Shaping operations to attack robust terror networks

Devon Callahan, Paulo Shakarian, Jeffrey Nielsen, Anthony N. Johnson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

Security organizations often attempt to disrupt terror or insurgent networks by targeting 'high value targets' (HVT's). However, there have been numerous examples that illustrate how such networks are able to quickly re-generate leadership after such an operation. Here, we introduce the notion of a 'shaping' operation in which the terrorist network is first targeted for the purpose of reducing its leadership re-generation ability before targeting HVT's. We look to conduct shaping by maximizing the network-wide degree centrality through node removal. We formally define this problem and prove solving it is NP-Complete. We introduce a mixed integer-linear program that solves this problem exactly as well as a greedy heuristic for more practical use. We implement the greedy heuristic and found in examining five real-world terrorist networks that removing only 12% of nodes can increase the network-wide centrality between 17% and 45%.

Original languageEnglish (US)
Title of host publicationProceedings of the 2012 ASE International Conference on Social Informatics, SocialInformatics 2012
PublisherIEEE Computer Society
Pages13-18
Number of pages6
ISBN (Print)9780769550152
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 ASE International Conference on Social Informatics, SocialInformatics 2012 - Washington, D.C., United States
Duration: Dec 14 2012Dec 16 2012

Publication series

NameProceedings of the 2012 ASE International Conference on Social Informatics, SocialInformatics 2012

Other

Other2012 ASE International Conference on Social Informatics, SocialInformatics 2012
Country/TerritoryUnited States
CityWashington, D.C.
Period12/14/1212/16/12

Keywords

  • algorithms
  • complex networks
  • sociology
  • terrorism

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Shaping operations to attack robust terror networks'. Together they form a unique fingerprint.

Cite this