TY - JOUR
T1 - Dynamic Patterns of Terrorist Networks
T2 - Efficiency and Security in the Evolution of Eleven Islamic Extremist Attack Networks
AU - McMillan, Cassie
AU - Felmlee, Diane
AU - Braines, Dave
N1 - Funding Information:
This research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon. This work was also supported by Pennsylvania State University and the National Science Foundation under an IGERT award # DGE-1144860, Big Data Social Science.
Funding Information:
This research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon. This work was also supported by Pennsylvania State University and the National Science Foundation under an IGERT award # DGE-1144860, Big Data Social Science.
Publisher Copyright:
© 2019, Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2020/9/1
Y1 - 2020/9/1
N2 - Objectives: The current research examines how the efficiency/security tradeoff shapes the evolution of dynamic terrorist networks by focusing on the structural properties of these collectives. Some scholars argue that terrorist groups develop as chain-like, decentralized structures, while others maintain that terrorist networks form patterns of redundant ties and organize around a few highly connected individuals, or central hubs. We investigate these structural properties and consider whether patterns vary at different phases of a terrorist network’s formation. Methods: Using a variety of descriptive network measures and Separable Temporal Exponential Random Graph Models, we consider patterns of tie formation across eleven multi-wave terrorism networks from the John Jay & ARTIS Transnational Terrorism database. This dataset includes networks from prominent attacks and bombings that occurred in the last 3 decades (e.g., the 2002 Bali Bombings), where nodes represent individual terrorists and ties represent social relationships. Results: We find that terrorist groups navigate the efficiency/security tradeoff by developing increasingly well-connected networks as they prepare for a violent incident. Our results also show that highly central nodes acquire even more ties in the years directly preceding an attack, signifying that the evolution of terrorist networks tends to be structured around a few key actors. Conclusions: Our findings have the potential to inform counterterrorism efforts by suggesting which actors in the network make the most influential targets for law enforcement. We discuss how these strategies should vary as extremist networks evolve over time.
AB - Objectives: The current research examines how the efficiency/security tradeoff shapes the evolution of dynamic terrorist networks by focusing on the structural properties of these collectives. Some scholars argue that terrorist groups develop as chain-like, decentralized structures, while others maintain that terrorist networks form patterns of redundant ties and organize around a few highly connected individuals, or central hubs. We investigate these structural properties and consider whether patterns vary at different phases of a terrorist network’s formation. Methods: Using a variety of descriptive network measures and Separable Temporal Exponential Random Graph Models, we consider patterns of tie formation across eleven multi-wave terrorism networks from the John Jay & ARTIS Transnational Terrorism database. This dataset includes networks from prominent attacks and bombings that occurred in the last 3 decades (e.g., the 2002 Bali Bombings), where nodes represent individual terrorists and ties represent social relationships. Results: We find that terrorist groups navigate the efficiency/security tradeoff by developing increasingly well-connected networks as they prepare for a violent incident. Our results also show that highly central nodes acquire even more ties in the years directly preceding an attack, signifying that the evolution of terrorist networks tends to be structured around a few key actors. Conclusions: Our findings have the potential to inform counterterrorism efforts by suggesting which actors in the network make the most influential targets for law enforcement. We discuss how these strategies should vary as extremist networks evolve over time.
UR - http://www.scopus.com/inward/record.url?scp=85071472104&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85071472104&partnerID=8YFLogxK
U2 - 10.1007/s10940-019-09426-9
DO - 10.1007/s10940-019-09426-9
M3 - Article
AN - SCOPUS:85071472104
SN - 0748-4518
VL - 36
SP - 559
EP - 581
JO - Journal of Quantitative Criminology
JF - Journal of Quantitative Criminology
IS - 3
ER -