Abstract
Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stopping such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here, we propose a model of transnational terrorism based on the theory of activity networks. The model represents attacks on different countries as paths in a network. The group is assumed to prefer paths of lowest cost (or risk) and maximal yield from attacks. The parameters of the model are computed for the Islamist–Salafi terrorist movement based on open source data and then used for estimation of risks of future attacks. The central finding is that the United States (US) has an enduring appeal as a target, due to lack of other nations of matching geopolitical weight or openness. It is also shown that countries in Africa and Asia that have been overlooked as terrorist bases may become highly significant threats in the future. The model quantifies the dilemmas facing countries in the effort to cut terror networks, and points to a limitation of deterrence against transnational terrorists.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
1 Here is how PRA is represented by networks. Suppose in a multi-stage terrorist operation r s is the probability of success at stage s (out of k stages in total) conditional on success at every previous stage. Suppose the gain from a successful operation is G (≥ 1). Then the expected gain from the operation is E = r 1 r 2 … r k G. Let us now relate r s values to costs (c s ≥ 0) using exponentiation: rs = e—c s, and let the gain be a function of yield Y : G = e−Y. Thus, an attack has expected gain \(E=\exp\left[-\left(c_{1}+c_{2}+\dots+c_{k}+Y\right)\right]\). In the network representation of terrorist operations, we can compute the sums in the exponent by adding edge weights along network paths that trace through all the stages. Paths of lower weights translate to attacks of greater expected gain. By comparing such paths we could anticipate which attacks would have the highest expected gain.
- 2.
2 One of the advantages of the stochastic model is that it can interpolate between the two extremes of complete ignorance and perfect information using a single parameter \(\lambda (\ge0)\) that describes the amount of information available to the adversaries. For a given level of information, the probability that a path p would be selected is proportional to \(\exp(-\lambda\, c(p))\). When λ is very large the path of least cost has a much higher probability than any of the alternatives, while λ close to 0 assigns all paths approximately the same probability. We set λ = 0.1 in the following but its value has a smooth effect on the predicted plots (i.e. the sensitivity is low). A value of 0.1 means that if the terrorist group learns of a increase in path cost by 10 units, its probability of taking the path will decrease by a multiplicative factor of ≈ 2.72. The exact amount of change depends on the original path probability: it is not as great a decrease when the original probability is high.
- 3.
3 To compute the distances to the “end” node, \(c(p_{uv})\), we use the Bellman–Ford algorithm because edge weights are negative for some edges (e.g. yield from attacks). Gutfraind et al. [20] uses the faster algorithm of Dijkstra because it treats only the case of positive weights.
References
Abrahms, M.: What terrorists really want: Terrorist motives and counterterrorism strategy. Int. Secur. 32(4), 78–105 (2008). http://www.mitpressjournals.org/doi/abs/10.1162/isec.2008.32.4.78
Anderton, C.H., Carter, J.R.: On rational choice theory and the study of terrorism. Def. Peace Econ. 16(4), 275–282 (2005)
Arquilla, J., Ronfeld, D.: Networks and Netwars: The Future of Terror, Crime, and Militancy. RAND Corporation, Santa Monica, CA (2001)
Bakker, E.: Jihadi terrorists in europe. Tech. rep., Netherlands Institute of International Relations, Dec 2006
Berman, E., Laitin, D.D.: Religion, terrorism and public goods: Testing the club model. J. Public Econ. 92(10–11), 1942–1967 (2008). http://www.sciencedirect.com/science/article/B6V76-4S4TNTW-1/2/6a0e405748612f6c10b7db12ace22fc1
Bier, V.M., Oliveros, S., Samuelson, L.: Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econ. Theory 9(4), 563–587 (2007)
Caplan, B.: Terrorism: The relevance of the rational choice model. Public Choice 128(1), 91–107 (2006). http://www.springerlink.com/content/041521274700t406
Corley, H.W., Sha, D.Y.: Most vital links and nodes in weighted networks. Oper. Res. Lett. 1(4), 157–160 (1982)
Corman, S.R.: Using activity focus networks to pressure terrorist organizations. Comput. Math. Organ. Theory 12, 35–49 (2006). http://www.springerlink.com/content/F36M527745172454
Dugan, L., Lafree, G., Piquero, A.R.: Testing a rational choice model of airline hijackings. Criminology 43(4), 1031–1065 (2005). http://www.blackwell-synergy.com/doi/abs/10.1111/j.1745-9125.2005.00032.x
Enders, W., Sandler, T.: Distribution of transnational terrorism among countries by income classes and geography after 9/11. Report by the Center for Risk and Economic Analysis of Terrorism Events (CREATE) (2005)
Enders, W., Sandler, T.: What do we know about the substitution effect in transnational terrorism. In: Silke, A. (ed.) Researching Terrorism: Trends, Achievements, Failures, pp. 119–137. Frank Cass, Ilford (2004)
Erlander, S., Stewart, N.F.: The gravity model in transportation analysis: theory and extensions, Topics in transportation, vol. 3. VSP, Utrecht, The Netherlands (1990)
Finbow, A.S., Hartnell, B.L.: On designing a network to defend against random attacks of radius two. Networks 19(7), 771–792 (1989). http://dx.doi.org/10.1002/net.3230190704
Ganor, B.: The Counter-Terrorism Puzzle: A Guide for Decision Makers. Transaction Publishers, Piscataway, NJ (2005)
Ganor, B.: Terrorist organization typologies and the probability of a boomerang effect. Stud. Confl. Terrorism 31, 269–283 (2008)
Ginsburg, S.: Countering terrorist mobility: Shaping an operational strategy. Tech. rep., Migration Policy Institute, Feb 2006
Gutfraind, A.: Mathemaical Terrorism. Ph.D. thesis, Cornell University, Ithaca, New York, USA (2009)
Gutfraind, A.: Optimizing topological cascade resilience based on the structure of terrorist networks. PLoS ONE 5(11), e13448 (2010)
Gutfraind, A., Hagberg, A.A., Izraelevitz, D., Pan, F.: Interdiction of a Markovian Evader. In: Dell, R., Wood, K. (eds.) Proceedings of the INFORMS Computing Society Conference. INFORMS (2011)
Hanson, M.A.: The economics of roadside bombs. SSRN eLibrary (2008)
Harmon, C.C.: Terrorism Today, 1 edn. Routledge, Oxford, UK, (2000)
Harrison, M.: Counter-terrorism in a police state : The KGB and codename blaster, 1977. The Warwick Economics Research Paper Series (TWERPS) 918, University of Warwick, Department of Economics (2009). http://ideas.repec.org/p/wrk/warwec/918.html
Hoffman, B.: Inside Terrorism. Columbia University Press, USA (2006)
Jung, W.S., Wang, F., Stanley, H.E.: Gravity model in the korean highway. EPL (Europhysics Letters) 81(4), 48005 (2008). http://stacks.iop.org/0295-5075/81/i=4/a=48005
Lake, D.A.: Rational extremism: Understanding terrorism in the twenty-first century. Dialog-IO, pp. 15–29. Spring, Berlin (2002)
Landes, W.M.: An economic study of U. S. aircraft hijacking, 1961–1976. The J. Law Econ. 21(1), 1 (1978). http://www.journals.uchicago.edu/doi/abs/10.1086/466909
Lee, D.R.: Free riding and paid riding in the fight against terrorism. Am. Econ. Rev. 78(2), 22–26 (1988). http://www.jstor.org/stable/1818091
Lindelauf, R.H., Borm, P.E., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Soc. Netw. (2009)
Lugo, L.: Mapping the Global Muslim Population. Pew Research Center, Oct 2009
Manningham-Buller, E.: The International Terrorist Threat to the UK. MI5 website (Nov 2006). http://www.mi5.gov.uk/output/the-international-terrorist-threat-to-the-uk-1.html
Mayer, T., Zignago, S.: Notes on CEPII’s distances measures. http://www.cepii.fr/anglais-graph/bdd/distances.htm(May 2006), Centre d’Etudes Prospective et d’Informations Internationales
Mickolus, E.F.: International Terrorism: Attributes of Terrorist Events (ITERATE). http://www.icpsr.umich.edu/cocoon/ICPSR/STUDY/07947.xml(2009)
OECD: Immigrants and expatriates: Total population by nationality and country of birth. online (2006), Organisation for Economic Co-Operation and Development
Sageman, M.: Leaderless Jihad – Terror Networks in the Twenty-First Century. University of Pennsylvania Press, Philadelphia, PA (2008)
Sandler, T.: Collective action and transnational terrorism. World Econ. 26(6), 779–802 (2003)
Sandler, T., Enders, W.: An economic perspective on transnational terrorism. Eur. J. Polit. Econ. 20(2), 301–316 (2004). http://ideas.repec.org/a/eee/poleco/v20y2004i2p301-316.html
Shapiro, J.N., Siegel, D.A.: Underfunding in Terrorist Organizations. In: Memon, N., Farley, J.D., Hicks, D.L., Rosenorn, T. (eds.) Mathematical Methods in Counterterrorism, pp. 349–382. Springer, New York (2009)
Shapiro, J.N., Siegel, D.A.: The Greedy Terrorist: A Rational Choice Perspective on Terrorist Organizations. Terrorist Financing in Comparative Perspective. Inefficiencies and Vulnerabilities. Stanford University Press, California (2009)
Shughart, W.F. II: Terrorism in rational choice perspective (2009), working Paper
Washburn, A., Wood, K.: Two-Person Zero-Sum Games for Network Interdiction. Oper. Res. 43(2), 243–251 (1995). http://or.journal.informs.org/cgi/content/abstract/43/2/243
Wike, R.: Pew global attitudes project. Pew Research Center (2006-2009)
Woo, G.: Understanding terrorism risk. online (2004), report for Risk Management Solutions
Woo, G.: Intelligence Constraints on Terrorist Network Plots. In: Memon, N., Farley, J.D., Hicks, D.L., Rosenorn, T. (eds.) Mathematical Methods in Counterterrorism, pp. 205–214. Springer, New York (2009)
Acknowledgements
A conversation with Gordon Woo has inspired this work. Matthew Hanson, Michael Genkin and Vadas Gintautas suggested useful improvements. Part of this work was funded by the Department of Energy at the Los Alamos National Laboratory under contract DE-AC52-06NA25396 through the Laboratory Directed Research and Development program, and by the Defense Threat Reduction Agency grant “Robust Network Interdiction Under Uncertainty”. Released as Los Alamos Unclassified Report 10-05689.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
1.1 1 Global Sensitivity Analysis
Considerable uncertainty exists above the values of the model parameters: the supply of plots, translocation costs, interception costs and the yields. Indeed, is likely that the estimates of those parameters in Sect.3 are different from the ones used by the terrorist groups. To explore the sensitivity of the predictions to this uncertainty we considered 100 realizations of the model, each with different parameter values. In each realization, each of the original values of the parameters was randomly changed: the value was multiplied by a random number sampled uniformly from [0.5, 1.5]. Thus, the values were varied through a range of ± 50%.
Table 4 shows the sensitivity in the expected number of attacks against various countries. In the majority of cases, the expected number of attacks changes by ± 10%, often less. The reason for this is that paths in the networks become sums of random quantities, and errors tend to partially cancel each other when summed (central limit theorem). The highest sensitivity was observed in the attacks against the US in the scenario when the US is protected against foreign plots. In such a case, the number of attacks in the US varies exactly as the number of plots that start in the US.
The values of λ (the determinism in the path selection, explained in Appendix 2) was kept at its default value (0.1) since λ directly expresses sensitivity. In the limit of \(\lambda\to0\), the terrorist groups is completely insensitive to risk or cost while in the limit \(\lambda\to\infty\) the sensitivity is infinite and even small changes in costs can lead to arbitrarily large changes in path choice. The regime \(\lambda\to\infty\) is the case where a decision maker can distinguish arbitrarily small differences in utility and never makes mistakes. Fortunately, clandestine and illicit decision makers like terrorist leaders are far from this omniscient regime.
1.2 2 Computation of Probabilities
In the framework of the theory of complex networks, attack plots could be represented as the motion of an adversary through a weighted network (the plot itself is the adversary we wish to stop). The adversary aims to find an attack path or to hide, whichever plan has the lowest cost. To map such a decision to the framework of activity networks, connect the “attack” and “abandon” nodes in Fig. 2 to a node termed “end” with edges of cost 0. Thus, an attack on a country j corresponds to an adversary that starts at country i and goes through country j and then to the node “attack” and finally to “end”. The decision to abandon corresponds to an adversary that starts at country i then goes to “abandon” and then to “end”. The expected number of attacks on a particular target t can be computed by combining information about path costs with information about the supply of plots from a particular country S i and the yield of abandonment A. Namely, it is the number of trips from all sources that arrive to the “attack” node from target country t.
The least-cost path corresponds to the optimal choice by the terrorists, but they can make mistakes. An attack plan under uncertainty could be described as a Markov chain [20]. The chain has initial distribution proportional to S i , and a transition probability matrix M describing the likelihood of taking a particular edge on the network. The “end” node is the absorbing state of the chain. The M matrix can be computed using the least-cost guided evader model described in [20]. Briefly, for each edge (u, v) of the network, the transition probability through it is given by the formula
where \(c(p_{u*})\) is the cost of the least-cost path from node u to the end node, and \(c(p_{uv})\) is the cost of the path through edge (u, v): \(p_{uv}=(u, v)\cup p_{v*}\). The sum in the denominator runs over the neighbors of node u. Thus, the model generalizes the least-cost path modelFootnote 3. The parameter λ was set to 0.1, in the reported data, but its value has a smooth effect on the predictions of the model because of the smoothness of the exponential function. The number of plots against a target country t is now found by taking the probability of a trip to that target multiplied by the total number of plots (\(=\sum_{i}S_{i}\)).
Rights and permissions
Copyright information
© 2011 Springer-Verlag/Wien
About this chapter
Cite this chapter
Gutfraind, A. (2011). Targeting by Transnational Terrorist Groups. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0388-3_2
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0387-6
Online ISBN: 978-3-7091-0388-3
eBook Packages: Computer ScienceComputer Science (R0)