Skip to main content

Staying Alive in the Business of Terror

  • Chapter
  • First Online:
Disaster Forensics

Abstract

Staying alive (and at large), is a career advantage when you manage an insurgent group. If instead, your objective was to detonate a suicide bomb, success would be measured differently. These divergent goals must be considered when examining the social network within which individual actors are embedded, as each outcome may require a different supporting structure, warranting the application of different theory and associated metrics. Breaking from the extant literature that is principally concerned with assessing the cellular structure of attack groups and the centrality of actors, this chapter applies a business model of competitive advantage to examine how varied egonet structures correlate with the operational success of command staff—here the objective is to stay alive. Investigating the utility of Burt’s (Structural holes: the social structure of competition. Harvard University Press, Cambridge, 1992), Burt (Adm Sci Q 42(2):339–365, 1997). theory of structural holes, we find that the communication patterns of central leaders of Al Qa’ida and the Islamic State of Iraq (ISI), who were active since 2006 and survived at-large until November 2015, involved smaller egonets that had fewer non-redundant ties, lower density, and were significantly less likely to involve reliance on a central actor for information. In short, less social capital and lower constraint improved the likelihood of survival.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    While we are aware of the differences between insurgent and terror groups, the terms are used interchangeably in this chapter.

  2. 2.

    The reader should be aware that there are different conceptions of social capital. Our adoption of Burt’s [1] perspective (and suggested metrics) does not indicate that it is the only useful conceptualization. Moreover, the theory did not remain in a vacuum: several additions were made (see [2]). Constrained by the limits of what can reasonably be covered in a chapter, we encourage readers to see Borgatti et al. [14] for a brief synopsis of the political and sociological discussion on this topic and the various measures available to study the attendant network structures. Readers are also advised to explore Granovetter’s [15, 16] discussion of the information benefits of weak ties, as well as some of Burt’s more recent writings.

  3. 3.

    For a more detailed description of this coding process see Bush and Bichler [8].

  4. 4.

    Degree centrality measures the number of direct connections an actor has; Bonacich’s power and eigenvector centrality identifies individuals who may have only a few connections, but those associates are highly connected; and, betweenness centrality can identify which individuals are situated along the shortest paths among all other pairs in the network. For more information about these centrality measures see Borgatti et al. [24], Hanneman and Riddle [25].

  5. 5.

    One journalist also appeared in the top 25 listing for Al Qa’ida. Since this person did not have a known role within an insurgent group they were excluded from this analysis.

  6. 6.

    Recall from our previous discussion that social capital is a dynamic byproduct of competition borne from relational structures that affords some individuals significantly more access and control of resources than others [1].

  7. 7.

    Admittedly, searching the status of each person using publicly available sources is a limitation for two reasons. First, some individuals go by several names and it is possible that a notice of death or arrest was missed. Second, many individuals assume names of others who have fought before them. To determine which person was killed or arrested, we considered their known locations, role within their respective organizations, and age. Again, we may have missed something. However, we compared our coding with published findings (see Wu et al. [13]) which confirmed our classification of Al Qa’ida operatives.

  8. 8.

    While the documents used to code communication chains are dated between September 2006 and April 2011, we decided that coding death or capture required a longer time frame. All actors active in September 2006 were alive in January 2006, so extending back from the documents was reasonable. Moreover, we wanted to code the ability of individuals to remain alive, and thus, expanding the window forward to when this chapter was written seemed appropriate.

  9. 9.

    Efficiency is a standardized version of effect size that controls for the size of an egonet. Generally, it is better to use this measure. However, we found that efficiency was highly correlated with density (Pearson Correlation of −0.992), and thus, it was not used here.

  10. 10.

    Borgatti [26] demonstrates that when applied to a dichotomous network (as we have done here) the effect size is simply the egonet density scaled by a factor of n − 1, such that effect size can be calculated as: \(n - \frac{2t}{n}\); where, t equals the number of ties in the egonet, excluding all ties to the ego.

  11. 11.

    The difference in effect size reported in Table 6 would seem to indicate that actors associated with ISI had fewer structural holes, and thus, less redundancy in the network; however the effect size reported does not control for the size of the network. Once network size is controlled for, individuals named in ISI documents exhibited more structural holes in their egonets (AQ = 0.82; both = 0.80; ISI = 0.87).

  12. 12.

    For brevity, only the logistic regression is reported.

References

  1. Burt RS (1992) Structural holes: the social structure of competition. Harvard University Press, Cambridge

    Google Scholar 

  2. Burt RS (1997) The contingent value of social capital. Adm Sci Q 42(2):339–365

    Article  Google Scholar 

  3. Raab J, Milward HB (2003) Dark networks as problems. J Public Adm Res Theor 13(4):413–439

    Article  Google Scholar 

  4. Morselli C, Giguère C, Petit K (2007) The efficiency/security trade-off in criminal networks. Soc Netw 29(1):143–153

    Article  Google Scholar 

  5. Krebs VE (2002) Mapping networks of terrorist cells. Connections 24:43–52

    Google Scholar 

  6. Everton SF, Cunningham D (2014) Terrorist network adaptation to a changing environment. In: Morselli C (ed) Crime and networks. Routledge, New York, pp 287–308

    Google Scholar 

  7. Xu J, Hu D, Chen H (2009) The dynamics of terrorist networks: understanding the survival mechanisms of global Salafi Jihad. JHSEM 6(1):27

    Article  Google Scholar 

  8. Bush S, Bichler G (2015) Measuring disruption in terrorist communications. In: Bichler G, Malm A (eds) Disrupting criminal networks: network analysis in crime prevention. Crime prevention studies, vol 28. First Forum Press, Boulder, CO, pp 177–208

    Google Scholar 

  9. Koschade S (2006) A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Stud Confl Terrorism 29(6):559–575

    Article  Google Scholar 

  10. Magouirk J, Atran S, Sageman M (2008) Connecting terrorist networks. Stud Confl Terrorism 31(1):1–16

    Article  Google Scholar 

  11. Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43:1324–1347

    Article  Google Scholar 

  12. Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia, PA

    Book  Google Scholar 

  13. Wu E, Carleton R, Davies G (2014) Discovering bin-Laden’s replacement in al-Qaeda, using social network analysis: a methodological investigation. Perspect Terrorism 8(1):57–73

    Google Scholar 

  14. Borgatti SP, Jones C, Everett MG (1998) Network measures of social capital. Connections 21(2):27–36

    Google Scholar 

  15. Granovetter M (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380

    Article  Google Scholar 

  16. Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420–1443

    Article  Google Scholar 

  17. Malm A, Bichler G (2013) Using friends for money: the positional importance of money-launderers in organized crime. Trends Organ Crime 16(4):365–381

    Article  Google Scholar 

  18. Morselli C (2001) Structuring Mr. Nice: entrepreneurial opportunities and brokerage positioning in the cannabis trade. Crime Law Soc Chang 35(3):203–244

    Article  Google Scholar 

  19. Morselli C (2005) Contacts, opportunity, and criminal enterprise. University of Toronto Press, Toronto, ON

    Google Scholar 

  20. Rassler D, Koehler-Derrick G, Collins L, al-Obaidi M, Lahoud N (2012) Letters from Abbottabad: Bin Ladin sidelined? Combating Terrorism Center

    Google Scholar 

  21. Al-‘Ubaydi M, Lahoud N, Milton D, Price B (2014) The group that calls itself a state: understanding the evolution and challenges of the Islamic State. Combating Terrorism Center, West Point

    Google Scholar 

  22. Jung DF, Ryan P, Shapiro JN, Wallace J (2014) Managing a transnational insurgency: the Islamic State of Iraq’s “Paper Trail,” 2005–2010. Occasional Paper Series, Harmony Program. Combating Terrorism Center, West Point

    Google Scholar 

  23. Borgatti SP (2002) NetDraw: graph visualization software. Analytic Technologies, Harvard

    Google Scholar 

  24. Borgatti SP, Everett MG, Johnson JC (2013) Analyzing social networks. SAGE Publications, Los Angeles

    Google Scholar 

  25. Hanneman RA, Riddle M (2011) Concepts and measures for basic network analysis. In Scott J, Carrington PJ (eds) The SAGE handbook of social network analysis. SAGE, Los Angeles, pp 340–369

    Google Scholar 

  26. Borgatti SP (1997) Structural holes: unpacking Burt’s redundancy measures. Connections 20(1):35–38

    Google Scholar 

  27. Bouchard M, Joffres K, Frank R (2014) Preliminary analytic considerations in designing a terrorism and extremism online network extractor. In: Mago VK, Dabbaghian V (eds) Computational models of complex systems. Springer International Publishing, Switzerland, pp 171–184

    Chapter  Google Scholar 

  28. Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100–107

    Article  Google Scholar 

  29. Everton SF, Cunningham D (2015) Dark network resilience in a hostile environment: optimizing centralization and density. Criminol Crim Justice Law Soc 16(1):1–20

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gisela Bichler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bichler, G., Bush, S. (2016). Staying Alive in the Business of Terror. In: Masys, A. (eds) Disaster Forensics. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-41849-0_11

Download citation

Publish with us

Policies and ethics