Abstract
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers [13] developed a theoretical framework to determine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abuza, Z. (2003). Militant Islam in Southeast Asia. Lynne Rienner Publishers: London.
Bergen, P. (2006). The Osama Bin Laden I Know: an Oral History of al Qaeda’s Leader. Free Press: New York.
Bollobas, B. (1998). Modern Graph Theory. Springer-Verlag: New York.
Cammaert, A.P.M. (1994). Het Verborgen Front. EISMA B.V.: Leeuwarden.
Cruickshank et al. (2007). Abu Musab Al Suri: Architect of the New Al Qaeda. Studies in Conflict and Terrorism Vol 30(1): 1–14.
Engelen, D. (2005). De Nederlandse stay behind-organisatie in de koude oorlog, 1945–1992. PIVOT-rapport nr. 166: ’s Gravenhage.
Gunaratna, R. (2003). Inside Al Qaeda: Global Network of Terror. Berkley Trade.
Jackson, M.O. (2001). The Stability and Efficiency of Economic and Social Networks. In: Dutta B. and Jackson M.O., editors. Networks and Groups. Springer-Verlag: Heidelberg.
Johnson, L.K. (ed.) (2007). Strategic Intelligence: Covert Action–Beyond The Veils of Secret Foreign Policy, Vol 3. Praeger Security International: Westport.
Koschade, S (2002). Indonesia Backgrounder: How the Jemaah Islamiyah Terrorist Network Operates. International Crisis Group.
Koschade, S (2005). A Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia. Proceedings Social Change in the 21st Century Conference, QUT Carseldine, Brisbane.
Koschade, S. (2006). A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence. Terrorism and Political Violence 29: 559–575.
Lindelauf, R.H.A. , Borm, P. and Hamers, H. (2008). The Influence of Secrecy on the Communication Structure of Covert Networks. CentER Discussion Paper, 2008-23, pp. 1–18.
Mishal, S. and Rosenthal, M. (2005). Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations. Studies in Conflict & Terrorism 28(4): 275–293.
Petraeus, D.H. et al. (2007). The U.S. Army Marine Corps Counterinsurgency Field Manual. University of Chicago Press: Chicago.
Sageman, M. (2004). Understanding Terror Networks. University of Pennsylvania Press: Philadelphia, Pennsylvania.
Vidino, L. (2006). Al Qaeda in Europe: The New Battleground of International Jihad. Prometheus Books: New York.
Weiner, T (2007). Legacy of Ashes: The History of the CIA. Doubleday.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag/Wien
About this chapter
Cite this chapter
Lindelauf, R., Borm, P., Hamers, H. (2009). On Heterogeneous Covert Networks. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-211-09442-6_13
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-09441-9
Online ISBN: 978-3-211-09442-6
eBook Packages: Computer ScienceComputer Science (R0)