Dismantling terrorist networks: Evaluating strategic options using agent-based modeling
Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and fail...
Gespeichert in:
Veröffentlicht in: | Technological forecasting & social change 2010-09, Vol.77 (7), p.1014-1036 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1036 |
---|---|
container_issue | 7 |
container_start_page | 1014 |
container_title | Technological forecasting & social change |
container_volume | 77 |
creator | Keller, Jared P. Desouza, Kevin C. Lin, Yuan |
description | Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains. |
doi_str_mv | 10.1016/j.techfore.2010.02.007 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_754047042</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0040162510000363</els_id><sourcerecordid>1770375611</sourcerecordid><originalsourceid>FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</originalsourceid><addsrcrecordid>eNqFkcFOGzEQhq2KSg0pr1D2Vi6bju21vcupCEJbKVIPEPVoOd7Z4LBZB9sJ4u3xKnClp5H--WZG-oaQbxRmFKj8sZkltA-dDzhjkENgMwD1iUxorXgpBDQnZAJQQUklE1_IaYwbyASv5YT8u3Fxa4bUu2FdJAzBBxdTMWB69uExXhbzg-n3Jo3tmIJJuHa28Lvk_BCLfRxzs8YhlSsTsS22vsVx11fyuTN9xLO3OiXL2_n99e9y8ffXn-urRWkrzlJpBZOtWVFUSjYUDJUtX1WG00YoaDpLQdYNk0ypqpa0FbRRRtQG2kZIhquOT8n3495d8E97jElvXbTY92ZAv49aiQoqBRXL5MWHJFUKuBKS0ozKI2qDjzFgp3fBbU140RT06Fxv9LtzPTrXwPRodErOj4Od8dqss0q9vMsAh_wLxgTPxM8jgVnKwWHQ0TocLLYuoE269e5_R14B28KXOQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1770375611</pqid></control><display><type>article</type><title>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</title><source>Elsevier ScienceDirect Journals Complete</source><source>Sociological Abstracts</source><creator>Keller, Jared P. ; Desouza, Kevin C. ; Lin, Yuan</creator><creatorcontrib>Keller, Jared P. ; Desouza, Kevin C. ; Lin, Yuan</creatorcontrib><description>Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.</description><identifier>ISSN: 0040-1625</identifier><identifier>EISSN: 1873-5509</identifier><identifier>DOI: 10.1016/j.techfore.2010.02.007</identifier><identifier>CODEN: TFSCB3</identifier><language>eng</language><publisher>Elsevier Inc</publisher><subject>Agent-based modeling ; Computer simulation ; Conflict ; Counter-terrorism strategies ; Dark networks ; Dismantling ; Experimentation ; Experiments ; Mathematical models ; Network resiliency ; Networks ; Peace ; Resilience ; Security ; Strategy ; Success ; Terrorism ; Terrorist networks</subject><ispartof>Technological forecasting & social change, 2010-09, Vol.77 (7), p.1014-1036</ispartof><rights>2010 Elsevier Inc.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</citedby><cites>FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0040162510000363$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,33752,65534</link.rule.ids></links><search><creatorcontrib>Keller, Jared P.</creatorcontrib><creatorcontrib>Desouza, Kevin C.</creatorcontrib><creatorcontrib>Lin, Yuan</creatorcontrib><title>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</title><title>Technological forecasting & social change</title><description>Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.</description><subject>Agent-based modeling</subject><subject>Computer simulation</subject><subject>Conflict</subject><subject>Counter-terrorism strategies</subject><subject>Dark networks</subject><subject>Dismantling</subject><subject>Experimentation</subject><subject>Experiments</subject><subject>Mathematical models</subject><subject>Network resiliency</subject><subject>Networks</subject><subject>Peace</subject><subject>Resilience</subject><subject>Security</subject><subject>Strategy</subject><subject>Success</subject><subject>Terrorism</subject><subject>Terrorist networks</subject><issn>0040-1625</issn><issn>1873-5509</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>BHHNA</sourceid><recordid>eNqFkcFOGzEQhq2KSg0pr1D2Vi6bju21vcupCEJbKVIPEPVoOd7Z4LBZB9sJ4u3xKnClp5H--WZG-oaQbxRmFKj8sZkltA-dDzhjkENgMwD1iUxorXgpBDQnZAJQQUklE1_IaYwbyASv5YT8u3Fxa4bUu2FdJAzBBxdTMWB69uExXhbzg-n3Jo3tmIJJuHa28Lvk_BCLfRxzs8YhlSsTsS22vsVx11fyuTN9xLO3OiXL2_n99e9y8ffXn-urRWkrzlJpBZOtWVFUSjYUDJUtX1WG00YoaDpLQdYNk0ypqpa0FbRRRtQG2kZIhquOT8n3495d8E97jElvXbTY92ZAv49aiQoqBRXL5MWHJFUKuBKS0ozKI2qDjzFgp3fBbU140RT06Fxv9LtzPTrXwPRodErOj4Od8dqss0q9vMsAh_wLxgTPxM8jgVnKwWHQ0TocLLYuoE269e5_R14B28KXOQ</recordid><startdate>20100901</startdate><enddate>20100901</enddate><creator>Keller, Jared P.</creator><creator>Desouza, Kevin C.</creator><creator>Lin, Yuan</creator><general>Elsevier Inc</general><scope>FBQ</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>KR7</scope><scope>7U4</scope><scope>BHHNA</scope><scope>DWI</scope><scope>WZK</scope></search><sort><creationdate>20100901</creationdate><title>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</title><author>Keller, Jared P. ; Desouza, Kevin C. ; Lin, Yuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Agent-based modeling</topic><topic>Computer simulation</topic><topic>Conflict</topic><topic>Counter-terrorism strategies</topic><topic>Dark networks</topic><topic>Dismantling</topic><topic>Experimentation</topic><topic>Experiments</topic><topic>Mathematical models</topic><topic>Network resiliency</topic><topic>Networks</topic><topic>Peace</topic><topic>Resilience</topic><topic>Security</topic><topic>Strategy</topic><topic>Success</topic><topic>Terrorism</topic><topic>Terrorist networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Keller, Jared P.</creatorcontrib><creatorcontrib>Desouza, Kevin C.</creatorcontrib><creatorcontrib>Lin, Yuan</creatorcontrib><collection>AGRIS</collection><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Sociological Abstracts (pre-2017)</collection><collection>Sociological Abstracts</collection><collection>Sociological Abstracts</collection><collection>Sociological Abstracts (Ovid)</collection><jtitle>Technological forecasting & social change</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Keller, Jared P.</au><au>Desouza, Kevin C.</au><au>Lin, Yuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</atitle><jtitle>Technological forecasting & social change</jtitle><date>2010-09-01</date><risdate>2010</risdate><volume>77</volume><issue>7</issue><spage>1014</spage><epage>1036</epage><pages>1014-1036</pages><issn>0040-1625</issn><eissn>1873-5509</eissn><coden>TFSCB3</coden><abstract>Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.</abstract><pub>Elsevier Inc</pub><doi>10.1016/j.techfore.2010.02.007</doi><tpages>23</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0040-1625 |
ispartof | Technological forecasting & social change, 2010-09, Vol.77 (7), p.1014-1036 |
issn | 0040-1625 1873-5509 |
language | eng |
recordid | cdi_proquest_miscellaneous_754047042 |
source | Elsevier ScienceDirect Journals Complete; Sociological Abstracts |
subjects | Agent-based modeling Computer simulation Conflict Counter-terrorism strategies Dark networks Dismantling Experimentation Experiments Mathematical models Network resiliency Networks Peace Resilience Security Strategy Success Terrorism Terrorist networks |
title | Dismantling terrorist networks: Evaluating strategic options using agent-based modeling |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T17%3A39%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dismantling%20terrorist%20networks:%20Evaluating%20strategic%20options%20using%20agent-based%20modeling&rft.jtitle=Technological%20forecasting%20&%20social%20change&rft.au=Keller,%20Jared%20P.&rft.date=2010-09-01&rft.volume=77&rft.issue=7&rft.spage=1014&rft.epage=1036&rft.pages=1014-1036&rft.issn=0040-1625&rft.eissn=1873-5509&rft.coden=TFSCB3&rft_id=info:doi/10.1016/j.techfore.2010.02.007&rft_dat=%3Cproquest_cross%3E1770375611%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1770375611&rft_id=info:pmid/&rft_els_id=S0040162510000363&rfr_iscdi=true |