The Diffusion and Permeability of Political Violence in North and West Africa

This paper explores the spatial and temporal diffusion of political violence in North and West Africa. It does so by endeavoring to represent the mental landscape that lives in the back of a group leader's mind as he contemplates strategic targeting. We assume that this representation is a combination of the physical geography of the target environment, and the mental and physical cost of following a seemingly random pattern of attacks. Focusing on the distance and time between attacks and taking into consideration the transaction costs that state boundaries impose, we wish to understand what constrains a group leader to attack at a location other than the one that would seem to yield the greatest overt payoff. By its very nature, the research problem defies the collection of a full set of structural data. Instead, we leverage functional data from the Armed Conflict Location and Event Data project (ACLED) dataset that, inter alia, meticulously catalogues violent extremist incidents in North and West Africa since 1997, to generate a network whose nodes are administrative regions. These nodes are connected by edges of qualitatively different types: undirected edges representing geographic distance, undirected edges representing borders, and directed edges representing consecutive attacks by the same group at the two endpoints. We analyze the resulting network using novel spectral embedding techniques that are able to account fully for the different types of edges. The result is a map of North and West Africa that depicts the permeability to violence. A better understanding of how location, time, and borders condition attacks enables planning, prepositioning, and response.

[1]  Colin Flint,et al.  Spatializing Social Networks: Using Social Network Analysis to Investigate Geographies of Gang Rivalry, Territoriality, and Violence in Los Angeles , 2010 .

[2]  Bruce A. Desmarais,et al.  Forecasting the locational dynamics of transnational terrorism: a network analytic approach , 2011, 2011 European Intelligence and Security Informatics Conference.

[3]  Ke Liao,et al.  Early Detection of Terrorism Outbreaks Using Prospective Space–Time Scan Statistics , 2013 .

[4]  Lotta Themnér,et al.  Armed conflicts, 1946–2013 , 2014 .

[5]  Caitriona Dowd,et al.  Cultural and religious demography and violent Islamist groups in Africa , 2015 .

[6]  Visakan Kadirkamanathan,et al.  Modeling Conflict Dynamics with Spatio-temporal Data , 2013, Springer Briefs in Applied Sciences and Technology.

[7]  Barry Wellman,et al.  Geography of Twitter networks , 2012, Soc. Networks.

[8]  Olivier Walther,et al.  Strange bedfellows: a network analysis of Mali’s northern conflict , 2015 .

[9]  Harry Timmermans,et al.  Modeling Social Networks in Geographic Space: Approach and Empirical Application , 2012 .

[10]  Kathleen M. Carley,et al.  Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions , 2007, IEEE Intelligent Systems.

[11]  Kathleen M. Carley,et al.  Complex Networks for Terrorist Target Prediction , 2018, SBP-BRiMS.

[12]  Andrew Wojtanik Mokhtar Belmokhtar: One-Eyed Firebrand of North Africa and the Sahel , 2015 .

[13]  Adib Bencherif,et al.  From Resilience to Fragmentation: Al Qaeda in the Islamic Maghreb and Jihadist Group Modularity , 2017 .

[14]  M. Kaldor New and Old Wars: Organised Violence in a Global Era , 2012 .

[15]  George F. Hepner,et al.  Advancing the Understanding of Sociospatial Dependencies in Terrorist Networks , 2011, Trans. GIS.

[16]  Thomas Scherngell,et al.  Investigating an online social network using spatial interaction models , 2009, Soc. Networks.

[17]  George F. Hepner,et al.  The Geography of International Terrorism: An Introduction to Spaces and Places of Violent Non-State Groups , 2013 .

[18]  Olivier Walther,et al.  Islamic Terrorism and the Malian Rebellion , 2015 .

[19]  Claude Berrebi,et al.  HOW DOES TERRORISM RISK VARY ACROSS SPACE AND TIME? AN ANALYSIS BASED ON THE ISRAELI EXPERIENCE , 2006 .

[20]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[21]  Roberto Rigobon,et al.  Distance and Political Boundaries: Estimating Border Effects Under Inequality Constraints , 2012 .

[22]  David B. Skillicorn,et al.  Signed Directed Social Network Analysis Applied to Group Conflict , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).

[23]  Benjamin Ducol,et al.  Rethinking Terrorist Safe Havens: Beyond a State-Centric Approach , 2011 .

[24]  Claude Berrebi,et al.  HOW DOES TERRORISM RISK VARY ACROSS SPACE AND TIME? AN ANALYSIS BASED ON THE ISRAELI EXPERIENCE , 2005 .

[25]  Anthony A. Braga,et al.  Hot spots policing and crime prevention: A systematic review of randomized controlled trials , 2005 .

[26]  David R. Schaefer,et al.  Youth co-offending networks: An investigation of social and spatial effects , 2011, Soc. Networks.

[27]  Jukka-Pekka Onnela,et al.  Geographic Constraints on Social Network Groups , 2010, PloS one.

[28]  David B. Skillicorn,et al.  Global Structure in Social Networks with Directed Typed Edges , 2014, Social Networks: Analysis and Case Studies.

[29]  Vladimir Batagelj,et al.  Understanding Large Temporal Networks and Spatial Networks: Exploration, Pattern Searching, Visualization and Network Evolution , 2014 .

[30]  Kathleen M. Carley A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .

[31]  Christian Leuprecht,et al.  Political Fragmentation and Alliances among Armed Non-state Actors in North and Western Africa (1997–2014) , 2017 .

[32]  David B. Skillicorn,et al.  Social Networks with Rich Edge Semantics , 2017 .

[33]  Ulrike von Luxburg,et al.  A tutorial on spectral clustering , 2007, Stat. Comput..

[34]  Clionadh Raleigh,et al.  Introducing ACLED: An Armed Conflict Location and Event Dataset , 2010 .

[35]  Robert W. Faris,et al.  Measuring 'neighborhood': Constructing network neighborhoods , 2012, Soc. Networks.

[36]  Kathleen M. Carley,et al.  Spatiotemporal Network Analysis and Visualization , 2015, Int. J. Appl. Geospat. Res..

[37]  Christian Leuprecht,et al.  Mapping and deterring violent extremist networks in North-West Africa , 2015 .

[38]  Judith Scheele,et al.  Smugglers and Saints of the Sahara: Regional Connectivity in the Twentieth Century , 2012 .

[39]  B. Wellman The Community Question: The Intimate Networks of East Yorkers , 1979, American Journal of Sociology.

[40]  Paul F. Diehl,et al.  Conceptualizing ConflictSpace: Toward a Geography of Relational Power and Embeddedness in the Analysis of Interstate Conflict , 2009 .

[41]  Paulo Shakarian,et al.  Mining for Spatially-Near Communities in Geo-Located Social Networks , 2013, AAAI Fall Symposia.

[42]  B. Wellman,et al.  Does Distance Matter in the Age of the Internet? , 2008 .

[43]  M. Kaldor New and Old Wars : Organized Violence in a Global Era , 1998 .

[44]  jimi adams,et al.  Capturing context: Integrating spatial and social network analyses , 2012, Soc. Networks.

[45]  David B. Skillicorn,et al.  Analysis of criminal social networks with typed and directed edges , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[46]  David B. Skillicorn,et al.  Spectral embedding of directed networks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[47]  Olivier Walther,et al.  Conceptualizing the Mobility of Space through the Malian Conflict , 2013 .

[48]  U. Feige,et al.  Spectral Graph Theory , 2015 .

[49]  John O'Loughlin,et al.  Spatial Analysis of Civil War Violence , 2008 .

[50]  Kevin Bartz,et al.  The Role of Borders, Languages, and Currencies as Obstacles to Labor Market Integration , 2012 .

[51]  Alexander H. Montgomery,et al.  Power Positions , 2006 .

[52]  Adib Bencherif,et al.  Alliances of convenience: assessing the dynamics of the Malian insurgency , 2017, Islamism and Social Movements in North Africa, the Sahel and Beyond.

[53]  Visakan Kadirkamanathan,et al.  Modelling Conflict Dynamics with Spatiotemporal Data , 2013 .

[54]  Shane D. Johnson,et al.  Space Time Dynamics of Insurgent Activity in Iraq , 2008 .

[55]  Jasmine Novak,et al.  Geographic routing in social networks , 2005, Proc. Natl. Acad. Sci. USA.

[56]  C. Engel,et al.  How Wide is the Border? , 1994 .

[57]  Michael D. Ward,et al.  Firewall? or Wall on Fire? A Unified Framework of Conflict Contagion and the Role of Ethnic Exclusion , 2017 .

[58]  Alessandro Chessa,et al.  Network communities within and across borders , 2013, Scientific Reports.

[59]  Eric J. Miller,et al.  AGENCY IN SOCIAL ACTIVITY INTERACTIONS: THE ROLE OF SOCIAL NETWORKS IN TIME AND SPACE , 2008 .

[60]  Armed Conflicts , 2001, Economic, Social and Cultural Rights.

[61]  Jan Ketil Rød,et al.  Ethno-Nationalist Dyads and Civil War , 2009 .