Skip to main content

Modeling Terrorist Networks: The Second Decade

  • Chapter

Part of the book series: Understanding Complex Systems ((UCS))

Abstract

The original version of “Modeling Terrorist Networks” was prepared for a NATO conference in 2003.1 There have been subsequent re-publications, most notably in The Intelligencer,2 and on the London School of Economics website. In those original versions of the paper, we sought to elucidate how the techniques of nonlinear dynamical systems modeling, combined with first principles of counter-intelligence, could be brought to bear on various problems regarding the structure of terrorist networks and the appropriate methods to counter those groups. Because we worked from first principles, many of the insights presented in that original paper remain true today. However, as we began to develop our approach, we noticed almost immediately that there were several constraints on our method, some simply challenging and others just plain awkward.

The wrath of the terrorist is rarely uncontrolled. Contrary to both popular belief and media depiction, most terrorism is neither crazed nor capricious. Rather, terrorist attacks are generally as carefully planned as they are premeditated. Bruce Hoffman, RAND Corporation

The best method to control something is to understand how it works. J. Doyne Farmer, Santa Fe Institute

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   129.00
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Fellman et al. [1].

  2. 2.

    Fellman and Wright [2].

  3. 3.

    Fellman and Wright [3].

  4. 4.

    Fellman [4].

  5. 5.

    Flynn et al. [5].

  6. 6.

    Jones [6].

  7. 7.

    Wilson [7].

  8. 8.

    Fellman et al. [8].

  9. 9.

    Kauffman [9].

  10. 10.

    Li and Mills [10].

  11. 11.

    Kauffman [9].

  12. 12.

    Fellman and Wright [11].

  13. 13.

    Richard N. Hass explains this problem rather nicely in terms of the first principles governing the relationship between intelligence, foreign policy, and policy makers, noting that “to be more than the accumulation of responses to separate crises, a successful foreign policy depends upon bridging the intellectual gap between the imperatives of the present and the potential of the future. In turn, this often depends upon bridging the gap between policymakers and the Intelligence Community. After all, as Robert Bowie—a predecessor of mine as Director of the Policy Planning Staff who later served as a deputy director of the CIA—insightfully defines it, “intelligence” is “knowledge and analysis designed to assist action.” Information and insights that do not “assist action” remain lifeless. Successful intelligence, therefore, requires a mutual understanding between policymakers and the Intelligence Community that is all too often lacking. Policymakers need to ensure that the Community is not working in a vacuum, that analysts know what is on our minds and what questions we need answered. At the same time, members of the Intelligence Community have a responsibility to seek out policymakers, understand their concerns, and tell them what they should be paying attention to. It is important to tell policymakers what they need to hear, not what they want to hear.”

  14. 14.

    Allison and Zelikow [12].

  15. 15.

    Department of Homeland Security Bioterrorism Risk Assessment: A Call For Change Committee on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis, Board on Mathematical Sciences and Their Applications, Division on Engineering and Physical Sciences, Board on Life Sciences, Division on Earth and Life Studies, National Research Council Of The National Academies, The National Academies Press, Washington, DC, [13].

  16. 16.

    See Packer [14]. See also Robb, “The Bazaar of Violence in Iraq” http://globalguerrillas.typepad.com/globalguerrillas/2004/07/the_bazaar_of_v.html.

  17. 17.

    See, most recently, Cordesman et al. [15].

  18. 18.

    Ibid., No. 13 and No. 16.

  19. 19.

    Ibid. No. 8.

  20. 20.

    Fellman [16].

  21. 21.

    Fuller [17].

  22. 22.

    Farmer [18].

  23. 23.

    (a) Russett et al. [19]; (b) Kennedy [20].

  24. 24.

    Hoffman and Carr [21].

  25. 25.

    For a full description of this process, see Hudson et al. [22] available at:

    http://www.loc.gov/rr/frd/Sociology-Psychology%20of%20Terrorism.htm.

  26. 26.

    At a basic mathematical level, this kind of phenomenon is explained very clearly by Peters [23]. A more rigorous treatment can be found in “Statistical Mechanics of Complex Networks” by Reka Albert and Laszlo Barbási, arXiv:cond-mat/0106096v1 6Jun2001, http://www.nd.edu/~networks/Papers/review.pdf.

  27. 27.

    Here, Farmer is having a bit of a laugh at the expense of his audience. By “simple” systems he means complex, nonlinear systems whose strange attractor is one of sufficiently low dimension that there is an observable phenomenon of closely packed state space and mapping of the phase space with Lyapunov exponents is relatively tractable. A “complex” system in this context would be one with a sparsely populated state space, with bifurcations taking place so frequently that even if there is a strange attractor, the “curse of dimensionality” makes it computationally intractable. The definitive work on the subject is (a) Farmer’s paper [24]. A good representative demonstration of the techniques involved is (b) Shampine and Thompson’s “Solving Delay Differential Equations with dde23” available on the world wide web at http://www.cs.runet.edu/~thompson/webddes/tutorial.html#CITEjdf. (c) Stuart Kauffman also draws on Farmer’s treatment in “The Structure of Rugged Fitness Landscapes”, Chapter 2 of The Origins of Order, Oxford University Press, 1993, pp. 33–67.

  28. 28.

    Ibid., No. 3.

  29. 29.

    See Lewis [25]; See also Sageman [26]; and Mastors and Deffenbaugh [27].

  30. 30.

    Hoffman [28]. In this paper Dr. Hoffman explains a number of factors driving terrorist behavior, from the psychological to the operational. In the psychological sense, he argues, (and we agree with the assessment) that “All terrorists have one trait in common: they live in the future: that distant—yet imperceptibly close—point in time when they will assuredly triumph over their enemies and attain the ultimate realization of their political destiny.’’ (p. 6) As psychological motivation moves into operational capabilities and objectives, terrorist behavior suddenly takes on characteristics which are essentially the same as those which underlie the planning and execution of any covert military, paramilitary, or intelligence operation. In terms of target selection, Hoffman points out that ‘the terrorists’ ability to attract—and moreover, to continue to attract—attention, however is most often predicated on the success of their attacks.” Given their desire for continued success, terrorists of necessity must develop an operational tradecraft which closely resembles that of their opponents. They generally have good intelligence, even exceptionally good intelligence, careful planning, well rehearsed, ergonomic execution, and as Hoffman explains “success for the terrorist is dependent not only on their ability to keep one step ahead of the authorities, but of the counter-terrorist technology curve as well. (p. 11). At this point we are looking at terrorism not at the long-range, socio-cultural level, or even at the mid-range, which is the central focus of our paper, but at the operational level which is about as far removed from Farmer’s social reform model as you can get. Just one example of this kind of operational thinking should help clarify how little likely long-range planning is to be in dealing with terrorist problems. In an investigation involving an unidentified group detonating explosives and destroying commercial property, the investigation was largely handled by a police element of the Ministry of Internal Affairs. One of the dangerous vulnerabilities that had to be corrected in a very rapid and powerful fashion was the fact that the investigators had not considered that the group undertaking the bombings might be monitoring their investigations, including signals traffic, much of which was in clear, unencrypted form. Nobody had thought that if they continued to leave their communications channels open to interception, that exactly in the spirit of staying both one step ahead of the law and one step ahead of the technology, should the investigation get close to providing a solution to the identity of the bombers that their own headquarters might very likely be the next target for a bomb. Add in the exponential increases in computing power, commercial and black market descrambling technologies and this kind of threat falls right into Hoffman’s category of “staying one step ahead of the technology.” Not being social theorists, we cannot professionally comment on the policy aspects of US or Russian governmental behavior with respect to moderating terrorist behavior against their citizens. However, at the operational level, the organization which better manages its compartmentation, which is more adept at either penetrating its adversary’s compartments or forcing its adversaries into a degree of over-compartmentalization that impedes the ability of signals to flow through the network (another form of command decapitation) and which better monitors and interprets its adversary’s communications (coverage) is the one which is vastly more likely to emerge as the winner.

  31. 31.

    Fellman et al. [29].

  32. 32.

    Fellman [16].

  33. 33.

    Fellman [30].

  34. 34.

    In 2004, the President issued a homeland security directive that, along with the National Strategy for Homeland Security published in 2002, mandated assessments of the biological weapons threat to the nation and assigned responsibility for those assessments to the Department of Homeland Security (DHS). The first such assessment—the Biological Threat Risk Assessment (BTRA) of 2006—is a computer-based tool to assess the risk associated with the release of each of 28 biological threat agents. To assist in its preparation of this version of BTRA as well as the 2008 version, DHS asked the NRC to carry out a study of the methodology used by the agency to prepare BTRA of 2006. This NRC report presents an introduction to the challenge; an analysis of the critical contribution of risk analysis to risk management; a description of the method used to produce the BTRA of 2006, which is the foundation for later assessments; a discussion of risk assessment for unknown and engineered bio-threats; and ways to improve bioterrorism consequence assessment and the BTRA methodology (from “[31]: A Call for Change, Committee on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis, National Research Council, ISBN: 0-309-12029-2, 92008) http://www.nap.edu/catalog/12206.html.

  35. 35.

    Parnell et al. [32].

  36. 36.

    Merrick and Parnell [33].

  37. 37.

    Carley et al. [34].

  38. 38.

    Hoffman [35].

  39. 39.

    Clauset and Gleditsch [36].

  40. 40.

    Fellman et al. [37].

  41. 41.

    Ibid. No. 20.

  42. 42.

    Krebs [38].

  43. 43.

    Ibid.

  44. 44.

    [39], Operational Procedures, Joint Pub 3-053, Joint Doctrine Division, J-7, Joint Staff, Pentagon, Washington, DC (1993).

  45. 45.

    A classic mistake in this area is frequently made when the authors apply neoclassical microeconomic “rational actor” assumptions to modeling terrorism which creates a static, homogenous treatment of opponents and sows more confusion than it resolves. While the rational actor methodology was once extremely popular in economics, it has been generally dismissed by “hard” science and is slowly being replaced by complexity science’s heterogeneous agent-based modeling. Typically, an agent-based model presumes heterogeneous agent composition, preferences, and behaviors and uses the stochastic microagent assumption to replace the rational actor model. For an explanation of agent-based modeling, see Farmer [40].

    For applications of agent-based models to terrorism, see Michael Johns and Barry Silverman, “How Emotions and Personality Affect the Utility of Alternative Decisions: A Terrorist Target Selection Case Study” http://www.seas.upenn.edu/~barryg/emotion.pdf, or Ronald A. Woodman, “Agent Based Simulation of Military Operations Other Than War: Small Unit Combat, Thesis, Naval Postgraduate School, Monterey, CA, September, [41] http://diana.gl.nps.navy.mil/~ahbuss/StudentTheses/WoodamanThesis.pdf.

  46. 46.

    Krebs (a) [42] (b) [43], (c) [44].

  47. 47.

    Stewart [45].

  48. 48.

    Watts [46].

  49. 49.

    See Gerecht [47].

  50. 50.

    See Porter [48,49].

  51. 51.

    See Klerks [50].

  52. 52.

    For more detail on this subject see Lissack [51].

  53. 53.

    Moody and White [52].

    http://www.santafe.edu/sfi/publications/Working-Papers/00-08-049.pdf.

  54. 54.

    In terms of strategy, destabilizing this kind of network means pressuring the group to increase its recruitment and raise its connectivity as opposed to the previously discussed strategy of forced over-compartmentation. Induced excess connectivity represents a different kind of complexity overload.

  55. 55.

    The Cohesiveness of Blocks in Social Networks [53].

  56. 56.

    The concept of cohesion is formalized through the use of graph theory. The graph is defined that the vertices represent the set of individuals in the network, and the edges are the relations among actors defined as paired sets. The subsets of nodes that link non-adjacent vertices will disconnect actors if removed. Any such set of nodes is called an (i, j) cut-set if every path connecting i and j passes through at least one node of the set. The “cut-set resistance to being pulled apart” criterion and the multiple independent paths “held together” criterion of cohesion are formally equivalent in this formal specification. This kind of graph, if constructed with complete information, also provides a predictive mechanism for exactly which nodes need to be removed in order to remove the possibility of signals propagating through the system.

  57. 57.

    Ibid. No. 36.

References

  1. Fellman, P. V., Sawyer, D., & Wright, R. (2003). Modeling terrorist networks – complex systems and first principles of counter-intelligence. In Proceedings of the NATO conference on central Asia: Enlargement, civil – military relations, and security, Kazakh American University/North Atlantic Treaty Organization (NATO).

    Google Scholar 

  2. Fellman, P. V., & Wright, R. (2004). Modeling terrorist networks. The Intelligencer U.S. Journal of Intelligence Studies, Vol. 14, No. 2, pp. 59–68.

    Google Scholar 

  3. Fellman, P. V., & Wright, R. (2003). Modeling terrorist networks – complex systems at the mid-range. In Paper presented at the joint complexity conference, London School of Economics.

    Google Scholar 

  4. Fellman, P. V. (2011). Understanding the complexity of IIED terrorist networks. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying themes in complex systems (Vol. 3). Cambridge: NECSI Knowledge Press.

    Google Scholar 

  5. Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A blueprint for making intelligence relevant in Afghanistan. Marine Corps Gazette. http://www.mca-marines.org/gazette/article/fixing-intel.

  6. Jones, D. (2006). Understanding the form, function, and logic of clandestine cellular networks: the first step in effective counternetwork operations. Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College.

    Google Scholar 

  7. Wilson, E. O. (2000). Sociobiology: The new synthesis. Cambridge: Belknap Press of Harvard University Press. Twenty-Fifth Anniversary Edition.

    Google Scholar 

  8. Fellman, P. V., Clemens, J. P., Wright, R., Post, J. V., & Dadmun, M. (2006). Disrupting terrorist networks, a dynamic fitness landscape approach. In Proceedings of the 2006 annual meeting of the North American association for computation in the social and organizational sciences.

    Google Scholar 

  9. Kauffman, S. A. (1993). The origins of order: Self organization and selection in evolution. New York: Oxford University Press.

    Google Scholar 

  10. Li, Q., & Mills, D. Investigating the Scaling Behavior, Crossover and Antipersistence, Global Telecommunications Conference, Institute of Electrical and Electronic Engineers, Rio de Janeiro, Dec. 5-9, 1999.

    Google Scholar 

  11. Fellman, P. V., & Wright, R. (2003). Modeling terrorist networks: Complex systems at the mid-range, the joint complexity conference, London School of Economics. http://www.psych.lse.ac.uk/complexity/conference/FellmanWright.pdf.

  12. Allison, G. T., & Zelikow, P. (1999). Essence of decision: Explaining the Cuban missile crisis (2nd ed.). New York: Pearson.

    Google Scholar 

  13. Department of Homeland Security Bioterrorism Risk Assessment (2008). A call for change committee on methodological improvements to the department of homeland security’s biological agent risk analysis. Washington, DC: Board on Mathematical Sciences and Their Applications, Division on Engineering and Physical Sciences, Board on Life Sciences, Division on Earth and Life Studies, National Research Council Of The National Academies, The National Academies Press.

    Google Scholar 

  14. Packer, G. (2006). The assassins gate: America in Iraq, Farrar, Strauss and Giroux. See also John Robb, The bazaar of violence in Iraq http://globalguerrillas.typepad.com/globalguerrillas/2004/07/the_bazaar_of_v.html.

  15. Cordesman, A. H., Mausner, A., Khazai, S., Alsis, P., & Loi, C. (2013). The real outcome of the Iraq war: US and Iranian strategic competition in Iraq. Center for Strategic and International Studies. http://csis.org/publication/real-outcome-iraq-war-us-and-iranian-strategic-competition-iraq.

  16. Fellman, P. V. (2011). The complexity of terrorist networks. Open Source Intelligence and web Mining, 1(2), 4–14. Special Edition of the International Journal of Networking and Virtual Organisations.

    MathSciNet  Google Scholar 

  17. Fuller, E. to Fuller, G. (1997). Redrawing the world’s borders. World Policy Journal;Spring97, Vol. 14 Issue 1, pp. 11-21.

    Google Scholar 

  18. Farmer, J. D. (2001). “What Now?” http://www.edge.org/documents/whatnow/whatnow_farmer.html.

  19. Russett, B., Starr, H., & Kinsella, D. (1999). World politics: The menu for choice (6th ed.). Belmont: Wadsworth.

    Google Scholar 

  20. Kennedy, P. M. (1989). The rise and fall of the great powers: Economic change and military conflict from 1500 to 2000. New York: Vintage Books.

    Google Scholar 

  21. Hoffman, B., & Carr, C. (1997). Terrorism: Who is fighting whom? World Policy Journal; Spring 97, Vol. 14 Issue 1, pp. 97-104.

    Google Scholar 

  22. Hudson, R. A., Majeska, M., Savada, A., & Metz, H. C. (1999). The sociology and psychology of terrorism: Who becomes a terrorist and why? Washington, DC: Federal Research Division, Library of Congress. Available at: http://www.loc.gov/rr/frd/Sociology-Psychology%20of%20Terrorism.htm.

  23. Peters, E. (1992). At a basic mathematical level, this kind of phenomenon is explained very clearly. In Chaos and order in the capital markets. New York: John Wiley and Sons. A more rigorous treatment can be found in Statistical mechanics of complex networks by Reka Albert and Laszlo Barbási, arXiv:cond-mat/0106096v1 6 Jun 2001. http://www.nd.edu/~networks/Papers/review.pdf.

  24. The definitive work on the subject of “simple” systems is (a) Farmer’s paper (1982). Chaotic attractors of an infinite-dimensional dynamical system. Physica D, 4, 366–393. A good representative demonstration of the techniques involved is (b) Shampine and Thompson’s “Solving Delay Differential Equations with dde23” available on the world wide web at http://www.cs.runet.edu/~thompson/webddes/tutorial.html#CITEjdf. (c) Stuart Kauffman also draws on Farmer’s treatment in “The Structure of Rugged Fitness Landscapes”, Chapter Two of The Origins of Order, Oxford University Press, 1993, pp. 33–67.

  25. Lewis, B. (2001). The multiple identities of the Middle East. New York: Schocken.

    Google Scholar 

  26. Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.

    Book  Google Scholar 

  27. Mastors, E., & Deffenbaugh, A. (2007). The lesser Jihad: Recruits and the al-Qaida network. Lanham: Rowman and Littlefield.

    Google Scholar 

  28. Hoffman, B. (1997). The modern terrorist mindset: Tactics, targets and technologies. Scotland: Centre for the Study of Terrorism and Political Violence, St. Andrews University.

    Google Scholar 

  29. Fellman, P. V., Carley, K., & Parnell, G. (2011). Biowar and bioterrorism threat risk assessment. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying themes in complex systems (Vol. 8). New York: NECSI Knowledge Press.

    Google Scholar 

  30. Fellman, P. V. (2011). The complexity of intelligence estimates. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying Themes in Complex Systems (Vol. 8). New York: NECSI Knowledge Press.

    Google Scholar 

  31. Department of Homeland Security Bioterrorism Risk Assessment: A Call for Change, Committee on Methodological Improvements to the Department of Homeland Security’s Biological Agent Risk Analysis, National Research Council, ISBN: 0-309-12029-2, 92008. http://www.nap.edu/catalog/12206.html.

  32. Parnell, G. S., Smith, C. M., & Moxley, F.I. (2010). Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 30, 32–48. doi: 10.1111/j.1539-6924.2009.01319.x.

  33. Merrick, J., & Parnell, G. S. (2011). A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Society for Risk Analysis. doi: 10.1111/j.1539-6924.2011.01590.x.

  34. Carley, K. M., Altman, N., Kaminsky, B., Nave, D., & Yahja, A. (2004). BioWar: A city-scale multi-agent network model of weaponized biological attacks, CASOS Technical Report, CMU-ISRI-04-101.

    Google Scholar 

  35. Hoffman, B. (2006) Inside terrorism. New York: Columbia University Press.

    Google Scholar 

  36. Clauset, A., & Gleditsch, C. S. (2012). The developmental dynamics of terrorist organizations. Santa Fe Institute Working Paper. http://www.santafe.edu/media/workingpapers/09-07-021.pdf.

  37. Fellman, P. V., Frutos, D., Thanakijsombat, N., & Teekasap, P. (2011). The complex landscape of maritime piracy. In H. Sayama, A. Minai, D. Braha, & Y. Bar-Yam (Eds.), Unifying themes in complex systems (Vol. 8). New York: NECSI Knowledge Press.

    Google Scholar 

  38. Krebs, V. (2001). Uncloaking terrorist networks. First Monday. http://pear.accc.uic.edu/ojs/index.php/fm/article/view/941/863.

  39. Joint Special Operations, Operational Procedures, Joint Pub 3-053, Joint Doctrine Division, J-7, Joint Staff, Pentagon, Washington, DC. (1993)

    Google Scholar 

  40. Farmer, J. D. (1999). Toward agent based models for investment. http://www.santafe.edu/~jdf/aimr.pdf, and Physicists attempt to scale the ivory towers of finance. Computing in Science and Engineering. http://www.santafe.edu/sfi/publications/Working-Papers/99-10-073.pdf.

  41. Johns, M., & Silverman, B. (2000). How emotions and personality affect the utility of alternative decisions: A terrorist target selection case study. http://www.seas.upenn.edu/~barryg/emotion.pdf, or Woodman, R.A. Agent based simulation of military operations other than war: Small unit combat, Thesis. Monterey, CA: Naval Postgraduate School. http://diana.gl.nps.navy.mil/~ahbuss/StudentTheses/WoodamanThesis.pdf.

  42. Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43–52. http://www.orgnet.com/MappingTerroristNetworks.pdf.

  43. Krebs, V. (2002). Surveillance of terrorist networks. http://www.orgnet.com/tnet.html.

  44. Krebs, V. (2002). Social network analysis of the 9–11 terrorist network. http://www.orgnet.com/hijackers.html.

  45. Stewart, T. A. (2001). Six degrees of Mohammed Atta. Business2.com is an electronic publication now owned by Forbes, Inc. http://www.business2.com/articles/mag/0,1640,35253,FF.html.

  46. Watts, D. J. (1999). Networks, dynamics, and the small-world phenomenon. American Journal of Sociology, 13(2), 493–527.

    Article  Google Scholar 

  47. Gerecht, R. M. (2001). The counterterrorist myth. The Atlantic Monthly.

    Google Scholar 

  48. Porter, M. (1979). How competitive forces shape strategy. Harvard Business Review.

    Google Scholar 

  49. Porter, M. (1996). What is strategy. Harvard Business Review.

    Google Scholar 

  50. Klerks, P. (2001). The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments for the Netherlands. Connections, 24(3), 53–65. http://www.sfu.ca/~insna/Connections-Web/Volume24-3/klerks.pdf.

  51. Lissack, M. (1996). Chaos and complexity – What does that have to do with knowledge management? In J. F. Schreinemakers (Ed.), Knowledge management: Organization, competence and methodology (Vol. 1, pp. 62–81). Wurzburg: Ergon. http://www.lissack.com/writings/knowledge.htm.

  52. Moody, J., & White, D. R. (2000). Social cohesion and embeddedness: A hierarchical conception of social groups, Santa Fe Institute Working Papers, 00-08-049, http://www.santafe.edu/sfi/publications/Working-Papers/00-08-049.pdf.

  53. The Cohesiveness of Blocks in Social Networks (2001). Node Connectivity and Conditional Density. Submitted to Sociological Methodology. http://www.santafe.edu/files/workshops/dynamics/sm-wh8a.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philip Vos Fellman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this chapter

Cite this chapter

Fellman, P.V. (2015). Modeling Terrorist Networks: The Second Decade. In: Fellman, P., Bar-Yam, Y., Minai, A. (eds) Conflict and Complexity. Understanding Complex Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1705-1_1

Download citation

Publish with us

Policies and ethics