Abstract
This paper aims to discuss the strengths of different terrorist cell structures, using the partially ordered set (“poset”) model of terrorist cells to define the strength of terrorist cell structures.We discuss algorithms implemented in a program examining the structures of posets of seven elements, and the patterns observed in this analysis. We then discuss implications of these findings, and their applicability to government strategic operations - namely, the possibilities for future expansion and use of the algorithms to produce structures fitting certain parameters, and the caution which must be exercised in following previous suggestions that terrorist cell structures can be assumed to be trees, since structures containing “V” structures and more than one leader can be more secure than trees, according to our findings. We end with several questions that require future investigation in order to increase applicability to strategic operations, and suggestions for how such questions may be approached.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Davey, B. A., Priestley, H. A.: Introduction to Lattices and Order, Second Edition. Cambridge University Press, Cambridge (2002)
Farley, J. D.: Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making). Studies in Conflict and Terrorism. 26, 399–411 (2003)
Farley, J. D.: Toward a Mathematical Theory of Counterterrorism: How to Build the Perfect Terrorist Cell, I. (2006)
Hartnell, B. L.: The Optimum Defense against Random Subversions in a Network. Tenth Southeastern Conference on Combinatorics, Graph Theory and Computing. 493–499. Florida Atlantic Univ., Boca Raton, Fla. (1979)
McGough, L. R.: Simulating Terrorist Cells: Experiments and Mathematical Theory. (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag/Wien
About this chapter
Cite this chapter
McGough, L. (2009). Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (eds) Mathematical Methods in Counterterrorism. Springer, Vienna. https://doi.org/10.1007/978-3-211-09442-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-211-09442-6_4
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-09441-9
Online ISBN: 978-3-211-09442-6
eBook Packages: Computer ScienceComputer Science (R0)