Skip to main content

Why Terror Networks are Dissimilar: How Structure Relates to Function

  • Chapter
  • First Online:
Book cover Networks and Network Analysis for Defence and Security

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Theories on international terrorist networks are wrought with contradiction. On the one hand, networks that support or facilitate politically motivated violent extremism are thought to pose a threat because they are centralized and hierarchical. On the other hand, the same networks are thought to pose a threat because they are decentralized and operate autonomously. Social networks analysis (SNA) makes it possible to resolve this apparent contradiction by controlling across countries for characteristics and structure of networks linked to the same terrorist organization relative to different functions that such networks perform. One terrorist organization for which sufficient open-source data exist to mount a systematic comparison is Al-Shabaab (AS). Comparing traits such as brokers, centrality characteristics of nodes, international linkages, and use of funds, the chapter compares AS networks as they relate to recruitment, fundraising and attacks across the United States and Australia with corroborating evidence from Canada, the United Kingdom, the Netherlands and Denmark. Although networks differ markedly across these attributes, unrelated networks performing similar functions are consistent in their nature and structure. These findings suggest that networks are functionally differentiated insofar as they serve as strategic repertoires. This is a significant finding. Knowing how a network’s function is related strategically to its structure means being able to infer a network’s function if only its structure is known and, conversely, being able to infer a network’s structure if only its function is known. Not only does SNA thereby facilitate detection and dismantling of networks, it also suggests that recruitment, fundraising and attack networks require differentiated approaches by defence and security agencies insofar as SNA shows them to be distinct phenomena.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Accurate figures for the total US Somali population are hard to come by and range from 35,000 to 150,000.

  2. 2.

    Like hub networks, defining all-channel networks as generally having one or two connections per node avoids conflation with “chain” networks.

  3. 3.

    Furthermore, this point does not countenance the hierarchical assumptions raised in the introduction, perhaps most succinctly put in Matthew and Shambaugh’s dictum that “Networks are easy to create, but hard to control” (2005, pp. 621–622).

  4. 4.

    This is, of course, relative. Plane tickets for the Minneapolis recruits reportedly to cost between $1,500 and $2,000 each; but the Minneapolis and St.Louis/San Diego fundraising group each channeled approximately $8,500 and $30,000 to AS operatives in Somalia.

  5. 5.

    Given, as is the case, that the receiving node controls the information (i.e. the account numbers that correspond to his sub-ordinates) that allows the sending broker to successfully transfer funds to these nodes.

  6. 6.

    While it may have been more expeditious for the individuals in the recruitment network to receive money from AS for airfare, no actors in this network seem to have stayed behind for lack of funds. For example, Abdiweli Isse planned to depart in December 2007, but was held back because his identification needed to travel internationally was not up-to-date. He departed successfully in October 2009.

  7. 7.

    Door-to-door solicitation (under false pretense or not) for an organization recognized as a foreign terrorist entity is a criminal activity; but door-to-door solicitation separate from the terrorist element is not, unlike activities such as theft or trafficking narcotics.

  8. 8.

    First, interviewees are subject to sampling bias and, consequently, information gleaned from interviews subject to omitted variables and less-robust results, since convicted terrorists are difficult to access and most refuse to be interviewed [73]. Second, we cannot just take the claims of interview subjects at face value without corroborating evidence. Third, ex post facto interviews are prone to the psychological phenomenon of hindsight bias: an interviewee’s memory is susceptible to distortion when asked to recollect and reconstruct content. They may also intend to deceive. Fourth, interviews may suffer from the Hawthorne effect: people change their answers by virtue of the fact that they know that they are being studied. Fifth, interview results are subject to coding bias. Sixth, information gained through interviews is subject to a priming effect that is inherent in the way questions are posed and the order in which they are posed.

  9. 9.

    The networks mapped herein include individuals who have interacted and/or coordinated with each other for purposes related to AS. They exclude friends and family members who may have interacted with these individuals during their recruitment yet remained oblivious to their involvement with AS until after their departure and/or death. As a result, not all known connections between radicalized individuals and members of the Somali diaspora are mapped and analyzed; we required a strong indication that advancing of AS-related objectives was part of the relationship between two individuals.

  10. 10.

    By definition, a network contains >2 nodes. For this reason, “lone wolves” as well as those who worked in pairs are excluded from this study. This is worth noting because as a consequence several prominent AS operatives will be excluded from this study. This includes about a dozen American cases, most notably Omar Hammami, who grew up in Atlanta with Syrian and American parents to become AS’ top English-language propagandist before he and AS became disillusioned with each other in early 2013. This also excludes Danish cartoonist Kurt Westergaard’s attacker, who acted alone in his attempt to murder Westergaard for his depiction of the prophet Mohammed, as well as two Danish-Somali brothers arrested in 2012 [7678 ]

  11. 11.

    The sole arrested in connection to this group, Mohammed Hersi, has been set to stand trial since December 2011, but a publication ban is in place, and no new information has come to light [81].

  12. 12.

    All-channel networks tend to be horizontal with a high interconnectivity of nodes. If any nodes appear to be especially central and interconnected, they are few and only marginally more influential than the rest.

  13. 13.

    ‘Implicated’ means that the individual was either indicted by an American court on terrorist charges related to these activities, and/or the individual has personally admitted involvement or is widely acknowledged by AS, but was killed before she could be indicted. Burhan Hassan, who departed in November 2008, exemplifies the latter.

  14. 14.

    This refers to the six men that departed in December 2007, as well as Mahamud Said Omar and Omer Abdi Mohamud.

  15. 15.

    While accompanying one another to the Preston Mosque is worth noting, reports of this behaviour were not specific enough to confirm interactions between specific nodes in this regard.

  16. 16.

    Most in this group are young men, with the notable outlier Abdulli Ali Afrah a.k.a. “Aspro”, who rose through AS’ ranks during its first few years to be killed in a mortar attack in early 2008 at age 56. Furthermore, two young Somali-Canadian women from Toronto have also mysteriously left for Somalia and are rumoured to be there aiding AS. One of these women is Asli Nur, the 19-year-old niece of Mohamed Abdullahi Mohamed, former Prime Minister of Somalia. None of these individuals have been connected to the Abu Huraira Islamic Center or to the other recruits in any other known way, and so these cases may be lone wolves unconnected to a potential network likely based around Abu Huraira [105, 106].

  17. 17.

    Of this network, only Ali and the book-keeper (Hawo Mohamed Hassan) were indicted on charges by the United States government. Information about un-indicted co-conspirators was crucial to justifying these indictments and is important here (and in the third network, to be discussed shortly) in accurately portraying the nature of this network’s activities and the structure of the network necessary for these activities. Information on non-indicted individuals in the Minneapolis recruitment network is not included because no such individuals can be credibly implicated in any of the network’s illicit activities, despite numerous calls from the community alleging complicity of the religious leadership of the Abu-Bakar As-Saddique mosque in Minneapolis.

  18. 18.

    This name as well as “Omar Mataan” are always in quotations in court documents, leading to the suspicion that they are known to be code names by American authorities. This further obscures the nature of relations between the nodes situated in Somalia, which are unknown except for the link between Diriye and “Sheeik Saaid”.

  19. 19.

    While a contact of BM’s identified as “Kay” did successfully refer BM to Mahad Karate, an AS member in Somalia, no money was ever remitted to him from the Western nodes.

  20. 20.

    This should not indicate that members of the recruitment networks were not exposed to propaganda available on the Internet that has been produced by AS operatives in Somalia such as Omar Hammami. However, this is obviously distinct from communicating with the central network to co-ordinate the activities of the peripheral network.

References

  1. Zelin AY (2013) European foreign fighters in Syria. International Centre for the Study of Radicalization, http://icsr.info/2013/04/icsr-insight-european-foreign-fighters-in-syria-2/. Accessed 23 June 2013

  2. Shinn D (2011), Al-Shabaab’s foreign threat to Somalia. Orbis 203–215

    Google Scholar 

  3. Robertson N and Cruikshank P (2012), Somali AQ’s western reach, CNN, 24 Feb 2012. http://homeland.house.gov/news/cnn-somali-AQs-western-reach. Accessed 21 Sept 2012

  4. IPT News (2011) Prosecutor warns not to ignore al Shabaab, investigative project on terrorism (Dec 6). http://www.investigativeproject.org/3323/prosecutor-warns-not-to-ignore-al-shabaab-threat. Accessed 21 Sept 2012

  5. Labott E, State dept: as core weakens, al Qaeda affiliates are top terror threat CNN Security Clearance, http://security.blogs.cnn.com/2012/07/31/state-dept-as-core-weakens-AQ-affiliates-are-top-terror-threat/. Accessed 21 Sept 2012

  6. Dunbar E (2010) Survey: nearly 1 in 3 US Somalis live in Minnesota. Minnesota Public Radio News, USA

    Google Scholar 

  7. BBC (2012) Former U.S. soldier Craig Baxam ‘helped al-Shabab’ (Jan 9)

    Google Scholar 

  8. Stickney R, Kreuger P (2010) Accused terrorist was “kind, peaceful man”: friends. NBC, San Diego, 6 Aug 2010

    Google Scholar 

  9. District of Minnesota, state of Minnesota (2009) Affidavit of Michael N. Cannizarro Jr., United States of America vs. Abdiweli Yassin Isse and Cabdulaahi Ahmed Faarax (Oct 8)

    Google Scholar 

  10. New York Times (2011) Joining the fight in Somalia (Oct 30)

    Google Scholar 

  11. United States District Court, District of Minnesota (2009) Affidavit in Support of Request for Extradition, United States of America v. Mahamud Said Omar (20 Nov 2009)

    Google Scholar 

  12. United Sates District Court, District of Minnesota (2009) Third superseding indictment, United Sates of America v. Ahmed Ali Omar et al (23 Nov 2009)

    Google Scholar 

  13. Zwartz B, Cooke D (2009) A battered faith. The Age (6 Aug 2009)

    Google Scholar 

  14. Powell WW (1990) Neither market nor hierarchy: network forms of organization. Res Organ Behav 12(1):295–336

    Google Scholar 

  15. Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theor 17:93–124

    Article  Google Scholar 

  16. Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia

    Google Scholar 

  17. Eilstrup-Sangiovanni M, Jones C (2008) Assessing the dangers of illicit networks: why al-Qaida May be less dangerous than many think. Int Secur 33:7–44

    Article  Google Scholar 

  18. Giraldo JK, Trinkunas HA (2007) Introduction. In: Giraldo JK, Trinkunas HA (eds) Terrorism financing and state responses: a comparative perspective. Stanford University Press, Stanford, pp 7–20

    Google Scholar 

  19. Gunning J (2009) Social movement theory and the study of terrorism. In: Jackson R, Smyth MB, Gunning J (eds) Critical terrorism studies: a new research agenda. Routledge, London

    Google Scholar 

  20. Jereon Gunning J (2008) Terrorism, charities, and diasporas. In: Biersteker TJ, Eckert SE (eds) Countering the financing of terrorism. Routledge, London, pp 93–125

    Google Scholar 

  21. Matthew R, Shambaugh G (2005) The limits of terrorism: a network perspective. Int Stud Rev 7:617–627

    Article  Google Scholar 

  22. Sheffer G (2005) Diasporas, terrorism and WMD. In: Blum A, Asal V, Wilkenfeld J (eds) Nonstate actors, terrorism and weapons of mass destruction. Int Stud Rev 7:133–70

    Google Scholar 

  23. Abuza Z (2003) Terrorist funding in Southeast Asia: the financial network of Al Qaeda and Jemaah Islamiya. Contemp SE Asia 25:169–199

    Article  Google Scholar 

  24. Magouirk J, Atran S, Sageman M (2008) Connecting terrorist networks. Stud Confl Terrorism 31:1–16

    Article  Google Scholar 

  25. Krebs VE (2002) Mapping networks of terrorist cells. Connections 24:43–52

    Google Scholar 

  26. Corman SR (2006) Using activity focus networks to pressure terrorist organizations. Comput Math Organ Theor 12:35–49

    Article  Google Scholar 

  27. BBC (2003) Suspect ‘reveals terrorist planning’ (Sept 22)

    Google Scholar 

  28. Ilachinski A (2012) Modelling insurgent and terrorist networks as self-organised complex adaptive systems. Int J Parallel Emergent Distrib Syst 27:45–77

    Article  Google Scholar 

  29. Siqueira K, Sandler T (2010) Terrorist networks, support, and delegation. Public Choice 142:237–253

    Google Scholar 

  30. Leistedt SJ (2013) Behavioural aspects of terrorism. Forensic Sci Int 228:21–27

    Article  Google Scholar 

  31. Stohl M (2008) Networks, terrorists, and criminals: the implications for community policing. Crime, Law Soc Change 50

    Google Scholar 

  32. Vertigans S (2011) The sociology of terrorism: people, places and processes. Taylor and Francis, New York

    Google Scholar 

  33. Asal V, Rethemeyer RK (2006) Researching terrorist networks. J Secur Educ 4

    Google Scholar 

  34. Keller JP, Desousa KC, Lin Y (2010) Dismantling terrorist networks: evaluating strategic options using agent-based modelling. Technol Forecast Soc Chang 77:1014–1036

    Article  Google Scholar 

  35. Shapiro JN (2008) Terrorist organizations’ inefficiencies and vulnerabilities. In: Giraldo JK, Trinkunas HA (eds) Terrorism financing and state responses: a comparative perspective. Stanford University Press, Stanford

    Google Scholar 

  36. Yang CC, Sageman M (2009) Analysis of terrorist social networks with fractal views. J Inf Sci 35:299–320

    Article  Google Scholar 

  37. Acharya A (2009) Targeting Terrorist Financing. Routledge, New York

    Google Scholar 

  38. Shapiro JN, Siegel DA (2007) Underfunding in terrorist organizations. Int Stud Quart 51:405–429

    Article  Google Scholar 

  39. Burt RS (2004) Structural holes and good ideas. Am J Sociol 100:349–399

    Article  Google Scholar 

  40. Burt RS (1992) Structural holes: the social structure of competition. Harvard University Press, Boston

    Google Scholar 

  41. Burt RS (2000) The network structure of social capital. In: Sutton RI, Straw BM (eds) Research in organizational behavior. JAI Press, Greenwood, pp 345–423

    Google Scholar 

  42. Horne C, Horgan J (2012) Methodological triangulation in the analysis of terrorist networks. Stud Conflict Terrorism 35:182–192

    Article  Google Scholar 

  43. Morselli C (2008) Assessing vulnerable and strategic positions in a criminal network. J Contemp Crim Justice 26:382–392

    Article  Google Scholar 

  44. Morselli C, Roy J (2008) Brokerage qualifications in ringing operations. Criminology 46:71–98

    Article  Google Scholar 

  45. Associated Press (2009) Third man pleads guilty in Somali terror case. 12 Aug 2009

    Google Scholar 

  46. Asal V, Nassbaum B, Harrington DW (2007) Terrorism as transnational advocacy: An organizational and tactical examination. Stud Confl Terrorism 30:65–74

    Google Scholar 

  47. Chen H, Qin J, Reid E, Zhou Y, Sageman M, Weinmann G (2008) Uncovering the dark web: case study of Jihad on the web. J Am Soc Inform Sci Technol 59:1347–1359

    Article  Google Scholar 

  48. Joseph J (2011) Terrorists move to Skype, frustrate eavesdroppers. The Economic Times, India

    Google Scholar 

  49. Ogun MN (2012) Terrorist use of internet: possible suggestions to prevent the usage for terrorist purposes. J Appl Secur Res 7:203–217

    Article  Google Scholar 

  50. Sageman M (2008) The next generation of terror. Foreign Policy 165:36–42

    Google Scholar 

  51. Schmidle RE (2010) Positioning theory and terrorist networks. J Theor Soc Behav 40:65–78

    Article  Google Scholar 

  52. United States District Court, District of Minnesota (2010) Indictment, United States of America vs. Amina Farah Ali and Hawo Mohamed Hassan

    Google Scholar 

  53. Dougherty JM (2006) Hawala: how terrorists move funds globally. Corp Fin Rev 10:333–335

    Google Scholar 

  54. de Goede M (2003) Hawala discourses and the war on terrorist finance. Environ Plann D: Soc Space 21:513–532

    Article  Google Scholar 

  55. Looney R (2003) Hawala: the terrorist’s informal financial mechanism. Middle East Policy 10(1): 164–167

    Google Scholar 

  56. Tupman WA (2009) Ten myths about terrorist financing, J Money Laundering Control, 12(2):189–205

    Google Scholar 

  57. Bakker RM, Raab J, Milward HB (2012) A preliminary theory of dark network resilience. J Policy Anal Manage 31:33–62

    Article  Google Scholar 

  58. U.S. Attorney’s Office, District of Minnesota (2009) Terror charges unsealed in Minnesota against eight defendants. Justice Department Announces (23 Nov 2009)

    Google Scholar 

  59. Kron J (2011) American identified as bomber in attack on African Union in Somalia. New York Times, USA

    Google Scholar 

  60. Yuen L (2011) Family IDs Minn. man allegedly behind Somali suicide bombing. Minnesota Public Radio News, USA

    Google Scholar 

  61. Razavy M (2005) Hawala: an underground haven for terrorists or social phenomenon? Crime, Law, Soc Change 44:277–299

    Article  Google Scholar 

  62. Eck JE (2006) When is a bologna sandwich better than sex? A defense of small-n case study evaluations. J Exp Criminol 2:345–362

    Article  Google Scholar 

  63. van Duijn MAJ, Vermunt JK (2006) What is special about social network analysis? Methodology 2:2–6

    Google Scholar 

  64. Bowyer-Bell J (2000) The IRA 1968–2000: An analysis of a secret army. Frank Cass, London

    Google Scholar 

  65. Bruce S (1992) The Red Hand: Protestant Paramilitaries in Northern Ireland. Oxford University Press, Oxford

    Google Scholar 

  66. Coogan TP (1995) The IRA. Harper-Collins, London

    Google Scholar 

  67. Della Porta D (1995) Social movements, political violence and the state. Cambridge University Press, Camridge

    Book  Google Scholar 

  68. Fair CF (2008) Who are Pakistan’s militants and their families? Terrorism Polit Violence 20:49–65

    Article  Google Scholar 

  69. Hegghammer T (2006) Terrorist recruitment and radicalization in Saudi Arabia. Middle East Policy 13:39–60

    Article  Google Scholar 

  70. Jamieson A (1989) The heart attacked: terrorism and conflict in the Italian state. Marian Boyers, London

    Google Scholar 

  71. Taylor M (1988) The terrorist. Brassey’s, London

    Google Scholar 

  72. White RW (1993) Provisional Irish republicans: an oral and interpretive history. Greenwood Press, Westport

    Google Scholar 

  73. LaFree G (2008) Generating Terrorism event databases: results from the global terrorism database, 1970 to 2008. In: Lum C, Kennedy LW (eds) Evidence-based counterterrorism policy. Springer, New York, pp 41–64

    Google Scholar 

  74. Chermak SM, Freilich JD, Parkin WS, Lynch JP (2011) American terrorism and extremist crime data sources and selectivity bias: an investigation focusing on homicide events committed by far-right extremists. J Quant Criminol 28:91–218

    Google Scholar 

  75. Leuprecht C, Hall K (2013) Networks as strategic repertoires: functional differentiation among Al-Shabaab terror cells. Global Crime 14:287–310

    Article  Google Scholar 

  76. Adams S (2012) ‘Just been shot in neck by assassin’: American jihadist live-tweets attack in Somalia and shows picture of his bloody neck. The Daily Mail, UK

    Google Scholar 

  77. BBC (2012) Danish–Somali terror suspect accused of training five weeks in Al-Shabaab camp (June 4)

    Google Scholar 

  78. Danish cartoonist hid in ‘panic room’ during attack (2010, Jan 2) CNN

    Google Scholar 

  79. Hiiraan Online (2006) Ontario municipal election: Somali Canadian prospective (Dec 10)

    Google Scholar 

  80. Freisen J, Freeze C (2009) Are Somali–Canadians fighting for the shadowy al-Shabab?. The Globe and Mail, Ontario

    Google Scholar 

  81. O’Toole M (2009) Terror suspect Mohamed Hersi to head directly to trial. The National Post, Ontario

    Google Scholar 

  82. Greenwood C, Bates D (2012) Seven held over smuggling of a banned stimulant from England to U.S. to fund terror. The Daily Mail, UK

    Google Scholar 

  83. Hartley A (2012) This is khat: The natural high available on British streets and suspected of funding terrorism. The Daily Mail, UK

    Google Scholar 

  84. Abdulle A (2010) Dutch police arrest Al shabaab commander’s father over foiled blasts. The Suna Times, Somalie

    Google Scholar 

  85. Associated Press (2010) Dutch arrest 12 Somalis on terror suspicions. CBS, New York

    Google Scholar 

  86. Meryhew R, Walsh J (2009) Young men: searching for something better. Minneapolis Star Tribune, USA

    Google Scholar 

  87. Yuen L (2012) Terrorist pipeline continues to flow from Minn. to Somalia. Minnesota Public Radio 26 Oct.

    Google Scholar 

  88. Shirwa’s Journey (2009) Minneapolis star tribune

    Google Scholar 

  89. United Sates District Court, District of Minnesota (2009) Indictment, United States of America vs. Mahamud Said Omar (20 Aug 2009)

    Google Scholar 

  90. Yuen L (2009) Man killed in Somalia may have recruited others to the cause. Minneapolis Public Radio, USA

    Google Scholar 

  91. Elliot A (2009) A call to Jihad, answered in America. New York Times, USA

    Google Scholar 

  92. Elliot A (2009) Charges detail road to terror for 20 in U.S. New York Times, USA

    Google Scholar 

  93. Meryhew R (2009) Minneapolis Somali man killed in homeland. Minneapolis Star Tribune, USA

    Google Scholar 

  94. District of Minnesota, state of Minnesota (2011) Affidavit of Michael N. Cannizarro Jr.’, United Sates of America vs. Abdow Munye Abdow (Oct 9)

    Google Scholar 

  95. United States District Court, District of Minnesota (2010) Government’s sentencing positioning paper, United Sates of America vs. Abdow Munye Abdow (13 July 2010)

    Google Scholar 

  96. Jones BT, Cooney JF (2011) Man extradited from Netherlands appears in federal court on charges of supporting terrorists. United Sates Department of Justice, USA

    Google Scholar 

  97. United Sates District Court, District of Minnesota (2009) Information, United Sates of America vs. Adarus Abdulle Ali (27 Oct, 2009)

    Google Scholar 

  98. United Sates District Court, District of Minnesota (2012) Plea agreement and sentencing stipulations, United States of America v. Ahmed Hussein Mahamud

    Google Scholar 

  99. United States District Court, Southern District of California (2011) Plea agreement, United States of America v. Nima Yusuf

    Google Scholar 

  100. United Sates District Court, District of Minnesota (2001) Government’s total brief, United Sates of America vs. Omer Abdi Mohamed (14 July 2001)

    Google Scholar 

  101. Fife-Yeomans J, Vollmer T (2009) Rant in court by one of four man who appear in court accused of terrorism offences. The Daily Telegraph, Australia

    Google Scholar 

  102. The Supreme Court of Victoria, Melbourne Criminal Division (2011) VSC 681, R. vs. Wissam Mahmoud Fattal, Saney Edow Aweys and Naser El Sayed, 16 Dec 2011

    Google Scholar 

  103. An uncle’s regret (2009, Aug 6) A flight from Somalia gone wrong. Sydney Morning Herald, Australia

    Google Scholar 

  104. Warne-Smith D, Wilson L (2009) Somali terror suspects ‘new to mosque’. The Australian, 6 Aug 2009

    Google Scholar 

  105. Aulakh R (2009) Did five Torontonians join jihad in Somalia?. The Toronto Star, Canada

    Google Scholar 

  106. Shephard M (2008) Canadian insurgent ‘Asparo’ killed in Somalia. The Toronto Star, Ontario

    Google Scholar 

  107. Bell S (2009) Imam tries to calm fears about missing Somali-Canadians. The National Post, Ontario

    Google Scholar 

  108. Freeze C, MacArthur G (2011) Man jailed in new kind of terrorist case for Canada. The Globe and Mail, Ontario

    Google Scholar 

  109. Bell S (2013) Canadian linked to terrorist group was killed in suicide attack in Somalia: community source. The National Post, Ontario

    Google Scholar 

  110. Bell S (2010) Martyr video claims Toronto man ‘succeeded’. The National Post, Ontario

    Google Scholar 

  111. United Sates District Court, Eastern District of Missouri, Eastern Division (2010) Indictment, United Sates of America v. Mohamud Abdi Yusuf, Duane Mohamed Diriye and Abdi Mahdi Hussein (21 Oct 2010)

    Google Scholar 

  112. United States District Court, Southern District of California (2013) United States’ trial memorandum, United States of America v. Basaaly Saeed Moalin, Mohamed Mohamed Mohamud, Issa Doreh and Ahmed Nasir Taalil Mohamud (28 Jan 2013)

    Google Scholar 

  113. Piazza JA (2009) Is islamist terrorism more dangerous?: an empirical study of group ideology, organization, and goal structure. Terrorism Polit Violence 21

    Google Scholar 

  114. Al Jazeera (2013) French agent ‘executed’ by al-Shabab (Jan 17)

    Google Scholar 

  115. Maclean W, Khamis N, Ahmed M (2012) Special report: in Africa, a militant group’s growing appeal. Reuters, 30 May 2012

    Google Scholar 

  116. The Amsterdam Herald (2013) First Dutch militia fighter killed in Syrian conflict. http://www.amsterdamherald.com/index.php/rss/748-20130320-first-dutch-militia-fighter-killed-syrian-conflict-delftmilitia-delft-aivd-intelligence-netherlands-dutch-security. Accessed 20 March 2013

  117. Radio Netherlands Worldwide (2012) Al-Shabaab plotting attacks in Netherlands. http://www.rnw.nl/english/bulletin/al-shabab-plotting-attack-netherlands. Accessed 28 May 2012

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Leuprecht, C., Hall, K. (2014). Why Terror Networks are Dissimilar: How Structure Relates to Function. In: Masys, A. (eds) Networks and Network Analysis for Defence and Security. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-04147-6_5

Download citation

Publish with us

Policies and ethics