1,890 research outputs found
One-Mode Projection Analysis and Design of Covert Affiliation Networks
Subject classifications: Terrorism; Counterinsurgency; Intelligence; Defense; Covert networks; Affiliation networks.
Understanding Terrorist Network Topologies and Their Resilience Against Disruption
This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah's Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.terror networks;terrorist cells;network structure;counterterrorism
The Influence of Secrecy on the Communication Structure of Covert Networks
In order to be able to devise successful strategies for destabilizing terrorist organizations it is vital to recognize and understand their structural properties. This paper deals with the opti- mal communication structure of terrorist organizations when considering the tradeoff between secrecy and operational efficiency. We use elements from game theory and graph theory to determine the `optimal' communication structure a covert network should adopt. Every covert organization faces the constant dilemma of staying secret and ensuring the necessary coordina- tion between its members. For several different secrecy and information scenarios this dilemma is modeled as a game theoretic bargaining problem over the set of connected graphs of given order. Assuming uniform exposure probability of individuals in the network we show that the Nash bargaining solution corresponds to either a network with a central individual (the star graph) or an all-to-all network (the complete graph) depending on the link detection probabil- ity, which is the probability that communication between individuals will be detected. If the probability that an individual is exposed as member of the network depends on the information hierarchy determined by the structure of the graph, the Nash bargaining solution corresponds to cellular-like networks.covert networks;terrorist networks;Nash bargaining;game theory;information;secrecy
On Heterogeneous Covert Networks
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.covert networks;terrorist networks;heterogeneity;game theory;information;secrecy
Theoretical study of isolated dangling bonds, dangling bond wires and dangling bond clusters on H:Si(100)-(21) surface
We theoretically study the electronic band structure of isolated unpaired and
paired dangling bonds (DB), DB wires and DB clusters on H:Si(100)-(21)
surface using Extended H\"uckel Theory (EHT) and report their effect on the Si
band gap. An isolated unpaired DB introduces a near-midgap state, whereas a
paired DB leads to and states, similar to those introduced by an
unpassivated asymmetric dimer (AD) Si(100)-(21) surface. Such induced
states have very small dispersion due to their isolation from the other states,
which reside in conduction and valence band. On the other hand, the surface
state induced due to an unpaired DB wire in the direction along the dimer row
(referred to as ), has large dispersion due to the strong coupling
between the adjacent DBs, being 3.84 apart. However, in the direction
perpendicular to the dimer row (referred to as [110]), due to the reduced
coupling between the DBs being 7.68 apart, the dispersion in the surface
state is similar to that of an isolated unpaired DB. Apart from this, a paired
DB wire in direction introduces and states similar
to those of an AD surface and a paired DB wire in [110] direction exhibits
surface states similar to those of an isolated paired DB, as expected. Besides
this, we report the electronic structure of different DB clusters, which
exhibit states inside the band gap that can be interpreted as superpositions of
states due to unpaired and paired DBs.Comment: 7 pages, 10 figure, 1 tabl
The Ge(001) (2 × 1) reconstruction: asymmetric dimers and multilayer relaxation observed by grazing incidence X-ray diffraction
Grazing incidence X-ray diffraction has been used to analyze in detail the atomic structure of the (2 × 1) reconstruction of the Ge(001) surface involving far reaching subsurface relaxations. Two kinds of disorder models, a statistical and a dynamical were taken into account for the data analysis, both indicating substantial disorder along the surface normal. This can only be correlated to asymmetric dimers.
Considering a statistical disorder model assuming randomly oriented dimers the analysis of 13 symmetrically independent in-plane fractional order reflections and of four fractional order reciprocal lattice rods up to the maximum attainable momentum transfer qz = 3c* (c* = 1.77 × 10−1 Å−1) indicates the formation of asymmetric dimers characterized by R>D = 2.46(5) Å as compared to the bulk bonding length of R = 2.45 Å. The dimer height of Δ Z = 0.74(15) Å corresponds to a dimer buckling angle of 17(4)°. The data refinement using anisotropic thermal parameters leads to a bonding length of RD = 2.44(4) Å and to a large anisotropy of the root mean-square vibration amplitudes of the dimer atoms (u112) 1/2 = 0.25 Å, (u222)1/2 = 0.14 Å, (u332)1/2 = 0.50 Å). We have evidence for lateral and vertical disp tenth layer below the surface
Preroughening transitions in a model for Si and Ge (001) type crystal surfaces
The uniaxial structure of Si and Ge (001) facets leads to nontrivial
topological properties of steps and hence to interesting equilibrium phase
transitions. The disordered flat phase and the preroughening transition can be
stabilized without the need for step-step interactions. A model describing this
is studied numerically by transfer matrix type finite-size-scaling of interface
free energies. Its phase diagram contains a flat, rough, and disordered flat
phase, separated by roughening and preroughening transition lines. Our estimate
for the location of the multicritical point where the preroughening line merges
with the roughening line, predicts that Si and Ge (001) undergo preroughening
induced simultaneous deconstruction transitions.Comment: 13 pages, RevTex, 7 Postscript Figures, submitted to J. Phys.
On the Connection of Anisotropic Conductivity to Tip Induced Space Charge Layers in Scanning Tunneling Spectroscopy of p-doped GaAs
The electronic properties of shallow acceptors in p-doped GaAs{110} are
investigated with scanning tunneling microscopy at low temperature. Shallow
acceptors are known to exhibit distinct triangular contrasts in STM images for
certain bias voltages. Spatially resolved I(V)-spectroscopy is performed to
identify their energetic origin and behavior. A crucial parameter - the STM
tip's work function - is determined experimentally. The voltage dependent
potential configuration and band bending situation is derived. Ways to validate
the calculations with the experiment are discussed. Differential conductivity
maps reveal that the triangular contrasts are only observed with a depletion
layer present under the STM tip. The tunnel process leading to the anisotropic
contrasts calls for electrons to tunnel through vacuum gap and a finite region
in the semiconductor.Comment: 11 pages, 8 figure
Structure and peculiarities of the (8 x n)-type Si(001) surface prepared in a molecular-beam epitaxy chamber: a scanning tunneling microscopy study
A clean Si(001) surface thermally purified in an ultrahigh vacuum
molecular-beam epitaxy chamber has been investigated by means of scanning
tunneling microscopy. The morphological peculiarities of the Si(001) surface
have been explored in detail. The classification of the surface structure
elements has been carried out, the dimensions of the elements have been
measured, and the relative heights of the surface relief have been determined.
A reconstruction of the Si(001) surface prepared in the molecular-beam epitaxy
chamber has been found to be (8 x n). A model of the Si(001)-(8 x n) surface
structure is proposed.Comment: 4 pages, 8 figures. Complete versio
- …
