Researchers have increasingly turned to social network analysis (SNA) for gaining greater understanding of “dark networks,” that is, covert and illegal networks, such as terrorist groups and criminal gangs, which seek to conceal their activities from authorities.

Unfortunately, because data on dark networks is somewhat limited and often anecdotal, it is difficult to evaluate the various theories that researchers, academics, and subject matter experts have developed about what makes some dark networks successful and what the best intervention strategies are for disrupting them.

The only way to resolve these differences is for analysts to compare and contrast dark networks across time and space; only then can they identify those characteristics (e.g., level of centralization, cohesion) that tend to be associated with successful dark networks and those associated with unsuccessful ones. That is where the CORE Lab’s Dark Network Archive (CORE DNA) comes in.

Recent Networks

Anabaptist Leadership Network

Historically, organized religion has been associated with large-scale cooperative activities- sometimes including the use of violence against groups of religious outsiders. Originally used in the article, “Cultural inheritance or cultural diffusion of religious violence? A quantitative case study of the Radical Reformation,” (Matthews, Edmons, Wildman, Nunn, 2013), a network of sixteenth-century Anabaptist were created to understand how religious violence diffused through the congregations. Almost half of the congregations represented groups advocating for the use of violence to overthrow established churches and governments toward the ultimate goal of establishing Christian theocracies, with the other half being pacifists. Actors and their stances on violence in the network were defined and coded based on their appearances within Anabaptist literature, and systematic collection of states for Anabaptist denominations. The authors used a number of statistical analyses to determine that violent ideology may be learned independently from most other characteristics of an overall belief system, and/or may be determined more by congregationally inherited economic and political factors than by theology (Matthews, 2013). The data was expanded from 49 to 67 leaders with documented ties during its use in “Factors of Religious Violence and Path to Peace: A Study of the 16th Century Anabaptists,” (McLaughlin, J 2015) to include Anabaptist and Prodestant leaders that were influential during the Protestant Reformation and the Radical Reformation that have documented interactions. Documented interactions between individuals include instances of the actors meeting each other, or were in conversation, but in many cases, the leaders worked together, or went to school together. In other cases, they opposed one another in debates and were at total odds with one another. McLaughlin determines through a variety of statistical methods that the propagation of theology that sanctions the use of violence was limited to a particular group of people with a particular set of beliefs associated with three factors: charismatic leadership, isolation, and apocalypticism, while also being strongly impacted by the theologies of emerging leaders.

Australian Embassy Bombing 2004, Indonesia

These data depict the network of individuals involved in the 2004 Australian Embassy Bombing in Jakarta, Indonesia. This incident was perpetrated by Jemaah Islamiyah, a terrorist organization linked to the 2002 Bali bombing, and claimed the lives of 9 people while injuring 150 others. The authors of these dataset, JJATT, gathered these data from using ‘open source’ information. The present dataset reflects a combination of familial, friendship, and association relationships. As a dynamic dataset these relationships are depicted as subject to changes over time. The terrorist group, Jemaah Islamiyah, is a Southeast Asian militant extremist Islamist rebel group with ties to Al-Qaeda, that has committed numerous violent acts dedicated to the creation of an Islamic state in Southeast Asia. The group has cells in Indonesia, Singapore, Malaysia, and the Philippines, but remains particularly active in Indonesia where they maintain a public website. The September 9th, 2004 suicide bombing of the Australian embassy resulted in the deaths of 9 individuals, with all Australians being reported alive. Motivations for the September 9th, 2004 bombing of the Australian embassy are unclear, but possibly linked to the upcoming Indonesian presidential elections and/or the upcoming Australian elections, or the desired release of Abu Bakar Bashir, the spiritual leader of Jemaah Islamiyah. This was the third major attack targeting Australians in Indonesia, following the 2002 Bali bombing and 2003 Marriott Hotel bombing in Jakarta- both of which Jemaah Islamiyah has been suspected of orchestrating.

Bali bombings 2002, Indonesia

These data depict the network of indiduals involved in the 2002 Bali bombings in the tourist district of Kuta on Bali, Indonesia. This incident claimed the lives of 202 people (including 88 Australians, 38 Indonesians, 23 Britons, and 20 more people of differing nationalities), and injuring 209 more individuals. The attack on October 12, 2002, has been attributed to Jemaah Islamiyah, a violent Islamist extremist group dedicated to the creation of an Islamic state in Southeast Asia that has links to Al-Qaeda. A suicide bomber detonated an explosive device inside of Paddy’s Pub, a local establishment popular with Australian and Western tourists, causing individuals to flee into the street where a second car bomb was detonated. A third device was detonated outside of the United States consulate in Denpasar, Bali, Indonesia, but was significantly smaller and caused minimal damage and no deaths. Motivation for the attack is believed to be in response to support for the United State’s War on Terror and Australia’s role in the liberation of East Timor. This was the first of a series of terrorist attacks committed by Jemaah Islamiyah targeting Australians and Westerners. The authors of this dataset, JJATT, gathered this data from using ‘open source’ information. The present dataset reflects a combination of familial, friendship, and association relationships. As a dynamic dataset these relationships are depicted as dynamic and subject to changes over time.

Contact