This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah’s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.
|Title of host publication||Counterterrorism and Open Source Intelligence|
|Editors||N. Memon, U. Wiil|
|Place of Publication||New York|
|Number of pages||458|
|Publication status||Published - 2011|
|Name||Lecture Notes in Social Networks|
Lindelauf, R., Borm, P. E. M., & Hamers, H. J. M. (2011). Understanding terrorist network topologies and their resilience against disruption. In N. Memon, & U. Wiil (Eds.), Counterterrorism and Open Source Intelligence (pp. 61-72). (Lecture Notes in Social Networks; No. 2). New York: Springer Verlag.