124 research outputs found

    Poisonous connections:a case study on a Czech counterfeit alcohol distribution network

    Get PDF
    Using data on 32 actors and ties among them drawn from available court files, we combine analytical sociology with statistical models for networks in order to analyse a case of a counterfeit alcohol distribution network from the Czech Republic. We formulate a theory of action and identify relational mechanisms which could explain how the structure of the network emerged and describe. We use the exponential random graph model to test these mechanisms. The analysis reveals that the two actors capable of manufacturing the poisonous mixture were considerably though not optimally proximate to others enabling fast distribution of the mixture. Our model results that the structure was formed by mechanisms of triadic closure, negative tendency to concentrate ties, and tie translation of pre-existing ties into operational ties. We conclude with the discussion of the implications our approach for the study of criminal networks

    A New Framework for Network Disruption

    Get PDF
    Traditional network disruption approaches focus on disconnecting or lengthening paths in the network. We present a new framework for network disruption that attempts to reroute flow through critical vertices via vertex deletion, under the assumption that this will render those vertices vulnerable to future attacks. We define the load on a critical vertex to be the number of paths in the network that must flow through the vertex. We present graph-theoretic and computational techniques to maximize this load, firstly by removing either a single vertex from the network, secondly by removing a subset of vertices.Comment: Submitted for peer review on September 13, 201

    An Information Theory Approach to Identify Sets of Key Players

    Get PDF

    About Modelling of Complex Networks with Applications to Terrorist Group Modelling

    Get PDF
    Based on available data on various organisations and networks, the article explores some key properties of the structure of a terrorist organisation. Analytical focus is on lower levels of organisational hierarchy, where network structure with exponential distribution of the number of links among network nodes is clearly visible. Such networks tend to grow organically, are very efficient in information diffusion, and are robust regarding stochastic failures and targeted attacks. These network features are illustrated by recent example based on network data about September 11, 2001 attacks on New York and Washington

    Bootstrapping a Terrorist Network

    Get PDF

    The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Get PDF
    This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any)legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells,but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here
    corecore