Open Source Network Analysis: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
No edit summary
 
No edit summary
 
Line 1: Line 1:
'''= the use of open information sources to apply Social Network Analysis'''
'''= the use of open information sources to apply Social Network Analysis'''


Line 19: Line 18:


[[Category:Relational]]
[[Category:Relational]]
[[Category:Open]]


[[Category:Encyclopedia]]
[[Category:Encyclopedia]]

Latest revision as of 05:55, 31 July 2008

= the use of open information sources to apply Social Network Analysis

Description

From http://www.csmonitor.com/2007/0108/p09s01-coop.html :

"Advanced technology and Web-savvy citizenry now make it possible for open-source information gathering to rival, if not surpass, the clandestine intelligence produced by government agencies.

Indeed, open-source methods have already proved their worth in counterterrorism. Shortly after Sept. 11, Valdis Krebs, a security expert, re-created the structure and identities of the core Al Qaeda network using publicly available information accessed from the Internet. He started with two 9/11 hijackers, Nawaf al-Hazmi and Khalid Almihdhar, who were identified from a photograph taken while they attended a meeting with known terrorists in Malaysia in 2000. By scanning public sources for information linking these suspects to others, he re-created the social network identifying all 19 hijackers and described their relationships to their coconspirators, including the identification of Mohammed Atta as the ringleader."


Examples

See http://www.networkweaving.com/blog/2007/06/osna-bgo.html