Uncovering Covert Structures: Social Network Analysis and Terrorist Organizations

Abstract

Social network analysis is a powerful method to analyze complex social networks. However, finding and gathering data that are suitable for social network analysis is often complex and time-consuming. This is particularly the case for clandestine networks such as terrorist organizations. In our research project, we used social network analysis to gather and analyze publicly available data from the United Nations Security Council on the Al-Qaeda terrorist network. We generated a new dataset which allowed us to map and analyze diverse features of the Al-Qaeda group structure. In this methods case, we introduce some of the key concepts and measures of social network analysis such as “node,” “tie/edge,” ordifferent “centrality” measures, and we provide insight on how we generated and analyzed the data fostering a basic understanding of social network analysis. Furthermore, we discuss the strength and weaknesses of social network analysis in analyzing terrorist networks and reflect on some of the advantages and shortcomings of our dataset. We also provide practical advice on several topics when using social network analysis. We suggest software, websites, and references to help start further social network analysis research projects. This research methods case should be most helpful for advanced students and researchers who want to use social network analysis in general and for researching terrorist networks in particular.

locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles