crime and terror: mathematical exploration and modeling of dark networks

39
Dark Networks are Different Cascade Resilience in Dark Networks Agent-Based Model of Banned Radical Groups C RIME AND T ERROR MATHEMATICAL EXPLORATION AND MODELING OF DARK NETWORKS A. “Sasha” Gutfraind University of Texas at Austin University of Waterloo 2011 A. “Sasha” Gutfraind Crime and Terror

Upload: waterloo-institute-for-complexity-and-innovation

Post on 30-Mar-2016

215 views

Category:

Documents


0 download

DESCRIPTION

The study of Complex Networks (CN), that is, unstructured graphs, has originated in the 1970s in sociological research and has since been applied to problems such as infrastructure security, cybersecurity, epidemiology, and enriched many others. A very special subfield of CN is the problem of dark networks: how are these networks organized, structured, and how might they be disrupted? I will report on some of the most important approaches in this area, and some of my own results. Dark networks are often organized in a very unique way as compared to other networks and even other social networks. Namely, they are organized into cells, and this organization is consistent with two simple computational models. Despite those advances, there are many open problems in the field, primarily the problem of predicting network evolution both for open social networks and for dark networks who might be subject to attack.

TRANSCRIPT

Page 1: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

CRIME AND TERRORMATHEMATICAL EXPLORATION AND MODELING OF DARK

NETWORKS

A. “Sasha” Gutfraind

University of Texas at Austin

University of Waterloo 2011

A. “Sasha” Gutfraind Crime and Terror

Page 2: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

NETWORK SCIENCE

How did this network emerge?

How is it structured?

How does it change?Newman MEJ. “Physics of Networks”, Physics Today 2008.

A. “Sasha” Gutfraind Crime and Terror

Page 3: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

UNIFYING IDEAS (1999-2001)

Distribution of node degrees. Newman MEJ, 2003.

Emerged through a “Preferential Attachment” process

Highly-clustered with a many “small-world” shortcuts

When attacked, it’s “robust [spokes] yet fragile [hubs]”

A. “Sasha” Gutfraind Crime and Terror

Page 4: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

OUTLINE

1 DARK NETWORKS ARE DIFFERENT

2 CASCADE RESILIENCE IN DARK NETWORKS

3 AGENT-BASED MODEL OF BANNED RADICAL GROUPS

Key findings:

Dark networks 6= Other complex networks

Two flavors of dark networks: Designed and Spontaneous

Open problems in formation and dynamics

A. “Sasha” Gutfraind Crime and Terror

Page 5: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

AL-QAIDA 2001

Xu, J. and Chen, “The topology of dark networks”, Comm. ACM, October 2008.

A. “Sasha” Gutfraind Crime and Terror

Page 6: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

THE 9/11 NETWORK AND FTP

0

1

2

3

4

5

67

8

9

10

11

121314

15

1617

18 1920

21

2223

2425 26

2728 29

303132

3334

35

363738

Krebs, “Mapping Networks of Terrorist Cells”, Connections 24(3), 2002; AG, “Optimizingtopological cascade resilience based on the structure of terrorist networks,” PLoS ONE,10.1371, 2010;

A. “Sasha” Gutfraind Crime and Terror

Page 7: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

PARIS 1944

A. “Sasha” Gutfraind Crime and Terror

Page 8: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

ABSTRACT MODEL FOR DESIGNING DARK NETWORK

Hypothesis: compartmentalization provides cascade resiliencewhile maintaining performance

Approach: Recreate the network design problem

Optimal network G ∈G maximizes a mix of

Resilience R(G)Efficiency W (G)

Optimization problem over “design” space G:

maxG∈G

rR(G)+(1− r)W (G)︸ ︷︷ ︸Fitness

A. “Sasha” Gutfraind Crime and Terror

Page 9: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

CASCADE ILLUSTRATION

τ

τ

Time 1

τ

Time 2

A. “Sasha” Gutfraind Crime and Terror

Page 10: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

RESILIENCE AND EFFICIENCY

Resilience to cascade of network

R(G) = 1− 1n−1

E[extent of cascade that starts at a single node]

Efficiency (or Value)

W (G) =1

n(n−1) ∑u,v 6=u∈V

1d(u,v)

FitnessF(G) = rR(G)+(1− r)W (G)

A. “Sasha” Gutfraind Crime and Terror

Page 11: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

FITNESS OF EMPIRICAL NETWORKS (r = .51)

0.0 0.2 0.4 0.6 0.8 1.0�

0.1

0.2

0.3

0.4

0.5

0.6

0.7Fi

tnes

s11M9/11CollabNetEmailFTPGnutellaInternet AS

A. “Sasha” Gutfraind Crime and Terror

Page 12: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

PERCOLATION THEOREM

THEOREM

Let G be a graph on n nodes with edges sampled independently withprobability p. Then in the limit n→ ∞ with probability→1 the graph isconnected if p > logn

n and disconnected otherwise.

FIGURE: Random graph with n = 50. (a) p = 0.02, (b) p = 0.05

Erdos, P and Renyi, A, “On the evolution of random graphs”, Pub. Math.Instit. Hungar.Acad.Sci 1960.

A. “Sasha” Gutfraind Crime and Terror

Page 13: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

NETWORK DESIGNS

Networks based on Erdos-Renyi (ER) random graph G(n,p)

Networks based on Connected Stars design

Others

A. “Sasha” Gutfraind Crime and Terror

Page 14: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

IMPORTANCE OF CELLS (r = .51)

0.0 0.2 0.4 0.6 0.8 1.0

τ

0.6

0.7

0.8

0.9

1.0

Fitn

ess

ConnCliquesConnStarsCliquesCyclesERStars

Connected Stars (cells) beats ER!A. “Sasha” Gutfraind Crime and Terror

Page 15: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

AVERAGE DEGREE

0.0 0.2 0.4 0.6 0.8 1.0

τ

101

102

Avg D

egre

e+

1

ConnCliquesConnStarsCliquesCyclesERStars

FIGURE: r = .49

0.0 0.2 0.4 0.6 0.8 1.0

τ100

101

102

Avg D

egre

e+

1

ConnCliquesConnStarsCliquesCyclesERStars

FIGURE: r = .51

Bifurcation around r = 0.5: maximize efficiency (high averagedegree) or resilience (low average degree)

A. “Sasha” Gutfraind Crime and Terror

Page 16: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

EFFICIENT FRONTIER (τ = 0.4)

0.0 0.2 0.4 0.6 0.8 1.0

Resilience0.0

0.2

0.4

0.6

0.8

1.0Eff

icie

ncy

ConnCliquesConnStarsCliquesCyclesERStars

A. “Sasha” Gutfraind Crime and Terror

Page 17: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

HOME-GROWN TERROR CELLS

Emerge spontaneously as radicals find one another andmobilize

Most notorious cases:Madrid 2003-03-11 and London 2005-07-07 bombings

Recent cases in Canada:2006 “Toronto 18” plot

Severe challenge to law enforcement!

How do those networks emerge, despite the risk and the low density?

A. “Sasha” Gutfraind Crime and Terror

Page 18: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

SIZES OF UNDERGROUND CELLS

1 2 3 4 5 6 7 8 9 10 11 12 13

Cell Size

0.0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

Pro

bab

ility

Environmentalist

Right-Wing

Islamist

A. “Sasha” Gutfraind Crime and Terror

Page 19: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

RANDOM INTERSECTION GRAPHS

DEFINITION

[Sociological] Magnet is any place (physical or online) where newfriendships can form (e.g. pub, pickup volleyball team, book club).

DEFINITION

A Uniform Random Intersection Graph G(n,k ,p) assigns each of then nodes each of the k colours at random with probability p. An edge(i, j) ∈ G iff i and j have at least one shared color.

K1 K3K2 K4

1 2 3 4 5 6

A. “Sasha” Gutfraind Crime and Terror

Page 20: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

SELF-ASSEMBLY OF TERRORIST CELLS

Genkin, AG: “How Do Terrorist Cells Self-Assemble”. Winner: best paper award AmericanSociological Association, 2008.

A. “Sasha” Gutfraind Crime and Terror

Page 21: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

SUMMARY OF FINDINGS

A. “Sasha” Gutfraind Crime and Terror

Page 22: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

CELL SIZE VS. MAGNETS

THEOREM

Let G(n,k ,p) with k ≤ n. Then in the limit n→ ∞ with probability→1the graph is connected if and only if p > logn

k .

Fill, Scheinerman, Singer-Cohen: “Random intersection graphs when m = w(n)”. Rand.Struct. Algorithms, 16(2), 2000.

A. “Sasha” Gutfraind Crime and Terror

Page 23: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

SIZES OF UNDERGROUND CELLS

1 2 3 4 5 6 7 8 9 10 11 12 13

Cell Size

0.0

0.1

0.2

0.3

0.4

0.5

0.6

Pro

bab

ility

Empirical

Simulated

A. “Sasha” Gutfraind Crime and Terror

Page 24: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

OPEN QUESTIONS

Scaling is P(X ≥ x)∼ x2.5 for a variety of regions. What drivesthis?How do networks heal after attacks?

Clauset, A. et al “On the Frequency of Severe Terrorist Events”, Journal of Conflict Resolution,51(1), 2007.

A. “Sasha” Gutfraind Crime and Terror

Page 25: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

SUMMARY

Dark networks 6= Other complex networks

Two flavors of dark networks: Designed and Spontaneous

Open problems in formation and dynamics

[email protected]

Thanks to Michael Genkin, Rick Durrett, Aric Hagberg

A. “Sasha” Gutfraind Crime and Terror

Page 26: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

OPTIONAL SLIDES

Optional Slides

A. “Sasha” Gutfraind Crime and Terror

Page 27: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

NETWORK DESIGNS I

Multiple independent cells:

Cliques, Cycles and StarsCascade-proof edges (not shown) could provide connectivity

A. “Sasha” Gutfraind Crime and Terror

Page 28: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

NETWORK DESIGNS II

Erdos-Renyi (ER) random graph G(n,p)

Connected Cliques

Connected Stars

A. “Sasha” Gutfraind Crime and Terror

Page 29: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

11M NETWORK

A. “Sasha” Gutfraind Crime and Terror

Page 30: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

IMPLICATIONS

Star-like features improve resilience

For some network designs, efforts are best put improvingefficiency not cascade resilience; for others the other wayaround.

For terrorist networks, depending on their design and cascaderecovery (r ), it might be possible to induce phase transitionswhere their fitness drops or tactics turn non-violent.

A. “Sasha” Gutfraind Crime and Terror

Page 31: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

RESULTS ABOUT FITNESS

LEMMA 1For a given design G, the fitness of the optimal configuration is adecreasing function of τ (cascade risk) and g (attenuation).

LEMMA 2For a given design G, the fitness of the optimal configuration is acontinuous function of r (the weight of resilience).

Notes

Lemma 1 for τ stems from “monotonicity” of cascades.

Lemma 2 - a standard result in multi-objective optimization?

Fitness need not be a continuous function of τ .

A. “Sasha” Gutfraind Crime and Terror

Page 32: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

SOLUTION PROCESS

Huge solution space:

Brute force is not an option: O(exp(c2 nlogn )) graphs on n nodes

Optimal set could be too large to analyze

Solution idea: search the space of graph-generating programs

Only a few parameters are enough to configuration a programActual networks are similar: constructed through “protocols”

Solving the optimization problem

Grid Search & Derivative-Free OptimizationProcedure: “Design” + Configuration =⇒Instances of networks=⇒evaluation of resilience & efficiencyCascade extent is found by simulation

A. “Sasha” Gutfraind Crime and Terror

Page 33: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

RESILIENCE R(G) OF OPTIMAL NETWORKS

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Resi

lience

ConnCliquesConnStarsCliquesCyclesERStars

FIGURE: r = .49

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Resi

lience

ConnCliquesConnStarsCliquesCyclesERStars

FIGURE: r = .51

Bifurcation around r = 0.5: optimize for resilience or for efficiency

A. “Sasha” Gutfraind Crime and Terror

Page 34: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

EFFICIENCY W (G) OF OPTIMAL NETWORKS

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Eff

icie

ncy

ConnCliquesConnStarsCliquesCyclesERStars

FIGURE: r = .49

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Eff

icie

ncy

ConnCliquesConnStarsCliquesCyclesERStars

FIGURE: r = .51

A. “Sasha” Gutfraind Crime and Terror

Page 35: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

CELL SIZE k OF OPTIMAL NETWORKS

0.0 0.2 0.4 0.6 0.8 1.0τ

100

101

102

ConnCliquesConnStarsCliquesCyclesStars

FIGURE: r = .49

0.0 0.2 0.4 0.6 0.8 1.0τ

100

101

102

ConnCliquesConnStarsCliquesCyclesStars

FIGURE: r = .51

A. “Sasha” Gutfraind Crime and Terror

Page 36: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

PARAMETER p OF OPT. NETWORKS

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

ConnCliquesConnStarsER

FIGURE: r = .49

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0ConnCliquesConnStarsER

FIGURE: r = .51

A. “Sasha” Gutfraind Crime and Terror

Page 37: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

ACCURACY OF OPTIMAL k

0.0 0.2 0.4 0.6 0.8 1.0τ

0

10

20

30

40

50

60

70

80ConnCliquesConnStarsCliquesCyclesStars

FIGURE: r = .49

0.0 0.2 0.4 0.6 0.8 1.0τ

0

10

20

30

40

50 ConnCliquesConnStarsCliquesCyclesStars

FIGURE: r = .75

A. “Sasha” Gutfraind Crime and Terror

Page 38: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

FITNESS LANDSCAPE FOR STARS DESIGN

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

r 0.5600.6

40

0.7

20

0.8

00

0.880

0.960

FIGURE: g = 0.5

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

r

0.300

0.400

0.500

0.600

0.700

0.800

0.900

FIGURE: g = 2.0

at low g, hardest to optimize near r = 0.5Stars is slightly biased towards maximizing resilience.

A. “Sasha” Gutfraind Crime and Terror

Page 39: Crime and Terror: Mathematical Exploration and Modeling of Dark Networks

Dark Networks are DifferentCascade Resilience in Dark Networks

Agent-Based Model of Banned Radical Groups

BINARY & WEIGHTED REPRESENTATION

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Fitn

ess

11M (binary)11M (weighted)9/11 (binary)9/11 (weighted)

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Resi

lienc

e

11M (binary)11M (weighted)9/11 (binary)9/11 (weighted)

0.0 0.2 0.4 0.6 0.8 1.0τ

0.0

0.2

0.4

0.6

0.8

1.0

Effic

ienc

y

11M (binary)11M (weighted)9/11 (binary)9/11 (weighted)

A. “Sasha” Gutfraind Crime and Terror