2021
DOI: 10.3390/e23101334
|View full text |Cite
|
Sign up to set email alerts
|

Entropy and Network Centralities as Intelligent Tools for the Investigation of Terrorist Organizations

Abstract: In recent years, law enforcement authorities have increasingly used mathematical tools to support criminal investigations, such as those related to terrorism. In this work, two relevant questions are discussed: “How can the different roles of members of a terrorist organization be recognized?” and “are there early signs of impending terrorist acts?” These questions are addressed using the tools of entropy and network theory, more specifically centralities (degree, betweenness, clustering) and their entropies. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 10 publications
(19 citation statements)
references
References 57 publications
1
1
0
Order By: Relevance
“…The global efficiency is also increasing at month 12, but not as sharply, given the precaution that communication is governed by intermediaries. In this sense, previous findings relating sharp changes in global network indicators with periods of intense activity of illicit organizations are confirmed [54,55]. A notable difference between the in and out degree entropies is also observed: the in-degree entropy reaches a global minimum at month 12, while the out-degree entropy reaches a global maximum.…”
Section: Discussion Of the Resultssupporting
confidence: 70%
See 1 more Smart Citation
“…The global efficiency is also increasing at month 12, but not as sharply, given the precaution that communication is governed by intermediaries. In this sense, previous findings relating sharp changes in global network indicators with periods of intense activity of illicit organizations are confirmed [54,55]. A notable difference between the in and out degree entropies is also observed: the in-degree entropy reaches a global minimum at month 12, while the out-degree entropy reaches a global maximum.…”
Section: Discussion Of the Resultssupporting
confidence: 70%
“…Monitoring the temporal evolution of the selected network indices in time may provide law enforcement authorities with data-oriented intelligence that can complement empirical evidence and expert opinion. This is demonstrated by the observed sharp increase in certain network indices during the monitoring period (Section 3.2), a finding that can be proved useful for alerting the authorities to increasing criminal activity [54,55].…”
Section: Contributionmentioning
confidence: 89%
“…We examine several attack strategies for sequentially removing nodes, based on different centrality criteria, reflecting distinct social roles in terrorist networks [48]:…”
Section: Methodology Attack Strategies and Datasetsmentioning
confidence: 99%
“…By mapping physical contacts within four real-world terrorist networks, the research uncovers distinctive roles linked to specific centrality values, and intriguingly, the imminent threat of an attack correlates with the evolutionary pattern of these centralities' entropies. This illuminates an invaluable tool for law enforcement, empowering them to not only identify pivotal figures within terrorist cells but also predict an imminent attack through monitoring the evolution of the centralities' entropies [48]. In a parallel vein, the second paper champions an innovative, quantitative, and unbiased methodology based on network theory to explore the distinct roles within terrorist organizations.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation