Home > Commentary, Operational analysis > “Edge of network connections” and terrorism

“Edge of network connections” and terrorism

September 29, 2009, 12:03 am Leave a comment Go to comments

I’ve had a lot of people ask  whether I plan to put out something formally on my “edge of network connections” theory and how it relates to terrorism . Short answer is yes. But not just yet.

First, it’s part of the thesis which must come well,  first. Second I want to fully unpack how I used it both in terms of my study and in my work at the AFP (as best I can using open source data), but to do so I need to wait until some trials are over. So hang tight on that. Once they are over and thesis is done I will get to it. And try to put it out formally if I can.

But by means of background for those of you interested, the idea of “edge of network connections” came to me many years ago when I was first interested in building a framework for my thesis that could be used in database solutions and in particular for mining un-structured data.

I’m still hoping to build that framework, but my thesis took a little detour into the world of doctrine so that will have to be a post thesis pull together.

But anyway, I’ve been fascinated by concept searching software, database mining, networks, ontologies and how it all comes together for many years. Lucky for me when I went into the AFP, the boys in this area were nice enough to humour me and teach me. And here we have the convergence from the IT stuff of “edge of networks” and into terrorism “edge of network connections”. I sort of got an idea from the computer stuff that I then worked with for my thesis. And I also thought it might have some applications in intelligence work. This idea was “edge of network connections” because in my study I kept seeing the same thing come up. And then of course with work I got to see more of the picture, which confirmed what I thought.

And then I got so interested that I ended up being on a working group that I subsequently chaired on Convergence Software. Basically it was a forward looking group that examined what intelligence solutions we would need to fully live up to our mantra of  intelligence led policing.   By that stage my  dear friend (who is the best analyst I have ever worked with and remains to this day my mentor in all things ct) and I had started our own project on green fields targeting (her idea) coupled with my idea (edge of network connections). It was a massive project as those analysts out there I am sure could appreciate. First we had to get the data, and confirm it was correct because one great thing about databases is everything is there. One bad thing about databases is that everything is there. So you have to sort out the wheat from the grass and make sure your data set is clean and accurate before you even get to the good stuff. And then you have to repeat each time you add new data.

Anyway, we were doing this manually (well sort of) with analysts notebook (yes it took months!). A great charting tool, but not good for network analysis (or social network analysis, although I know some purists have issues with us analysts co-opting that term for what we do). Anyway, we were half way through that when we got some tools to try and things really started to take off and we really started to see some good things happen. As I said I need to wait before I can explain that more fully. But the bottom line was that we were able to predict future cell members and we successfully did so. Pretty exciting stuff.

So I sat on the idea which came from the thesis stuff originally because it had more immediate applications at work. But now I’m not at work and I’m again looking at data like that from London ( transatlantic plots, 07/05 attacks, operation crevice), I think it is time to really unpack this and do some research that I hope will not only help us understand more fully “edge of network connections” and how they play into radicalisation trajectories and terrorist plots  but also for software solutions.  Won’t be perfect but it might be a start. So there you have it. Now I need to go do some work so this stupid thesis gets finished or my supervisors will kill me.

Like
Be the first to like this post.
  1. September 29, 2009, 12:59 am at 12:59 am | #1
    Reply | Quote

    I am looking forward to reading the thesis when it is done. Network analysis of the type you describe is large part of my own research.

    Also, if you ever have any questions regarding tools, I have tried most and am happy to provide advice/feedback. Glad to see you ditched i2!

    • Leah Farrall, Australia
      September 29, 2009, 1:49 am at 1:49 am | #2
      Reply | Quote

      Thank you Drew. I’ve seen your blog! It’s great. Am following your research with great interest and likewise looking forward to seeing your thesis. Actually your comments on your blog were what inspired my mention of how we have co-opted the term network analysis from its original meaning, since I noticed what you said about the origins of the term. Should have shouted out your blog too. Sorry for that.

  2. dd
    September 29, 2009, 2:30 am at 2:30 am | #3
    Reply | Quote

    Drew, Leah, you guys know where I can find an article on why Analyst Notebook is a limited tool to do network analysis ?

    • Leah Farrall, Australia
      September 29, 2009, 2:38 am at 2:38 am | #4
      Reply | Quote

      Not off the top of my head. But will look. Drew’s more the tech guru than me. But basically you can’t input the formulas you need into analysts notebook to do sophisticated analysis. It’s also limited in the types of data you can use for analysis viz charting. It can also go pear shaped running with certain databases. And actually depending on what database you are running you should be able to build a tool that pretty much does what analysts notebook does, but that works better with your own systems. Depends of course on the database and your in house development capacity. Some agencies prefer this since it solves a lot of issues with enterprise tools, updates etc and of course CLASS issues. But again Drew’s your man on that by the sounds of it. I just like to mutter rude words at the systems when they don’t do what I want (-:

  3. dd
    September 29, 2009, 3:21 am at 3:21 am | #5
    Reply | Quote

    Thanks for the reply Leah. Still got a lot to learn on network analysis. Seems Drew’s blog is a good starting point.

  4. September 29, 2009, 4:14 am at 4:14 am | #6
    Reply | Quote

    I do not know of any paper on the topic, per se, but I can some from personal experience Analyst Notebook if for drawing links charts, not for doing analysis.

    I have ranted on it a few times on my blog, but for something that may actually be useful you may want to check out this talk I gave at the NYC R Meetup in August on performing SNA in R

    http://www.drewconway.com/zia/?p=1221

    • Leah Farrall, Australia
      September 29, 2009, 4:26 am at 4:26 am | #7
      Reply | Quote

      Oooh this looks great. Will wait to I am fully awake to check this out. Thanks!

  1. No trackbacks yet.

Leave a Reply

V. interesting article “Illusions of Victory” Last one on CTC Sentinel