This document discusses using social network analysis to study terrorism. It outlines a process for retrieving evidence of terrorism from online social networks, including acquiring evidence, examining digital evidence, and reconstructing data. The document also examines quantitative assessment of the 2008 Mumbai attack and the structure of terrorist organizations like Jemaah Islamiyah. It describes measures to analyze individual centrality, network centrality, and uses the 9/11 hijacking network as an example, identifying key individuals and analyzing network properties.