Skip to main content

Interrogation Methods and Terror Networks

  • Chapter
Mathematical Methods in Counterterrorism

Abstract

We examine how the structure of terror networks varies with legal limits on interrogation and the ability of authorities to extract information from detainees. We assume that terrorist networks are designed to respond optimally to a tradeoff caused by information exchange: Diffusing information widely leads to greater internal efficiency, but it leaves the organization more vulnerable to law enforcement. The extent of this vulnerability depends on the law enforcement authority’s resources, strategy and interrogation methods. Recognizing that the structure of a terrorist network responds to the policies of law enforcement authorities allows us to begin to explore the most effective policies from the authorities’ point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anselmi, T.: La testimonianza di Tina Anselmi sulla Resistenza raccolta da Alessandra Chiappano. (2003) http://www.novecento.org.

  2. Arquilla J., Ronfeldt, D. F.: Networks and Netwars: The Future of Terror, Crime, and Militancy. (2002) Rand Corporation.

    Google Scholar 

  3. Baccara, M., Bar-Isaac, H.: How to Organize Crime. The Review of Economic Studies 75 (2008) 1039–1067

    Article  MATH  MathSciNet  Google Scholar 

  4. Ballester, C., Calvó-Armengolz A., Zenou, Y.: Who’s Who in Networks. Wanted: The Key Player. Econometrica 74 (2006) 1403–1418

    Article  MATH  MathSciNet  Google Scholar 

  5. Charlie M.:Into the Abyss: A Personal Journey Into the World of Street Gangs. Manuscript (2002)

    Google Scholar 

  6. Farley, J. D.: Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making). Studies in Conflict and Terrorism 26 (2006) 399–411

    Article  Google Scholar 

  7. Farley, J. D.: Building the perfect terrorist cell. conference presentation (2006)

    Google Scholar 

  8. Garoupa, N.: Optimal law enforcement and criminal organization. Journal of Economic Behavior & Organization 63 (2007) 461–474

    Article  Google Scholar 

  9. Oliva A.: Esercito and Democrazia. Vangelista Editore (1976)

    Google Scholar 

  10. Pearl M.: A Mighty Heart: The Inside Story of the Al Qaeda Kidnapping of Danny Pearl. Scribner Publishing (2003)

    Google Scholar 

  11. Thompson, T.: Gangs: A Journey into the Heart of the British Underworld. Hodder & Stoughton (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariagiovanna Baccara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag/Wien

About this chapter

Cite this chapter

Baccara, M., Bar-Isaac, H. (2009). Interrogation Methods and Terror Networks. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-211-09442-6_16

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-09441-9

  • Online ISBN: 978-3-211-09442-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics