Abstract
The complexity of the current threat landscape associated with terrorism and criminal networks continues to be a top national and global security agenda item. With heightened awareness and concern regarding the proliferation and expansion of ISIL and connections to homegrown violent extremism, understanding the network structure and functional perspectives is a key enabler to supporting counter terrorism disruption strategies. Challenges associated with understanding these ‘dark networks’ stems both from contextualizing the information (plagued by uncertainty and ambiguity) and from the multiplex nature of the actors whereby they can share more than one type of relation. In this exploratory work, Counter-Terrorism Architectural Frameworks (CTAF) is introduced as an application of the Department of Defense Architectural Frameworks (DODAF) to support ‘opening the blackbox’ of terrorist activities to identify terrorist network vulnerabilities and to develop disruption strategies. The multiple views afforded by the application of DODAF provides a more comprehensive picture to support decision making and can highlight the complex organizational dynamics that are not readily observable through Social Network Analysis (SNA) alone. In this chapter the methodology is explained and applied to an analysis of the Lashkar-e-Taiba (LeT) terrorist network (Subrahmanian et al. in Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer, Berlin, 2013) and the Noordin Top terrorist network (Roberts and Everton in J Soc Struct 12(2), 2011).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aghakhani S, Dawoud K, Alhajj R, Rokne J (2011) A global measure for estimating the degree of organization and effectiveness of individual actors with application to terrorist networks. In: Wiil UK (ed) Counterterrorism and open source intelligence. Springer, Wien, New York, pp 189–222
Bakker RM, Raab J, Milward HB (2012) A preliminary theory of dark network resilience. J Policy Anal Manage 31:33–62
Boivin R (2014) Macrosocial network analysis: the case of transnational drug trafficking. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer, Berlin
Bruinsma G, Bernasco W (2004) Criminal groups and transnational illegal markets. Crime, Law, Soc Change 41:79–94
Carrington PJ, Scott J, Wasserman S (eds) (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge
Checkland P (1981) Systems thinking, systems practice. Wiley, Chichester
Chiu Y-N, Leclerc B, Townsley M (2011) Crime script analysis of drug manufacturing in clandestine laboratories. Br J Criminol 51:355–374
Corman S (2006) Using activity focus networks to pressure terrorist organizations. Comput Math Organiz Theor 12:35–49
DODAF (2015) DODAF V 2.0. volume II: architectural data and models. Available at: http://dodcio.defense.gov/Portals/0/Documents/DODAF2/DoDAF%20v2.02%20Chg%201%20Vol%20II%20Final%202015-01-19.pdf. Accessed 11 Oct 2015
Duijn PAC, Klerks PPHM (2014) Social network analysis applied to criminal networks: recent developments in dutch law enforcement. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer, Berlin
Duijn PAC, Kashirin V, Sloot PMA (2014) The relative ineffectiveness of criminal network disruption. Scientific reports|4: 4238 available at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3937802/pdf/srep04238.pdf
Easley D, Kleinberg J (2010) Networks, crowds and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge
Everton SF (2011) Disrupting dark networks. Cambridge University Press, Cambridge
Global Terrorism Index (2014) http://www.visionofhumanity.org/sites/default/files/Global%20Terrorism%20Index%20Report%202014_0.pdf
Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theor 1:201–233
Gunduz-Oguducu S, Etaner-Uyar AS (2014) Social networks: analysis and case studies. Springer, Berlin
Leclerc B (2014) Script analysis for crime controllers: extending the reach of situational crime prevention. In: Caneppele S, Caldroni F (eds) Organized crime, corruption and crime prevention. Springer Publishing, Berlin
Leuprecht C, Hall K (2014) Why terror networks are dissimilar: how structure relates to function. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer Publishing, Berlin
Levi M, Maguire M (2004) Reducing and preventing organised crime: an evidence-based critique. Crime, Law Soc Change 41:397–469
Lindelauf R, Borm P, Hamers H (2011) Understanding terrorist network topologies and their resilience against disruption. In: Wiil UK (ed) Counterterrorism and open source intelligence. Springer, Berlin
Masys AJ (ed) (2014a) Networks and network analysis for defence and security. Springer Publishing, Berlin
Masys AJ (2014b) Radicalization and recruitment: a systems approach to understanding violent extremism. Int J Syst Soc 1(2):51–65
Masys AJ, Vallerand A (2015) Major event security planning: secure by design—through the strategic use of integrated modeling and simulation. M&S J
Rhodes CJ (2011) The use of open source intelligence in the construction of covert social networks. In: Wiil U (ed) Counterterrorism and open source intelligence. Springer, Berlin
Rhodes CJ, Keefe EMJ (2007) Social network topology: a Bayesian approach. J Op Res Soc 58:1605–1611
Roberts N, Everton SF (2011) Strategies for combating dark networks. J Soc Struct 12(2). http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf
Strang S, Masys AJ (2015) Visual thinking for intelligence analysis. In: Masys AJ (ed) Applications of systems thinking and soft operations research in managing complexity. Springer Publishing, Berlin
Subrahmanian VS, Mannes A, Siliva A, Shakarian J, Dickerson JP (2013) Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer Publishing, Berlin
The Economist (2015) http://www.economist.com/news/leaders/21646750-though-islamic-state-still-spreading-terror-its-weaknesses-are-becoming-apparent
Wiil UK (ed) (2011) Counterterrorism and open source intelligence. Springer Publishing, Berlin
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Masys, A.J. (2016). Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications. In: Masys, A. (eds) Exploring the Security Landscape: Non-Traditional Security Challenges. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-27914-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-27914-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27913-8
Online ISBN: 978-3-319-27914-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)