons (Ressler, 2006).
Most
Important Network Measures
When dealing with the graphical
representation of human relationships, it is important to have some measures
that enhance the level of insight. In the social network analysis for fighting
terrorism, the most important measures are the centrality measures. In this
regard, the degree centrality measure and the between centrality measure are
most important (Perliger&Pedahzur, 2011).
The degree centrality measure is useful in identifying the nodes that have the
most links to other nodes in the network. The nodes that have high degree
centrality are often influential or have strategic important in communication
for the network (Perliger and Pedahzur, 2011).
The betweenness centrality measure shows the nodes that frequently act as
connectors to other nodes in the network. These nodes are often the crucial
gatekeepers of information within the network (Perliger and Pedahzur,
2011).
How
the SNA Helps
The social network analysis helps in
the diagnosis of the challenges that exist. With regards to fighting terrorism,
it can help in a variety of ways. A proper analysis can identify some of the
major characteristics that increase the likelihood of terrorist organizations
being lethal(Ressler, 2006).
For instance, there are some ideologies that increase this likelihood. If an
organization that is highly religious or it combines its religious ideology
with ethnic or nationalist ideology, then it is more likely to engage in lethal
activities. On the other hand, organizations that hold environmental, human
rights or anarchist convictions are less likely to engage in lethal activities.
Young and fledgling organizations are also less likely lethal as compared to large,
well-established and networked organizations(Ressler, 2006).
The analysis can also help in mapping
terrorist networks. This can be explained by an example of two known terror
suspects. If the authorities monitor these two individuals, the process might
be too slow for it to achieve the results that would enable the saving of
lives. This is where social network analysis comes in. The authorities would
need the communication information of the two men. If these records are
analyzed, it is possible to get contacts that the two individuals have in
common. The next step would be an analysis of the contact information of the
shared contacts to establish another level of common contacts. This analysis by
now would have established a triad that represents the network. This process is
repeated till the network expands to reveal an adequate picture of a terror
network (Perliger and Pedahzur, 2011).
Once the network has been mapped, the
next step is the mathematical analysis. This helps to identify the important
insights such as the most central figure, the most connected individual, or who
is the most crucial link in the network. This information can then be used by
the authorities to target the individuals. For instance, a terror plot can be
dismantled if the most important leaders are eliminated. This shows that the
network analysis can be effective in giving the authorities a clear picture of
a terror network that is not hierarchical.
In conclusion, social network analysis
is an important technique in helping map out the relationships between people,
groups, and organizations. If used properly, it can help address some of the
challenges that face the society. For this to happen, however, the relevant
data must be availed. The accuracy of the data influences the accuracy of the
analysis. The analysis can then be used in diagnosing the problem; thus,
enabling the relevant parties to bring about change. Therefore, this paper has
shown that with proper analysis and the availability of adequate and accurate
data, terrorist organizations can be mapped; thus, allowing the authorities to
take the relevant action.
————by Hui Zhao
From MIB
1 comment:
This is an adequate description of how SNA can be used to detect terrorist activity, but it comes from a recycling of what we covered in class and a bit of the literature; the purpose of this post was to come up with an SNA idea of your own and show how you would apply it and its measures.
Post a Comment