@inbook{f05d7c3a355b49a799cd57f8ea7a9cd6,
title = "Understanding terrorist network topologies and their resilience against disruption",
abstract = "This chapter investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah{\textquoteright}s Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.",
author = "R. Lindelauf and P.E.M. Borm and H.J.M. Hamers",
note = "Appeared earlier as CentER DP 2009-085 Pagination: 458",
year = "2011",
language = "English",
isbn = "9783709103876",
series = "Lecture Notes in Social Networks",
publisher = "Springer Verlag",
number = "2",
pages = "61--72",
editor = "N. Memon and U. Wiil",
booktitle = "Counterterrorism and Open Source Intelligence",
address = "Germany",
}