Understanding terrorist network topologies and their resilience against disruption

R. Lindelauf, P.E.M. Borm, H.J.M. Hamers

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

Abstract

This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah’s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.
Original languageEnglish
Title of host publicationCounterterrorism and Open Source Intelligence
EditorsN. Memon, U. Wiil
Place of PublicationNew York
PublisherSpringer Verlag
Pages61-72
Number of pages458
ISBN (Print)9783709103876
Publication statusPublished - 2011

Publication series

NameLecture Notes in Social Networks
Number2

Fingerprint

resilience
secrecy
social isolation
social network
evidence

Cite this

Lindelauf, R., Borm, P. E. M., & Hamers, H. J. M. (2011). Understanding terrorist network topologies and their resilience against disruption. In N. Memon, & U. Wiil (Eds.), Counterterrorism and Open Source Intelligence (pp. 61-72). (Lecture Notes in Social Networks; No. 2). New York: Springer Verlag.
Lindelauf, R. ; Borm, P.E.M. ; Hamers, H.J.M. / Understanding terrorist network topologies and their resilience against disruption. Counterterrorism and Open Source Intelligence. editor / N. Memon ; U. Wiil. New York : Springer Verlag, 2011. pp. 61-72 (Lecture Notes in Social Networks; 2).
@inbook{f05d7c3a355b49a799cd57f8ea7a9cd6,
title = "Understanding terrorist network topologies and their resilience against disruption",
abstract = "This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah’s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.",
author = "R. Lindelauf and P.E.M. Borm and H.J.M. Hamers",
note = "Appeared earlier as CentER DP 2009-085 Pagination: 458",
year = "2011",
language = "English",
isbn = "9783709103876",
series = "Lecture Notes in Social Networks",
publisher = "Springer Verlag",
number = "2",
pages = "61--72",
editor = "N. Memon and U. Wiil",
booktitle = "Counterterrorism and Open Source Intelligence",
address = "Germany",

}

Lindelauf, R, Borm, PEM & Hamers, HJM 2011, Understanding terrorist network topologies and their resilience against disruption. in N Memon & U Wiil (eds), Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks, no. 2, Springer Verlag, New York, pp. 61-72.

Understanding terrorist network topologies and their resilience against disruption. / Lindelauf, R.; Borm, P.E.M.; Hamers, H.J.M.

Counterterrorism and Open Source Intelligence. ed. / N. Memon; U. Wiil. New York : Springer Verlag, 2011. p. 61-72 (Lecture Notes in Social Networks; No. 2).

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

TY - CHAP

T1 - Understanding terrorist network topologies and their resilience against disruption

AU - Lindelauf, R.

AU - Borm, P.E.M.

AU - Hamers, H.J.M.

N1 - Appeared earlier as CentER DP 2009-085 Pagination: 458

PY - 2011

Y1 - 2011

N2 - This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah’s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.

AB - This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah’s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.

M3 - Chapter

SN - 9783709103876

T3 - Lecture Notes in Social Networks

SP - 61

EP - 72

BT - Counterterrorism and Open Source Intelligence

A2 - Memon, N.

A2 - Wiil, U.

PB - Springer Verlag

CY - New York

ER -

Lindelauf R, Borm PEM, Hamers HJM. Understanding terrorist network topologies and their resilience against disruption. In Memon N, Wiil U, editors, Counterterrorism and Open Source Intelligence. New York: Springer Verlag. 2011. p. 61-72. (Lecture Notes in Social Networks; 2).