Dismantling terrorist networks: Evaluating strategic options using agent-based modeling

Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and fail...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Technological forecasting & social change 2010-09, Vol.77 (7), p.1014-1036
Hauptverfasser: Keller, Jared P., Desouza, Kevin C., Lin, Yuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1036
container_issue 7
container_start_page 1014
container_title Technological forecasting & social change
container_volume 77
creator Keller, Jared P.
Desouza, Kevin C.
Lin, Yuan
description Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.
doi_str_mv 10.1016/j.techfore.2010.02.007
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_754047042</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0040162510000363</els_id><sourcerecordid>1770375611</sourcerecordid><originalsourceid>FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</originalsourceid><addsrcrecordid>eNqFkcFOGzEQhq2KSg0pr1D2Vi6bju21vcupCEJbKVIPEPVoOd7Z4LBZB9sJ4u3xKnClp5H--WZG-oaQbxRmFKj8sZkltA-dDzhjkENgMwD1iUxorXgpBDQnZAJQQUklE1_IaYwbyASv5YT8u3Fxa4bUu2FdJAzBBxdTMWB69uExXhbzg-n3Jo3tmIJJuHa28Lvk_BCLfRxzs8YhlSsTsS22vsVx11fyuTN9xLO3OiXL2_n99e9y8ffXn-urRWkrzlJpBZOtWVFUSjYUDJUtX1WG00YoaDpLQdYNk0ypqpa0FbRRRtQG2kZIhquOT8n3495d8E97jElvXbTY92ZAv49aiQoqBRXL5MWHJFUKuBKS0ozKI2qDjzFgp3fBbU140RT06Fxv9LtzPTrXwPRodErOj4Od8dqss0q9vMsAh_wLxgTPxM8jgVnKwWHQ0TocLLYuoE269e5_R14B28KXOQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1770375611</pqid></control><display><type>article</type><title>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</title><source>Elsevier ScienceDirect Journals Complete</source><source>Sociological Abstracts</source><creator>Keller, Jared P. ; Desouza, Kevin C. ; Lin, Yuan</creator><creatorcontrib>Keller, Jared P. ; Desouza, Kevin C. ; Lin, Yuan</creatorcontrib><description>Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.</description><identifier>ISSN: 0040-1625</identifier><identifier>EISSN: 1873-5509</identifier><identifier>DOI: 10.1016/j.techfore.2010.02.007</identifier><identifier>CODEN: TFSCB3</identifier><language>eng</language><publisher>Elsevier Inc</publisher><subject>Agent-based modeling ; Computer simulation ; Conflict ; Counter-terrorism strategies ; Dark networks ; Dismantling ; Experimentation ; Experiments ; Mathematical models ; Network resiliency ; Networks ; Peace ; Resilience ; Security ; Strategy ; Success ; Terrorism ; Terrorist networks</subject><ispartof>Technological forecasting &amp; social change, 2010-09, Vol.77 (7), p.1014-1036</ispartof><rights>2010 Elsevier Inc.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</citedby><cites>FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0040162510000363$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,33752,65534</link.rule.ids></links><search><creatorcontrib>Keller, Jared P.</creatorcontrib><creatorcontrib>Desouza, Kevin C.</creatorcontrib><creatorcontrib>Lin, Yuan</creatorcontrib><title>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</title><title>Technological forecasting &amp; social change</title><description>Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.</description><subject>Agent-based modeling</subject><subject>Computer simulation</subject><subject>Conflict</subject><subject>Counter-terrorism strategies</subject><subject>Dark networks</subject><subject>Dismantling</subject><subject>Experimentation</subject><subject>Experiments</subject><subject>Mathematical models</subject><subject>Network resiliency</subject><subject>Networks</subject><subject>Peace</subject><subject>Resilience</subject><subject>Security</subject><subject>Strategy</subject><subject>Success</subject><subject>Terrorism</subject><subject>Terrorist networks</subject><issn>0040-1625</issn><issn>1873-5509</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>BHHNA</sourceid><recordid>eNqFkcFOGzEQhq2KSg0pr1D2Vi6bju21vcupCEJbKVIPEPVoOd7Z4LBZB9sJ4u3xKnClp5H--WZG-oaQbxRmFKj8sZkltA-dDzhjkENgMwD1iUxorXgpBDQnZAJQQUklE1_IaYwbyASv5YT8u3Fxa4bUu2FdJAzBBxdTMWB69uExXhbzg-n3Jo3tmIJJuHa28Lvk_BCLfRxzs8YhlSsTsS22vsVx11fyuTN9xLO3OiXL2_n99e9y8ffXn-urRWkrzlJpBZOtWVFUSjYUDJUtX1WG00YoaDpLQdYNk0ypqpa0FbRRRtQG2kZIhquOT8n3495d8E97jElvXbTY92ZAv49aiQoqBRXL5MWHJFUKuBKS0ozKI2qDjzFgp3fBbU140RT06Fxv9LtzPTrXwPRodErOj4Od8dqss0q9vMsAh_wLxgTPxM8jgVnKwWHQ0TocLLYuoE269e5_R14B28KXOQ</recordid><startdate>20100901</startdate><enddate>20100901</enddate><creator>Keller, Jared P.</creator><creator>Desouza, Kevin C.</creator><creator>Lin, Yuan</creator><general>Elsevier Inc</general><scope>FBQ</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>KR7</scope><scope>7U4</scope><scope>BHHNA</scope><scope>DWI</scope><scope>WZK</scope></search><sort><creationdate>20100901</creationdate><title>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</title><author>Keller, Jared P. ; Desouza, Kevin C. ; Lin, Yuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c432t-c526dab1e776910a16d3b4a3195709fc10689262774861d5197a58a0d9562ebf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Agent-based modeling</topic><topic>Computer simulation</topic><topic>Conflict</topic><topic>Counter-terrorism strategies</topic><topic>Dark networks</topic><topic>Dismantling</topic><topic>Experimentation</topic><topic>Experiments</topic><topic>Mathematical models</topic><topic>Network resiliency</topic><topic>Networks</topic><topic>Peace</topic><topic>Resilience</topic><topic>Security</topic><topic>Strategy</topic><topic>Success</topic><topic>Terrorism</topic><topic>Terrorist networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Keller, Jared P.</creatorcontrib><creatorcontrib>Desouza, Kevin C.</creatorcontrib><creatorcontrib>Lin, Yuan</creatorcontrib><collection>AGRIS</collection><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Sociological Abstracts (pre-2017)</collection><collection>Sociological Abstracts</collection><collection>Sociological Abstracts</collection><collection>Sociological Abstracts (Ovid)</collection><jtitle>Technological forecasting &amp; social change</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Keller, Jared P.</au><au>Desouza, Kevin C.</au><au>Lin, Yuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dismantling terrorist networks: Evaluating strategic options using agent-based modeling</atitle><jtitle>Technological forecasting &amp; social change</jtitle><date>2010-09-01</date><risdate>2010</risdate><volume>77</volume><issue>7</issue><spage>1014</spage><epage>1036</epage><pages>1014-1036</pages><issn>0040-1625</issn><eissn>1873-5509</eissn><coden>TFSCB3</coden><abstract>Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.</abstract><pub>Elsevier Inc</pub><doi>10.1016/j.techfore.2010.02.007</doi><tpages>23</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0040-1625
ispartof Technological forecasting & social change, 2010-09, Vol.77 (7), p.1014-1036
issn 0040-1625
1873-5509
language eng
recordid cdi_proquest_miscellaneous_754047042
source Elsevier ScienceDirect Journals Complete; Sociological Abstracts
subjects Agent-based modeling
Computer simulation
Conflict
Counter-terrorism strategies
Dark networks
Dismantling
Experimentation
Experiments
Mathematical models
Network resiliency
Networks
Peace
Resilience
Security
Strategy
Success
Terrorism
Terrorist networks
title Dismantling terrorist networks: Evaluating strategic options using agent-based modeling
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T17%3A39%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dismantling%20terrorist%20networks:%20Evaluating%20strategic%20options%20using%20agent-based%20modeling&rft.jtitle=Technological%20forecasting%20&%20social%20change&rft.au=Keller,%20Jared%20P.&rft.date=2010-09-01&rft.volume=77&rft.issue=7&rft.spage=1014&rft.epage=1036&rft.pages=1014-1036&rft.issn=0040-1625&rft.eissn=1873-5509&rft.coden=TFSCB3&rft_id=info:doi/10.1016/j.techfore.2010.02.007&rft_dat=%3Cproquest_cross%3E1770375611%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1770375611&rft_id=info:pmid/&rft_els_id=S0040162510000363&rfr_iscdi=true