| In recent years,terrorist forces have been hit hard in succession,and traditional terrorist means frequently failed.At the same time,the status of the Internet is beginning to become more and more important.Terrorist organizations not only use the Internet to collect information,plan and execute crimes,but also serve it as an important base for liaison,advocacy,recruitment and training.The center of the terrorist war has gradually shifted to the virtual world.Compared with traditional terrorist crimes,cyber terrorism has greatly improved in terms of active,destructive and preventive power.Information network technology has changed the way terrorists connect and communicate,but it also disintegrates its hierarchical network structure.At this stage,the cyber terrorist forces present a complex structure of "De-grading" and "Multi-center" : On the one hand,high-level members turned to provide guidance on a macro level,and ordinary members more depend on their own choice instead of higher-level instructions.On the other hand,the "scale-free network" phenomenon strengthens the strong,and members who have information advantage become the actual "new center".In this context,social network theory plays an important role in terrorist crime investigation.Considering the existing results,the application value of social network analysis theory in investigation has been proved by practice and theory.From the perspective of the real environment,the current changes of the internal hierarchy,the terrorist activity and the membership structure also require interdisciplinary theory.Social network theory helps to communicate individual characteristics and overall nature,static relationships and dynamic behaviors,while it provides a unique perspective for understanding cyber terrorist crimes.The use of social network theory to analyze cyber terrorism requires three steps: First,collect information about people involved in terrorism by searching,subscripting and tagging,and select members who have high suspiciousness and mining value as the initial node.Second,comprehensively use online and offline investigations to expand the network of terrorist relationships.Finally,use professional software such as Ucinet and Pajek to build analytical models.From the micro,mesoscopic and macro aspects,we can evaluate a terrorist network in terms of the individual centrality,factional distribution and overall hierarchical level."East Turkistan" is one of the main terrorist threats facing China.The relational data in Twitter can be used to construct a terrorist network model,and then the specific application process of the social network analysis method can be seen. |