Modeling Terrorist Networks: The Second Decade

Part of the Understanding Complex Systems book series (UCS)


The original version of “Modeling Terrorist Networks” was prepared for a NATO conference in 2003.1 There have been subsequent re-publications, most notably in The Intelligencer,2 and on the London School of Economics website. In those original versions of the paper, we sought to elucidate how the techniques of nonlinear dynamical systems modeling, combined with first principles of counter-intelligence, could be brought to bear on various problems regarding the structure of terrorist networks and the appropriate methods to counter those groups. Because we worked from first principles, many of the insights presented in that original paper remain true today. However, as we began to develop our approach, we noticed almost immediately that there were several constraints on our method, some simply challenging and others just plain awkward.


Social Network Analysis Terrorist Attack Complex Adaptive System Intelligence Community Terrorist Threat 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Fellman, P. V., Sawyer, D., & Wright, R. (2003). Modeling terrorist networks – complex systems and first principles of counter-intelligence. In Proceedings of the NATO conference on central Asia: Enlargement, civil – military relations, and security, Kazakh American University/North Atlantic Treaty Organization (NATO).Google Scholar
  2. 2.
    Fellman, P. V., & Wright, R. (2004). Modeling terrorist networks. The Intelligencer U.S. Journal of Intelligence Studies, Vol. 14, No. 2, pp. 59–68.Google Scholar
  3. 3.
    Fellman, P. V., & Wright, R. (2003). Modeling terrorist networks – complex systems at the mid-range. In Paper presented at the joint complexity conference, London School of Economics.Google Scholar
  4. 4.
    Fellman, P. V. (2011). Understanding the complexity of IIED terrorist networks. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying themes in complex systems (Vol. 3). Cambridge: NECSI Knowledge Press.Google Scholar
  5. 5.
    Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A blueprint for making intelligence relevant in Afghanistan. Marine Corps Gazette.
  6. 6.
    Jones, D. (2006). Understanding the form, function, and logic of clandestine cellular networks: the first step in effective counternetwork operations. Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College.Google Scholar
  7. 7.
    Wilson, E. O. (2000). Sociobiology: The new synthesis. Cambridge: Belknap Press of Harvard University Press. Twenty-Fifth Anniversary Edition.Google Scholar
  8. 8.
    Fellman, P. V., Clemens, J. P., Wright, R., Post, J. V., & Dadmun, M. (2006). Disrupting terrorist networks, a dynamic fitness landscape approach. In Proceedings of the 2006 annual meeting of the North American association for computation in the social and organizational sciences. Google Scholar
  9. 9.
    Kauffman, S. A. (1993). The origins of order: Self organization and selection in evolution. New York: Oxford University Press.Google Scholar
  10. 10.
    Li, Q., & Mills, D. Investigating the Scaling Behavior, Crossover and Antipersistence, Global Telecommunications Conference, Institute of Electrical and Electronic Engineers, Rio de Janeiro, Dec. 5-9, 1999.Google Scholar
  11. 11.
    Fellman, P. V., & Wright, R. (2003). Modeling terrorist networks: Complex systems at the mid-range, the joint complexity conference, London School of Economics.
  12. 12.
    Allison, G. T., & Zelikow, P. (1999). Essence of decision: Explaining the Cuban missile crisis (2nd ed.). New York: Pearson.Google Scholar
  13. 13.
    Department of Homeland Security Bioterrorism Risk Assessment (2008). A call for change committee on methodological improvements to the department of homeland security’s biological agent risk analysis. Washington, DC: Board on Mathematical Sciences and Their Applications, Division on Engineering and Physical Sciences, Board on Life Sciences, Division on Earth and Life Studies, National Research Council Of The National Academies, The National Academies Press.Google Scholar
  14. 14.
    Packer, G. (2006). The assassins gate: America in Iraq, Farrar, Strauss and Giroux. See also John Robb, The bazaar of violence in Iraq
  15. 15.
    Cordesman, A. H., Mausner, A., Khazai, S., Alsis, P., & Loi, C. (2013). The real outcome of the Iraq war: US and Iranian strategic competition in Iraq. Center for Strategic and International Studies.
  16. 16.
    Fellman, P. V. (2011). The complexity of terrorist networks. Open Source Intelligence and web Mining, 1(2), 4–14. Special Edition of the International Journal of Networking and Virtual Organisations.MathSciNetGoogle Scholar
  17. 17.
    Fuller, E. to Fuller, G. (1997). Redrawing the world’s borders. World Policy Journal;Spring97, Vol. 14 Issue 1, pp. 11-21.Google Scholar
  18. 18.
    Farmer, J. D. (2001). “What Now?”
  19. 19.
    Russett, B., Starr, H., & Kinsella, D. (1999). World politics: The menu for choice (6th ed.). Belmont: Wadsworth.Google Scholar
  20. 20.
    Kennedy, P. M. (1989). The rise and fall of the great powers: Economic change and military conflict from 1500 to 2000. New York: Vintage Books.Google Scholar
  21. 21.
    Hoffman, B., & Carr, C. (1997). Terrorism: Who is fighting whom? World Policy Journal; Spring 97, Vol. 14 Issue 1, pp. 97-104.Google Scholar
  22. 22.
    Hudson, R. A., Majeska, M., Savada, A., & Metz, H. C. (1999). The sociology and psychology of terrorism: Who becomes a terrorist and why? Washington, DC: Federal Research Division, Library of Congress. Available at:
  23. 23.
    Peters, E. (1992). At a basic mathematical level, this kind of phenomenon is explained very clearly. In Chaos and order in the capital markets. New York: John Wiley and Sons. A more rigorous treatment can be found in Statistical mechanics of complex networks by Reka Albert and Laszlo Barbási, arXiv:cond-mat/0106096v1 6 Jun 2001.
  24. 24.
    The definitive work on the subject of “simple” systems is (a) Farmer’s paper (1982). Chaotic attractors of an infinite-dimensional dynamical system. Physica D, 4, 366–393. A good representative demonstration of the techniques involved is (b) Shampine and Thompson’s “Solving Delay Differential Equations with dde23” available on the world wide web at (c) Stuart Kauffman also draws on Farmer’s treatment in “The Structure of Rugged Fitness Landscapes”, Chapter Two of The Origins of Order, Oxford University Press, 1993, pp. 33–67.
  25. 25.
    Lewis, B. (2001). The multiple identities of the Middle East. New York: Schocken.Google Scholar
  26. 26.
    Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
  27. 27.
    Mastors, E., & Deffenbaugh, A. (2007). The lesser Jihad: Recruits and the al-Qaida network. Lanham: Rowman and Littlefield.Google Scholar
  28. 28.
    Hoffman, B. (1997). The modern terrorist mindset: Tactics, targets and technologies. Scotland: Centre for the Study of Terrorism and Political Violence, St. Andrews University.Google Scholar
  29. 29.
    Fellman, P. V., Carley, K., & Parnell, G. (2011). Biowar and bioterrorism threat risk assessment. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying themes in complex systems (Vol. 8). New York: NECSI Knowledge Press.Google Scholar
  30. 30.
    Fellman, P. V. (2011). The complexity of intelligence estimates. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying Themes in Complex Systems (Vol. 8). New York: NECSI Knowledge Press.Google Scholar
  31. 31.
    Department of Homeland Security Bioterrorism Risk Assessment: A Call for Change, Committee on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis, National Research Council, ISBN: 0-309-12029-2, 92008.
  32. 32.
    Parnell, G. S., Smith, C. M., & Moxley, F.I. (2010). Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 30, 32–48. doi:  10.1111/j.1539-6924.2009.01319.x.
  33. 33.
    Merrick, J., & Parnell, G. S. (2011). A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Society for Risk Analysis. doi:  10.1111/j.1539-6924.2011.01590.x.
  34. 34.
    Carley, K. M., Altman, N., Kaminsky, B., Nave, D., & Yahja, A. (2004). BioWar: A city-scale multi-agent network model of weaponized biological attacks, CASOS Technical Report, CMU-ISRI-04-101.Google Scholar
  35. 35.
    Hoffman, B. (2006) Inside terrorism. New York: Columbia University Press.Google Scholar
  36. 36.
    Clauset, A., & Gleditsch, C. S. (2012). The developmental dynamics of terrorist organizations. Santa Fe Institute Working Paper.
  37. 37.
    Fellman, P. V., Frutos, D., Thanakijsombat, N., & Teekasap, P. (2011). The complex landscape of maritime piracy. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying themes in complex systems (Vol. 8). New York: NECSI Knowledge Press.Google Scholar
  38. 38.
    Krebs, V. (2001). Uncloaking terrorist networks. First Monday.
  39. 39.
    Joint Special Operations, Operational Procedures, Joint Pub 3-053, Joint Doctrine Division, J-7, Joint Staff, Pentagon, Washington, DC. (1993)Google Scholar
  40. 40.
    Farmer, J. D. (1999). Toward agent based models for investment., and Physicists attempt to scale the ivory towers of finance. Computing in Science and Engineering.
  41. 41.
    Johns, M., & Silverman, B. (2000). How emotions and personality affect the utility of alternative decisions: A terrorist target selection case study., or Woodman, R.A. Agent based simulation of military operations other than war: Small unit combat, Thesis. Monterey, CA: Naval Postgraduate School.
  42. 42.
    Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43–52.
  43. 43.
    Krebs, V. (2002). Surveillance of terrorist networks.
  44. 44.
    Krebs, V. (2002). Social network analysis of the 9–11 terrorist network.
  45. 45.
    Stewart, T. A. (2001). Six degrees of Mohammed Atta. is an electronic publication now owned by Forbes, Inc.,1640,35253,FF.html.
  46. 46.
    Watts, D. J. (1999). Networks, dynamics, and the small-world phenomenon. American Journal of Sociology, 13(2), 493–527.CrossRefGoogle Scholar
  47. 47.
    Gerecht, R. M. (2001). The counterterrorist myth. The Atlantic Monthly. Google Scholar
  48. 48.
    Porter, M. (1979). How competitive forces shape strategy. Harvard Business Review. Google Scholar
  49. 49.
    Porter, M. (1996). What is strategy. Harvard Business Review.Google Scholar
  50. 50.
    Klerks, P. (2001). The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments for the Netherlands. Connections, 24(3), 53–65.
  51. 51.
    Lissack, M. (1996). Chaos and complexity – What does that have to do with knowledge management? In J. F. Schreinemakers (Ed.), Knowledge management: Organization, competence and methodology (Vol. 1, pp. 62–81). Wurzburg: Ergon.
  52. 52.
    Moody, J., & White, D. R. (2000). Social cohesion and embeddedness: A hierarchical conception of social groups, Santa Fe Institute Working Papers, 00-08-049,
  53. 53.
    The Cohesiveness of Blocks in Social Networks (2001). Node Connectivity and Conditional Density. Submitted to Sociological Methodology.

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.American Military University and InterPort PoliceCharles TownUSA

Personalised recommendations