Skip to main content

On Heterogeneous Covert Networks

  • Chapter
Mathematical Methods in Counterterrorism

Abstract

Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers [13] developed a theoretical framework to determine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abuza, Z. (2003). Militant Islam in Southeast Asia. Lynne Rienner Publishers: London.

    Google Scholar 

  2. Bergen, P. (2006). The Osama Bin Laden I Know: an Oral History of al Qaeda’s Leader. Free Press: New York.

    Google Scholar 

  3. Bollobas, B. (1998). Modern Graph Theory. Springer-Verlag: New York.

    MATH  Google Scholar 

  4. Cammaert, A.P.M. (1994). Het Verborgen Front. EISMA B.V.: Leeuwarden.

    Google Scholar 

  5. Cruickshank et al. (2007). Abu Musab Al Suri: Architect of the New Al Qaeda. Studies in Conflict and Terrorism Vol 30(1): 1–14.

    Article  Google Scholar 

  6. Engelen, D. (2005). De Nederlandse stay behind-organisatie in de koude oorlog, 1945–1992. PIVOT-rapport nr. 166: ’s Gravenhage.

    Google Scholar 

  7. Gunaratna, R. (2003). Inside Al Qaeda: Global Network of Terror. Berkley Trade.

    Google Scholar 

  8. Jackson, M.O. (2001). The Stability and Efficiency of Economic and Social Networks. In: Dutta B. and Jackson M.O., editors. Networks and Groups. Springer-Verlag: Heidelberg.

    Google Scholar 

  9. Johnson, L.K. (ed.) (2007). Strategic Intelligence: Covert Action–Beyond The Veils of Secret Foreign Policy, Vol 3. Praeger Security International: Westport.

    Google Scholar 

  10. Koschade, S (2002). Indonesia Backgrounder: How the Jemaah Islamiyah Terrorist Network Operates. International Crisis Group.

    Google Scholar 

  11. Koschade, S (2005). A Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia. Proceedings Social Change in the 21st Century Conference, QUT Carseldine, Brisbane.

    Google Scholar 

  12. Koschade, S. (2006). A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence. Terrorism and Political Violence 29: 559–575.

    Google Scholar 

  13. Lindelauf, R.H.A. , Borm, P. and Hamers, H. (2008). The Influence of Secrecy on the Communication Structure of Covert Networks. CentER Discussion Paper, 2008-23, pp. 1–18.

    Google Scholar 

  14. Mishal, S. and Rosenthal, M. (2005). Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations. Studies in Conflict & Terrorism 28(4): 275–293.

    Article  Google Scholar 

  15. Petraeus, D.H. et al. (2007). The U.S. Army Marine Corps Counterinsurgency Field Manual. University of Chicago Press: Chicago.

    Google Scholar 

  16. Sageman, M. (2004). Understanding Terror Networks. University of Pennsylvania Press: Philadelphia, Pennsylvania.

    Google Scholar 

  17. Vidino, L. (2006). Al Qaeda in Europe: The New Battleground of International Jihad. Prometheus Books: New York.

    Google Scholar 

  18. Weiner, T (2007). Legacy of Ashes: The History of the CIA. Doubleday.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roy Lindelauf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag/Wien

About this chapter

Cite this chapter

Lindelauf, R., Borm, P., Hamers, H. (2009). On Heterogeneous Covert Networks. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-211-09442-6_13

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-09441-9

  • Online ISBN: 978-3-211-09442-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics