Dark network resilience in a hostile environment: optimizing centralization and density
https://doi.org/10.21202/2782-2923.2023.3.667-688
EDN: MOZVSV
Abstract
Objective: to analyze the legal nature, structure, and features of violent extremism and to develop measures to prevent this illegal behavior.
Methods: dialectical approach to cognition of social phenomena, allowing to analyze them in historical development and functioning in the context of the totality of objective and subjective factors, which predetermined the following research methods: formal-logical and sociological.
Results: in recent years, the world has witnessed the emergence of violent extremists (VEs), and they have become an ongoing concern for countries around the globe. A great deal of effort has been expended examining their nature and structure in order to aid in the development of interventions to prevent further violence. Analysts and scholars have been
particularly interested in identifying structural features that enhance (or diminish) VE resilience to exogenous and endogenous shocks. As many have noted, VEs typically seek to balance operational security and capacity/efficiency. Some argue that their desire for secrecy outweighs their desire for efficiency, which leads them to be less centralized with few internal connections. Others argue that centralization is necessary because security is more easily compromised and that internal density promotes solidarity and limits countervailing influences. Unsurprisingly, scholars have found evidence for both positions. In this paper, we analyze the Noordin Top terrorist network over time to examine the security-efficiency tradeoff from a new perspective. We find that the process by which they adopt various network structures is far more complex than much of the current literature suggests.
Scientific novelty: the research showed that a dark network’s adoption of a network structure is far more complex than what current literature suggests, namely that a network structure at either side of the cohesion and centralization continuums offers potential advantages and disadvantages in terms of network resilience. In the case of Noordin Top, it appears that his network’s focus on establishing external ties after its operations provided it possible access to resources but likely became a factor contributing to its exposure and eventual disruption. The network, much like its Bali I predecessors who also focused on establishing external ties after their operation, faced significant losses and needed to reconstitute itself immediately following each operation. This tendency, along with the general adoption of a centralized structure, suggests that Noordin’s network adopted a suboptimal structure that ultimately contributed to his demise.
Practical significance: the main provisions and conclusions of the article can be used in scientific, pedagogical and law enforcement activities when considering the issues related to fighting extremism and terrorism.
The article was first published in English language by Criminology, Criminal Justice, Law & Society and The Western Society of
Criminology Hosting by Scholastica. For more information please contact: CCJLS@WesternCriminology.org The submitted material is published in full, as interpreted by the author.
For original publication: Everton, S. F., & Cunningham, D. (2015). Dark network resilience in a hostile environment: optimizing centralization and density. Criminology, Criminal Justice, Law & Society, 16(1), 1–20.
Publication URL: https://ccjls.scholasticahq.com/article/341-dark-network-resilience-in-a-hostile-environment-optimizingcentralization-and-density
About the Authors
S. F. EvertonUnited States
Sean F. Everton is an Assistant Professor in the Department of Defense Analysis and the Co-Director of the CORE Lab
Monterey, CA, 93943, USA
D. Cunningham
United States
Daniel Cunningham is an Associate Faculty for Instruction in the Defense Analysis Department
Monterey, CA, 93943, USA
References
1. Arquilla, J. (2009). Aspects of Netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School.
2. Baker, W. E. & Faulkner, R. R. (1993). The social-organization of conspiracy: Illegal networks in the heavy electrical-equipment industry. American Sociological Review, 58(6), 837–860. https://doi.org/10.2307/2095954
3. Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31(1), 33–62. https://doi.org/10.1002/pam.20619
4. Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: The MIT Press.
5. Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET for Windows: Software for social network analysis. Harvard, MA: Analytical Technologies.
6. Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing terrorist networks. Paper presented at the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington DC.
7. Chwe, M. S. (2001).Rational ritual: Culture, coordination, and common knowledge. Princeton, NJ: Princeton University Press.
8. Coleman, J. S. (1964). Introduction to Mathematical Sociology. New York, NY: Free Press.
9. Coleman, J. S. (1988). Free riders and zealots: The role of social networks. Sociological Theory, 6(1), 52–57. https://doi.org/10.2307/201913
10. Combatting Terrorism Center. (2006). Harmony and disharmony: Exploiting al-Qaida's organizational vulnerabilities (pp. 55). West Point, NY: Combating Terrorism Center at West Point.
11. Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press.
12. Crossley, N., Edwards, G., Harries, E., & Stevenson, R. (2012). Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914). Social Networks, 34, 634–644. https://doi.org/10.1016/j.socnet.2012.07.004
13. deNooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (Revised and expanded ed.). Cambridge, UK: Cambridge University Press.
14. Elite indonesian police unity under fire over torture, unlawful killings (2013, March 30). South China Morning Post: Asia. http://www.scmp.com/news/asia/article/1202787/elite-indonesian-police-unit-under-fire-over-torture-unlawful-killings
15. Enders, W., & Jindapon, P. (2010). Network externalities and the structure of terror networks. Journal of Conflict Resolution, 54(2), 262–280. https://doi.org/10.1177/0022002709355439
16. Enders, W., & Sandler, T. (2006). The political economy of terrorism. Cambridge, UK: Cambridge University Press.
17. Enders, W., & Su, X. (2007). Rational terrorists and optimal network structure. Journal of Conflict Resolution, 57(1), 33–57. https://doi.org/10.1177/0022002706296155
18. Erickson, B. (1981). Secret societies and social structure. Social Forces, 60(1), 188–210. https://doi.org/10.1093/sf/60.1.188
19. Everton, S. F. (2012a). Disrupting dark networks. Cambridge, UK: Cambridge University Press.
20. Everton, S. F. (2012b). Network topography, key players and terrorist networks. Connections, 37(1), 12–19.
21. Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94–114. https://doi.org/10.1080/19434472.2012.725225
22. Everton, S. F., & Cunningham, D. (2013). Terrorist network adaptation to a changing environment. In C. Morselli (Ed.), Crime and Networks (pp. 287–308). London, UK: Routledge.
23. Everton, S. F., & Cunningham, D. (2015). Dark network resilience in a hostile environment: optimizing centralization and density. Criminology, Criminal Justice, Law & Society, 16(1), 1–20.
24. Finke, R., & Stark, R. (1992). The churching of America, 1776-1990: Winners and losers in our religious economy. New Brunswick, NJ: Rutgers University Press.
25. Finke, R., & Stark, R. (2005). The churching of America, 1776–2005: Winners and losers in our religious economy (2nd ed.). New Brunswick, NJ: Rutgers University Press.
26. Freeman, L. C. (1979). Centrality in social networks I: Conceptual clarification. Social Networks, 1, 215–239. https://doi.org/10.1016/0378-8733(78)90021-7
27. Granovetter, M. (1973). The strength of weak ties. American Journal of Sociology, 73(6), 13601380. https://doi.org/.2307/2776392
28. Granovetter, M. (2005). The impact of social structure on economic outcomes. Journal of Economic Perspectives, 79(1), 33–50. https://doi.org/10.1257/0895330053147958
29. Griswold, E. (2010). The tenth parallel: Dispatches from the fault line between Christianity and Islam. New York, NY: Farra, Staus, and Giroux.
30. Hafez, M. M. (2004). From marginalization to massacres: A political process explanation of violence in Algeria. In Q. Wiktorowicz (Ed.), Islamic activism: A social movement theory approach (pp. 37–60). Bloomington, IN: Indiana University Press.
31. Hoivik, T., & Gleditsch, N. P. (1975). Structural parameters of graphs: A theoretical investigation. In H. M. Blalock (Ed.), Quantitative sociology (pp. 203–222). New York: Academic Press. https://doi.org/10.1007/BF00192487
32. International Crisis Group. (2006).Terrorism in Indonesia: Noordin's networks (Asia Report No. 114). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/114 terrorism in indonesianoor din s networks
33. International Crisis Group. (2009). Indonesia: Noordin Top's support base (Asia Briefing No. 95). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/b95indonesianoordintops s upport base.pdf
34. International Crisis Group. (2010). Indonesia: Jihadi surprise in Aceh (Asia Report No. 189). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/189%20Indonesia%20-%20Jihadi%20Surprise%20in%20Aceh.pdf
35. International Crisis Group. (2011). Indonesian jihadism: Small groups, big plans (Asia Report No. 204). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/204%29Indonesian%20Jihadism%20%20Sall%20Groups%20Big%20Plans.pdf
36. International Crisis Group. (2012). Indonesia: The deadly cost of poor policing (Asia Report No. 218). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/218%20Indonesia%20--%20The%20Deadly%20Cost%20of%20Poor%20
37. Policing, M., Petersen, E., Bull, J., Monsen, S., & Richmond, P. (1960). The failure of an incipient social movement. Pacific Sociological Review, 3, 35–40.
38. Jakarta Centre for Law Enforcement Cooperation. (2005–2010). Annual reports. http://www.jclec.com/index.php?option=comdocman&task=catview&gid=113&Itemid=42
39. Jones, S. (2009). Noordin’s dangerous liaisons. Tempo. http://www.crisisgroup.org/en/regions/asia/south-east-asia/indonesia/op-eds/jones-noordins-dangerous-liaisons.aspx
40. Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park, PA: Pennsylvania State University Press.
41. Kilcullen, D. (2010). Counterinsurgency. Oxford, UK: Oxford University Press.
42. Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–575. https://doi.org/10.1080/10576100600798418
43. Krackhardt, D. (1994). Graph theoretical dimensions of informal organizations. In K. M. Carley, & M. J. Prietula (Eds.), Computational organization theory (pp. 89–111).
44. Hillsdale, NJ: L. Erlbaum Associates. Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43–52.
45. Lindelauf, R., Borm, P., & Hamers, H. (2009). The influence of secrecy on the communication structure of covert networks. Social Networks, 31, 126–137. https://doi.org/10.2139/ssrn.1096057
46. Lofland, J., & Stark, R. (1965). Becoming a worldsaver: A theory of conversion to a deviant perspective. American Sociological Review, 30, 862–875. https://doi.org/10.2307/2090965
47. Maoz, Z. (2011). Networks of nations: The evolution, structure, and impact of international networks, 1816–2001. Cambridge, UK: Cambridge University Press.
48. McAdam, D. (1982). Political process and the development of Black insurgency, 1930–1970. Chicago, IL: University of Chicago Press.
49. McAdam, D. (1986). Recruitment to high risk activism: The case of Freedom Summer. American Journal of Sociology, 92, 64–90. https://doi.org/10.1086/228463
50. McAdam, D. (1999). Political process and the development of Black Insurgency, 1930–1970 (2nd ed.). Chicago, IL: University of Chicago Press.
51. McAdam, D., & Paulsen, R. (1993). Specifying the relationship between social ties and activism. American Journal of Sociology, 99, 640–667. https://doi.org/10.2307/2781286
52. McCloskey, D. (1995). The insignificance of statistical significance. Scientific American, April, 32–33.
53. McCormick, G. (2005). The Diamond Insurgent/COIN Model. Department of Defense Analysis, Naval Postgraduate School.
54. Monterey, CA. McCormick, G., & Owen, G. (2000). Security and coordination in a clandestine organization. Mathematical and Computer Modelling, 31, 175–192. https://doi.org/10.1016/S0895-7177(00)00050-9
55. Morselli, C. (2009). Inside criminal networks. New York, NY: Springer.
56. Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29, 71–98. https://doi.org/10.1016/j.socnet.2006.05.001
57. Passy, F. (2003). Social networks matter. But how? In M. Diani & D. McAdam (Eds.), Social movements and networks: Relational approaches to collective action (pp. 21–48). Oxford, UK: Oxford University Press. https://doi.org/10.1093/0199251789.003.0002
58. Prell, C. (2011). Social network analysis: History, theory & methodology. Thousand Oaks, CA: SAGE Publications.
59. Priamarizki, A. (2013). Counter-terrorism in Indonesia: The end of special detachment 88? RSIS Commentaries, 062/2013. http://www.rsis.edu.sg/publications/Perspective/RSIS0622013.pdf
60. Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–439. https://doi.org/10.1093/jpart/mug029
61. Ramakrishna, K. (2009). Governmental responses to extremism in Southeast Asia: 'Hard' versus 'soft' approaches. In A. de Borchgrave, T. Sanderson & D. Gordon (Eds.), Conflict, community, and criminality in Southeast Asia and Australia: Assessments from the field (pp. 31–36). Washington, DC: Center for Strategic and International Studies.
62. Roberts, G. (2013). Indonesian anti-terror squad killings prompt revenge attacks. http://www.abc.net.au/am/content/2013/s3686010.htm
63. Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf
64. Sageman, M. (2003). Statement to the National Commission on Terrorist Attacks Upon the United States. http://www.9-11commission.gov/hearings/hearing3/witnesssageman.htm
65. Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.
66. Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press.
67. Scott, J. (2000). Social network analysis: A handbook (2nd ed.). Thousand Oaks, CA: Sage Publications.
68. Smith, C. S. (1991). The emergence of liberation theology: Radical religion and social movement theory. Chicago, IL: University of Chicago Press.
69. Snijders, T. A. B. (1981). The degree variance: An index of graph heterogeneity. Social Networks, 3, 163–174. https://doi.org/10.1016/0378-8733(81)90014-9
70. Snow, D. A., Zurcher, L. A., & Ekland-Olson, S. (1980). Social networks and social movements: A microstructural approach to differential recruitment. American Sociological Review, 45, 787–801. https://doi.org/10.2307/2094895
71. Solomon, D. (2007). Pillars of power: Australia's institutions. Sydney, Australia: The Federation Press.
72. Stark, R. (1996). The rise of Christianity: A sociologist reconsiders history. Princeton, NJ: Princeton University Press.
73. Stark, R., & Bainbridge, W. S. (1980). Networks of faith: Interpersonal bonds and recruitment to cults and sects. American Journal of Sociology, 85(6), 1376–1395.
74. Sunstein, C. R. (2009). Going to extremes: How like minds unite and divide. Oxford, UK: Oxford University Press.
75. Tucker, D. (2008). Terrorism, networks and strategy: Why the conventional wisdom is wrong. Homeland Security Affairs, 4(2), 1–18.
76. Uzzi, B. (1996). The sources and consequences of embeddedness for the economic performance of organizations: The network effect. American Sociological Review, 61(4), 674–698. https://doi.org/10.2307/2096399
77. Uzzi, B. (2008). A social network's changing statistical properties and the quality of human innovation. Journal of Physics A: Mathematical and Theoretical, 41, 1–12. https://doi.org/10.1088/17518113/41/22/224023
78. Uzzi, B., & Spiro, J. (2005). Collaboration and creativity: The small world problem. American Journal of Sociology, 111(2), 447–504. https://doi.org/10.1086/432782
79. Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge, UK: Cambridge University Press. Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor, MI: The University of Michigan Press.
Review
For citations:
Everton S.F., Cunningham D. Dark network resilience in a hostile environment: optimizing centralization and density. Russian Journal of Economics and Law. 2023;17(3):667-688. (In Russ.) https://doi.org/10.21202/2782-2923.2023.3.667-688. EDN: MOZVSV