Preview

Russian Journal of Economics and Law

Advanced search

Dark network resilience in a hostile environment: optimizing centralization and density

S. F. Everton, D. Cunningham

Translator E. N. Belyaeva

https://doi.org/10.21202/2782-2923.2023.3.667-688

EDN: MOZVSV

Abstract

Objective: to analyze the legal nature, structure, and features of violent extremism and to develop measures to prevent this illegal behavior.

Methods: dialectical approach to cognition of social phenomena, allowing to analyze them in historical development and functioning in the context of the totality of objective and subjective factors, which predetermined the following research methods: formal-logical and sociological.

Results: in recent years, the world has witnessed the emergence of violent extremists (VEs), and they have become an ongoing concern for countries around the globe. A great deal of effort has been expended examining their nature and structure in order to aid in the development of interventions to prevent further violence. Analysts and scholars have been 

particularly interested in identifying structural features that enhance (or diminish) VE resilience to exogenous and endogenous shocks. As many have noted, VEs typically seek to balance operational security and capacity/efficiency. Some argue that their desire for secrecy outweighs their desire for efficiency, which leads them to be less centralized with few internal connections. Others argue that centralization is necessary because security is more easily compromised and that internal density promotes solidarity and limits countervailing influences. Unsurprisingly, scholars have found evidence for both positions. In this paper, we analyze the Noordin Top terrorist network over time to examine the security-efficiency tradeoff from a new perspective. We find that the process by which they adopt various network structures is far more complex than much of the current literature suggests.

Scientific novelty: the research showed that a dark network’s adoption of a network structure is far more complex than what current literature suggests, namely that a network structure at either side of the cohesion and centralization continuums offers potential advantages and disadvantages in terms of network resilience. In the case of Noordin Top, it appears that his network’s focus on establishing external ties after its operations provided it possible access to resources but likely became a factor contributing to its exposure and eventual disruption. The network, much like its Bali I predecessors who also focused on establishing external ties after their operation, faced significant losses and needed to reconstitute itself immediately following each operation. This tendency, along with the general adoption of a centralized structure, suggests that Noordin’s network adopted a suboptimal structure that ultimately contributed to his demise.

Practical significance: the main provisions and conclusions of the article can be used in scientific, pedagogical and law enforcement activities when considering the issues related to fighting extremism and terrorism.

 

The article was first published in English language by Criminology, Criminal Justice, Law & Society and The Western Society of

Criminology Hosting by Scholastica. For more information please contact: CCJLS@WesternCriminology.org The submitted material is published in full, as interpreted by the author.

For original publication: Everton, S. F., & Cunningham, D. (2015). Dark network resilience in a hostile environment: optimizing centralization and density. Criminology, Criminal Justice, Law & Society, 16(1), 1–20.

Publication URL: https://ccjls.scholasticahq.com/article/341-dark-network-resilience-in-a-hostile-environment-optimizingcentralization-and-density

About the Authors

S. F. Everton
Naval Postgraduate School
United States

Sean F. Everton is an Assistant Professor in the Department of Defense Analysis and the Co-Director of the CORE Lab 

Monterey, CA, 93943, USA 



D. Cunningham
Naval Postgraduate School
United States

Daniel Cunningham is an Associate Faculty for Instruction in the Defense Analysis Department 

Monterey, CA, 93943, USA 



References

1. Arquilla, J. (2009). Aspects of Netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School.

2. Baker, W. E. & Faulkner, R. R. (1993). The social-organization of conspiracy: Illegal networks in the heavy electrical-equipment industry. American Sociological Review, 58(6), 837–860. https://doi.org/10.2307/2095954

3. Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31(1), 33–62. https://doi.org/10.1002/pam.20619

4. Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: The MIT Press.

5. Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET for Windows: Software for social network analysis. Harvard, MA: Analytical Technologies.

6. Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing terrorist networks. Paper presented at the 8th International Command and Control Research and Technology Symposium, National Defense War College, Washington DC.

7. Chwe, M. S. (2001).Rational ritual: Culture, coordination, and common knowledge. Princeton, NJ: Princeton University Press.

8. Coleman, J. S. (1964). Introduction to Mathematical Sociology. New York, NY: Free Press.

9. Coleman, J. S. (1988). Free riders and zealots: The role of social networks. Sociological Theory, 6(1), 52–57. https://doi.org/10.2307/201913

10. Combatting Terrorism Center. (2006). Harmony and disharmony: Exploiting al-Qaida's organizational vulnerabilities (pp. 55). West Point, NY: Combating Terrorism Center at West Point.

11. Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press.

12. Crossley, N., Edwards, G., Harries, E., & Stevenson, R. (2012). Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906–1914). Social Networks, 34, 634–644. https://doi.org/10.1016/j.socnet.2012.07.004

13. deNooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (Revised and expanded ed.). Cambridge, UK: Cambridge University Press.

14. Elite indonesian police unity under fire over torture, unlawful killings (2013, March 30). South China Morning Post: Asia. http://www.scmp.com/news/asia/article/1202787/elite-indonesian-police-unit-under-fire-over-torture-unlawful-killings

15. Enders, W., & Jindapon, P. (2010). Network externalities and the structure of terror networks. Journal of Conflict Resolution, 54(2), 262–280. https://doi.org/10.1177/0022002709355439

16. Enders, W., & Sandler, T. (2006). The political economy of terrorism. Cambridge, UK: Cambridge University Press.

17. Enders, W., & Su, X. (2007). Rational terrorists and optimal network structure. Journal of Conflict Resolution, 57(1), 33–57. https://doi.org/10.1177/0022002706296155

18. Erickson, B. (1981). Secret societies and social structure. Social Forces, 60(1), 188–210. https://doi.org/10.1093/sf/60.1.188

19. Everton, S. F. (2012a). Disrupting dark networks. Cambridge, UK: Cambridge University Press.

20. Everton, S. F. (2012b). Network topography, key players and terrorist networks. Connections, 37(1), 12–19.

21. Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 94–114. https://doi.org/10.1080/19434472.2012.725225

22. Everton, S. F., & Cunningham, D. (2013). Terrorist network adaptation to a changing environment. In C. Morselli (Ed.), Crime and Networks (pp. 287–308). London, UK: Routledge.

23. Everton, S. F., & Cunningham, D. (2015). Dark network resilience in a hostile environment: optimizing centralization and density. Criminology, Criminal Justice, Law & Society, 16(1), 1–20.

24. Finke, R., & Stark, R. (1992). The churching of America, 1776-1990: Winners and losers in our religious economy. New Brunswick, NJ: Rutgers University Press.

25. Finke, R., & Stark, R. (2005). The churching of America, 1776–2005: Winners and losers in our religious economy (2nd ed.). New Brunswick, NJ: Rutgers University Press.

26. Freeman, L. C. (1979). Centrality in social networks I: Conceptual clarification. Social Networks, 1, 215–239. https://doi.org/10.1016/0378-8733(78)90021-7

27. Granovetter, M. (1973). The strength of weak ties. American Journal of Sociology, 73(6), 13601380. https://doi.org/.2307/2776392

28. Granovetter, M. (2005). The impact of social structure on economic outcomes. Journal of Economic Perspectives, 79(1), 33–50. https://doi.org/10.1257/0895330053147958

29. Griswold, E. (2010). The tenth parallel: Dispatches from the fault line between Christianity and Islam. New York, NY: Farra, Staus, and Giroux.

30. Hafez, M. M. (2004). From marginalization to massacres: A political process explanation of violence in Algeria. In Q. Wiktorowicz (Ed.), Islamic activism: A social movement theory approach (pp. 37–60). Bloomington, IN: Indiana University Press.

31. Hoivik, T., & Gleditsch, N. P. (1975). Structural parameters of graphs: A theoretical investigation. In H. M. Blalock (Ed.), Quantitative sociology (pp. 203–222). New York: Academic Press. https://doi.org/10.1007/BF00192487

32. International Crisis Group. (2006).Terrorism in Indonesia: Noordin's networks (Asia Report No. 114). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/114 terrorism in indonesianoor din s networks

33. International Crisis Group. (2009). Indonesia: Noordin Top's support base (Asia Briefing No. 95). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/b95indonesianoordintops s upport base.pdf

34. International Crisis Group. (2010). Indonesia: Jihadi surprise in Aceh (Asia Report No. 189). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/189%20Indonesia%20-%20Jihadi%20Surprise%20in%20Aceh.pdf

35. International Crisis Group. (2011). Indonesian jihadism: Small groups, big plans (Asia Report No. 204). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/204%29Indonesian%20Jihadism%20%20Sall%20Groups%20Big%20Plans.pdf

36. International Crisis Group. (2012). Indonesia: The deadly cost of poor policing (Asia Report No. 218). http://www.crisisgroup.org/~/media/Files/asia/south-east-asia/indonesia/218%20Indonesia%20--%20The%20Deadly%20Cost%20of%20Poor%20

37. Policing, M., Petersen, E., Bull, J., Monsen, S., & Richmond, P. (1960). The failure of an incipient social movement. Pacific Sociological Review, 3, 35–40.

38. Jakarta Centre for Law Enforcement Cooperation. (2005–2010). Annual reports. http://www.jclec.com/index.php?option=comdocman&task=catview&gid=113&Itemid=42

39. Jones, S. (2009). Noordin’s dangerous liaisons. Tempo. http://www.crisisgroup.org/en/regions/asia/south-east-asia/indonesia/op-eds/jones-noordins-dangerous-liaisons.aspx

40. Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park, PA: Pennsylvania State University Press.

41. Kilcullen, D. (2010). Counterinsurgency. Oxford, UK: Oxford University Press.

42. Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–575. https://doi.org/10.1080/10576100600798418

43. Krackhardt, D. (1994). Graph theoretical dimensions of informal organizations. In K. M. Carley, & M. J. Prietula (Eds.), Computational organization theory (pp. 89–111).

44. Hillsdale, NJ: L. Erlbaum Associates. Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43–52.

45. Lindelauf, R., Borm, P., & Hamers, H. (2009). The influence of secrecy on the communication structure of covert networks. Social Networks, 31, 126–137. https://doi.org/10.2139/ssrn.1096057

46. Lofland, J., & Stark, R. (1965). Becoming a worldsaver: A theory of conversion to a deviant perspective. American Sociological Review, 30, 862–875. https://doi.org/10.2307/2090965

47. Maoz, Z. (2011). Networks of nations: The evolution, structure, and impact of international networks, 1816–2001. Cambridge, UK: Cambridge University Press.

48. McAdam, D. (1982). Political process and the development of Black insurgency, 1930–1970. Chicago, IL: University of Chicago Press.

49. McAdam, D. (1986). Recruitment to high risk activism: The case of Freedom Summer. American Journal of Sociology, 92, 64–90. https://doi.org/10.1086/228463

50. McAdam, D. (1999). Political process and the development of Black Insurgency, 1930–1970 (2nd ed.). Chicago, IL: University of Chicago Press.

51. McAdam, D., & Paulsen, R. (1993). Specifying the relationship between social ties and activism. American Journal of Sociology, 99, 640–667. https://doi.org/10.2307/2781286

52. McCloskey, D. (1995). The insignificance of statistical significance. Scientific American, April, 32–33.

53. McCormick, G. (2005). The Diamond Insurgent/COIN Model. Department of Defense Analysis, Naval Postgraduate School.

54. Monterey, CA. McCormick, G., & Owen, G. (2000). Security and coordination in a clandestine organization. Mathematical and Computer Modelling, 31, 175–192. https://doi.org/10.1016/S0895-7177(00)00050-9

55. Morselli, C. (2009). Inside criminal networks. New York, NY: Springer.

56. Morselli, C., Giguere, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29, 71–98. https://doi.org/10.1016/j.socnet.2006.05.001

57. Passy, F. (2003). Social networks matter. But how? In M. Diani & D. McAdam (Eds.), Social movements and networks: Relational approaches to collective action (pp. 21–48). Oxford, UK: Oxford University Press. https://doi.org/10.1093/0199251789.003.0002

58. Prell, C. (2011). Social network analysis: History, theory & methodology. Thousand Oaks, CA: SAGE Publications.

59. Priamarizki, A. (2013). Counter-terrorism in Indonesia: The end of special detachment 88? RSIS Commentaries, 062/2013. http://www.rsis.edu.sg/publications/Perspective/RSIS0622013.pdf

60. Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–439. https://doi.org/10.1093/jpart/mug029

61. Ramakrishna, K. (2009). Governmental responses to extremism in Southeast Asia: 'Hard' versus 'soft' approaches. In A. de Borchgrave, T. Sanderson & D. Gordon (Eds.), Conflict, community, and criminality in Southeast Asia and Australia: Assessments from the field (pp. 31–36). Washington, DC: Center for Strategic and International Studies.

62. Roberts, G. (2013). Indonesian anti-terror squad killings prompt revenge attacks. http://www.abc.net.au/am/content/2013/s3686010.htm

63. Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf

64. Sageman, M. (2003). Statement to the National Commission on Terrorist Attacks Upon the United States. http://www.9-11commission.gov/hearings/hearing3/witnesssageman.htm

65. Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.

66. Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press.

67. Scott, J. (2000). Social network analysis: A handbook (2nd ed.). Thousand Oaks, CA: Sage Publications.

68. Smith, C. S. (1991). The emergence of liberation theology: Radical religion and social movement theory. Chicago, IL: University of Chicago Press.

69. Snijders, T. A. B. (1981). The degree variance: An index of graph heterogeneity. Social Networks, 3, 163–174. https://doi.org/10.1016/0378-8733(81)90014-9

70. Snow, D. A., Zurcher, L. A., & Ekland-Olson, S. (1980). Social networks and social movements: A microstructural approach to differential recruitment. American Sociological Review, 45, 787–801. https://doi.org/10.2307/2094895

71. Solomon, D. (2007). Pillars of power: Australia's institutions. Sydney, Australia: The Federation Press.

72. Stark, R. (1996). The rise of Christianity: A sociologist reconsiders history. Princeton, NJ: Princeton University Press.

73. Stark, R., & Bainbridge, W. S. (1980). Networks of faith: Interpersonal bonds and recruitment to cults and sects. American Journal of Sociology, 85(6), 1376–1395.

74. Sunstein, C. R. (2009). Going to extremes: How like minds unite and divide. Oxford, UK: Oxford University Press.

75. Tucker, D. (2008). Terrorism, networks and strategy: Why the conventional wisdom is wrong. Homeland Security Affairs, 4(2), 1–18.

76. Uzzi, B. (1996). The sources and consequences of embeddedness for the economic performance of organizations: The network effect. American Sociological Review, 61(4), 674–698. https://doi.org/10.2307/2096399

77. Uzzi, B. (2008). A social network's changing statistical properties and the quality of human innovation. Journal of Physics A: Mathematical and Theoretical, 41, 1–12. https://doi.org/10.1088/17518113/41/22/224023

78. Uzzi, B., & Spiro, J. (2005). Collaboration and creativity: The small world problem. American Journal of Sociology, 111(2), 447–504. https://doi.org/10.1086/432782

79. Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge, UK: Cambridge University Press. Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor, MI: The University of Michigan Press.


Review

For citations:


Everton S.F., Cunningham D. Dark network resilience in a hostile environment: optimizing centralization and density. Russian Journal of Economics and Law. 2023;17(3):667-688. (In Russ.) https://doi.org/10.21202/2782-2923.2023.3.667-688. EDN: MOZVSV

Views: 355


ISSN 2782-2923 (Print)