Understanding Terrorist Network Topologies and Their Resilience Against Disruption

R. Lindelauf, P.E.M. Borm, H.J.M. Hamers

Research output: Working paperDiscussion paperOther research output

516 Downloads (Pure)

Abstract

This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah's Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.
Original languageEnglish
Place of PublicationTilburg
PublisherOperations research
Number of pages14
Volume2009-85
Publication statusPublished - 2009

Publication series

NameCentER Discussion Paper
Volume2009-85

Keywords

  • terror networks
  • terrorist cells
  • network structure
  • counterterrorism

Fingerprint Dive into the research topics of 'Understanding Terrorist Network Topologies and Their Resilience Against Disruption'. Together they form a unique fingerprint.

  • Cite this

    Lindelauf, R., Borm, P. E. M., & Hamers, H. J. M. (2009). Understanding Terrorist Network Topologies and Their Resilience Against Disruption. (CentER Discussion Paper; Vol. 2009-85). Operations research.