You are on page 1of 9

AI AND GAME THEORY

Editor: Michael Wooldridge, University of Oxford, mjw@cs.ox.ac.uk

Defeating Terrorist
Networks with
Game Theory
Tomasz P. Michalak, University of Oxford
Talal Rahwan, Masdar Institute of Science and Technology
Oskar Skibski, Kyushu University
Michael Wooldridge, University of Oxford

D
espite enormous efforts to tackle terrorism will depend on the application domain, but in the
in the aftermath of 9/11, many terrorist net- analysis of terrorist networks, nodes are interpreted
as members of the network, edges indicate links be-
works are growing in size and in threat. Faced with
tween them, and weights indicate the strength of the
this challenge, security agencies urgently require link (for example, the number of meetings between
robust and efficient techniques to analyze and the two individuals). Centrality analysis aims to cre-
understand the structure and operation of terror- ate a principled ranking of the importance of nodes
ist organizations. One key problem is that of iden- within such a network. Since “importance” depends
tifying the key members of the organization using on the problem at hand, researchers have consid-
information about the terrorist network’s topol- ered many different centrality measures. Among
ogy: this capability would enable security agencies them, degree centrality, closeness centrality, and be-
to focus severely limited resources on just those key tweenness centrality are the most well-known and
members. widely applied. According to weighted degree cen-
To this end, many standard measures of centrality trality, a node’s importance is equal to the weight
from the field of social network analysis can be of that node’s adjacent edges (that is, the weighted
used. Centrality measures aim to give a numerical degree of the node). For instance, in the network in
characterization of a node’s significance in a Figure 1, nodes v1 and v2 are the most important ac-
network. For example, IBM’s Analyst Notebook— cording to weighted degree centrality, because they
a software package used worldwide by law have a weighted degree of 6 each, which is greater
enforcement and intelligence agencies—supports than that of any other node in the network. In con-
the degree, closeness, and betweenness centralities, trast, according to closeness centrality, a node’s im-
which are probably the most widely used centrality portance is based on the average distance between
measures. However, these measures have well- that node and other nodes in the network. In Fig-
known limitations, and the development of more ure 1, for example, this measure considers node v8
sophisticated measures is currently a key research to be the most important in the network. Finally,
area. One important thread of current research is to betweenness centrality focuses on shortest paths
apply techniques from the field of cooperative game between any two nodes in the network; the more
theory to this problem. In this article, we present a shortest paths a given node belongs to, the higher
survey of this work. its ranking. In Figure 1, node v11 is the most impor-
tant from the perspective of betweenness centrality.
Classic Measures of Centrality All of these centralities can be defined on weighted,
The networks we are interested in are undirected unweighted, directed, and undirected networks. For
weighted graphs: they consist of a set of nodes instance, the unweighted in-degree centrality of a
(vertices) and undirected edges that connect some node counts the total number of its incoming edges.
nodes; each edge is associated with a numerical Clearly, all three measures expose a node’s
weight. The specific interpretation of the network different characteristics. For example, assume that

JANUARY/FEBRUARY 2015 1541-1672/15/$31.00 © 2015 IEEE 53


Published by the IEEE Computer Society
1 B 1
2 1 2 the importance of each node by fo-
cusing only on the role that this node
1 2 plays by itself in the network. How-
1 2 ever, in many applications, such an
1 F B
1 1 approach is inadequate as it fails to
capture any positive or negative syn-
ergies that might exist among differ-
1
ent groups of nodes. To illustrate this
1
point, let us consider the problem
of finding a group of two individu-
1 1 als that together have the highest in-
B
fluence in the network. As a possible
solution to this problem, let us fo-
Figure 1. Sample network of 13 nodes with weighted edges. The letter F represents cus on unweighted degree centrality.
a terrorist with the necessary funds, and the letter B represents a terrorist with
With this measure, because nodes v1
bomb expertise.
and v2 have five neighbors each, and
because no other node has that many
Figure 1 represents a network of certain critical resources and/or skills, neighbors, then v1 and v2 each have
cell-phone connections made by the such as financial endowments or ex- the highest centrality. One might then
members of a terrorist network; the pertise in explosives. To illustrate this conclude that {v1, v2} is the most influ-
weight of any given edge represents point, let us assume that node v1 in ential pair in the network. However,
the number of calls made between the Figure 1 represents the terrorist who it is easy to observe that their spheres
two ends of that edge. In this context, provides funding to the entire organiza- of influence (that is, their neighbor-
we can think of degree centrality as a tion, while nodes v2, v6, and v11 repre- hoods) overlap. In particular, both
simple tool to identify the terrorist(s) sent the available bomb experts. Now, v1 and v2 are linked to v6, v7, and v8.
with the highest frequency of direct let us try to express the fact that the Thus, nodes v1 and v2 together have
contacts. The hypothesis here is that funding and bomb expertise are both only 7 unique neighbors, not 5 + 5 =
such individuals are the most active critical to carry out an attack, and that 10 neighbors. To put it differently, in
within the network. Conversely, we can the former skill is possessed by a sin- this example there is a negative syn-
think of closeness centrality as a tool to gle individual, while the latter skill by ergy between v1 and v2 due to their
identify the terrorist(s) whose message three. To this end, we could for instance overlapping spheres of influence. Tak-
would spread fastest throughout the assign a weight of 10 to v1, a weight of ing such synergies into consideration,
organization. Finally, betweenness 5 to every bomb expert, and a weight we find that the most influential pair
centrality reveals the nodes that play a of 1 to every other node. Then, if an at- is in fact {v1, v11}, not {v1, v2}, because
crucial role in passing the information tack requires the funds, one bomb ex- v1 and v11 together have eight unique
from one individual in the network to pert, and at least two other members, neighbors. This is despite the fact that
another. we can set a threshold of 17 on the v11 is actually ranked lower than v2.
Although the standard measures in- total weight of the terrorists needed To account for such synergies, and
deed deliver nontrivial insights, they can- to carry out an attack. Unfortunately, to quantify the importance of groups
not capture certain important aspects of such a solution would not work, be- of nodes more accurately, Martin
centrality in a terrorist organization. cause a group of three bomb experts Everett and Steve Borgatti introduced
First, standard centrality measures and two other members (other than the the notion of group centrality.1 Intu-
are defined for networks in which one providing the funds) would cross itively, group centrality is derived in
we can consider at most a single real- this threshold, although they are unable the same way as standard centrality,
valued weight for every node or edge. to carry out any attack. This simple ex- but now we consider the functioning
This assumption restricts the qualita- ample illustrates how it could be hard of a group of nodes rather than an
tive analysis of terrorist organizations. for a quantitative analysis to replace a individual node. For instance, as we
For instance, it might be difficult or qualitative one. have already established in Figure 1,
even impossible for a single weight to The second deficiency of standard the unweighted degree centrality
reflect the fact that a terrorist possesses centrality measures is that they assess of group {v 1, v2} is 7, whereas the

54 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS


unweighted degree centrality of group argue that the game-theoretic approach of the coalition itself is 2. Therefore,
{v1, v11} is 8. to centrality measures has all the above value({v1, v9}) = 7 + 2 = 9. This charac-
Unfortunately, the notion of group properties, including the third property. teristic function can be interpreted as
centrality has the following inherent a function that counts the nodes that
drawback: given a network of size n, Game Theory for are directly influenced by a given co-
there are 2n groups of nodes to consider. Network Analysis alition; those nodes are the members
Not only is this computationally prohib- This direction of research is based on themselves, as well as their neighbors.
itive, but it is also unclear how to con- the following observation: by having an Having specified how to evaluate dif-
struct a coherent ranking of individual exponential number of groups of nodes, ferent coalitions in the game, we now
nodes using such an exponential num- each with an assigned value reflecting must specify how to compute the pay-
ber of group-wise results. For instance, its centrality, we end up with exactly off of each player in the game; that is,
we could consider the most impor- the same combinatorial structure as a we need to specify a suitable solution
tant nodes to be those belonging to the coalitional game (see the “Coalitional concept. Let that solution concept be
most important group. Alternatively, we Games” sidebar). As such, we can con- the Shapley value, for example. Re-
could rank individual nodes according sider the network’s nodes to be the play- call that the Shapley value of a node
to the average importance of the groups ers of a coalitional game, with the value vi is a weighted average of its marginal
they belong to. In fact, one can think of each group, or “coalition,” of nodes contributions. Now, given the above
of an endless list of such alternatives. being equal to its group centrality. With characteristic function, the marginal
Things become even more complicated this analogy, we can capitalize on de- contribution of vi to any given coali-
if, for instance, we are only interested in cades of research in cooperative game tion is the change in the coalition’s in-
groups of nodes that are connected (that theory, which focuses on analyzing the fluence that occurs when vi joins that
is, they induce a connected subgraph). values of different coalitions to deter- coalition. In Figure 1, for example,
In summary, on top of evaluating mine each individual’s worth. In par- the marginal contribution of v8 to co-
the role that each node plays in a net- ticular, a coalitional game representing alition {v1, v9} equals 1, because add-
work’s topology, we have identified the network, along with an adopted so- ing v8 to {v1, v9} brings one additional
the following desirable properties to lution concept, produce what we call a node—namely, v11—under the coali-
have in a centrality measure: game-theoretic network centrality mea- tion’s influence. Formally, value({v1,
sure, whereby a node’s centrality is the v8, v9}) – value({v1, v9}) = 1. Thus, by
1. It should be able to account for payoff of that node in the correspond- interpreting the Shapley value of vi as
the individual properties of each ing coalitional game; this payoff is com- its centrality, we end up with a mea-
node and/or edge (expressed either puted according to the adopted solution sure with which the ranking of vi is
quantitatively or qualitatively). concept, such as the Shapley value or the proportional to the change in group
2. It should be able to consider not Myerson value. Let us consider a few influence that vi causes when joining
only the functioning of individual examples. different groups.
nodes but also the positive or neg-
ative synergies that might exist in Example 1: Detecting the Top-k Example 2: The Myerson
different groups of nodes. Most Influential Terrorists Value-Based Centrality
3. It should be able to aggregate all Given an unweighted and undirected In the previous example, whether a coali-
the above information in an in- network, one might represent such tion was connected or not did not have
formed and meaningful way to a setting with a coalitional game in a direct bearing on the coalition’s value.
produce a coherent ranking of in- which the value of a group of nodes, C, Conversely, in this example, we will con-
dividual nodes. is computed as follows: sider a Myerson’s graph-restricted game
with the characteristic function defined
By adapting the standard central- value(C) = the number of nodes in C + as follows:2
ity measures to account for qualitative the number of neighbors of C value(C)
properties of the nodes and/or edges, ⎧
and by extending those measures to Consider coalition {v1, v9} in Fig- ⎪ the number of edges in C
⎪⎪ the weight of edges in C if C is connected,
groups, we can address properties 1 ure 1, for example. This coalition has =⎨
and 2. The third property, however, a total of 7 neighbors—namely, v2, ⎪the sum of values of
⎪ connected components of C otherwise.
remains elusive. In the next section, we v3, v4, v5, v6, v7, and v8—and the size ⎪⎩

JANUARY/FEBRUARY 2015 www.computer.org/intelligent 55


Coalitional Games

A
cooperative game models scenarios where individuals, The Shapley value of i is a weighted average of player i’s
or players, benefit from cooperation, and where bind- marginal contributions, where the marginal contribution
ing agreements are possible. This means it is possible of i to a coalition C is v (C ∪ {i }) − v(C). More precisely, for
for players to agree on which groups, or coalitions, to form, any permutation of players, let us consider the marginal
and on how the payoff, or value, of the formed coalitions contribution of vi to the coalition consisting of all players
shall be divided among the members. A coalition’s value is that appear before it in the permutation. Then, the Shapley
often assumed to depend entirely on the identities of the co- value is simply the average such marginal contribution taken
alition members. In such games, the function that assigns a over all permutations.
value to every coalition is called the characteristic function, Myerson followed a similar approach, but for games
and is denoted by v. defined on a graph G in which nodes represent players and
The vector that specifies each player’s share is called the edges represent communication channels.1 Thus, every
payoff vector. The main question here is which payoff vector coalition can be thought of as a subgraph of G. Myerson
should we adopt? One common way of addressing this assumed that if a coalition, or a subgraph, C was not
question is to carefully select a number of desirable properties, connected in G, then the value of C is simply the sum of the
and then prove that there exists only one possible payoff vector values of the connected components in C. The intuition is that
that satisfies all of those properties. The selected properties are disconnected components cannot communicate with one
then called the axioms of this unique vector. In this context, another, and so there is no value added when considering
Shapley focused on scenarios where the players form the grand their union. Formally, the value of C is
coalition—that is, one big coalition containing all players in the
game.1 He proposed the following axioms:
⎧ v (C )
⎪ if C is connected in G
t Efficiency. The grand coalition value is divided entirely w (C ) = ⎨ ∑ v (S )
otherwise.
among the players (that is, there are no leftovers). ⎩⎪connected component S in C
t Null player. The share is zero for every “null player”—that
is, a player whose membership in any coalition does not
affect the value of that coalition. For such scenarios, Myerson proposed the following
t Symmetry. All “symmetric” players receive equal shares, axioms:
where any two players are symmetric if replacing one with t Component efficiency. The payoff of every connected
the other in any coalition makes no impact on that coali- component is divided entirely among its members (that is,
tion’s value. there are no leftovers).
t Additivity. Given two games, G1 and G2, that involve the t Fairness. Any two connected players benefit equally from
same set of players, and given a third game, G3, in which the bilateral connection between them.
a coalition’s value is the sum of its value in G1 and in G2,
the share of a player in G3 should be the sum of its share Myerson proved that there is a unique payoff vector
in G1 and in G2. satisfying the above axioms, whereby the share of a player i,
called the Myerson value of i, is
Shapley proved that there is a unique payoff vector satis-
fying all of the above, whereby the share of a player i, called
v w
“the Shapley value of i,” is Myerson _ valuei = Shapley _ valuei .

C !( n − C − 1) ! Reference
v
Shapley _ valuei = ∑ n!
(v (C ∪ {i }) − v (C )) . 1. M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge
C ⊆ N \ {i } Univ. Press, 2013.

For instance, the value of the The fraction in the above character- those authors focused on the Shapley
connected coalition {v1, v5} in Figure istic function was proposed by Linde- value, Skibski and colleagues showed
1 is 2, and the value of the connected lauf and colleagues, who provided the that the Myerson value has more in-
coalition {v2, v3, v9, v10} is 2/3. In following rationale: “A terrorist orga- teresting properties as a centrality
contrast, the coalition {v1, v2, v3, v5, nization will try to shield its impor- measure.2
v9, v10} is disconnected, meaning tant players by keeping the frequency
that the terrorists involved cannot and duration of their interaction with Example 3: Centrality with Skills
communicate, and so they will proceed others to a minimum. However, to be Let us again consider the situation
with their activities as two independent able to coordinate and control the at- when the critical skills of nodes v1,
groups. Consequently, our graph- tack, an important player needs to v2, v6, and v11 are known to the in-
restricted game assigns the value of 2 maintain relationships with other in- vestigators. Michalak and colleagues
+ 2/3 to {v1, v2, v3, v5, v9, v10}. dividuals in the network.”3 Although proposed the Myerson value-based

56 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS


Flexibility of Game-Theoretic Centrality

A
n interesting property of game-theoretic centrality is t The solution concept. This concept specifies the criteria the
its flexibility. Specifically, it can be adapted to a partic- players use to decide which coalitions to form and which
ular application, along three general dimensions. payoff vector to adopt. Different solution concepts are based
on different prescriptive and normative considerations. Ex-
t The form of the game. The game is usually assumed to be in
amples include the Shapley value and Myerson value (see the
characteristic function form—that is, a coalition’s value de-
“Coalitional Games” sidebar), which focus on fairness, and
pends solely on the identities of its members. However, other
the core and the nucleolus, which focus on stability.2
forms may better model the application at hand. For in-
stance, partition function games allow for a coalition’s value A recent overview on the literature on game-theoretic
to be influenced by the way nonmembers are partitioned. Al- centrality can be found in Tarkowski and colleagues.3
ternatively, generalized characteristic function games assume
that the members of a coalition are ordered, and allow for a
coalition’s value to be influenced by the order of its members. References
1. P.T. Michalak et al., “Efficient Computation of the Shapley Value
t The coalition-value function. Usually, an arbitrary coali-
for Game-Theoretic Network Centrality,” J. Artificial Intelligence
tion-value function is assumed. Thus, one can pick the Research, vol. 46, 2013, pp. 607–650.
function that best represents the worth of a coalition 2. M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge
given the application at hand. For instance, Michalak and Univ. Press, 2013.
colleagues consider alternative such functions when study- 3. M. Tarkowski et al., “Game-Theoretic Network Centrality
ing the problem of information diffusion in networks.1 Measures: A Critical Survey,” mimeo, Univ. of Oxford, 2014.

centrality measure that accounts for These examples demonstrate that The Computational Challenge
such qualitative data.4 Specifically, game-theoretic centrality measures Unfortunately, due to their inher-
they proposed the following charac- account for individual properties of ent combinatorial nature, comput-
teristic function, where F denotes a nodes and edges, expressed both quan- ing solution concepts for coalitional
terrorist capable of funding multiple titatively and qualitatively (property games is often computationally chal-
attacks, B denotes a terrorist capable 1). They also analyze all groups (that lenging. In fact, already the size of the
of handling bombs, and M denotes a is, subsets) of nodes (property 2). input (that is, the number of elements
terrorist skilled in martial arts: Finally, they use all those pieces of of the characteristic function) grows
information to construct a coherent exponentially with the number of
value(C)
ranking of individual nodes (prop- players. Luckily, in many cases the
⎧ ⎧ M ⎫ erty 3). On top of this, by drawing coalition values in the coalitional
⎪min ⎨the number of B, 2 in C ⎬
⎪⎪ ⎩ ⎭ parallels between networks and co- game have some underlying structure,
= ⎨ × ( the number of F in C ) if C is connected, alitional games, we can build on a which makes it possible to represent
⎪ the sum of values of the large body of literature on game-the- the characteristic function compactly.

⎪⎩ connected componentss of C otherwise. oretic solution concepts. Importantly, This has led to an important research
the game-theoretic approach to cen- direction in algorithmic game theory,
Intuitively, this qualitative charac- trality places no assumptions on the aimed at identifying classes of games
teristic function represents scenarios in coalition-evaluation function, nor the that admit such a compact represen-
which every attack requires a terrorist adapted solution concept, nor even tation, and determining whether and
with the necessary funding, in addition the form of the game (see the “Flex- how certain solution concepts are
to one bomb expert and two terrorists ibility of Game-Theoretic Central- computable in polynomial time.
skilled in martial arts. This can be gener- ity” sidebar); these can be adjusted as In the context of game-theoretic cen-
alized to more than just a single attack— necessary, thus providing a desirable trality, the underlying coalitional game is
for example, the terrorist providing the degree of flexibility to capture a wide defined over the network, and is some-
funds, combined with two bomb experts range of scenarios. how influenced by the network topol-
and four martial artists, can carry out But alas, every rose has its thorns. ogy. This suggests that, in some cases,
two attacks. Naturally, the numbers and All the advantages of game-theoretic such coalitional games can be (but do
skills specified in the above function can centrality measures might never ma- not have to be) represented compactly.
be adjusted to better reflect the scenario terialize if we cannot compute those For instance, this is the case for the
under investigation. Note that, for each measures in the first place. Next, we games in Examples 1, 2, and 3 given ear-
attack, the group must be connected to discuss recent works that address lier. However, having a compact repre-
be able to coordinate its activities. this issue. sentation does not necessarily imply that

JANUARY/FEBRUARY 2015 www.computer.org/intelligent 57


the solution concept of interest is com- to compute the Shapley value of vi, for v2 and every neighbor of v2. The
putable in polynomial time. In this re- we first identify all possible permu- general formula is as follows:
spect, we can summarize the available tations of nodes in which vi makes a
results in the literature as follows: positive marginal contribution to the 1
ShapleyValuei =
coalition C consisting of all the nodes 1 + degree of vi
• On one hand, negative results were that appear before vi in the permuta- 1
obtained for game-theoretic cen- tion. To this end, if vj is a neighbor of + ∑ 1 + degree of v j
tralities in which, in the spirit of vi, we must ask what is the necessary v j ∈Neighbors of v i

Myerson’s graph-restricted games, and sufficient condition for node vi to


the value of a coalition explicitly “marginally contribute” its neighbor vj The algorithm that implements
depends on whether this coalition is to C? This clearly happens if and only this expression for all nodes in the
connected or not. For instance, both if neither vj nor any of its neighbors network iterates exactly once through
the Myerson value-based centrality are present in C (in this case, when vi all nodes and their neighbors. Thus,
measures in Examples 2 and 3 are joins C, its neighbor vj becomes under its running time is O(|V| + |E|) , where
hard to compute.2 the influence of C). In Figure 1, for ex- |V| is the number of nodes and |E| is
• On the other hand, positive results ample, v2 marginally contributes its the number of edges in the network.
were obtained for various game- neighbor v9 to a coalition C if and only Recall that the Shapley value is
theoretic centralities in which, in if neither v9 nor any of its neighbors used as a centrality measure in our ex-
the spirit of Everett and Borgatti, (that is, v2 and v3) are members of C. ample. Thus, by looking at the above
the value of a coalition of nodes is Now, let us count the number of pos- formula, one can see where a node’s
simply equal to its group centrality, sible permutations in which v2 margin- centrality comes from. In particular,
meaning that whether the coalition ally contributes its neighbor v9 to the if a node has a high degree, the num-
is connected or not does not have an coalition C consisting of all the nodes ber of terms in its Shapley value sum-
explicit bearing on its value.5 that appear before v2 in the permuta- mation is high. However, the terms
tions. To do so, themselves will be inversely related
Next, we will analyze the Shapley to the degree of neighboring nodes.
value-based measure from Example 1, • We randomly choose |{v2, v3, v9}| = Thus, a node has high centrality not
which is an instance of the above posi- 3 positions in a permutation consist- only when its degree is high, but also
tive results. After that, we will briefly ing of all 13 nodes from Figure 1. whenever the degree of its neighbor-
discuss the state-of-the-art algorithm to ing nodes is low. To put it differently,
⎛ 13⎞
compute the Myerson value-based cen- • This can be done in ⎜ ⎟ ways. We the power comes from being con-
⎝ 3⎠
trality, which has exponential worst- nected to many who are powerless—
case complexity. In practice, however, place v2 in the first position, and a phenomenon well-recognized in the
it solves problems of sparse networks place v3 and v9 randomly in the re- centrality literature.
with about 50 nodes in a matter of maining two positions. This can be
minutes on a modern workstation. done in 2! ways. An Algorithm for the Myerson
Furthermore, for bigger problems, an Value-Based Centrality
efficient albeit inexact Monte Carlo • The remaining elements can be ar- When computing game-theoretic cen-
sampling algorithm can be used.5 ranged in (13 – 3)! = 10! ways. tralities based on Myerson’s graph-
restricted games, the most critical
⎛ 13⎞
The Shapley Value-Based Centrality Thus, there are in total ⎜ ⎟ 2!10! = operations are the enumeration of
⎝ 3⎠
Computable in Polynomial Time induced connected subgraphs, and
Let us now see how the game-theoretic 2075673600 permutations in which v2 the identification of cut vertices. Al-
centrality from Example 1 can be com- marginally contributes v9. Given that though researchers studied both op-
puted in polynomial time.5 Recall that there are in total 13! = 6227020800 erations independently, until recently
the Shapley value can be interpreted permutations, the fraction of the Shap- there was no dedicated algorithm
as the average marginal contribution ley value of v2 that is due to contrib- that performs both at the same time.
taken over all possible permutations uting v9 is 1/3. To compute the total Moreover, the state-of-the-art algo-
of players (nodes) (see the “Coali- value of the Shapley value of v2, we rithm for each operation was differ-
tional Games” sidebar). In particular, should perform the above procedure ent than the other algorithm in the

58 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS


υ1 - Wail Alshehri

υ19 υ2 - S. Suqami
M υ3 - Waleed Alshehri
way it traversed the graph; enumerat- υ18
υ4 - A. A. AI-Omari
ing all induced connected subgraphs
υ17 υ5 - M. Atta
required breadth-first search (BFS), M
whereas identifying cut vertices re- υ6 - M. Moqed
υ14
quired depth-first search (DFS). υ7 - M. AI-Shehhi
To address this issue, Skibski and υ15 υ8 - F. Ahmed
υ16 M
colleagues proposed the first algo- υ9 - H. Hanjour
M υ13
rithm that performs both opera- υ10 υ10 - K. AI-Midhdar
tions simultaneously. 2 The main M υ11 - S. Alhazmi
υ11
trick is to perform the first operation υ12 - Z. Jarrah
P
(enumerating all induced connected υ13 - A. AI-Haznawi
subgraphs) using DFS rather than BFS, υ9 υ12 υ14 - S. Alghamdi
thus making it compatible with the M υ8
υ15 - M. Alshehri
other operation’s performance (iden- P
υ16 - N. Alhazmi
tifying cut vertices). Broadly speak- υ7 υ17 - H. Alghamdi
ing, the DFS enumeration algorithm
υ6 υ18 - A. Alnaml
starts with a subgraph consisting of P
υ19 - A. Alghamdi
a single node, and gradually expands υ5
M
the subgraph to (some of) its neigh-
P
boring nodes in a DFS manner. This is
done using a divide-and-conquer tech-
nique, which works as follows: when- υ4
ever a neighbor is found that has not
yet been visited by the algorithm, the M
calculations are split into two parts,
the first with the neighbor added to
υ3
the subgraph, and the second with the
neighbor marked as forbidden. This
υ1
entire process is repeated recursively
such that eventually all induced sub- υ2
graphs are enumerated without any
M
redundancies (that is, without per-
forming an operation twice). For a
Figure 2. World Trade Center 9/11 terrorist network. 3,6 The letter P stands for a
detailed description of the algorithm,
pilot, and the letter M indicates a terrorist skilled in martial arts.
as well as the pseudocode, see Oskar
Skibski and colleagues2

Case Study: World Trade to split into four groups. Each group assumed that two terrorists with such
Center, 9/11 had to contain at least one terrorist skills were needed per flight.
In the already classic work, Valdis E. with pilot training (P) and some ter- Let us now consider a qualita-
Krebs constructed the World Trade rorists skilled in martial arts (M) in tive characteristic function similar to
Center 9/11 terrorist network from order to take control over the crew that of Example 3, but now modified
publicly available sources and used and the cabin. To fulfill these require- such that a P-terrorist (pilot) and two
standard centrality measures to de- ments, terrorists S. Suqami and A.A. M-terrorists (martial arts) are needed
termine the key terrorists.6 Let us fo- Al-Omari took part in martial arts to carry out a single attack. Table 1
cus on the core of the 9/11 network training in the weeks before the attack; compares the (qualitative) Myerson-
composed of 19 hijackers with 32 it is unknown who else was skilled in value-based centrality with the other
relationships, as illustrated in Fig- martial arts. Therefore, we assigned standard centralities for Figure 2. We
ure 2. To hijack the four planes on 11 this skill to seven other terrorists observe that, as expected, the new cen-
September 2001, the terrorists needed chosen uniformly at random, and trality measure promotes the terrorist

JANUARY/FEBRUARY 2015 www.computer.org/intelligent 59


Table 1. Comparison of rankings for the World Trade Center 9/11 network from Figure 2, given different centrality measures.
(The Degree, Closeness, and Betweenness columns are from Lindelauf and colleagues. 3)

Rank Degree Closeness Betweeness Qualitative Myerson


1 v16 —N. Alhazmi N/A v16 —N. Alhazmi N/A v16 —N. Alhazmi N/A v9 —H. Hanjour P
2 v 7—M. Al-Shehhi P v4 —A.A. Al-Omari M v5 —M. Atta P v 7—M. Al-Shehhi P
3 v17—H. Alghamdi M v5 —M. Atta P v 7—M. Al-Shehhi P v12—Z. Jarrah P
4 v9 —H. Hanjour P v 7—M. Al-Shehhi P v9 —H. Hanjour P v4 —A.A. Al-Omari M
5 v 5 —M. Atta P v1—Wail Alshehri N/A v12—Z. Jarrah P v5 —M. Atta P
6 v12—Z. Jarrah P v17—H. Alghamdi M v17—H. Alghamdi M v13 —A. Al-Haznawi M
7 v14 —S. Alghamdi N/A v9 —H. Hanjour P v11—S. Alhazmi M v11—S. Alhazmi M
8 v4 —A.A. Al-Omari M v12—Z. Jarrah P v4 —A.A. Al-Omari M v17—H. Alghamdi M
9 v1—Wail Alshehri N/A v8 —F. Ahmed M v14 —S. Alghamdi N/A v16 —N. Alhazmi N/A
10 v13 —A. Al-Haznawi M v15 —M. Alshehri N/A v13 —A. Al-Haznawi M v8 —F. Ahmed M
11 v11—S. Alhazmi M v13 —A. Al-Haznawi M v8 —F. Ahmed M v10 —K. Al-Mihdhar M
12 v18 —A. Alnami M v11—S. Alhazmi M v18 —A. Alnami M v6 —M. Moqed M
13 v8 —F. Ahmed M v14 —S. Alghamdi N/A v10 —K. Al-Mihdhar M v18 —A. Alnami M
14 v15 —M. Alshehri N/A v18 —A. Alnami M v15 —M. Alshehri N/A v3 —Waleed Alshehri N/A
15 v10 —K. Al-Mihdhar M v10 —K. Al-Mihdhar M v6 —M. Moqed M v2—S. Suqami M
16 v2—S. Suqami M v2—S. Suqami M v1—Wail Alshehri N/A v15 —M. Alshehri N/A
17 v3 —Waleed Alshehri N/A v3 —Waleed Alshehri N/A v19 —A. Alghamdi N/A v14 —S. Alghamdi N/A
18 v19 —A. Alghamdi N/A v19 —A. Alghamdi N/A v3 —Waleed Alshehri N/A v19 —A. Alghamdi N/A
19 v6 —M. Moqed M v6 —M. Moqed M v2—S. Suqami M v1—Wail Alshehri N/A

with the necessary skills. Interest- account for the properties of each ter- Acknowledgments
ingly, the M-terrorist A.A. Al-Omari is rorist, compute the synergies in vari- Tomasz Michalak and Michael Wooldridge
ranked higher than the P-terrorist M. ous groups (that is, subsets) of those were supported by the European Research
Atta. In other words, when consider- terrorists, and aggregate all this in- Council under Advanced Grant 291528
(“RACE”). Oskar Skibski and Tomasz
ing the positions (in the network) and formation into a coherent ranking Michalak were supported by the Polish
the skills of different terrorists, it turns of individual terrorists. This was not National Science grant DEC-2013/09/D/
out that the martial arts skill of A.A. possible until recently, when game- ST6/03920.
Al-Omari is more often indispensable theoretic centrality measures were
to increasing the attack capabilities proposed. We showed how these new References
of connected coalitions of terrorists measures capitalize on decades of re- 1. M.G. Everett and S.P. Borgatti, “The
than the pilot skills of M. Atta. Con- search in cooperative game theory, Centrality of Groups and Classes,”
versely, N. Alhazmi—the terrorist with thus providing a rich pool of solu- J. Mathematical Sociology, vol. 23, no. 3,
no skills, who is ranked at the top by tion concepts to evaluate individuals 1999, pp. 181–201.
all three standard centrality measures on the basis of their performance in 2. O. Skibski et al., “Algorithms for
(unable to recognize skills)—is now different groups. Unfortunately, these the Shapley and Myerson Values in
ranked ninth. new measures are inherently com- Graph-Restricted Games,” Proc. 13th
plex and raise various computational Int’l Conf. Autonomous Agents and
challenges, even for relatively small
T
Multiagent Systems (AAMAS 2014),
he problem of identifying key networks. However, we showed how 2014, pp. 197–204.
members of a terrorist network is to overcome some of these computa- 3. R. Lindelauf, H. Hamers, and B.
an important topic in the literature; tional challenges, following recent re- Husslage, “Cooperative Game Theoretic
it has attracted significant interest sults from algorithmic game theory. Centrality Analysis of Terrorist Networks:
within the social network analysis Hopefully, the further development The Cases of Jemaah Islamiyah and
community and well beyond. In this of these measures will shed more light Al Qaeda,” European J. Operational
article, we argued that this problem on the dark nature of covert terrorist Research, vol. 229, no. 1, 2013,
requires a centrality measure that can organizations. pp. 230–238.

60 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS


4. T.P. Michalak et al., The Qualitative the University of Oxford and an assistant Kyushu University. Contact him at oskibski@
Game-Theoretic Centrality Measure, professor in the Institute of Informatics at inf.kyushu-u.ac.jp.
Univ. of Oxford, 2014. the University of Warsaw. Contact him at
5. P.T. Michalak et al., “Efficient Computation tomasz.michalak@cs.ox.ac.uk. Michael Wooldridge is a professor in the De-
of the Shapley Value for Game-Theoretic partment of Computer Science at the University
Network Centrality,” J. Artificial Intelligence Talal Rahwan is an assistant professor in the of Oxford. Contact him at michael.wooldridge@
Research, vol. 46, 2013, pp. 607–650. Computing and Information Science Depart- cs.ox.ac.uk.
6. V.E. Krebs, “Mapping Networks of ment at the Masdar Institute of Science and
Terrorist Cells,” Connections, vol. 24, Technology. Contact him at trahwan@gmail.
2002, pp. 43–52. com.
Selected CS articles and columns
Tomasz P. Michalak is a research assistant Oskar Skibski is an assistant professor in are also available for free at
in the Department of Computer Science at the Department of Computer Science at http://ComputingNow.computer.org.

EXECUTIVE STAFF
Executive Director: Angela R. Burgess; Associate Executive Director &
Director, Governance: Anne Marie Kelly; Director, Finance & Accounting:
PURPOSE: The IEEE Computer Society is the world’s largest association John Miller; Director, Information Technology & Services: Ray Kahn;
of computing professionals and is the leading provider of technical Director, Membership Development: Eric Berkowitz; Director, Products &
information in the field. Services: Evan Butterfield; Director, Sales & Marketing: Chris Jensen
MEMBERSHIP: Members receive the monthly magazine Computer,
discounts, and opportunities to serve (all activities are led by volunteer COMPUTER SOCIETY OFFICES
members). Membership is open to all IEEE members, affiliate society Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928
members, and others interested in the computer field. Phone:     GFax: +1 202 728 9614
COMPUTER SOCIETY WEBSITE: www.computer.org Email: hq.ofc@computer.org
Los Alamitos: 10662 Los Vaqueros Circle, Los Alamitos, CA 90720
Next Board Meeting: 26–30 January 2015, Long Beach, CA, USA Phone:     GEmail: help@computer.org

EXECUTIVE COMMITTEE MEMBERSHIP & PUBLICATION ORDERS


President: Dejan S. Milojicic Phone:    GFax:     GEmail: help@computer.org
President-Elect: Thomas M. Conte; Past President: David Alan Grier; Asia/Pacific: Watanabe Building, 1-4-2 Minami-Aoyama, Minato-ku, Tokyo
Secretary: David S. Ebert; Treasurer: Charlene (“Chuck”) J. Walrad; VP,   ,;,9G$3:90    GFax:     G
Educational Activities: Phillip Laplante; VP, Member & Geographic Email: tokyo.ofc@computer.org
Activities: Elizabeth L. Burd; VP, Publications: Jean-Luc Gaudiot; VP,
Professional Activities: Donald F. Shafer; VP, Standards Activities: James IEEE BOARD OF DIRECTORS
W. Moore; VP, Technical & Conference Activities: Cecilia Metra; 2014 President: J. Roberto de Marca; President-Elect: Howard E. Michel; Past
IEEE Director & Delegate Division VIII: Roger U. Fujii; 2014 IEEE Director President$0?0=*&?,0.60=; Secretary: Marko Delimar; Treasurer:
& Delegate Division V: Susan K. (Kathy) Land; 2014 IEEE Director-Elect & John T. Barr; Director & President, IEEE-USA: Gary L. Blank; Director
Delegate Division VIII: John W. Walz & President, Standards Association: Karen Bartleson; Director & VP,
Educational Activities: Saurabh Sinha; Director & VP, Membership and
BOARD OF GOVERNORS Geographic Activities: Ralph M. Ford; Director & VP, Publication Services
Term Expiring 2014: Jose Ignacio Castillo Velazquez, David S. Ebert, and Products: Gianluca Setti; Director & VP, Technical Activities: Jacek
Hakan Erdogmus, Gargi Keeni, Fabrizio Lombardi, Hironori Kasahara, M. Zurada; Director & Delegate Division V: Susan K. (Kathy) Land;
Arnold N. Pears Director & Delegate Division VIII: Roger U. Fujii
Term Expiring 2015: Ann DeMarle, Cecilia Metra, Nita Patel, Diomidis
Spinellis, Phillip Laplante, Jean-Luc Gaudiot, Stefano Zanero
Term Expriring 2016: David A. Bader, Pierre Bourque, Dennis Frailey, Jill
I. Gostin, Atsuhiro Goto, Rob Reilly, Christina M. Schober revised 6 November 2014

JANUARY/FEBRUARY 2015 www.computer.org/intelligent 61

You might also like