Public Release:  Less is more in the fight against terrorism

Inderscience Publishers

Terrorist networks are complex. Now, a mathematical analysis of their properties published this month in the International Journal of Networking and Virtual Organisations, suggests that the best way to fight them is to isolate the hubs within the network rather than trying to destroy the network as a whole through short-term battles.

According to Philip Vos Fellman a Lecturer at Suffolk University, Boston, and member of the New England Complex Systems Institute, USA, tools used to analyze complex systems can also be used to study terrorist networks with a view to undermining them.

Vos Fellman explains how terrorist networks are "typical of the structures encountered in the study of conflict, in that they possess multiple, irreducible levels of complexity and ambiguity."

"This complexity is compounded by the covert activities of terrorist networks where key elements may remain hidden for extended periods of time and the network itself is dynamic," adds Vos Fellman, an expert in mathematical modeling and strategy. The nature of a dynamic network is akin to the robust Internet but contrasts starkly with the structure of the armed forces or homeland security systems, which tend to be centralized and hierarchical.

Vos Fellman has used network analysis, agent-based simulation, and dynamic NK Boolean fitness landscapes to try and understand the complexities of terrorist networks. In particular, he has focused on how long-term operational and strategic planning might be undertaken so that tactics which appear to offer immediate impact are avoided if they cause little long-term damage to the terrorist network.

Vos Fellman's computer simulations of terrorist networks suggest that isolation rather than removal could be the key to successfully defeating them.

"The results which these simulation and dynamical systems modeling tools present suggest that quite literally sometimes less is more," says Vos Fellman, "and that operational objectives might be better directed at isolation rather than removal." He also points out that the simulations show that soft, or easy, targets of small cells within a network are, for the most part, not worth pursuing. Instead efforts should be focused on the hubs around which the network hinges. "If you are not focused on the top problems, then considerations of opportunity cost suggest that it may be better to do nothing rather than to waste valuable resources on exercises which are doomed to fail," he says.

###

"The complexity of terrorist networks" in Int. J. Networking and Virtual Organisations, 2010, 8, 4-14

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.