Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

16
Counterterrorism’s New Tool: ‘Metanetwork’ Analysis John Bohannon Presenter: Mustafa Kilavuz

description

John Bohannon. Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis. Presenter: Mustafa Kilavuz. Acts in Baghdad. Shyam Sankar proposes looking at the geospatial distribution of significant acts on the map of Baghdad. - PowerPoint PPT Presentation

Transcript of Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Page 1: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Counterterrorism’s New Tool:‘Metanetwork’ Analysis

John Bohannon

Presenter: Mustafa Kilavuz

Page 2: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Acts in Baghdad

Shyam Sankar proposes looking at the geospatial distribution of significant acts on the map of Baghdad.

They investigate the bars on the map indicating the daily acts in April and May 2008 such as: Suicide bombings Mortar attacks Improvised explosive device (IED)

detonations

Page 3: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Sadr City District

As they go through the timeline they find dense events in Sadr City District.

The attacks seem to be correlated over time and space with the construction of this security wall, forming a line.

This information is important to predict the insurgents’ next moves.

Page 4: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Terrorist Network

Sinensky works on a social network with the Naval Postgraduate School that shows the people connected to Noordin Mohammed Top who is Southeast Asia’s most wanted terrorist.

The graph represents the suspects’ known communications and relationships, as well as their known involvement with terrorist plots.

Page 5: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Conspiracy Map

Page 6: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Analysis Techniques Sinensky applies betweenness, centrality,

and eigenvector centrality and they see Noordin is the first in the list.

How about the second and the third names? After September 11 attacks social networks

were used more in the warfare analysis. Some in the U.S. military worries about they

put too much faith in it. One former U.S. official claims that they led

to unethical practices.

Page 7: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Investigating Networks:The Dark Side

Side Story

Page 8: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Tangled Maps

It emerged that the 9/11 attacks were not work of a government but a team of international terrorists: 19 hijackers and dozens of supporters (funding, logistic).

The intelligence community was desperate for any help they could get to prevent another attack.

Valdis Krebs made a social network from the information on the news: meetings, residences, and financial transections.

Page 9: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Krebs’ Analysis

Mohammed Atta scored highest on Degrees: Intensity of his activity Closeness: Ability to access others Betweenness: Control over the flow in

the network He was the ringleader and a member

of Al-Qaeda

Page 10: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Expanding the network

By 2003, U.S. defense officials expanded the network by including insurgents in Afghanistan and Iraq.

The results disappointed Krebs. It didn’t really work to catch the bad guys.

Page 11: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Problems

They were good at modeling a static network but this network was highly dynamic. When someone dies or caught, someone else replaced him with own relations.

Noise increased as the graph grew. Mathematical analysis was not

enough by itself. Social analysis were needed. Pizza delivery guy problem

Page 12: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Could 7/7 Have Been Prevented? After bombing in London on July 7,

2005, a report is issued called “Could 7/7 Have Been Prevented?”

Using network analysis, the researchers traced the relations between plotters.

The result: “A hairball”

Page 13: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Dynamic Metanetwork Analysis Ian McCulloh, a U.S. Army major, proposed a

technique called “dynamic metanetwork analysis” which can adapt the change over time.

Instead of having a “who” network, different layers storing information about when, what, where and why are needed.

Carley, McCulloh’s advisor from the university, developed a computer program (ORA) that finds people who are a threat by using both mathematical and social metrics.

Page 14: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Network Extracted From Videos McCulloh and Carley investigated

1500 videos made by insurgents in Iraq.

As of March 2006, 3 of 4 U.S. soldier deaths were on tapes.

They extracted a big network out of these tapes which is kept as secret.

The actions taken according to this network reduced the sniper activities 70% and also reduced the IED deaths.

Page 15: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

IED Attack

Page 16: Counterterrorism’s New Tool: ‘ Metanetwork ’ Analysis

Conclusion Marc Sageman, a forensic psychiatrist, doesn’t

believe that the network works. According to him, there could be many reasons that the numbers drop.

Carley just counters that Sageman doesn’t get the methods.

The army established a network science center in Aberdeen, Maryland 2 years ago.

This year U.S. Army Research Lab is committing $162 million to research on “network-centric warfare”.

Carley is one of the academics applying for funding.