-
2
-
-
0038401985
-
"Mapping Networks of Terrorist Cells"
-
V. Krebs. "Mapping Networks of Terrorist Cells," Connections, 24 (3) (2002), pp. 43-52.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.1
-
3
-
-
33748510935
-
"The Study of Social Networks"
-
Available at accessed 17 May
-
L. Freeman. "The Study of Social Networks," The International Network for Social Network Analysis. Available at (http://www.sfu.ca/~insna/ INSNA/na_inf.html), accessed 17 May, 2004.
-
(2004)
The International Network for Social Network Analysis
-
-
Freeman, L.1
-
4
-
-
33748487344
-
"A Social Network Analysis of the Iranian Government"
-
paper presented at 12-14 June
-
R. Renfro and R. Deckro. "A Social Network Analysis of the Iranian Government," paper presented at 69th MORS Symposium, 12-14 June, 2001, p. 4.
-
(2001)
69th MORS Symposium
, pp. 4
-
-
Renfro, R.1
Deckro, R.2
-
6
-
-
33748511161
-
"Secrecy News: Social Network Analysis and Intelligence"
-
[online], Available at last accessed 17 May
-
S. Aftergood. "Secrecy News: Social Network Analysis and Intelligence" [online], Federation of American Scientists Project on Government Secrecy, Vol. 2004, 15. Available at (http://www.fas.org/sgp/news/secrecy/2004/02/020904.html), last accessed 17 May, 2004.
-
(2004)
Federation of American Scientists Project on Government Secrecy
, vol.2004
, pp. 15
-
-
Aftergood, S.1
-
7
-
-
0012254042
-
"The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects"
-
M. Sparrow. "The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects," Social Networks, 13 (1991), pp. 251-252.
-
(1991)
Social Networks
, vol.13
, pp. 251-252
-
-
Sparrow, M.1
-
8
-
-
0012254042
-
"The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects"
-
Ibid., p. 252.
-
(1991)
Social Networks
, vol.13
, pp. 252
-
-
Sparrow, M.1
-
9
-
-
0012254042
-
"The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects"
-
Ibid., p. 253.
-
(1991)
Social Networks
, vol.13
, pp. 253
-
-
Sparrow, M.1
-
10
-
-
0012254042
-
"The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects"
-
Ibid., pp. 261-263.
-
(1991)
Social Networks
, vol.13
, pp. 261-263
-
-
Sparrow, M.1
-
11
-
-
84923618755
-
"The Social Organisation of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry"
-
W. Baker and R. Faulkner. "The Social Organisation of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry," American Sociological Review, 58 (6) (1993), pp. 837-860.
-
(1993)
American Sociological Review
, vol.58
, Issue.6
, pp. 837-860
-
-
Baker, W.1
Faulkner, R.2
-
12
-
-
33748493726
-
"A Social Network Analysis of the Iranian Government"
-
R. Renfro and R. Deckro. "A Social Network Analysis of the Iranian Government."
-
-
-
Renfro, R.1
Deckro, R.2
-
13
-
-
0035738867
-
"The Devil You Know: Continuing Problems with Research on Terrorism"
-
A. Silke. "The Devil You Know: Continuing Problems with Research on Terrorism," Terrorism and Political Violence, 13 (4) (2001), p. 3.
-
(2001)
Terrorism and Political Violence
, vol.13
, Issue.4
, pp. 3
-
-
Silke, A.1
-
14
-
-
84937345454
-
"Talking to 'Terrorists': Towards an Independent Analytical Framework for the Study of Violent Substate Activism"
-
D. Brannan, P. Esler, and N. Strindberg. "Talking to 'Terrorists': Towards an Independent Analytical Framework for the Study of Violent Substate Activism," Studies in Conflict and Terrorism, 24 (1) (2001, p. 20.
-
(2001)
Studies in Conflict and Terrorism
, vol.24
, Issue.1
, pp. 20
-
-
Brannan, D.1
Esler, P.2
Strindberg, N.3
-
16
-
-
33748479854
-
-
Refers to conflict and crime in which the subjects are organised as networks without leaders, as oppose to hierarchical networks
-
Refers to conflict and crime in which the subjects are organised as networks without leaders, as oppose to hierarchical networks.
-
-
-
-
19
-
-
33748517352
-
-
NAACSOS Conference Proceedings, Pittsburgh, PA
-
K. Carley, J. Reminga, and N. Kamneva. 2003. Destabilising Terrorist Networks, NAACSOS Conference Proceedings, Pittsburgh, PA.
-
(2003)
Destabilising Terrorist Networks
-
-
Carley, K.1
Reminga, J.2
Kamneva, N.3
-
20
-
-
85044913143
-
"Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivilance"
-
M. Tsvetovat and K. Carley. "Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivilance," Journal of Social Structure, 6 (2) (2005) pp. 23-28.
-
(2005)
Journal of Social Structure
, vol.6
, Issue.2
, pp. 23-28
-
-
Tsvetovat, M.1
Carley, K.2
-
21
-
-
3042526674
-
"Terrorist/Liberators: Researching and Dealing with Adversary Social Networks"
-
K. Van Meter. "Terrorist/Liberators: Researching and Dealing with Adversary Social Networks," Connections, 24 (3) (2002), pp. 66-78.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 66-78
-
-
Van Meter, K.1
-
22
-
-
33748487971
-
-
All essential elements of social network analysis
-
All essential elements of social network analysis.
-
-
-
-
23
-
-
33748501637
-
"Mapping Networks of Terrorist Cells"
-
Krebs. "Mapping Networks of Terrorist Cells."
-
-
-
Krebs, V.1
-
25
-
-
34248045384
-
"Breaking al-Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making)"
-
J. Farley. "Breaking al-Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making)," Studies in Conflict & Terrorism, 26(6) (2003), pp. 399-411.
-
(2003)
Studies in Conflict & Terrorism
, vol.26
, Issue.6
, pp. 399-411
-
-
Farley, J.1
-
26
-
-
11144288407
-
"Destabilising Dynamic Covert Networks"
-
National Defence War College: Washington DC
-
K. Carley, M. Dombroski, M. Tsvetovat, J. Reminga and N. Kamenva. "Destabilising Dynamic Covert Networks," Proceedings of the 8th International Command and Control Research and Technology Symposium, National Defence War College: Washington DC (2003).
-
(2003)
Proceedings of the 8th International Command and Control Research and Technology Symposium
-
-
Carley, K.1
Dombroski, M.2
Tsvetovat, M.3
Reminga, J.4
Kamenva, N.5
-
28
-
-
84878459561
-
-
(Carnegie Mellon University, Pittsburgh, Pennsylvania)
-
K. Carley, J. Diesner, J. Reminga, and M. Tsvetovat. Toward an Interoperable Dynamic Network Analysis Toolkit (Carnegie Mellon University, Pittsburgh, Pennsylvania, 2005).
-
(2005)
Toward an Interoperable Dynamic Network Analysis Toolkit
-
-
Carley, K.1
Diesner, J.2
Reminga, J.3
Tsvetovat, M.4
-
29
-
-
33748505375
-
-
The significance of such research is evidenced by the amount of further research drawn from Krebs's study
-
The significance of such research is evidenced by the amount of further research drawn from Krebs's (2002) study.
-
(2002)
-
-
-
33
-
-
33748477631
-
-
All of the data presented in this article are from unclassified, open sources
-
All of the data presented in this article are from unclassified, open sources.
-
-
-
-
34
-
-
20644445032
-
-
Australian Department of Foreign Affairs and Trade. (Canberra: National Capital Printing)
-
Australian Department of Foreign Affairs and Trade. Transnational Terrorism: The Threat to Australia (Canberra: National Capital Printing, 2004).
-
(2004)
Transnational Terrorism: The Threat to Australia
-
-
-
40
-
-
33748490984
-
-
(Sydney: Harper Collins Publishers)
-
S. Neighbour. In the Shadows of Swords (Sydney: Harper Collins Publishers, 2004), pp. 224-226.
-
(2004)
In the Shadows of Swords
, pp. 224-226
-
-
Neighbour, S.1
-
43
-
-
33748512012
-
"The Night Terror Touched Our Lives: Bali Remembered - How the Terror Unfolded"
-
(4 October)
-
D. Goodsir and W. Miller. "The Night Terror Touched Our Lives: Bali Remembered - How the Terror Unfolded," The Age (4 October, 2003), p. 2
-
(2003)
The Age
, pp. 2
-
-
Goodsir, D.1
Miller, W.2
-
46
-
-
33748500362
-
"The Night Terror Touched Our Lives"
-
Goodsir and Miller. 2003. "The Night Terror Touched Our Lives."
-
(2003)
-
-
Goodsir, D.1
Miller, W.2
-
48
-
-
33748497754
-
"Ruthless Enforcer Pulled the Strings"
-
11 September
-
D. Goodsir. "Ruthless Enforcer Pulled the Strings," The Sydney Morning Herald, 11 September, 2003, p. 9.
-
(2003)
The Sydney Morning Herald
, pp. 9
-
-
Goodsir, D.1
-
49
-
-
33748500362
-
"The Night Terror Touched Our Lives"
-
Goodsir and Miller, "The Night Terror Touched Our Lives," p. 2.
-
-
-
Goodsir, D.1
Miller, W.2
-
51
-
-
33748500362
-
"The Night Terror Touched Our Lives"
-
Goodsir and Miller, "The Night Terror Touched Our Lives," p. 2.
-
-
-
Goodsir, D.1
Miller, W.2
-
53
-
-
33748478504
-
-
Apart from the one incident where a small amount of the explosives detonated, and the group left to demonstrate to inquisitive neighbors that the noise was of no significance
-
Apart from the one incident where a small amount of the explosives detonated, and the group left to demonstrate to inquisitive neighbors that the noise was of no significance.
-
-
-
-
55
-
-
33748478970
-
"The Bali Bomber's Song"
-
18 February
-
"The Bali Bomber's Song," Jakarta Tempo, 18 February, 2003.
-
(2003)
Jakarta Tempo
-
-
-
56
-
-
33748500362
-
"The Night Terror Touched Our Lives"
-
Goodsir and Miller, "The Night Terror Touched Our Lives," p. 2.
-
-
-
Goodsir, D.1
Miller, W.2
-
58
-
-
84904783856
-
-
Four Corners, Australian Broadcasting Corporation, Sydney, 10 February
-
The Bali Confessions. Four Corners, Australian Broadcasting Corporation, Sydney, 10 February 2003.
-
(2003)
The Bali Confessions
-
-
-
59
-
-
33748490408
-
"Ex-UTM Don and Samudra Charged"
-
3 June
-
E. Chua. "Ex-UTM Don and Samudra Charged," The Business Times, 3 June 2003, p. 20.
-
(2003)
The Business Times
, pp. 20
-
-
Chua, E.1
-
61
-
-
33748500362
-
"The Night Terror Touched Our Lives"
-
Goodsir and Miller. "The Night Terror Touched Our Lives," p. 2.
-
-
-
Goodsir, D.1
Miller, W.2
-
66
-
-
33748497230
-
-
note
-
Ties such as family, religion, and friendship are considered to be dormant during the covert stage of an operation, as the only interactions that bind individuals together are those that concern the operation. These are the interactions that can be tracked and monitored by counterterrorism authorities.
-
-
-
-
74
-
-
33748517347
-
-
Such measures also ensure that the focus and length criticisms of case studies are abided by
-
Such measures also ensure that the focus and length criticisms of case studies are abided by.
-
-
-
-
81
-
-
33748501854
-
-
This "degree" simply equates to the number of links the individual node possesses
-
This "degree" simply equates to the number of links the individual node possesses.
-
-
-
-
82
-
-
33748495718
-
-
The standardization of results was devised by Beauchamp in
-
The standardization of results was devised by Beauchamp in 1965.
-
(1965)
-
-
-
84
-
-
0013987194
-
"The Centrality Index of a Graph"
-
G. Sabidussi. "The Centrality Index of a Graph," Psychometrika, 31 (1966), pp. 581-603.
-
(1966)
Psychometrika
, vol.31
, pp. 581-603
-
-
Sabidussi, G.1
-
85
-
-
84865730611
-
"A Set of Measures of Centrality Based on Betweenness"
-
L. Freeman. "A Set of Measures of Centrality Based on Betweenness," Sociometry, 40 (1977), pp. 35-41.
-
(1977)
Sociometry
, vol.40
, pp. 35-41
-
-
Freeman, L.1
-
88
-
-
33748513394
-
-
This last role was reserved for the members of Team Lima
-
This last role was reserved for the members of Team Lima.
-
-
-
-
89
-
-
33748492484
-
-
Areas of a network with 100% density (every member interacts with every other member)
-
Areas of a network with 100% density (every member interacts with every other member).
-
-
-
-
90
-
-
33748503856
-
-
note
-
This is not unfeasible, as the operations are conducted by individuals with the same training and indoctrination (Afghanistan and Mindanao), and are often planned and executed by the same individuals.
-
-
-
|