Lethal Connections: The Determinants of Network Connections in the Provisional Irish Republican Army, 1970–1998

Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, “closure”), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted.

[1]  Assessing Contemporary Trends and Future Prospects in the Study of the Suicide Bomber , 2012 .

[2]  Gerard Delanty The Foundations of Social Theory , 2009 .

[3]  Shaul Mishal,et al.  Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations , 2005 .

[4]  Samuel T. Hunter,et al.  Malevolent Creativity in Terrorist Organizations , 2013 .

[5]  Ragnhild Silkoset,et al.  The Dark Side of Social Capital , 2008 .

[6]  Paul Gill,et al.  Improvised Explosive Devices – The Problem of Definition , 2011 .

[7]  B. Nooteboom Forms, Sources and Processes of Trust , 2006 .

[8]  James A. Piazza,et al.  Counterterrorism Killings and Provisional IRA Bombings, 1970–1998 , 2016 .

[9]  Hein de Vries,et al.  Article in Press G Model Social Networks Dynamics of Adolescent Friendship Networks and Smoking Behavior , 2022 .

[10]  Patricia E. Tweet Brokerage and Closure: An Introduction to Social Capital , 2006 .

[11]  T. Snijders The statistical evaluation of social network dynamics , 2001 .

[12]  T. Snijders,et al.  Modeling the Coevolution of Networks and Behavior , 2007 .

[13]  Garry Robins,et al.  An introduction to exponential random graph (p*) models for social networks , 2007, Soc. Networks.

[14]  J. Coleman,et al.  Social Capital in the Creation of Human Capital , 1988, American Journal of Sociology.

[15]  S. Wasserman,et al.  Logit models and logistic regressions for social networks: II. Multivariate relations. , 1999, The British journal of mathematical and statistical psychology.

[16]  Gary LaFree,et al.  Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007 , 2012 .

[17]  Peng Wang,et al.  Recent developments in exponential random graph (p*) models for social networks , 2007, Soc. Networks.

[18]  Max Taylor,et al.  The provisional Irish republican army: Command and functional structure , 1997 .

[19]  H. Patterson The politics of illusion : a political history of the IRA , 1997 .

[20]  J. Coleman,et al.  Public and Private High Schools: The Impact of Communities , 1987 .

[21]  David Tucker,et al.  What is New about the New Terrorism and How Dangerous is It? , 2001 .

[22]  Herbert Hamers,et al.  The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.

[23]  S. Wasserman,et al.  Logit models and logistic regressions for social networks: III. Valued relations , 1999 .

[24]  H. Ibarra Personal Networks of Women and Minorities in Management: A Conceptual Framework , 1993 .

[25]  T. Snijders,et al.  Conditional maximum likelihood estimation under various specifications of exponential random graph models , 2002 .

[26]  H. Ibarra Homophily and differential returns: Sex differences in network structure and access in an advertising firm. , 1992 .

[27]  J. Horgan,et al.  Who Were the Volunteers? 1 The Shifting Sociological and Operational Profile of 1240 Provisional Irish Republican Army Members , 2013 .

[28]  Kathleen M. Carley,et al.  Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..

[29]  T. Snijders Models for longitudinal network datain , 2005 .

[30]  John Scott What is social network analysis , 2010 .

[31]  John Arquilla,et al.  Networks, netwar, and information-age terrorism , 1999 .

[32]  R. Karl Rethemeyer,et al.  Killing Range: Explaining Lethality Variance Within a Terrorist Organization , 2014 .

[33]  Kathleen M. Carley A Theory of Group Stability , 1991 .

[34]  John Arquilla,et al.  Netwar Revisited: The Fight for the Future Continues , 2002 .

[35]  M. Hopkinson :Armed Struggle: The History of the IRA , 2006 .

[36]  M.L.R. Smith Fighting for Ireland? : the military strategy of the Irish Republican movement , 1997 .

[37]  Varvara Mitliaga,et al.  Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..

[38]  Walter Enders,et al.  Rational Terrorists and Optimal Network Structure , 2007 .

[39]  Ed Moloney,et al.  A Secret History of the IRA , 2002 .

[40]  John Horgan,et al.  Improvised Explosive Device: The Problem of Definition , 2011 .

[41]  J. Bowyer Bell The IRA, 1968-2000: An Analysis of a Secret Army , 2000 .

[42]  James D. Thompson Organizations in Action , 1967 .

[43]  Walter Enders,et al.  The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.

[44]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[45]  Shane D. Johnson,et al.  Space–Time Modeling of Insurgency and Counterinsurgency in Iraq , 2012 .

[46]  T. Sandler,et al.  What do we know about the substitution effect in transnational terrorism , 2003 .