Open Source Network Analysis: Difference between revisions
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
'''= the use of open information sources to apply Social Network Analysis''' | '''= the use of open information sources to apply Social Network Analysis''' | ||
| Line 19: | Line 18: | ||
[[Category:Relational]] | [[Category:Relational]] | ||
[[Category:Open]] | |||
[[Category:Encyclopedia]] | [[Category:Encyclopedia]] | ||
Latest revision as of 05:55, 31 July 2008
= the use of open information sources to apply Social Network Analysis
Description
From http://www.csmonitor.com/2007/0108/p09s01-coop.html :
"Advanced technology and Web-savvy citizenry now make it possible for open-source information gathering to rival, if not surpass, the clandestine intelligence produced by government agencies.
Indeed, open-source methods have already proved their worth in counterterrorism. Shortly after Sept. 11, Valdis Krebs, a security expert, re-created the structure and identities of the core Al Qaeda network using publicly available information accessed from the Internet. He started with two 9/11 hijackers, Nawaf al-Hazmi and Khalid Almihdhar, who were identified from a photograph taken while they attended a meeting with known terrorists in Malaysia in 2000. By scanning public sources for information linking these suspects to others, he re-created the social network identifying all 19 hijackers and described their relationships to their coconspirators, including the identification of Mohammed Atta as the ringleader."
Examples
See http://www.networkweaving.com/blog/2007/06/osna-bgo.html