Skip to main content

Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes

  • Chapter
Mathematical Methods in Counterterrorism

Abstract

This paper aims to discuss the strengths of different terrorist cell structures, using the partially ordered set (“poset”) model of terrorist cells to define the strength of terrorist cell structures.We discuss algorithms implemented in a program examining the structures of posets of seven elements, and the patterns observed in this analysis. We then discuss implications of these findings, and their applicability to government strategic operations - namely, the possibilities for future expansion and use of the algorithms to produce structures fitting certain parameters, and the caution which must be exercised in following previous suggestions that terrorist cell structures can be assumed to be trees, since structures containing “V” structures and more than one leader can be more secure than trees, according to our findings. We end with several questions that require future investigation in order to increase applicability to strategic operations, and suggestions for how such questions may be approached.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Davey, B. A., Priestley, H. A.: Introduction to Lattices and Order, Second Edition. Cambridge University Press, Cambridge (2002)

    MATH  Google Scholar 

  2. Farley, J. D.: Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making). Studies in Conflict and Terrorism. 26, 399–411 (2003)

    Article  Google Scholar 

  3. Farley, J. D.: Toward a Mathematical Theory of Counterterrorism: How to Build the Perfect Terrorist Cell, I. (2006)

    Google Scholar 

  4. Hartnell, B. L.: The Optimum Defense against Random Subversions in a Network. Tenth Southeastern Conference on Combinatorics, Graph Theory and Computing. 493–499. Florida Atlantic Univ., Boca Raton, Fla. (1979)

    Google Scholar 

  5. McGough, L. R.: Simulating Terrorist Cells: Experiments and Mathematical Theory. (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lauren McGough .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag/Wien

About this chapter

Cite this chapter

McGough, L. (2009). Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-211-09442-6_4

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-09441-9

  • Online ISBN: 978-3-211-09442-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics