Skip to main content

Modeling and Simulating Command and Control for Terrorist Organization

  • Chapter
  • First Online:
Book cover Modeling and Simulating Command and Control

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

Over time, people change with whom they interact and where they are. For instance, terrorists attempt different tasks, move to new locations, and interact with different groups. Understanding how changes in social and geospatial relations interact is critical to a number of areas, including counterterrorism, counternarcotics, and general social change. This case study introduces a simple theoretical multi-agent model for reasoning about the influence on the criticality of agents and locations as the distribution of agents in geospatial and the social interaction space coevolve. The model simulates social changes regarding with whom they interact, and spatial changes in where they relocate as functions of learning and evolutions. The analysis suggests that terrorists will disperse around the world rather than gather at a specific location. Similarly, terrorists who have been at the center of social networks will be same. This model helps us gain insights into the complexities and social organizations evolving in social and geospatial dimensions simultaneously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This case study is introduced by Moon and Carley (2007). This chapter expands the initial publication with additional background, dataset description, and virtual experiment results. Also, at the end of this chapter, we discuss how to interpret the result in the context of the command and control.

References

  • Akerlof, G.A.: Social distance and social decisions. Econometrica. 65(5), 1005–1027 (1997)

    Article  MathSciNet  Google Scholar 

  • Arquilla, J., D. Ronfeldt (eds.).: Networks and netwars: the future of terror, crime, and militancy. Santa Monica, Calif: RAND, MR-1382-OSD. www.rand.org/publica-tions/MR/MR1382/ (2001)

  • Bergkvist, M., Davidson, P., Persson, J.A., Ramstedt, L.: A hybrid micro-simulator for determining the effects of governmental control policies on transport chains. Joint Work-shop on Multi-Agent and Multi-Agent Based Simulation. Springer, New York (2004)

    Google Scholar 

  • Butts, C.T.: Spatial models of large-scale interpersonal networks. Doctoral Dissertation, Carnegie Mellon University (2002)

    Google Scholar 

  • Carley, K.M., Lee, J.S., Krackhardt, D.: Destabilizing networks. Connections 24(3), 31–44 (2001)

    Google Scholar 

  • Carley, K.M.: Dynamic network analysis. Committee on Human Factors, National Research Council. pp. 133–145 (2003)

    Google Scholar 

  • Carley, K.M.: Computational organization science: a new frontier.In: Proceedings of the National Academy of Science, vol. 99(3), pp. 7314–7316 (2002)

    Google Scholar 

  • Carley, K.M., Svoboda, D.M.: Modeling organizational adaptation as a simulated annealing process. Sociol. Methods Res. 25(1), 138–168 (1996)

    Article  Google Scholar 

  • Carley, K.M.: On generating hypotheses using computer simulations. Syst. Eng. 2(2), 69–77 (1999)

    Article  Google Scholar 

  • Carley, K.M., Diesner, J., Reminga, J., Tsvetovat, M.: Toward an interoperable dynamic network analysis toolkit, DSS special issue on cyber infrastructure for homeland security: advances in information sharing, data mining, and collaboration systems, forthcoming

    Google Scholar 

  • Carley, K.M.: Smart agents and organizations of the future, the handbook of new media. In: Lievrouw, L., Livingstone, S (eds.). Thousand Oaks, CA, Sage, Ch. 12, 206–220 (2002)

    Google Scholar 

  • Chen, H., Wang, F., Zeng, D.: Intelligence and security informatics for homeland security: information, communication, and transportation. IEEE Trans. Intell. Transp. Syst. 5(4), 329–341 (2004)

    Article  Google Scholar 

  • Diesner, J., Carley, K.M.: Revealing and comparing the organizational structure of covert networks with network text analysis. XXV Sunbelt Social Network Conference, Redondo Beach, 16–20 Feb (2005)

    Google Scholar 

  • Epstein, J., Steinbruner, J.D., Parker, M.T.: Modeling Civil Violence: An Agent-Based Computational Approach. Center of Social and Economic Dynamics, Brookings Institute, Washington, D.C (2001)

    Google Scholar 

  • Friedkin, N.E.: Horizons of observability and limits of informal control in organizations. Soc. Forces 62, 54–77 (1983)

    Google Scholar 

  • Gavrieli, D.A., Scott, W.R.: Intercultural knowledge flows in edge organizations: trust as an enabler. In: Proceeding of International Command and Control Research and Technology Symposium (2005)

    Google Scholar 

  • Hollingshead, A.B.: Perceptions of Expertise and Transactive Memory in Work Relationships. Group Processes Intergroup Relat. 3(3), 257–267 (2000)

    Article  Google Scholar 

  • Janeja, V.P., Atluri, V., Adam, N.R.: Detecting anomalous geospatial trajectories through spatial characterization and spatio-semantic associations.In: Proceedings of the 2004 Annual National Conference on Digital Government Research, pp. 1–10 (2004)

    Google Scholar 

  • Jonas, J., Harper, J.: Effective Counterterrorism and the Limited Role of Predictive Data Minig, Policy Analysis, No. 584. CATO Institute, Dec 2006

    Google Scholar 

  • Kandel, D.B.: Homophily, selection, and socialization in adolescent friendships, Am. J. Sociol. 84(2), 427–436, 1978

    Google Scholar 

  • Keller-McNulty, S., Bellman, K.L., Carley, K.M., Davis, P.K., Ivanetich, R., Laskey, K.B.: Defense Modeling, Simulation, and Analysis: Meeting the Challenge, The National Academies Press, pp. 64–73, (2006)

    Google Scholar 

  • Krackhardt, D., Carley, K.M.: A PCANS model of structure in organization. In: Proceedings of the 1998 International Symposium on Command and Control Research and Technology, pp. 113–119, 1998e Challenge, The National Academies Press, pp. 64–73 (2006)

    Google Scholar 

  • McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a Feather: Homophily in Social Networks, Annual Review of Sociology, vol. 27, pp. 415–444 (2001)

    Google Scholar 

  • Mieg, A.: The Social Psychology of Expertise: Case Studies in Research, Professional Domains, and Expert Roles. Erlbaum, Mahwah (2001)

    Google Scholar 

  • Mooney, R.J., Melville, O., Tang, L.R., Shavlik, J., Dutra, I., Page, D., Costa, V.S.: Relational data mining with inductive logic programming for link discovery, in data mining: next generation challenges and future directions. In: Kargupta, H., Joshi, A., Siva-kumar K., and Yesha, Y. (eds.) pp. 239–254, AAAI Press, Menlo Park (2004)

    Google Scholar 

  • Moon, I.C., Carley K.M.: Modeling and simulation of terrorist networks in social and geospatial dimensions. IEEE Intell. Sys. Special Issue on Social Computing 22, 40–49, Sep/Oct (2007)

    Google Scholar 

  • Reminga, J., Carley, K.M.: ORA: Organization Risk Analyzer, Tech Report, CMU-ISRI-04-106, CASOS. Carnegie Mellon University, Pittsburgh. http://www.casos.cs.cmu.edu/projects/ora/index.html(2004)

  • Sageman, M.: Understanding terror networks. University of Pennsylvania Press, Philadelphia, pp. 142–146 (2004)

    Google Scholar 

  • Schreiber, C., Carley, K.M.: Going beyond the data: empirical validation leading to grounded theory. Comput Math Organ Theory 10, 155–164 (2004)

    Article  Google Scholar 

  • Snijders, T.A.B., Steglich, C., Schweinberger, M.: Modeling the co-evolution of networks and behavior. In: Van Montfort, K., Oud, H., Satorra, A. (eds.) Longitudinal Models in the Behavioral and Related Sciences. Lawrence Erlbaum, Mahwah (in press)

    Google Scholar 

  • Sorenson, O., Stuart, T.E.: Syndication networks and the spatial distribution of venture capital investments. Am. J. Sociol. 106, 1546–1588 (2001)

    Article  Google Scholar 

  • Watts, D.J., Dodds, P.S., Newman, M.E.J.: Identity and search in social net-works. Science 17 296(5571), 1302–1305 May 2002

    Google Scholar 

  • Wegner, D.M.: Transactive memory: a contemporary analysis of the group mind. In: Mullen, B., Goethals, G.R. (eds.) Theories of Group Behavior, pp. 185–205. Springer, New York (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Il-Chul Moon .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Il-Chul Moon

About this chapter

Cite this chapter

Moon, IC., Carley, K.M., Kim, T.G. (2013). Modeling and Simulating Command and Control for Terrorist Organization. In: Modeling and Simulating Command and Control. SpringerBriefs in Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-5037-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5037-4_2

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5036-7

  • Online ISBN: 978-1-4471-5037-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics