124 research outputs found
Poisonous connections:a case study on a Czech counterfeit alcohol distribution network
Using data on 32 actors and ties among them drawn from available court files, we combine analytical sociology with statistical models for networks in order to analyse a case of a counterfeit alcohol distribution network from the Czech Republic. We formulate a theory of action and identify relational mechanisms which could explain how the structure of the network emerged and describe. We use the exponential random graph model to test these mechanisms. The analysis reveals that the two actors capable of manufacturing the poisonous mixture were considerably though not optimally proximate to others enabling fast distribution of the mixture. Our model results that the structure was formed by mechanisms of triadic closure, negative tendency to concentrate ties, and tie translation of pre-existing ties into operational ties. We conclude with the discussion of the implications our approach for the study of criminal networks
A New Framework for Network Disruption
Traditional network disruption approaches focus on disconnecting or
lengthening paths in the network. We present a new framework for network
disruption that attempts to reroute flow through critical vertices via vertex
deletion, under the assumption that this will render those vertices vulnerable
to future attacks. We define the load on a critical vertex to be the number of
paths in the network that must flow through the vertex. We present
graph-theoretic and computational techniques to maximize this load, firstly by
removing either a single vertex from the network, secondly by removing a subset
of vertices.Comment: Submitted for peer review on September 13, 201
About Modelling of Complex Networks with Applications to Terrorist Group Modelling
Based on available data on various organisations and networks, the article explores some key properties of the structure of a terrorist organisation. Analytical focus is on lower levels of organisational hierarchy, where network structure with exponential distribution of the number of links
among network nodes is clearly visible. Such networks tend to grow organically, are very efficient in information diffusion, and are robust regarding stochastic failures and targeted attacks. These network
features are illustrated by recent example based on network data about September 11, 2001 attacks on New York and Washington
The Use of Structures in Communication Networks to Track Membership in Terrorist Groups
This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any)legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells,but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here
- …