Abstract
The study of terrorist networks as well as the study of how to impede their successful functioning has been the topic of considerable attention since the odious event of the 2001 World Trade Center disaster. While serious students of terrorism were indeed engaged in the subject prior to this time, a far more general concern has arisen subsequently. Nonetheless, much of the subject remains shrouded in obscurity, not the least because of difficulties with language and the representation or translation of names, and the inherent complexity and ambiguity of the subject matter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Butts, Carter T. (2000). “An Axiomatic Approach to Network Complexity.” Journal of Mathematical Sociology, 24(4), 273–301.
Butts, Carter T. (2001). “The Complexity of Social Networks: Theoretical and Empirical Findings.” Social Networks, 23(1), 31–71
Butts, Carter T. (2003a) “Network Inference, Error, and Informant (In)Accuracy: A Bayesian Approach”, Social Networks 25(2) 103–30.
Butts, Carter T. (2003b). “Predictability of Large-scale Spatially Embedded Networks.” In Ronald Breiger, Kathleen Carley, and Philippa Pattison (eds.), Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, 313–323. Washington, D.C.: National Academies Press.
Carley, Kathleen M. and Butts, Carter T. (1997). “An Algorithmic Approach to the Comparison of Partially Labeled Graphs.” In Proceedings of the 1997 International Symposium on Command and Control Research and Technology. June. Washington, D.C.
Carley, Kathleen; Lee, Ju-Sung; and Krackhardt, David; (2001) “Destabilizing Networks”, Connections 24(3): 31–34, INSNA (2001)
Carley, Kathleen (2002a) Modeling “Covert Networks”, Paper prepared for the National Academy of Science Workshop on Terrorism, December 11, 2002
Carley, Kathleen (2002b) “Inhibiting Adaptation”, Proceedings of the 2002 Command and Control Research and Technology Symposium, Naval Postgraduate School, Monterey, CA (2002)
Carley, Kathleen; Dombroski, Matthew; Tsvetovat, Maksim; Reminga, Jeffrey; Kamneva, Natasha (2003) “Destabilizing Dynamic Covert Networks”, Proceedings of the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington, D.C. (2003) http://www.casos.cs.cmu.edu/publications/resources_others/a2c2_carley_2003_d estabilizing.pdf
Carley, Kathleen; Diesner, Jana; Reminga, Jeffrey; and Tsvetovat, Maksim (2004), “Toward an end-to-end approach for extracting, analyzing and visualizing network data”, ISRI, Carnegie Mellon University (2004)
Clemens, Jonathan P. and O’ Neill, Lauren “Discovering an Optimum Covert Network”; Santa Fe Institute. Summer. 2004
Codevilla, Angelo (2004a) “Doing it the Hard Way”, Claremont Review of Books, Fall, 2004 http://www.claremont.org/writings/crb/fall2004/codevilla.html
Codevilla, Angelo (2004b) “Why U.S. Intelligence is Inadequate and How to Fix It”, Center for Security Policy, Occasional Papers Series, December, 2004 http://www.centerforsecuritypolicy.org/occasionalpapers/Why-US-Intelligence-Is-Inadequate.pdf
Fellman, Philip V.; Sawyer, David; and Wright, Roxana (2003) “Modeling Terrorist Networks — Complex Systems and First Principles of Counter-intelligence,” Proceedings of the NATO Conference on Central Asia: Enlargement, Civil-Military Relations, and Security, Kazach American University/North Atlantic Treaty Organization (NATO) May 14–16, 2003
Fellman, Philip V. and Wright, Roxana (2003) “Modeling Terrorist Networks: Complex Systems at the Mid-Range”, paper prepared for the Joint Complexity Conference, London School of Economics, September 16–18, 2003 http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf
Fellman, Philip V. and Strathern, Mark (2004) “The Symmetries and Redundancies of Terror: Patterns in the Dark”, Proceedings of the annual meeting of the North American Association for Computation in the Social and Organizational Sciences, Carnegie Mellon University, June 27–29, 2004. http://casos.isri.cmu.edu/events/conferences/2004/2004_roceedings/V.Fellman Phill.doc
Gerecht, R.M., “The Counterterrorist Myth”, The Atlantic Monthly, July–August, 2001
Ghemawat, Pankaj and Levinthal, Daniel (2000) “Choice Structures, Business Strategy and Performance: A Generalized NK-Simulation Approach”, Reginald H. Jones Center, The Wharton School, University of Pennsylvania (2000) http:// www.people,hbs.edu/pghemawat/pubs/ChoiceStructures.pdf
Gilligan, Tom CIA Life: 10,000 Days with the Agency, Intelligence E-Publishing Company (November 2003)
Hoffman, Bruce (1997) “The Modern Terrorist Mindset: Tactics, Targets and Technologies”, Centre for the Study of Terrorism and Political Violence, St. Andrews University, Scotland, October, 1997
Hoffman, Bruce and Carr, Caleb (1997) “Terrorism: Who Is Fighting Whom?” World Policy Journal, Vol. 14, No. 1, Spring 1997
Kauffman, Stuart (1993), The Origins of Order, Oxford University Press (Oxford and New York: 1993)
Kauffman, Stuart (1996), At Home In the Universe, Oxford University Press (Oxford and New York: 1996)
Kauffman, Stuart (2000) Investigations, Oxford University Press (Oxford and New York, 2000)
Krebs, Valdis (2001) “Uncloaking Terrorist Networks”, First Monday, (2001) http:// www.orgnet.com/hijackers.html
Lissack, Michael, (1996) “Chaos and Complexity: What Does That Have to Do with Knowledge Management?”, in Knowledge Management: Organization, Competence and Methodology, ed. J. F. Schreinemakers, Ergon Verlog J. F. Schreinemakers, Ergon Verlog: 62–81 (Wurzburg: 1996)
McKelvey, Bill (1999) “Avoiding Complexity Catastrophe in Revolutionary Pockets: Strategies for Rugged Landscapes”, Organization Science, Vol. 10, No. 3, May–June 1999 pp. 294–321
Meyer, Chris “What’s Under the Hood: A Layman’s Guide to the Real Science”, Center for Business Innovation, Cap Gemini, Ernst and Young, Conference on Embracing Complexity, San Francisco, July 17–19, 1996
Porter, Michael (1996) “What is Strategy?”, Harvard Business Review, November–December, 1996
Sageman, Mark (2004) Understanding Terror Networks, University of Pennsylvania Press, 2004.
Tsvetovat, Max & Carley, Kathleen. (2003). Bouncing Back: Recovery mechanisms of covert networks. NAACSOS Conference 2003
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 NECSI Cambridge, Massachusetts
About this paper
Cite this paper
Fellman, P.V., Clemens, J.P., Wright, R., Post, J.V., Dadmun, M. (2012). Disrupting Terrorist Networks — A Dynamic Fitness Landscape Approach. In: Minai, A.A., Braha, D., Bar-Yam, Y. (eds) Unifying Themes in Complex Systems VII. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18003-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-18003-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18002-6
Online ISBN: 978-3-642-18003-3
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)