Abstract
In this paper we provide a presentation of the most popular metrics and systematically apply them to seven terrorist networks studied in the literature and to three new ISIS-affiliated networks. This study then investigates the correlates between structural network characteristics and severity of the attack carried out by the terrorists. Such approach allows us to analyze these networks from several perspectives and to use them to discuss about the security/efficiency trade-off.
Similar content being viewed by others
Notes
The dataset is available from https://sites.google.com/site/ucinetsoftware/datasets/covert-networks/911hijackers.
Starting from the relational data collected by Gutfraind and Genkin (2017) we have added new actors and relationships thanks to the information obtained from different sources, for instance, “Le galaxie djihadiste – L’atelier du Parisien”(https://atelier.leparisien.fr/galaxie-djihadiste/) and several recent journal articles such as The Sun, The New York Times and Le Parisien.
The sources used to reconstruct this network include most of those in Paris 2015. However, since the two networks were responsible for two different attacks occurring with months of separation between them, it was possible to create two distinct networks.
While for the two previous networks mostly international newspapers were used as a source, for this attack (which had less media impact), most of the sources were Italian and German newspapers.
References
Acosta B, Childs SJ (2013) Illuminating the global suicide-attack network. Studies in Conflict & Terrorism 36:49–76
Albert R, Jeong H, Barabási A-L (2000) Error and attack tolerance of complex networks. Nature 406:378–382
Allen C (2004) The Dunbar number as a limit to Group Sizes. http://www.lifewithalacrity.com/2004/03/the_dunbar_numb.html Accessed: 2018
Arquilla J, Ronfeldt DF (2001) Networks and netwars: the future of terror, crime and militancy. The Rand Corporation, Santa Monica, CA
Asal V, Gill P, Rethemeyer RK, Horgan J (2015) Killing range: explaining lethality variance within a terrorist organization. Journal of Conflict Resolution 59:401–427
Asal V, Rethemeyer RK (2008) The nature of the beast: organizational structures and the lethality of terrorist attacks. The Journal of Politics 70:437–449
Asal VH, Park HH, Rethemeyer RK, Ackerman G (2016) With friends like these... why terrorist organizations ally. International Public Management J 19:1–30
Associated Press (2019) Report: Berlin attacker was part of Europe-wide network. AP NEWS, https://apnews.com/c5c673c97b8545b9890d776c5cfc2c3d. Accessed 2019
Barabási A-L (2002) Linked the new science of networks. Perseus Pub, Cambridge
Barabási A-L, Bonabeau E (2003) Scale-free networks. Scientific American, 288
Berlusconi G, Calderoni F, Parolini N, Verani M, Piccardi C (2016) Link prediction in criminal networks: a tool for criminal intelligence analysis. PLoS ONE 11:e0154244
Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Org Theor 12:21–34
Borgatti SP, Everett MG, Johnson JC (2018) Analyzing social networks. Sage
Bright D, Koskinen J, Malm A (2018) Illicit network dynamics: the formation and evolution of a drug trafficking network. J Quantitative Criminol
Burcher M, Whelan C (2015) Social network analysis and small group ‘dark’networks: an analysis of the london bombers and the problem of ‘fuzzy’boundaries. Global Crime 16:104–122
Calderoni F (2013) Strategic positioning in mafia networks. In: Crime and networks. Routledge, Evanston, pp 163–181
Carley KM (2005) Dynamic network analysis for counter-terrorism. Unpublished manuscript
Carley KM (2006) Destabilization of covert networks. Comput Math Org Theor 12:51–66
Crossley N, Edwards G, Harries E, Stevenson R (2012) Covert social movement networks and the secrecy-efficiency trade off: the case of the UK suffragettes (1906–1914). Social Netw 34:634–644
Cumming GS (2016) Heterarchies: reconciling networks and hierarchies. Trends in Ecology & Evolution 31:622–632
Degenne A, Forse M (1999) Power and centrality. SAGE Publications, London, pp 133–158
Duijn PAC, Sloot PMA (2015) From data to disruption. Digital Investigation 15:39–45. Special Issue: Big Data and Intelligent Data Analysis
Duijn PAC, Kashirin V, Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Sci Reports 4:4238
Dunbar RIM (2016) Do online social media cut through the constraints that limit the size of offline social networks? Royal Society Open Science 3:150292
Duxbury SW, Haynie DL (2019) Criminal network security: an agent-based approach to evaluating network resilience. Criminology
Everton SF (2009) Connections network topography, key players and terrorist networks
Everton SF, Cunningham D (2013) Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression 5:94–114
Everton SF, Cunningham D (2015) Dark network resilience in a hostile environment: optimizing centralization and density. Behavioral Sciences of Terrorism and Political Aggression 16:1–20
Fielding NG (2017) The shaping of covert social networks: isolating the effects of secrecy. Trends in Organized Crime 20:16–30
Freeman LC (1978) Centrality in social networks conceptual clarification. Social Netw 1:215–239
French NN (2013) Project report: Toronto 18 terror group. Unpublished manuscript. CORE Lab, Naval Postgraduate School, Monterey, CA
Garrison AH (2004) Defining terrorism: philosophy of the bomb, propaganda by deed and change through fear and violence. Criminal Justice Studies 17:259–279
Grund TU, Densley JA (2015) Ethnic homophily and triad closure: mapping internal gang structure using exponential random graph models. Journal of Contemporary Criminal Justice 31:354–370
Gutfraind A (2009) Understanding terrorist organizations with a dynamic model. In: Mathematical methods in counterterrorism. Springer, Vienna, pp 107–125
Gutfraind A, Genkin M (2017) A graph database framework for covert network analysis: an application to the Islamic State network in Europe. Social Netw 51:178–188
Harmon CC (2001) Five strategies of terrorism. Small Wars and Insurgencies 12:39–66
Helfstein S, Wright D (2011) Covert or convenient? Evolution of terror attack networks. Journal of Conflict Resolution 55:785–813
Hill R, Dunbar R (2003) Social network size in humans. Human Nature 14:53–72
Hoppe B, Reinelt C (2010) Social network analysis and the evaluation of leadership networks. The Leadership Quarterly 21:600–619
JJAT (2009) The John Jay & ARTIS Transnational Terrorism (JJATT) database (2009) http://doitapps.jjay.cuny.edu/jjatt/index.php. Accessed: 2018
Jordan J (2014) Attacking the leader, missing the mark. Int Secur 38:7–38
Kamada T, Kawai S (1989) An algorithm for drawing general undirected graphs. Information Processing Letters 31:7–15
Kilberg J (2012) A basic model explaining terrorist group organizational structure. Studies in Conflict and Terrorism 35:810–830
Knaub A, Henderson C, Fisher K (2018) Finding the leaders: an examination of social network analysis and leadership identification in stem education change. Int J STEM Education 5:1–14
Knoke D (2015) Emerging trends in social network analysis of terrorism and counterterrorism. Emerging Trends in the Social and Behavioral Sciences: An Interdiciplinary, Searchable, and Linkable Resource pp 1–15
Knox H, Savage M, Harvey P (2006) Social networks and the study of relations: networks as method, metaphor and form. Economy and Society 35:113–140
Koschade S (2006) A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Studies in Conflict and Terrorism 29:559–575
Krebs VE (2001) Mapping networks of terrorist cells. Connections 3:43–52
Krebs VE (2002) Uncloaking terrorist networks. First Monday, 7(4)
Latora V, Marchiori M (2001) Efficient behavior of small-world networks. Phys Rev Lett 87
Lindelauf R, Borm P, Hamers H (2009) The influence of secrecy on the communication structure of covert networks. Social Netw 31:126–137
Luce RD, Perry AD (1949) A method of matrix analysis of group structure. Psychometrika 14:95–116
Magouirk J, Atran S (2008) Jemaah Islamiyah’s radical madrassah networks. Dynamics of Asymmetric Conflict 1:25–41
Magouirk J, Atran S, Sageman M (2008) Connecting terrorist networks. Studies in Conflict and Terrorism 31:1–16
Matusitz J (2008) Similarities between terrorist networks in antiquity and present-day cyberterrorist networks. Trends in Organized Crime 11:183–199
McGrath C, Blythe J (2004) Do you see what I want you to see? The effects of motion and spatial layout on viewers’ perceptions of graph structure. J Social Struct 5
McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: Homophily in social networks. Annual Rev Sociol 27:415–444
Medina R, Hepner G (2008) Geospatial analysis of dynamic terrorist networks. In: Values and violence: intangible aspects of terrorism. Springer Netherlands, Dordrecht, pp 151–167
Medina RM (2014) Social network analysis: a case study of the Islamist terrorist network. Secur J 27:97–121
Morselli C, Petit K, Giguère C (2006) The efficiency/security trade-off in criminal networks. Social Netw 29
Opsahl T, Panzarasa P (2009) Clustering in weighted networks. Social Netw 31:155–163. http://www.sciencedirect.com/science/article/pii/S0378873309000070
Ouellet M, Bouchard M, Hart M (2017) Criminal collaboration and risk: the drivers of Al Qaeda’s network structure before and after 9/11. Social Netw 51:171–177
Papachristos AV, Hureau DM, Braga AA (2013) The corner and the crew: The influence of geography and social networks on gang violence . American Sociol Rev 78:417–447
Perliger A, Pedahzur A (2011) Social network analysis in the study of terrorism and political violence. PS: Political Science and Politics 44:45–50
Price BC (2012) Targeting top terrorists: how leadership decapitation contributes to counterterrorism. Int Secur 36:9–46
Qin J, Xu JJ, Hu D, Sageman M, Chen H (2005) Analyzing terrorist networks: a case study of the global Salafi Jihad network. In: Kantor P, Muresan G, Roberts F, Zeng DD, Wang F-Y, Chen H, Merkle RC (eds) Intelligence and security informatics. Springer, Berlin, pp 287–304
Raab J, Milward HB (2003) Dark networks as problems. Journal of Public Administration Research and Theory 13:413–439
Raab J, Milward HB (2006) Dark networks as organizational problems: elements of a theory. International Public Management Journal 9:333–360
Robins G (2009) Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime 12:166–187
Rodríguez JA (2005) The March 11th terrorist network: in its weakness lies its strength
Sageman M (2004) Understanding terror networks. University of Pennsylvania, Philadelphia, PA, USA
Sageman M (2008) Leaderless Jihad: terror networks in the twenty-first century. University of Pennsylvania Press. Philadelphia, PA
Schmid A (2005) Terrorism as psychological warfare. Democracy and Security 1:137–146
Sparrow MK (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Social Netw 13:251–274
Tucker D (2008) Terrorism, networks, and strategy: why the conventional wisdom is wrong
Ünal MC (2019) Do terrorists make a difference in criminal networks? An empirical analysis on illicit drug and narco-terror networks in their prioritization between security and efficiency. Social Netw 57:1–17
van der Hulst RC (2014) Terrorist networks: the threat of connectivity. In: The SAGE handbook of social network analysis. SAGE Publications Ltd, pp 256–270
van Vlierden G (2015) Profile: paris attack ringleader Abdelhamid Abaaoud. Combating Terrorism Center at West Point 8:30–33
Varese F (2006) The structure of criminal connections: the Russian-Italian Mafia network. Oxford Legal Studies Research Paper 21:1–71
Waniek M, Michalak TP, Rahwan T, Wooldridge M (2017) On the construction of covert networks. In: Proceedings of the 16th conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp 1341–1349
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Structural Analysis in the Social Sciences. Cambridge University Press, Cambridge
Wu E, Carleton R, Davies G (2014) Discovering bin-Laden’s replacement in al-Qaeda, using social network analysis: a methodological investigation. Perspectives on Terrorism 8
Xu J, Chen H, Hu D (2009) The dynamics of terrorist networks: understanding the survival mechanisms of global Salafi Jihad. Journal of Homeland Security and Emergency Management 6
Zara G, Farrington DP (2016) Criminal recidivism: explanation, prediction and prevention. Routledge, Abingdon
Acknowledgements
We would like to thank Sean F. Everton and Nils N. French for providing us the necessary material to reconstruct the Toronto 2005 network. We also thank Roy Cerqueti the Editor and the anonymous reviewers for their helpful suggestions.
Funding
This study was not funded.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors – Matteo Gregori and Ugo Merlone – declare that have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Appendix A: Technical appendix
Appendix A: Technical appendix
A.1 Centralization
Centralization refers to the variation in actor centrality within a network (Everton and Cunningham 2013, p.97). Following Freeman (1978) and Everton and Cunningham (2013), in this study we take into consideration the degree centralization:
where \(C_{\max \limits }\) is the largest degree centrality score for all actors and \( C_{n_{i}} \) is the degree centrality score for actor ni, and the denominator is the theoretical maximum possible sum of differences in actor degree centrality. The larger is the score, the more likely it is that a single actor is very central whereas the other actors are not. For details see Everton and Cunningham (2013, p. 97).
A.2 Density
Network density is the number of actual connections within the network compared to the total number of possible ties. In an undirected graph density is expressed as:
where L is the number of lines in the network and g the number of nodes. For details see Wasserman and Faust (1994, p. 101).
A.3 Mean nodal degree
The mean nodal degree is a statistic that reports the average degree of the nodes in a graph. In an undirected graph it is expressed as:
For details see Wasserman and Faust (1994, p. 100).
A.4 Clustering coefficient
The clustering coefficient refers to the density of triplets of nodes in an undirected graph and is defined as:
The first attempt to measure the coefficient was made by Luce and Perry (1949), for further details see Opsahl and Panzarasa (2009).
A.5 Average path length
This is defined through the average path length of the network and is:
where d(i,j) denotes the shortest distance between node i and node j; for details see Wasserman and Faust (1994, p. 107).
A.6 Average efficiency
For details see Latora and Marchiori (2001).
A.7 Global efficiency
where EIdeal is the “ideal” graph wherein all possible edges are present. For details see Latora and Marchiori (2001).
A.8 Betweenness
where gjk is the number of shortest paths from node j to node k and gjk(ni) is the number of those paths that pass through i. Since the value depends on the size of the network we standardize it dividing by (g − 1)(g − 2)/2. For details see Freeman (1978) and Wasserman and Faust (1994, p. 190).
A.9 Closeness
where d(ni,nj) denotes the number of lines in geodesic linking actors i and j. For details see Wasserman and Faust (1994, p. 183–184).
Rights and permissions
About this article
Cite this article
Gregori, M., Merlone, U. Comparing operational terrorist networks. Trends Organ Crim 23, 263–288 (2020). https://doi.org/10.1007/s12117-020-09381-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12117-020-09381-z