Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in India

Recent studies examine factors that lead to the emergence of terrorism and why some locations are more frequently targeted than others. However, much of the research assumes that terrorist incidents and groups are independent. We show that the assumption of independence is not always valid. Instead, we identify the conditions under which terrorist groups share choices over target locations, forming Implicit Terrorist Networks. We demonstrate the utility of this approach by examining Islamic terrorism in India (1990–2015). Using a two-mode network approach, we find that violent target locations are not independent of each other, but instead have a tendency to occur in clusters. The results highlight the patterns by which India has been targeted by a number of active, Islamic terrorist organizations over a 25-year period. More generally, our study: (1) demonstrates the utility of employing an Implicit Network approach to understanding terrorism, (2) shows that cluster analysis can assist in identifying terror group aliases, (3) identifies unexpected locations for violence that may indicate the involvement of external factors, providing leads for counter terrorism efforts, and (4) provides a tool for identifying the structures underlying patterns of global terrorism.

[1]  Diane H Felmlee Interaction in Social Networks , 2013 .

[2]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[3]  C. J. Drake,et al.  The role of ideology in terrorists’ target selection , 1998 .

[4]  Sean F. Everton Disrupting Dark Networks , 2012 .

[5]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[6]  R. Breiger The Duality of Persons and Groups , 1974 .

[7]  Varvara Mitliaga,et al.  Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..

[8]  E Shepherd,et al.  With friends like these.... , 1999, Nursing times.

[9]  Claude Berrebi,et al.  HOW DOES TERRORISM RISK VARY ACROSS SPACE AND TIME? AN ANALYSIS BASED ON THE ISRAELI EXPERIENCE , 2006 .

[10]  M. Newman Mathematics of networks , 2018, Oxford Scholarship Online.

[11]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[12]  Stefan Burr,et al.  The Mathematics of networks , 1982 .

[13]  M. Newman,et al.  Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[14]  et al,et al.  Measurements of neutral B decay branching fractions to KS0π+π- final states , 2004 .

[15]  F. Guerra-Pujol The Logic of Terrorism , 2012 .

[16]  Aparna Basu,et al.  Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir , 2004 .

[17]  S. Gartner Ties to the Dead: Connections to Iraq War and 9/11 Casualties and Disapproval of the President , 2008 .

[18]  J. M. McPherson,et al.  Hypernetwork sampling: Duality and differentiation among voluntary organizations , 1982 .

[19]  H. Park,et al.  With Friends Like These … Why Terrorist Organizations Ally , 2016 .