“…To overcome the lack of complete data, researchers have applied probabilistic modeling (Miffen, Boner, Godfrey, & Skokan 2004) and Markov processes (Kaplan, 2010), used overlapping network assumptions (Atkinson & Wein, 2010), and approached the problem from a network topology perspective (Xu & Chen, 2008) to model terrorist networks. They have successfully applied social network analysis (SNA) to covert networks such as corporate price fixing, organized crime, drug trafficking, and terrorist groups (e.g., Krebs, 2002;Sageman, 2004;Xu, Marshall, Kaza, & Chen, 2004;Rodriguez, 2005;Keefe, 2006;Natarajan, 2006;Reid, Chen, & Xu, 2007;Bright et al, 2012;Senekal, 2014). Critical to this success has been the more recent use of social media networks and the analysis of these networks and data using existing social network analysis techniques (Everton, 2012a;Schroeder, Everton, & Shepherd, 2012;Freeman & Schroeder, 2014) and new techniques such as real-time Twitter data analysis and visualization (Cheong & Lee, 2011;Dudas, 2013).…”