Understanding terrorist network topologies and their resilience against disruption

R. Lindelauf, P.E.M. Borm, H.J.M. Hamers

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

Abstract

This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah’s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.
Original languageEnglish
Title of host publicationCounterterrorism and Open Source Intelligence
EditorsN. Memon, U. Wiil
Place of PublicationNew York
PublisherSpringer Verlag
Pages61-72
Number of pages458
ISBN (Print)9783709103876
Publication statusPublished - 2011

Publication series

NameLecture Notes in Social Networks
Number2

    Fingerprint

Cite this

Lindelauf, R., Borm, P. E. M., & Hamers, H. J. M. (2011). Understanding terrorist network topologies and their resilience against disruption. In N. Memon, & U. Wiil (Eds.), Counterterrorism and Open Source Intelligence (pp. 61-72). (Lecture Notes in Social Networks; No. 2). New York: Springer Verlag.