Abstract
We examine how the structure of terror networks varies with legal limits on interrogation and the ability of authorities to extract information from detainees. We assume that terrorist networks are designed to respond optimally to a tradeoff caused by information exchange: Diffusing information widely leads to greater internal efficiency, but it leaves the organization more vulnerable to law enforcement. The extent of this vulnerability depends on the law enforcement authority’s resources, strategy and interrogation methods. Recognizing that the structure of a terrorist network responds to the policies of law enforcement authorities allows us to begin to explore the most effective policies from the authorities’ point of view.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anselmi, T.: La testimonianza di Tina Anselmi sulla Resistenza raccolta da Alessandra Chiappano. (2003) http://www.novecento.org.
Arquilla J., Ronfeldt, D. F.: Networks and Netwars: The Future of Terror, Crime, and Militancy. (2002) Rand Corporation.
Baccara, M., Bar-Isaac, H.: How to Organize Crime. The Review of Economic Studies 75 (2008) 1039–1067
Ballester, C., Calvó-Armengolz A., Zenou, Y.: Who’s Who in Networks. Wanted: The Key Player. Econometrica 74 (2006) 1403–1418
Charlie M.:Into the Abyss: A Personal Journey Into the World of Street Gangs. Manuscript (2002)
Farley, J. D.: Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making). Studies in Conflict and Terrorism 26 (2006) 399–411
Farley, J. D.: Building the perfect terrorist cell. conference presentation (2006)
Garoupa, N.: Optimal law enforcement and criminal organization. Journal of Economic Behavior & Organization 63 (2007) 461–474
Oliva A.: Esercito and Democrazia. Vangelista Editore (1976)
Pearl M.: A Mighty Heart: The Inside Story of the Al Qaeda Kidnapping of Danny Pearl. Scribner Publishing (2003)
Thompson, T.: Gangs: A Journey into the Heart of the British Underworld. Hodder & Stoughton (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag/Wien
About this chapter
Cite this chapter
Baccara, M., Bar-Isaac, H. (2009). Interrogation Methods and Terror Networks. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-211-09442-6_16
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-09441-9
Online ISBN: 978-3-211-09442-6
eBook Packages: Computer ScienceComputer Science (R0)