Dismantling terrorist networks: Evaluating strategic options using agent-based modeling

Abstract Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.

[1]  Maciej Latek,et al.  Dynamics of Agent Organizations: Application to Modeling Irregular Warfare , 2009, MABS.

[2]  Scott Gerwehr,et al.  Al-Qaida: Terrorist Selection and Recruitment , 2006 .

[3]  Eric Bonabeau,et al.  Agent-based modeling: Methods and techniques for simulating human systems , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[4]  H. Milward,et al.  Dark Networks as Problems , 2003 .

[5]  Richard A. Falkenrath,et al.  Analytic Models and Policy Prescription: Understanding Recent Innovation in U.S. Counterterrorism , 2001 .

[6]  Joshua M. Epstein Agent-based computational models and generative social science , 1999 .

[7]  Douglas H. Walker,et al.  Developing Metrics in the Global War on Terrorism , 2005 .

[8]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[9]  David J. Kilcullen Countering global insurgency , 2005 .

[10]  B. Bollobás The evolution of random graphs , 1984 .

[11]  César A. Hidalgo,et al.  Scale-free networks , 2008, Scholarpedia.

[12]  Kevin C. Desouza,et al.  Impeding insurgent attacks: The information management agenda , 2007 .

[13]  Martin Suter,et al.  Small World , 2002 .

[14]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[15]  M. Macy,et al.  FROM FACTORS TO ACTORS: Computational Sociology and Agent-Based Modeling , 2002 .

[16]  J. Holland,et al.  Artificial Adaptive Agents in Economic Theory , 1991 .

[17]  Martin C. Libicki,et al.  How Terrorist Groups End , 2008 .

[18]  D. Watts Networks, Dynamics, and the Small‐World Phenomenon1 , 1999, American Journal of Sociology.

[19]  Kathleen M. Carley,et al.  Modeling Complex Socio-technical Systems using Multi-Agent Simulation Methods , 2004, Künstliche Intell..

[20]  M. Emiliani,et al.  Terrorism in Indonesia: Noordin's Networks , 2009 .

[21]  P. Doreian Causality in Social Network Analysis , 2001 .

[22]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[23]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[24]  Kevin C. Desouza,et al.  Managing the Proliferation of Weapons of Mass Destruction: An Information Management Perspective , 2008 .

[25]  Aidan Kirby,et al.  The London Bombers as “Self-Starters”: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques , 2007 .

[26]  Carlos M. Del Rio,et al.  What You Need to Know , 2012 .

[27]  Eliot R. Smith,et al.  Agent-Based Modeling: A New Approach for Theory Building in Social Psychology , 2007, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[28]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[29]  Albert,et al.  Topology of evolving networks: local events and universality , 2000, Physical review letters.

[30]  Ray Takeyh,et al.  Do terrorist networks need a home? , 2002 .

[31]  Kevin C. Desouza,et al.  Connectivity among Terrorist Groups: A Two Models Business Maturity Approach , 2007 .

[32]  Kevin C. Desouza,et al.  Information and Knowledge Management in Public Sector Networks: The Case of the US Intelligence Community , 2009 .