Skip to main content

Disrupting Terrorist Networks — A Dynamic Fitness Landscape Approach

  • Conference paper
Unifying Themes in Complex Systems VII

Abstract

The study of terrorist networks as well as the study of how to impede their successful functioning has been the topic of considerable attention since the odious event of the 2001 World Trade Center disaster. While serious students of terrorism were indeed engaged in the subject prior to this time, a far more general concern has arisen subsequently. Nonetheless, much of the subject remains shrouded in obscurity, not the least because of difficulties with language and the representation or translation of names, and the inherent complexity and ambiguity of the subject matter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Butts, Carter T. (2000). “An Axiomatic Approach to Network Complexity.” Journal of Mathematical Sociology, 24(4), 273–301.

    Article  MATH  Google Scholar 

  • Butts, Carter T. (2001). “The Complexity of Social Networks: Theoretical and Empirical Findings.” Social Networks, 23(1), 31–71

    Article  Google Scholar 

  • Butts, Carter T. (2003a) “Network Inference, Error, and Informant (In)Accuracy: A Bayesian Approach”, Social Networks 25(2) 103–30.

    Article  Google Scholar 

  • Butts, Carter T. (2003b). “Predictability of Large-scale Spatially Embedded Networks.” In Ronald Breiger, Kathleen Carley, and Philippa Pattison (eds.), Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, 313–323. Washington, D.C.: National Academies Press.

    Google Scholar 

  • Carley, Kathleen M. and Butts, Carter T. (1997). “An Algorithmic Approach to the Comparison of Partially Labeled Graphs.” In Proceedings of the 1997 International Symposium on Command and Control Research and Technology. June. Washington, D.C.

    Google Scholar 

  • Carley, Kathleen; Lee, Ju-Sung; and Krackhardt, David; (2001) “Destabilizing Networks”, Connections 24(3): 31–34, INSNA (2001)

    Google Scholar 

  • Carley, Kathleen (2002a) Modeling “Covert Networks”, Paper prepared for the National Academy of Science Workshop on Terrorism, December 11, 2002

    Google Scholar 

  • Carley, Kathleen (2002b) “Inhibiting Adaptation”, Proceedings of the 2002 Command and Control Research and Technology Symposium, Naval Postgraduate School, Monterey, CA (2002)

    Google Scholar 

  • Carley, Kathleen; Dombroski, Matthew; Tsvetovat, Maksim; Reminga, Jeffrey; Kamneva, Natasha (2003) “Destabilizing Dynamic Covert Networks”, Proceedings of the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington, D.C. (2003) http://www.casos.cs.cmu.edu/publications/resources_others/a2c2_carley_2003_d estabilizing.pdf

    Google Scholar 

  • Carley, Kathleen; Diesner, Jana; Reminga, Jeffrey; and Tsvetovat, Maksim (2004), “Toward an end-to-end approach for extracting, analyzing and visualizing network data”, ISRI, Carnegie Mellon University (2004)

    Google Scholar 

  • Clemens, Jonathan P. and O’ Neill, Lauren “Discovering an Optimum Covert Network”; Santa Fe Institute. Summer. 2004

    Google Scholar 

  • Codevilla, Angelo (2004a) “Doing it the Hard Way”, Claremont Review of Books, Fall, 2004 http://www.claremont.org/writings/crb/fall2004/codevilla.html

    Google Scholar 

  • Codevilla, Angelo (2004b) “Why U.S. Intelligence is Inadequate and How to Fix It”, Center for Security Policy, Occasional Papers Series, December, 2004 http://www.centerforsecuritypolicy.org/occasionalpapers/Why-US-Intelligence-Is-Inadequate.pdf

    Google Scholar 

  • Fellman, Philip V.; Sawyer, David; and Wright, Roxana (2003) “Modeling Terrorist Networks — Complex Systems and First Principles of Counter-intelligence,” Proceedings of the NATO Conference on Central Asia: Enlargement, Civil-Military Relations, and Security, Kazach American University/North Atlantic Treaty Organization (NATO) May 14–16, 2003

    Google Scholar 

  • Fellman, Philip V. and Wright, Roxana (2003) “Modeling Terrorist Networks: Complex Systems at the Mid-Range”, paper prepared for the Joint Complexity Conference, London School of Economics, September 16–18, 2003 http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf

    Google Scholar 

  • Fellman, Philip V. and Strathern, Mark (2004) “The Symmetries and Redundancies of Terror: Patterns in the Dark”, Proceedings of the annual meeting of the North American Association for Computation in the Social and Organizational Sciences, Carnegie Mellon University, June 27–29, 2004. http://casos.isri.cmu.edu/events/conferences/2004/2004_roceedings/V.Fellman Phill.doc

    Google Scholar 

  • Gerecht, R.M., “The Counterterrorist Myth”, The Atlantic Monthly, July–August, 2001

    Google Scholar 

  • Ghemawat, Pankaj and Levinthal, Daniel (2000) “Choice Structures, Business Strategy and Performance: A Generalized NK-Simulation Approach”, Reginald H. Jones Center, The Wharton School, University of Pennsylvania (2000) http:// www.people,hbs.edu/pghemawat/pubs/ChoiceStructures.pdf

    Google Scholar 

  • Gilligan, Tom CIA Life: 10,000 Days with the Agency, Intelligence E-Publishing Company (November 2003)

    Google Scholar 

  • Hoffman, Bruce (1997) “The Modern Terrorist Mindset: Tactics, Targets and Technologies”, Centre for the Study of Terrorism and Political Violence, St. Andrews University, Scotland, October, 1997

    Google Scholar 

  • Hoffman, Bruce and Carr, Caleb (1997) “Terrorism: Who Is Fighting Whom?” World Policy Journal, Vol. 14, No. 1, Spring 1997

    Google Scholar 

  • Kauffman, Stuart (1993), The Origins of Order, Oxford University Press (Oxford and New York: 1993)

    Google Scholar 

  • Kauffman, Stuart (1996), At Home In the Universe, Oxford University Press (Oxford and New York: 1996)

    Google Scholar 

  • Kauffman, Stuart (2000) Investigations, Oxford University Press (Oxford and New York, 2000)

    Google Scholar 

  • Krebs, Valdis (2001) “Uncloaking Terrorist Networks”, First Monday, (2001) http:// www.orgnet.com/hijackers.html

    Google Scholar 

  • Lissack, Michael, (1996) “Chaos and Complexity: What Does That Have to Do with Knowledge Management?”, in Knowledge Management: Organization, Competence and Methodology, ed. J. F. Schreinemakers, Ergon Verlog J. F. Schreinemakers, Ergon Verlog: 62–81 (Wurzburg: 1996)

    Google Scholar 

  • McKelvey, Bill (1999) “Avoiding Complexity Catastrophe in Revolutionary Pockets: Strategies for Rugged Landscapes”, Organization Science, Vol. 10, No. 3, May–June 1999 pp. 294–321

    Article  Google Scholar 

  • Meyer, Chris “What’s Under the Hood: A Layman’s Guide to the Real Science”, Center for Business Innovation, Cap Gemini, Ernst and Young, Conference on Embracing Complexity, San Francisco, July 17–19, 1996

    Google Scholar 

  • Porter, Michael (1996) “What is Strategy?”, Harvard Business Review, November–December, 1996

    Google Scholar 

  • Sageman, Mark (2004) Understanding Terror Networks, University of Pennsylvania Press, 2004.

    Google Scholar 

  • Tsvetovat, Max & Carley, Kathleen. (2003). Bouncing Back: Recovery mechanisms of covert networks. NAACSOS Conference 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 NECSI Cambridge, Massachusetts

About this paper

Cite this paper

Fellman, P.V., Clemens, J.P., Wright, R., Post, J.V., Dadmun, M. (2012). Disrupting Terrorist Networks — A Dynamic Fitness Landscape Approach. In: Minai, A.A., Braha, D., Bar-Yam, Y. (eds) Unifying Themes in Complex Systems VII. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18003-3_9

Download citation

Publish with us

Policies and ethics