Social Network Analysis: A case study of the Islamist terrorist network

Social Network Analysis is a compilation of methods used to identify and analyze patterns in social network systems. This article serves as a primer on foundational social network concepts and analyses and builds a case study on the global Islamist terrorist network to illustrate the use and usefulness of these methods. The Islamist terrorist network is a system composed of multiple terrorist organizations that are socially connected and work toward the same goals. This research utilizes traditional social network, as well as small-world, and scale-free analyses to characterize this system on individual, network and systemic levels. Leaders in the network are identified based on their positions in the social network and the network structure is categorized. Finally, two vital nodes in the network are removed and this version of the network is compared with the previous version to make implications of strengths, weaknesses and vulnerabilities. The Islamist terrorist network structure is found to be a resilient and efficient structure, even with important social nodes removed. Implications for counterterrorism are given from the results of each analysis.

[1]  Steven B. Andrews,et al.  Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.

[2]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[3]  George F. Hepner,et al.  Advancing the Understanding of Sociospatial Dependencies in Terrorist Networks , 2011, Trans. GIS.

[4]  Michael Mousseau,et al.  Market Civilization and Its Clash with Terror , 2003, International Security.

[5]  Brynjar Lia,et al.  Architect of Global Jihad: The Life of Al-Qaida Strategist Abu Mus'ab Al-Suri , 2007 .

[6]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[7]  Aili Malm,et al.  Comparing the ties that bind criminal networks: Is blood thicker than water? , 2010 .

[8]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[9]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[10]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[11]  Albert-László Barabási,et al.  Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .

[12]  R. Gunaratna Inside Al Qaeda: Global Network of Terror , 2002 .

[13]  Marc Sageman,et al.  Connecting Terrorist Networks , 2008 .

[14]  Laura K. Siebeneck,et al.  A Geographic Information Systems (GIS) Analysis of Spatiotemporal Patterns of Terrorist Incidents in Iraq 2004–2009 , 2011 .

[15]  Alan T. Murray,et al.  Vital Nodes, Interconnected Infrastructures, and the Geographies of Network Survivability , 2006 .

[16]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[17]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[18]  Stephen E. Reynolds,et al.  Values and violence : intangible aspects of terrorism , 2008 .

[19]  George F. Hepner,et al.  Geospatial Analysis of Dynamic Terrorist Networks , 2008 .

[20]  S. Koschade A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .

[21]  R. Hanneman Introduction to Social Network Methods , 2001 .

[22]  George F. Hepner,et al.  A Sociospatial Approach to Understanding Terrorist Networks , 2011 .

[23]  Hawoong Jeong,et al.  Classification of scale-free networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[24]  Aili Malm,et al.  Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production , 2008 .

[25]  Hsinchun Chen,et al.  The Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi Jihad , 2009 .

[26]  John Arquilla,et al.  The Advent of Netwar (Revisited) , 2001 .

[27]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[28]  Mitchell Moss,et al.  The Stafford Act and Priorities for Reform , 2009 .

[29]  Executive Summary,et al.  COUNTERING GLOBAL INSURGENCY , 2004 .

[30]  Rohan Gunaratna,et al.  The post‐madrid face of Al Qaeda , 2004 .

[31]  Marco Gonzalez,et al.  Author's Personal Copy Social Networks Tastes, Ties, and Time: a New Social Network Dataset Using Facebook.com , 2022 .

[32]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[33]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .