Structural Vulnerabilities of Networked Insurgencies: Adapting to the New Adversary