Abstract
Staying alive (and at large), is a career advantage when you manage an insurgent group. If instead, your objective was to detonate a suicide bomb, success would be measured differently. These divergent goals must be considered when examining the social network within which individual actors are embedded, as each outcome may require a different supporting structure, warranting the application of different theory and associated metrics. Breaking from the extant literature that is principally concerned with assessing the cellular structure of attack groups and the centrality of actors, this chapter applies a business model of competitive advantage to examine how varied egonet structures correlate with the operational success of command staff—here the objective is to stay alive. Investigating the utility of Burt’s (Structural holes: the social structure of competition. Harvard University Press, Cambridge, 1992), Burt (Adm Sci Q 42(2):339–365, 1997). theory of structural holes, we find that the communication patterns of central leaders of Al Qa’ida and the Islamic State of Iraq (ISI), who were active since 2006 and survived at-large until November 2015, involved smaller egonets that had fewer non-redundant ties, lower density, and were significantly less likely to involve reliance on a central actor for information. In short, less social capital and lower constraint improved the likelihood of survival.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
While we are aware of the differences between insurgent and terror groups, the terms are used interchangeably in this chapter.
- 2.
The reader should be aware that there are different conceptions of social capital. Our adoption of Burt’s [1] perspective (and suggested metrics) does not indicate that it is the only useful conceptualization. Moreover, the theory did not remain in a vacuum: several additions were made (see [2]). Constrained by the limits of what can reasonably be covered in a chapter, we encourage readers to see Borgatti et al. [14] for a brief synopsis of the political and sociological discussion on this topic and the various measures available to study the attendant network structures. Readers are also advised to explore Granovetter’s [15, 16] discussion of the information benefits of weak ties, as well as some of Burt’s more recent writings.
- 3.
For a more detailed description of this coding process see Bush and Bichler [8].
- 4.
Degree centrality measures the number of direct connections an actor has; Bonacich’s power and eigenvector centrality identifies individuals who may have only a few connections, but those associates are highly connected; and, betweenness centrality can identify which individuals are situated along the shortest paths among all other pairs in the network. For more information about these centrality measures see Borgatti et al. [24], Hanneman and Riddle [25].
- 5.
One journalist also appeared in the top 25 listing for Al Qa’ida. Since this person did not have a known role within an insurgent group they were excluded from this analysis.
- 6.
Recall from our previous discussion that social capital is a dynamic byproduct of competition borne from relational structures that affords some individuals significantly more access and control of resources than others [1].
- 7.
Admittedly, searching the status of each person using publicly available sources is a limitation for two reasons. First, some individuals go by several names and it is possible that a notice of death or arrest was missed. Second, many individuals assume names of others who have fought before them. To determine which person was killed or arrested, we considered their known locations, role within their respective organizations, and age. Again, we may have missed something. However, we compared our coding with published findings (see Wu et al. [13]) which confirmed our classification of Al Qa’ida operatives.
- 8.
While the documents used to code communication chains are dated between September 2006 and April 2011, we decided that coding death or capture required a longer time frame. All actors active in September 2006 were alive in January 2006, so extending back from the documents was reasonable. Moreover, we wanted to code the ability of individuals to remain alive, and thus, expanding the window forward to when this chapter was written seemed appropriate.
- 9.
Efficiency is a standardized version of effect size that controls for the size of an egonet. Generally, it is better to use this measure. However, we found that efficiency was highly correlated with density (Pearson Correlation of −0.992), and thus, it was not used here.
- 10.
Borgatti [26] demonstrates that when applied to a dichotomous network (as we have done here) the effect size is simply the egonet density scaled by a factor of n − 1, such that effect size can be calculated as: \(n - \frac{2t}{n}\); where, t equals the number of ties in the egonet, excluding all ties to the ego.
- 11.
The difference in effect size reported in Table 6 would seem to indicate that actors associated with ISI had fewer structural holes, and thus, less redundancy in the network; however the effect size reported does not control for the size of the network. Once network size is controlled for, individuals named in ISI documents exhibited more structural holes in their egonets (AQ = 0.82; both = 0.80; ISI = 0.87).
- 12.
For brevity, only the logistic regression is reported.
References
Burt RS (1992) Structural holes: the social structure of competition. Harvard University Press, Cambridge
Burt RS (1997) The contingent value of social capital. Adm Sci Q 42(2):339–365
Raab J, Milward HB (2003) Dark networks as problems. J Public Adm Res Theor 13(4):413–439
Morselli C, Giguère C, Petit K (2007) The efficiency/security trade-off in criminal networks. Soc Netw 29(1):143–153
Krebs VE (2002) Mapping networks of terrorist cells. Connections 24:43–52
Everton SF, Cunningham D (2014) Terrorist network adaptation to a changing environment. In: Morselli C (ed) Crime and networks. Routledge, New York, pp 287–308
Xu J, Hu D, Chen H (2009) The dynamics of terrorist networks: understanding the survival mechanisms of global Salafi Jihad. JHSEM 6(1):27
Bush S, Bichler G (2015) Measuring disruption in terrorist communications. In: Bichler G, Malm A (eds) Disrupting criminal networks: network analysis in crime prevention. Crime prevention studies, vol 28. First Forum Press, Boulder, CO, pp 177–208
Koschade S (2006) A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Stud Confl Terrorism 29(6):559–575
Magouirk J, Atran S, Sageman M (2008) Connecting terrorist networks. Stud Confl Terrorism 31(1):1–16
Carley KM, Diesner J, Reminga J, Tsvetovat M (2007) Toward an interoperable dynamic network analysis toolkit. Decis Support Syst 43:1324–1347
Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia, PA
Wu E, Carleton R, Davies G (2014) Discovering bin-Laden’s replacement in al-Qaeda, using social network analysis: a methodological investigation. Perspect Terrorism 8(1):57–73
Borgatti SP, Jones C, Everett MG (1998) Network measures of social capital. Connections 21(2):27–36
Granovetter M (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380
Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420–1443
Malm A, Bichler G (2013) Using friends for money: the positional importance of money-launderers in organized crime. Trends Organ Crime 16(4):365–381
Morselli C (2001) Structuring Mr. Nice: entrepreneurial opportunities and brokerage positioning in the cannabis trade. Crime Law Soc Chang 35(3):203–244
Morselli C (2005) Contacts, opportunity, and criminal enterprise. University of Toronto Press, Toronto, ON
Rassler D, Koehler-Derrick G, Collins L, al-Obaidi M, Lahoud N (2012) Letters from Abbottabad: Bin Ladin sidelined? Combating Terrorism Center
Al-‘Ubaydi M, Lahoud N, Milton D, Price B (2014) The group that calls itself a state: understanding the evolution and challenges of the Islamic State. Combating Terrorism Center, West Point
Jung DF, Ryan P, Shapiro JN, Wallace J (2014) Managing a transnational insurgency: the Islamic State of Iraq’s “Paper Trail,” 2005–2010. Occasional Paper Series, Harmony Program. Combating Terrorism Center, West Point
Borgatti SP (2002) NetDraw: graph visualization software. Analytic Technologies, Harvard
Borgatti SP, Everett MG, Johnson JC (2013) Analyzing social networks. SAGE Publications, Los Angeles
Hanneman RA, Riddle M (2011) Concepts and measures for basic network analysis. In Scott J, Carrington PJ (eds) The SAGE handbook of social network analysis. SAGE, Los Angeles, pp 340–369
Borgatti SP (1997) Structural holes: unpacking Burt’s redundancy measures. Connections 20(1):35–38
Bouchard M, Joffres K, Frank R (2014) Preliminary analytic considerations in designing a terrorism and extremism online network extractor. In: Mago VK, Dabbaghian V (eds) Computational models of complex systems. Springer International Publishing, Switzerland, pp 171–184
Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100–107
Everton SF, Cunningham D (2015) Dark network resilience in a hostile environment: optimizing centralization and density. Criminol Crim Justice Law Soc 16(1):1–20
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Bichler, G., Bush, S. (2016). Staying Alive in the Business of Terror. In: Masys, A. (eds) Disaster Forensics. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-41849-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-41849-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41847-6
Online ISBN: 978-3-319-41849-0
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)