63 research outputs found

    On Heterogeneous Covert Networks

    Get PDF
    Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.covert networks;terrorist networks;heterogeneity;game theory;information;secrecy

    Understanding Terrorist Network Topologies and Their Resilience Against Disruption

    Get PDF
    This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah's Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.terror networks;terrorist cells;network structure;counterterrorism

    The Influence of Secrecy on the Communication Structure of Covert Networks

    Get PDF
    In order to be able to devise successful strategies for destabilizing terrorist organizations it is vital to recognize and understand their structural properties. This paper deals with the opti- mal communication structure of terrorist organizations when considering the tradeoff between secrecy and operational efficiency. We use elements from game theory and graph theory to determine the `optimal' communication structure a covert network should adopt. Every covert organization faces the constant dilemma of staying secret and ensuring the necessary coordina- tion between its members. For several different secrecy and information scenarios this dilemma is modeled as a game theoretic bargaining problem over the set of connected graphs of given order. Assuming uniform exposure probability of individuals in the network we show that the Nash bargaining solution corresponds to either a network with a central individual (the star graph) or an all-to-all network (the complete graph) depending on the link detection probabil- ity, which is the probability that communication between individuals will be detected. If the probability that an individual is exposed as member of the network depends on the information hierarchy determined by the structure of the graph, the Nash bargaining solution corresponds to cellular-like networks.covert networks;terrorist networks;Nash bargaining;game theory;information;secrecy

    One-Mode Projection Analysis and Design of Covert Affiliation Networks

    Get PDF
    Subject classifications: Terrorism; Counterinsurgency; Intelligence; Defense; Covert networks; Affiliation networks.

    Understanding Terrorist Network Topologies and Their Resilience Against Disruption

    Get PDF
    This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social networks. This finding is backed by empirical evidence concerning Jemaah Islamiyah's Bali bombing and a heroin distribution network in New York. The importance of this finding lies in the strength such a topology provides. Disruption and attack by counterterrorist agencies often focuses on the isolation and capture of highly connected individuals. The remarkable result is that these covert networks are well suited against such targeted attacks as shown by the resilience properties of secrecy versus information balanced networks. This provides an explanation of the survival of global terrorist networks and food for thought on counterterrorism strategy policy.

    A New Approximation Method for the Shapley Value Applied to the WTC 9/11 Terrorist Attack

    Get PDF
    The Shapley value (Shapley (1953)) is one of the most prominent one-point solution concepts in cooperative game theory that divides revenues (or cost, power) that can be obtained by cooperation of players in the game. The Shapley value is mathematically characterized by properties that have appealing real-world interpretations and hence its use in practical settings is easily justified. The down part is that its computational complexity increases exponentially with the number of players in the game. Therefore, in practical problems that consist of more that 25 players the calculation of the Shapley value is usually too time expensive. Among others the Shapley value is applied in the analysis of terrorist networks (cf. Lindelauf et al. (2013)) which generally extend beyond the size of 25 players. In this paper we therefore present a new method to approximate the Shapley value by refining the random sampling method introduced by Castro et al. (2009). We show that our method outperforms the random sampling method, reducing the average error in the Shapley value approximation by almost 30%. Moreover, our new method enables us to analyze the extended WTC 9/11 network of Krebs (2002) that consists of 69 members. This in contrast to the restricted WTC 9/11 network considered in Lindelauf et al. (2013), that only considered the operational cells consisting of the 19 hijackers that conducted the attack

    Perioperative Hyperspectral Imaging to Assess Mastectomy Skin Flap and DIEP Flap Perfusion in Immediate Autologous Breast Reconstruction: A Pilot Study.

    Get PDF
    Mastectomy skin flap necrosis (MSFN) and partial DIEP (deep inferior epigastric artery perforator) flap loss represent two frequently reported complications in immediate autologous breast reconstruction. These complications could be prevented when areas of insufficient tissue perfusion are detected intraoperatively. Hyperspectral imaging (HSI) is a relatively novel, non-invasive imaging technique, which could be used to objectively assess tissue perfusion through analysis of tissue oxygenation patterns (StO2%), near-infrared (NIR%), tissue hemoglobin (THI%), and tissue water (TWI%) perfusion indices. This prospective clinical pilot study aimed to evaluate the efficacy of HSI for tissue perfusion assessment and to identify a cut-off value for flap necrosis. Ten patients with a mean age of 55.4 years underwent immediate unilateral autologous breast reconstruction. Prior, during and up to 72 h after surgery, a total of 19 hyperspectral images per patient were acquired. MSFN was observed in 3 out of 10 patients. No DIEP flap necrosis was observed. In all MSFN cases, an increased THI% and decreased StO2%, NIR%, and TWI% were observed when compared to the vital group. StO2% was found to be the most sensitive parameter to detect MSFN with a statistically significant lower mean StO2% (51% in the vital group versus 32% in the necrosis group, p < 0.0001) and a cut-off value of 36.29% for flap necrosis. HSI has the potential to accurately assess mastectomy skin flap perfusion and discriminate between vital and necrotic skin flap during the early postoperative period prior to clinical observation. Although the results should be confirmed in future studies, including DIEP flap necrosis specifically, these findings suggest that HSI can aid clinicians in postoperative mastectomy skin flap and DIEP flap monitoring

    Optimizing topological cascade resilience based on the structure of terrorist networks

    Get PDF
    Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades - to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an optimization method for constructing networks with high passive cascade resilience. The optimal networks are found to be based on cells, where each cell has a star topology. Counterintuitively, we find that there are conditions where networks should not be modified to stop cascades because doing so would come at a disproportionate loss of efficiency. Implementation of these findings can lead to more cascade-resilient networks in many diverse areas.Comment: 26 pages. v2: In review at Public Library of Science ON
    • …
    corecore