Abstract
Theories on international terrorist networks are wrought with contradiction. On the one hand, networks that support or facilitate politically motivated violent extremism are thought to pose a threat because they are centralized and hierarchical. On the other hand, the same networks are thought to pose a threat because they are decentralized and operate autonomously. Social networks analysis (SNA) makes it possible to resolve this apparent contradiction by controlling across countries for characteristics and structure of networks linked to the same terrorist organization relative to different functions that such networks perform. One terrorist organization for which sufficient open-source data exist to mount a systematic comparison is Al-Shabaab (AS). Comparing traits such as brokers, centrality characteristics of nodes, international linkages, and use of funds, the chapter compares AS networks as they relate to recruitment, fundraising and attacks across the United States and Australia with corroborating evidence from Canada, the United Kingdom, the Netherlands and Denmark. Although networks differ markedly across these attributes, unrelated networks performing similar functions are consistent in their nature and structure. These findings suggest that networks are functionally differentiated insofar as they serve as strategic repertoires. This is a significant finding. Knowing how a network’s function is related strategically to its structure means being able to infer a network’s function if only its structure is known and, conversely, being able to infer a network’s structure if only its function is known. Not only does SNA thereby facilitate detection and dismantling of networks, it also suggests that recruitment, fundraising and attack networks require differentiated approaches by defence and security agencies insofar as SNA shows them to be distinct phenomena.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Accurate figures for the total US Somali population are hard to come by and range from 35,000 to 150,000.
- 2.
Like hub networks, defining all-channel networks as generally having one or two connections per node avoids conflation with “chain” networks.
- 3.
Furthermore, this point does not countenance the hierarchical assumptions raised in the introduction, perhaps most succinctly put in Matthew and Shambaugh’s dictum that “Networks are easy to create, but hard to control” (2005, pp. 621–622).
- 4.
This is, of course, relative. Plane tickets for the Minneapolis recruits reportedly to cost between $1,500 and $2,000 each; but the Minneapolis and St.Louis/San Diego fundraising group each channeled approximately $8,500 and $30,000 to AS operatives in Somalia.
- 5.
Given, as is the case, that the receiving node controls the information (i.e. the account numbers that correspond to his sub-ordinates) that allows the sending broker to successfully transfer funds to these nodes.
- 6.
While it may have been more expeditious for the individuals in the recruitment network to receive money from AS for airfare, no actors in this network seem to have stayed behind for lack of funds. For example, Abdiweli Isse planned to depart in December 2007, but was held back because his identification needed to travel internationally was not up-to-date. He departed successfully in October 2009.
- 7.
Door-to-door solicitation (under false pretense or not) for an organization recognized as a foreign terrorist entity is a criminal activity; but door-to-door solicitation separate from the terrorist element is not, unlike activities such as theft or trafficking narcotics.
- 8.
First, interviewees are subject to sampling bias and, consequently, information gleaned from interviews subject to omitted variables and less-robust results, since convicted terrorists are difficult to access and most refuse to be interviewed [73]. Second, we cannot just take the claims of interview subjects at face value without corroborating evidence. Third, ex post facto interviews are prone to the psychological phenomenon of hindsight bias: an interviewee’s memory is susceptible to distortion when asked to recollect and reconstruct content. They may also intend to deceive. Fourth, interviews may suffer from the Hawthorne effect: people change their answers by virtue of the fact that they know that they are being studied. Fifth, interview results are subject to coding bias. Sixth, information gained through interviews is subject to a priming effect that is inherent in the way questions are posed and the order in which they are posed.
- 9.
The networks mapped herein include individuals who have interacted and/or coordinated with each other for purposes related to AS. They exclude friends and family members who may have interacted with these individuals during their recruitment yet remained oblivious to their involvement with AS until after their departure and/or death. As a result, not all known connections between radicalized individuals and members of the Somali diaspora are mapped and analyzed; we required a strong indication that advancing of AS-related objectives was part of the relationship between two individuals.
- 10.
By definition, a network contains >2 nodes. For this reason, “lone wolves” as well as those who worked in pairs are excluded from this study. This is worth noting because as a consequence several prominent AS operatives will be excluded from this study. This includes about a dozen American cases, most notably Omar Hammami, who grew up in Atlanta with Syrian and American parents to become AS’ top English-language propagandist before he and AS became disillusioned with each other in early 2013. This also excludes Danish cartoonist Kurt Westergaard’s attacker, who acted alone in his attempt to murder Westergaard for his depiction of the prophet Mohammed, as well as two Danish-Somali brothers arrested in 2012 [76–78 ]
- 11.
The sole arrested in connection to this group, Mohammed Hersi, has been set to stand trial since December 2011, but a publication ban is in place, and no new information has come to light [81].
- 12.
All-channel networks tend to be horizontal with a high interconnectivity of nodes. If any nodes appear to be especially central and interconnected, they are few and only marginally more influential than the rest.
- 13.
‘Implicated’ means that the individual was either indicted by an American court on terrorist charges related to these activities, and/or the individual has personally admitted involvement or is widely acknowledged by AS, but was killed before she could be indicted. Burhan Hassan, who departed in November 2008, exemplifies the latter.
- 14.
This refers to the six men that departed in December 2007, as well as Mahamud Said Omar and Omer Abdi Mohamud.
- 15.
While accompanying one another to the Preston Mosque is worth noting, reports of this behaviour were not specific enough to confirm interactions between specific nodes in this regard.
- 16.
Most in this group are young men, with the notable outlier Abdulli Ali Afrah a.k.a. “Aspro”, who rose through AS’ ranks during its first few years to be killed in a mortar attack in early 2008 at age 56. Furthermore, two young Somali-Canadian women from Toronto have also mysteriously left for Somalia and are rumoured to be there aiding AS. One of these women is Asli Nur, the 19-year-old niece of Mohamed Abdullahi Mohamed, former Prime Minister of Somalia. None of these individuals have been connected to the Abu Huraira Islamic Center or to the other recruits in any other known way, and so these cases may be lone wolves unconnected to a potential network likely based around Abu Huraira [105, 106].
- 17.
Of this network, only Ali and the book-keeper (Hawo Mohamed Hassan) were indicted on charges by the United States government. Information about un-indicted co-conspirators was crucial to justifying these indictments and is important here (and in the third network, to be discussed shortly) in accurately portraying the nature of this network’s activities and the structure of the network necessary for these activities. Information on non-indicted individuals in the Minneapolis recruitment network is not included because no such individuals can be credibly implicated in any of the network’s illicit activities, despite numerous calls from the community alleging complicity of the religious leadership of the Abu-Bakar As-Saddique mosque in Minneapolis.
- 18.
This name as well as “Omar Mataan” are always in quotations in court documents, leading to the suspicion that they are known to be code names by American authorities. This further obscures the nature of relations between the nodes situated in Somalia, which are unknown except for the link between Diriye and “Sheeik Saaid”.
- 19.
While a contact of BM’s identified as “Kay” did successfully refer BM to Mahad Karate, an AS member in Somalia, no money was ever remitted to him from the Western nodes.
- 20.
This should not indicate that members of the recruitment networks were not exposed to propaganda available on the Internet that has been produced by AS operatives in Somalia such as Omar Hammami. However, this is obviously distinct from communicating with the central network to co-ordinate the activities of the peripheral network.
References
Zelin AY (2013) European foreign fighters in Syria. International Centre for the Study of Radicalization, http://icsr.info/2013/04/icsr-insight-european-foreign-fighters-in-syria-2/. Accessed 23 June 2013
Shinn D (2011), Al-Shabaab’s foreign threat to Somalia. Orbis 203–215
Robertson N and Cruikshank P (2012), Somali AQ’s western reach, CNN, 24 Feb 2012. http://homeland.house.gov/news/cnn-somali-AQs-western-reach. Accessed 21 Sept 2012
IPT News (2011) Prosecutor warns not to ignore al Shabaab, investigative project on terrorism (Dec 6). http://www.investigativeproject.org/3323/prosecutor-warns-not-to-ignore-al-shabaab-threat. Accessed 21 Sept 2012
Labott E, State dept: as core weakens, al Qaeda affiliates are top terror threat CNN Security Clearance, http://security.blogs.cnn.com/2012/07/31/state-dept-as-core-weakens-AQ-affiliates-are-top-terror-threat/. Accessed 21 Sept 2012
Dunbar E (2010) Survey: nearly 1 in 3 US Somalis live in Minnesota. Minnesota Public Radio News, USA
BBC (2012) Former U.S. soldier Craig Baxam ‘helped al-Shabab’ (Jan 9)
Stickney R, Kreuger P (2010) Accused terrorist was “kind, peaceful man”: friends. NBC, San Diego, 6 Aug 2010
District of Minnesota, state of Minnesota (2009) Affidavit of Michael N. Cannizarro Jr., United States of America vs. Abdiweli Yassin Isse and Cabdulaahi Ahmed Faarax (Oct 8)
New York Times (2011) Joining the fight in Somalia (Oct 30)
United States District Court, District of Minnesota (2009) Affidavit in Support of Request for Extradition, United States of America v. Mahamud Said Omar (20 Nov 2009)
United Sates District Court, District of Minnesota (2009) Third superseding indictment, United Sates of America v. Ahmed Ali Omar et al (23 Nov 2009)
Zwartz B, Cooke D (2009) A battered faith. The Age (6 Aug 2009)
Powell WW (1990) Neither market nor hierarchy: network forms of organization. Res Organ Behav 12(1):295–336
Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theor 17:93–124
Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia
Eilstrup-Sangiovanni M, Jones C (2008) Assessing the dangers of illicit networks: why al-Qaida May be less dangerous than many think. Int Secur 33:7–44
Giraldo JK, Trinkunas HA (2007) Introduction. In: Giraldo JK, Trinkunas HA (eds) Terrorism financing and state responses: a comparative perspective. Stanford University Press, Stanford, pp 7–20
Gunning J (2009) Social movement theory and the study of terrorism. In: Jackson R, Smyth MB, Gunning J (eds) Critical terrorism studies: a new research agenda. Routledge, London
Jereon Gunning J (2008) Terrorism, charities, and diasporas. In: Biersteker TJ, Eckert SE (eds) Countering the financing of terrorism. Routledge, London, pp 93–125
Matthew R, Shambaugh G (2005) The limits of terrorism: a network perspective. Int Stud Rev 7:617–627
Sheffer G (2005) Diasporas, terrorism and WMD. In: Blum A, Asal V, Wilkenfeld J (eds) Nonstate actors, terrorism and weapons of mass destruction. Int Stud Rev 7:133–70
Abuza Z (2003) Terrorist funding in Southeast Asia: the financial network of Al Qaeda and Jemaah Islamiya. Contemp SE Asia 25:169–199
Magouirk J, Atran S, Sageman M (2008) Connecting terrorist networks. Stud Confl Terrorism 31:1–16
Krebs VE (2002) Mapping networks of terrorist cells. Connections 24:43–52
Corman SR (2006) Using activity focus networks to pressure terrorist organizations. Comput Math Organ Theor 12:35–49
BBC (2003) Suspect ‘reveals terrorist planning’ (Sept 22)
Ilachinski A (2012) Modelling insurgent and terrorist networks as self-organised complex adaptive systems. Int J Parallel Emergent Distrib Syst 27:45–77
Siqueira K, Sandler T (2010) Terrorist networks, support, and delegation. Public Choice 142:237–253
Leistedt SJ (2013) Behavioural aspects of terrorism. Forensic Sci Int 228:21–27
Stohl M (2008) Networks, terrorists, and criminals: the implications for community policing. Crime, Law Soc Change 50
Vertigans S (2011) The sociology of terrorism: people, places and processes. Taylor and Francis, New York
Asal V, Rethemeyer RK (2006) Researching terrorist networks. J Secur Educ 4
Keller JP, Desousa KC, Lin Y (2010) Dismantling terrorist networks: evaluating strategic options using agent-based modelling. Technol Forecast Soc Chang 77:1014–1036
Shapiro JN (2008) Terrorist organizations’ inefficiencies and vulnerabilities. In: Giraldo JK, Trinkunas HA (eds) Terrorism financing and state responses: a comparative perspective. Stanford University Press, Stanford
Yang CC, Sageman M (2009) Analysis of terrorist social networks with fractal views. J Inf Sci 35:299–320
Acharya A (2009) Targeting Terrorist Financing. Routledge, New York
Shapiro JN, Siegel DA (2007) Underfunding in terrorist organizations. Int Stud Quart 51:405–429
Burt RS (2004) Structural holes and good ideas. Am J Sociol 100:349–399
Burt RS (1992) Structural holes: the social structure of competition. Harvard University Press, Boston
Burt RS (2000) The network structure of social capital. In: Sutton RI, Straw BM (eds) Research in organizational behavior. JAI Press, Greenwood, pp 345–423
Horne C, Horgan J (2012) Methodological triangulation in the analysis of terrorist networks. Stud Conflict Terrorism 35:182–192
Morselli C (2008) Assessing vulnerable and strategic positions in a criminal network. J Contemp Crim Justice 26:382–392
Morselli C, Roy J (2008) Brokerage qualifications in ringing operations. Criminology 46:71–98
Associated Press (2009) Third man pleads guilty in Somali terror case. 12 Aug 2009
Asal V, Nassbaum B, Harrington DW (2007) Terrorism as transnational advocacy: An organizational and tactical examination. Stud Confl Terrorism 30:65–74
Chen H, Qin J, Reid E, Zhou Y, Sageman M, Weinmann G (2008) Uncovering the dark web: case study of Jihad on the web. J Am Soc Inform Sci Technol 59:1347–1359
Joseph J (2011) Terrorists move to Skype, frustrate eavesdroppers. The Economic Times, India
Ogun MN (2012) Terrorist use of internet: possible suggestions to prevent the usage for terrorist purposes. J Appl Secur Res 7:203–217
Sageman M (2008) The next generation of terror. Foreign Policy 165:36–42
Schmidle RE (2010) Positioning theory and terrorist networks. J Theor Soc Behav 40:65–78
United States District Court, District of Minnesota (2010) Indictment, United States of America vs. Amina Farah Ali and Hawo Mohamed Hassan
Dougherty JM (2006) Hawala: how terrorists move funds globally. Corp Fin Rev 10:333–335
de Goede M (2003) Hawala discourses and the war on terrorist finance. Environ Plann D: Soc Space 21:513–532
Looney R (2003) Hawala: the terrorist’s informal financial mechanism. Middle East Policy 10(1): 164–167
Tupman WA (2009) Ten myths about terrorist financing, J Money Laundering Control, 12(2):189–205
Bakker RM, Raab J, Milward HB (2012) A preliminary theory of dark network resilience. J Policy Anal Manage 31:33–62
U.S. Attorney’s Office, District of Minnesota (2009) Terror charges unsealed in Minnesota against eight defendants. Justice Department Announces (23 Nov 2009)
Kron J (2011) American identified as bomber in attack on African Union in Somalia. New York Times, USA
Yuen L (2011) Family IDs Minn. man allegedly behind Somali suicide bombing. Minnesota Public Radio News, USA
Razavy M (2005) Hawala: an underground haven for terrorists or social phenomenon? Crime, Law, Soc Change 44:277–299
Eck JE (2006) When is a bologna sandwich better than sex? A defense of small-n case study evaluations. J Exp Criminol 2:345–362
van Duijn MAJ, Vermunt JK (2006) What is special about social network analysis? Methodology 2:2–6
Bowyer-Bell J (2000) The IRA 1968–2000: An analysis of a secret army. Frank Cass, London
Bruce S (1992) The Red Hand: Protestant Paramilitaries in Northern Ireland. Oxford University Press, Oxford
Coogan TP (1995) The IRA. Harper-Collins, London
Della Porta D (1995) Social movements, political violence and the state. Cambridge University Press, Camridge
Fair CF (2008) Who are Pakistan’s militants and their families? Terrorism Polit Violence 20:49–65
Hegghammer T (2006) Terrorist recruitment and radicalization in Saudi Arabia. Middle East Policy 13:39–60
Jamieson A (1989) The heart attacked: terrorism and conflict in the Italian state. Marian Boyers, London
Taylor M (1988) The terrorist. Brassey’s, London
White RW (1993) Provisional Irish republicans: an oral and interpretive history. Greenwood Press, Westport
LaFree G (2008) Generating Terrorism event databases: results from the global terrorism database, 1970 to 2008. In: Lum C, Kennedy LW (eds) Evidence-based counterterrorism policy. Springer, New York, pp 41–64
Chermak SM, Freilich JD, Parkin WS, Lynch JP (2011) American terrorism and extremist crime data sources and selectivity bias: an investigation focusing on homicide events committed by far-right extremists. J Quant Criminol 28:91–218
Leuprecht C, Hall K (2013) Networks as strategic repertoires: functional differentiation among Al-Shabaab terror cells. Global Crime 14:287–310
Adams S (2012) ‘Just been shot in neck by assassin’: American jihadist live-tweets attack in Somalia and shows picture of his bloody neck. The Daily Mail, UK
BBC (2012) Danish–Somali terror suspect accused of training five weeks in Al-Shabaab camp (June 4)
Danish cartoonist hid in ‘panic room’ during attack (2010, Jan 2) CNN
Hiiraan Online (2006) Ontario municipal election: Somali Canadian prospective (Dec 10)
Freisen J, Freeze C (2009) Are Somali–Canadians fighting for the shadowy al-Shabab?. The Globe and Mail, Ontario
O’Toole M (2009) Terror suspect Mohamed Hersi to head directly to trial. The National Post, Ontario
Greenwood C, Bates D (2012) Seven held over smuggling of a banned stimulant from England to U.S. to fund terror. The Daily Mail, UK
Hartley A (2012) This is khat: The natural high available on British streets and suspected of funding terrorism. The Daily Mail, UK
Abdulle A (2010) Dutch police arrest Al shabaab commander’s father over foiled blasts. The Suna Times, Somalie
Associated Press (2010) Dutch arrest 12 Somalis on terror suspicions. CBS, New York
Meryhew R, Walsh J (2009) Young men: searching for something better. Minneapolis Star Tribune, USA
Yuen L (2012) Terrorist pipeline continues to flow from Minn. to Somalia. Minnesota Public Radio 26 Oct.
Shirwa’s Journey (2009) Minneapolis star tribune
United Sates District Court, District of Minnesota (2009) Indictment, United States of America vs. Mahamud Said Omar (20 Aug 2009)
Yuen L (2009) Man killed in Somalia may have recruited others to the cause. Minneapolis Public Radio, USA
Elliot A (2009) A call to Jihad, answered in America. New York Times, USA
Elliot A (2009) Charges detail road to terror for 20 in U.S. New York Times, USA
Meryhew R (2009) Minneapolis Somali man killed in homeland. Minneapolis Star Tribune, USA
District of Minnesota, state of Minnesota (2011) Affidavit of Michael N. Cannizarro Jr.’, United Sates of America vs. Abdow Munye Abdow (Oct 9)
United States District Court, District of Minnesota (2010) Government’s sentencing positioning paper, United Sates of America vs. Abdow Munye Abdow (13 July 2010)
Jones BT, Cooney JF (2011) Man extradited from Netherlands appears in federal court on charges of supporting terrorists. United Sates Department of Justice, USA
United Sates District Court, District of Minnesota (2009) Information, United Sates of America vs. Adarus Abdulle Ali (27 Oct, 2009)
United Sates District Court, District of Minnesota (2012) Plea agreement and sentencing stipulations, United States of America v. Ahmed Hussein Mahamud
United States District Court, Southern District of California (2011) Plea agreement, United States of America v. Nima Yusuf
United Sates District Court, District of Minnesota (2001) Government’s total brief, United Sates of America vs. Omer Abdi Mohamed (14 July 2001)
Fife-Yeomans J, Vollmer T (2009) Rant in court by one of four man who appear in court accused of terrorism offences. The Daily Telegraph, Australia
The Supreme Court of Victoria, Melbourne Criminal Division (2011) VSC 681, R. vs. Wissam Mahmoud Fattal, Saney Edow Aweys and Naser El Sayed, 16 Dec 2011
An uncle’s regret (2009, Aug 6) A flight from Somalia gone wrong. Sydney Morning Herald, Australia
Warne-Smith D, Wilson L (2009) Somali terror suspects ‘new to mosque’. The Australian, 6 Aug 2009
Aulakh R (2009) Did five Torontonians join jihad in Somalia?. The Toronto Star, Canada
Shephard M (2008) Canadian insurgent ‘Asparo’ killed in Somalia. The Toronto Star, Ontario
Bell S (2009) Imam tries to calm fears about missing Somali-Canadians. The National Post, Ontario
Freeze C, MacArthur G (2011) Man jailed in new kind of terrorist case for Canada. The Globe and Mail, Ontario
Bell S (2013) Canadian linked to terrorist group was killed in suicide attack in Somalia: community source. The National Post, Ontario
Bell S (2010) Martyr video claims Toronto man ‘succeeded’. The National Post, Ontario
United Sates District Court, Eastern District of Missouri, Eastern Division (2010) Indictment, United Sates of America v. Mohamud Abdi Yusuf, Duane Mohamed Diriye and Abdi Mahdi Hussein (21 Oct 2010)
United States District Court, Southern District of California (2013) United States’ trial memorandum, United States of America v. Basaaly Saeed Moalin, Mohamed Mohamed Mohamud, Issa Doreh and Ahmed Nasir Taalil Mohamud (28 Jan 2013)
Piazza JA (2009) Is islamist terrorism more dangerous?: an empirical study of group ideology, organization, and goal structure. Terrorism Polit Violence 21
Al Jazeera (2013) French agent ‘executed’ by al-Shabab (Jan 17)
Maclean W, Khamis N, Ahmed M (2012) Special report: in Africa, a militant group’s growing appeal. Reuters, 30 May 2012
The Amsterdam Herald (2013) First Dutch militia fighter killed in Syrian conflict. http://www.amsterdamherald.com/index.php/rss/748-20130320-first-dutch-militia-fighter-killed-syrian-conflict-delftmilitia-delft-aivd-intelligence-netherlands-dutch-security. Accessed 20 March 2013
Radio Netherlands Worldwide (2012) Al-Shabaab plotting attacks in Netherlands. http://www.rnw.nl/english/bulletin/al-shabab-plotting-attack-netherlands. Accessed 28 May 2012
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Leuprecht, C., Hall, K. (2014). Why Terror Networks are Dissimilar: How Structure Relates to Function. In: Masys, A. (eds) Networks and Network Analysis for Defence and Security. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-04147-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-04147-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04146-9
Online ISBN: 978-3-319-04147-6
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)