Terrorist network monitoring with identifying code

Arunabha Sen, Victoria Horan Goliber, Chenyang Zhou, Kaustav Basu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren’t under active surveillance at the time of the attack due to resource limitations on the part of the authorities. As the suspect databases in various European countries are very large, and it takes significant amount of technical and human resources to monitor a suspect in the database, monitoring all the suspects in the database may be an impossible task. In this paper, we propose a scheme utilizing Identifying Codes that will significantly reduce the resource requirement of law enforcement authorities, and will have the capability of uniquely identifying a suspect in case the suspect becomes active in planning a terrorist attack. The scheme relies on the assumption that, when an individual becomes active in planning a terrorist attack, his/her friends/associates will have some inkling of the individuals plan. Accordingly, even if the individual is not under active surveillance by the authorities, but the individual’s friends/associates are, the individual planning the attack can be uniquely identified. We applied our technique on two terrorist networks, one involved in an attack in Paris and the other involved in the 9/11 attack. We show that, in the Paris network, if 5 of the 10 individuals were monitored, the attackers most likely would have been exposed. If only 15 out of the 37 individuals involved in the 9/11 attack were under surveillance, specific individuals involved in the planning of the 9/11 attack would have been exposed.

Original languageEnglish (US)
Title of host publicationSocial, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings
EditorsHalil Bisgin, Robert Thomson, Ayaz Hyder, Christopher Dancy
PublisherSpringer Verlag
Pages329-339
Number of pages11
ISBN (Print)9783319933719
DOIs
StatePublished - Jan 1 2018
Event11th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction conference and Behavior Representation in Modeling and Simulation, SBP-BRiMS 2018 - Washington, United States
Duration: Jul 10 2018Jul 13 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10899 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction conference and Behavior Representation in Modeling and Simulation, SBP-BRiMS 2018
CountryUnited States
CityWashington
Period7/10/187/13/18

Fingerprint

Identifying Code
Network Monitoring
Attack
Planning
Monitoring
Law enforcement
Surveillance
Law Enforcement
Personnel
Human Resources
Resources
Incidence
Monitor
Likely

Keywords

  • Approximation algorithm
  • Computational complexity
  • Identification code
  • Terrorist network

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Sen, A., Goliber, V. H., Zhou, C., & Basu, K. (2018). Terrorist network monitoring with identifying code. In H. Bisgin, R. Thomson, A. Hyder, & C. Dancy (Eds.), Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings (pp. 329-339). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10899 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-93372-6_36

Terrorist network monitoring with identifying code. / Sen, Arunabha; Goliber, Victoria Horan; Zhou, Chenyang; Basu, Kaustav.

Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. ed. / Halil Bisgin; Robert Thomson; Ayaz Hyder; Christopher Dancy. Springer Verlag, 2018. p. 329-339 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sen, A, Goliber, VH, Zhou, C & Basu, K 2018, Terrorist network monitoring with identifying code. in H Bisgin, R Thomson, A Hyder & C Dancy (eds), Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10899 LNCS, Springer Verlag, pp. 329-339, 11th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction conference and Behavior Representation in Modeling and Simulation, SBP-BRiMS 2018, Washington, United States, 7/10/18. https://doi.org/10.1007/978-3-319-93372-6_36
Sen A, Goliber VH, Zhou C, Basu K. Terrorist network monitoring with identifying code. In Bisgin H, Thomson R, Hyder A, Dancy C, editors, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Springer Verlag. 2018. p. 329-339. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-93372-6_36
Sen, Arunabha ; Goliber, Victoria Horan ; Zhou, Chenyang ; Basu, Kaustav. / Terrorist network monitoring with identifying code. Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. editor / Halil Bisgin ; Robert Thomson ; Ayaz Hyder ; Christopher Dancy. Springer Verlag, 2018. pp. 329-339 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{002187d66571485ebe9d68e082f303eb,
title = "Terrorist network monitoring with identifying code",
abstract = "On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren’t under active surveillance at the time of the attack due to resource limitations on the part of the authorities. As the suspect databases in various European countries are very large, and it takes significant amount of technical and human resources to monitor a suspect in the database, monitoring all the suspects in the database may be an impossible task. In this paper, we propose a scheme utilizing Identifying Codes that will significantly reduce the resource requirement of law enforcement authorities, and will have the capability of uniquely identifying a suspect in case the suspect becomes active in planning a terrorist attack. The scheme relies on the assumption that, when an individual becomes active in planning a terrorist attack, his/her friends/associates will have some inkling of the individuals plan. Accordingly, even if the individual is not under active surveillance by the authorities, but the individual’s friends/associates are, the individual planning the attack can be uniquely identified. We applied our technique on two terrorist networks, one involved in an attack in Paris and the other involved in the 9/11 attack. We show that, in the Paris network, if 5 of the 10 individuals were monitored, the attackers most likely would have been exposed. If only 15 out of the 37 individuals involved in the 9/11 attack were under surveillance, specific individuals involved in the planning of the 9/11 attack would have been exposed.",
keywords = "Approximation algorithm, Computational complexity, Identification code, Terrorist network",
author = "Arunabha Sen and Goliber, {Victoria Horan} and Chenyang Zhou and Kaustav Basu",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-93372-6_36",
language = "English (US)",
isbn = "9783319933719",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "329--339",
editor = "Halil Bisgin and Robert Thomson and Ayaz Hyder and Christopher Dancy",
booktitle = "Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings",

}

TY - GEN

T1 - Terrorist network monitoring with identifying code

AU - Sen, Arunabha

AU - Goliber, Victoria Horan

AU - Zhou, Chenyang

AU - Basu, Kaustav

PY - 2018/1/1

Y1 - 2018/1/1

N2 - On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren’t under active surveillance at the time of the attack due to resource limitations on the part of the authorities. As the suspect databases in various European countries are very large, and it takes significant amount of technical and human resources to monitor a suspect in the database, monitoring all the suspects in the database may be an impossible task. In this paper, we propose a scheme utilizing Identifying Codes that will significantly reduce the resource requirement of law enforcement authorities, and will have the capability of uniquely identifying a suspect in case the suspect becomes active in planning a terrorist attack. The scheme relies on the assumption that, when an individual becomes active in planning a terrorist attack, his/her friends/associates will have some inkling of the individuals plan. Accordingly, even if the individual is not under active surveillance by the authorities, but the individual’s friends/associates are, the individual planning the attack can be uniquely identified. We applied our technique on two terrorist networks, one involved in an attack in Paris and the other involved in the 9/11 attack. We show that, in the Paris network, if 5 of the 10 individuals were monitored, the attackers most likely would have been exposed. If only 15 out of the 37 individuals involved in the 9/11 attack were under surveillance, specific individuals involved in the planning of the 9/11 attack would have been exposed.

AB - On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren’t under active surveillance at the time of the attack due to resource limitations on the part of the authorities. As the suspect databases in various European countries are very large, and it takes significant amount of technical and human resources to monitor a suspect in the database, monitoring all the suspects in the database may be an impossible task. In this paper, we propose a scheme utilizing Identifying Codes that will significantly reduce the resource requirement of law enforcement authorities, and will have the capability of uniquely identifying a suspect in case the suspect becomes active in planning a terrorist attack. The scheme relies on the assumption that, when an individual becomes active in planning a terrorist attack, his/her friends/associates will have some inkling of the individuals plan. Accordingly, even if the individual is not under active surveillance by the authorities, but the individual’s friends/associates are, the individual planning the attack can be uniquely identified. We applied our technique on two terrorist networks, one involved in an attack in Paris and the other involved in the 9/11 attack. We show that, in the Paris network, if 5 of the 10 individuals were monitored, the attackers most likely would have been exposed. If only 15 out of the 37 individuals involved in the 9/11 attack were under surveillance, specific individuals involved in the planning of the 9/11 attack would have been exposed.

KW - Approximation algorithm

KW - Computational complexity

KW - Identification code

KW - Terrorist network

UR - http://www.scopus.com/inward/record.url?scp=85049773670&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85049773670&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-93372-6_36

DO - 10.1007/978-3-319-93372-6_36

M3 - Conference contribution

AN - SCOPUS:85049773670

SN - 9783319933719

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 329

EP - 339

BT - Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings

A2 - Bisgin, Halil

A2 - Thomson, Robert

A2 - Hyder, Ayaz

A2 - Dancy, Christopher

PB - Springer Verlag

ER -