Skip to main content

Targeting by Transnational Terrorist Groups

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stopping such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here, we propose a model of transnational terrorism based on the theory of activity networks. The model represents attacks on different countries as paths in a network. The group is assumed to prefer paths of lowest cost (or risk) and maximal yield from attacks. The parameters of the model are computed for the Islamist–Salafi terrorist movement based on open source data and then used for estimation of risks of future attacks. The central finding is that the United States (US) has an enduring appeal as a target, due to lack of other nations of matching geopolitical weight or openness. It is also shown that countries in Africa and Asia that have been overlooked as terrorist bases may become highly significant threats in the future. The model quantifies the dilemmas facing countries in the effort to cut terror networks, and points to a limitation of deterrence against transnational terrorists.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    1 Here is how PRA is represented by networks. Suppose in a multi-stage terrorist operation r s is the probability of success at stage s (out of k stages in total) conditional on success at every previous stage. Suppose the gain from a successful operation is G (≥ 1). Then the expected gain from the operation is E = r 1 r 2r k G. Let us now relate r s values to costs (c s ≥ 0) using exponentiation: rs = e—c s, and let the gain be a function of yield Y : G = eY. Thus, an attack has expected gain \(E=\exp\left[-\left(c_{1}+c_{2}+\dots+c_{k}+Y\right)\right]\). In the network representation of terrorist operations, we can compute the sums in the exponent by adding edge weights along network paths that trace through all the stages. Paths of lower weights translate to attacks of greater expected gain. By comparing such paths we could anticipate which attacks would have the highest expected gain.

  2. 2.

    2 One of the advantages of the stochastic model is that it can interpolate between the two extremes of complete ignorance and perfect information using a single parameter \(\lambda (\ge0)\) that describes the amount of information available to the adversaries. For a given level of information, the probability that a path p would be selected is proportional to \(\exp(-\lambda\, c(p))\). When λ is very large the path of least cost has a much higher probability than any of the alternatives, while λ close to 0 assigns all paths approximately the same probability. We set λ = 0.1 in the following but its value has a smooth effect on the predicted plots (i.e. the sensitivity is low). A value of 0.1 means that if the terrorist group learns of a increase in path cost by 10 units, its probability of taking the path will decrease by a multiplicative factor of ≈ 2.72. The exact amount of change depends on the original path probability: it is not as great a decrease when the original probability is high.

  3. 3.

    3 To compute the distances to the “end” node, \(c(p_{uv})\), we use the Bellman–Ford algorithm because edge weights are negative for some edges (e.g. yield from attacks). Gutfraind et al. [20] uses the faster algorithm of Dijkstra because it treats only the case of positive weights.

References

  1. Abrahms, M.: What terrorists really want: Terrorist motives and counterterrorism strategy. Int. Secur. 32(4), 78–105 (2008). http://www.mitpressjournals.org/doi/abs/10.1162/isec.2008.32.4.78

  2. Anderton, C.H., Carter, J.R.: On rational choice theory and the study of terrorism. Def. Peace Econ. 16(4), 275–282 (2005)

    Article  Google Scholar 

  3. Arquilla, J., Ronfeld, D.: Networks and Netwars: The Future of Terror, Crime, and Militancy. RAND Corporation, Santa Monica, CA (2001)

    Google Scholar 

  4. Bakker, E.: Jihadi terrorists in europe. Tech. rep., Netherlands Institute of International Relations, Dec 2006

    Google Scholar 

  5. Berman, E., Laitin, D.D.: Religion, terrorism and public goods: Testing the club model. J. Public Econ. 92(10–11), 1942–1967 (2008). http://www.sciencedirect.com/science/article/B6V76-4S4TNTW-1/2/6a0e405748612f6c10b7db12ace22fc1

  6. Bier, V.M., Oliveros, S., Samuelson, L.: Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econ. Theory 9(4), 563–587 (2007)

    Article  Google Scholar 

  7. Caplan, B.: Terrorism: The relevance of the rational choice model. Public Choice 128(1), 91–107 (2006). http://www.springerlink.com/content/041521274700t406

  8. Corley, H.W., Sha, D.Y.: Most vital links and nodes in weighted networks. Oper. Res. Lett. 1(4), 157–160 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  9. Corman, S.R.: Using activity focus networks to pressure terrorist organizations. Comput. Math. Organ. Theory 12, 35–49 (2006). http://www.springerlink.com/content/F36M527745172454

    Google Scholar 

  10. Dugan, L., Lafree, G., Piquero, A.R.: Testing a rational choice model of airline hijackings. Criminology 43(4), 1031–1065 (2005). http://www.blackwell-synergy.com/doi/abs/10.1111/j.1745-9125.2005.00032.x

    Google Scholar 

  11. Enders, W., Sandler, T.: Distribution of transnational terrorism among countries by income classes and geography after 9/11. Report by the Center for Risk and Economic Analysis of Terrorism Events (CREATE) (2005)

    Google Scholar 

  12. Enders, W., Sandler, T.: What do we know about the substitution effect in transnational terrorism. In: Silke, A. (ed.) Researching Terrorism: Trends, Achievements, Failures, pp. 119–137. Frank Cass, Ilford (2004)

    Chapter  Google Scholar 

  13. Erlander, S., Stewart, N.F.: The gravity model in transportation analysis: theory and extensions, Topics in transportation, vol. 3. VSP, Utrecht, The Netherlands (1990)

    Google Scholar 

  14. Finbow, A.S., Hartnell, B.L.: On designing a network to defend against random attacks of radius two. Networks 19(7), 771–792 (1989). http://dx.doi.org/10.1002/net.3230190704

    Google Scholar 

  15. Ganor, B.: The Counter-Terrorism Puzzle: A Guide for Decision Makers. Transaction Publishers, Piscataway, NJ (2005)

    Google Scholar 

  16. Ganor, B.: Terrorist organization typologies and the probability of a boomerang effect. Stud. Confl. Terrorism 31, 269–283 (2008)

    Article  Google Scholar 

  17. Ginsburg, S.: Countering terrorist mobility: Shaping an operational strategy. Tech. rep., Migration Policy Institute, Feb 2006

    Google Scholar 

  18. Gutfraind, A.: Mathemaical Terrorism. Ph.D. thesis, Cornell University, Ithaca, New York, USA (2009)

    Google Scholar 

  19. Gutfraind, A.: Optimizing topological cascade resilience based on the structure of terrorist networks. PLoS ONE 5(11), e13448 (2010)

    Article  Google Scholar 

  20. Gutfraind, A., Hagberg, A.A., Izraelevitz, D., Pan, F.: Interdiction of a Markovian Evader. In: Dell, R., Wood, K. (eds.) Proceedings of the INFORMS Computing Society Conference. INFORMS (2011)

    Google Scholar 

  21. Hanson, M.A.: The economics of roadside bombs. SSRN eLibrary (2008)

    Google Scholar 

  22. Harmon, C.C.: Terrorism Today, 1 edn. Routledge, Oxford, UK, (2000)

    Google Scholar 

  23. Harrison, M.: Counter-terrorism in a police state : The KGB and codename blaster, 1977. The Warwick Economics Research Paper Series (TWERPS) 918, University of Warwick, Department of Economics (2009). http://ideas.repec.org/p/wrk/warwec/918.html

  24. Hoffman, B.: Inside Terrorism. Columbia University Press, USA (2006)

    Google Scholar 

  25. Jung, W.S., Wang, F., Stanley, H.E.: Gravity model in the korean highway. EPL (Europhysics Letters) 81(4), 48005 (2008). http://stacks.iop.org/0295-5075/81/i=4/a=48005

  26. Lake, D.A.: Rational extremism: Understanding terrorism in the twenty-first century. Dialog-IO, pp. 15–29. Spring, Berlin (2002)

    Google Scholar 

  27. Landes, W.M.: An economic study of U. S. aircraft hijacking, 1961–1976. The J. Law Econ. 21(1), 1 (1978). http://www.journals.uchicago.edu/doi/abs/10.1086/466909

  28. Lee, D.R.: Free riding and paid riding in the fight against terrorism. Am. Econ. Rev. 78(2), 22–26 (1988). http://www.jstor.org/stable/1818091

  29. Lindelauf, R.H., Borm, P.E., Hamers, H.: The influence of secrecy on the communication structure of covert networks. Soc. Netw. (2009)

    Google Scholar 

  30. Lugo, L.: Mapping the Global Muslim Population. Pew Research Center, Oct 2009

    Google Scholar 

  31. Manningham-Buller, E.: The International Terrorist Threat to the UK. MI5 website (Nov 2006). http://www.mi5.gov.uk/output/the-international-terrorist-threat-to-the-uk-1.html

  32. Mayer, T., Zignago, S.: Notes on CEPII’s distances measures. http://www.cepii.fr/anglais-graph/bdd/distances.htm(May 2006), Centre d’Etudes Prospective et d’Informations Internationales

  33. Mickolus, E.F.: International Terrorism: Attributes of Terrorist Events (ITERATE). http://www.icpsr.umich.edu/cocoon/ICPSR/STUDY/07947.xml(2009)

  34. OECD: Immigrants and expatriates: Total population by nationality and country of birth. online (2006), Organisation for Economic Co-Operation and Development

    Google Scholar 

  35. Sageman, M.: Leaderless Jihad – Terror Networks in the Twenty-First Century. University of Pennsylvania Press, Philadelphia, PA (2008)

    Book  Google Scholar 

  36. Sandler, T.: Collective action and transnational terrorism. World Econ. 26(6), 779–802 (2003)

    Article  Google Scholar 

  37. Sandler, T., Enders, W.: An economic perspective on transnational terrorism. Eur. J. Polit. Econ. 20(2), 301–316 (2004). http://ideas.repec.org/a/eee/poleco/v20y2004i2p301-316.html

    Google Scholar 

  38. Shapiro, J.N., Siegel, D.A.: Underfunding in Terrorist Organizations. In: Memon, N., Farley, J.D., Hicks, D.L., Rosenorn, T. (eds.) Mathematical Methods in Counterterrorism, pp. 349–382. Springer, New York (2009)

    Chapter  Google Scholar 

  39. Shapiro, J.N., Siegel, D.A.: The Greedy Terrorist: A Rational Choice Perspective on Terrorist Organizations. Terrorist Financing in Comparative Perspective. Inefficiencies and Vulnerabilities. Stanford University Press, California (2009)

    Google Scholar 

  40. Shughart, W.F. II: Terrorism in rational choice perspective (2009), working Paper

    Google Scholar 

  41. Washburn, A., Wood, K.: Two-Person Zero-Sum Games for Network Interdiction. Oper. Res. 43(2), 243–251 (1995). http://or.journal.informs.org/cgi/content/abstract/43/2/243

  42. Wike, R.: Pew global attitudes project. Pew Research Center (2006-2009)

    Google Scholar 

  43. Woo, G.: Understanding terrorism risk. online (2004), report for Risk Management Solutions

    Google Scholar 

  44. Woo, G.: Intelligence Constraints on Terrorist Network Plots. In: Memon, N., Farley, J.D., Hicks, D.L., Rosenorn, T. (eds.) Mathematical Methods in Counterterrorism, pp. 205–214. Springer, New York (2009)

    Chapter  Google Scholar 

Download references

Acknowledgements

A conversation with Gordon Woo has inspired this work. Matthew Hanson, Michael Genkin and Vadas Gintautas suggested useful improvements. Part of this work was funded by the Department of Energy at the Los Alamos National Laboratory under contract DE-AC52-06NA25396 through the Laboratory Directed Research and Development program, and by the Defense Threat Reduction Agency grant “Robust Network Interdiction Under Uncertainty”. Released as Los Alamos Unclassified Report 10-05689.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Gutfraind .

Editor information

Editors and Affiliations

Appendix

Appendix

1.1 1 Global Sensitivity Analysis

Considerable uncertainty exists above the values of the model parameters: the supply of plots, translocation costs, interception costs and the yields. Indeed, is likely that the estimates of those parameters in Sect.3 are different from the ones used by the terrorist groups. To explore the sensitivity of the predictions to this uncertainty we considered 100 realizations of the model, each with different parameter values. In each realization, each of the original values of the parameters was randomly changed: the value was multiplied by a random number sampled uniformly from [0.5, 1.5]. Thus, the values were varied through a range of ± 50%.

Table 4 shows the sensitivity in the expected number of attacks against various countries. In the majority of cases, the expected number of attacks changes by ± 10%, often less. The reason for this is that paths in the networks become sums of random quantities, and errors tend to partially cancel each other when summed (central limit theorem). The highest sensitivity was observed in the attacks against the US in the scenario when the US is protected against foreign plots. In such a case, the number of attacks in the US varies exactly as the number of plots that start in the US.

Table 4 Expected number of plots and sensitivity to parameter estimates

The values of λ (the determinism in the path selection, explained in Appendix 2) was kept at its default value (0.1) since λ directly expresses sensitivity. In the limit of \(\lambda\to0\), the terrorist groups is completely insensitive to risk or cost while in the limit \(\lambda\to\infty\) the sensitivity is infinite and even small changes in costs can lead to arbitrarily large changes in path choice. The regime \(\lambda\to\infty\) is the case where a decision maker can distinguish arbitrarily small differences in utility and never makes mistakes. Fortunately, clandestine and illicit decision makers like terrorist leaders are far from this omniscient regime.

1.2 2 Computation of Probabilities

In the framework of the theory of complex networks, attack plots could be represented as the motion of an adversary through a weighted network (the plot itself is the adversary we wish to stop). The adversary aims to find an attack path or to hide, whichever plan has the lowest cost. To map such a decision to the framework of activity networks, connect the “attack” and “abandon” nodes in Fig. 2 to a node termed “end” with edges of cost 0. Thus, an attack on a country j corresponds to an adversary that starts at country i and goes through country j and then to the node “attack” and finally to “end”. The decision to abandon corresponds to an adversary that starts at country i then goes to “abandon” and then to “end”. The expected number of attacks on a particular target t can be computed by combining information about path costs with information about the supply of plots from a particular country S i and the yield of abandonment A. Namely, it is the number of trips from all sources that arrive to the “attack” node from target country t.

The least-cost path corresponds to the optimal choice by the terrorists, but they can make mistakes. An attack plan under uncertainty could be described as a Markov chain [20]. The chain has initial distribution proportional to S i , and a transition probability matrix M describing the likelihood of taking a particular edge on the network. The “end” node is the absorbing state of the chain. The M matrix can be computed using the least-cost guided evader model described in [20]. Briefly, for each edge (u, v) of the network, the transition probability through it is given by the formula

$$M_{uv}=\frac{\exp\left[-\lambda\left(c(p_{uv})-c(p_{u*})\right)\right]}{\sum_{w}\exp\left[-\lambda\left(c(p_{uw})-c(p_{u*})\right)\right]}\,, $$

where \(c(p_{u*})\) is the cost of the least-cost path from node u to the end node, and \(c(p_{uv})\) is the cost of the path through edge (u, v): \(p_{uv}=(u, v)\cup p_{v*}\). The sum in the denominator runs over the neighbors of node u. Thus, the model generalizes the least-cost path modelFootnote 3. The parameter λ was set to 0.1, in the reported data, but its value has a smooth effect on the predictions of the model because of the smoothness of the exponential function. The number of plots against a target country t is now found by taking the probability of a trip to that target multiplied by the total number of plots (\(=\sum_{i}S_{i}\)).

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag/Wien

About this chapter

Cite this chapter

Gutfraind, A. (2011). Targeting by Transnational Terrorist Groups. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0388-3_2

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0387-6

  • Online ISBN: 978-3-7091-0388-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics