Content area
Full text
A B S T R A C T A N D A R T I C L E I N F O R M A T I O N
In recent years, the world has witnessed the emergence of violent extremists (VEs), and they have become an ongoing concern for countries around the globe. A great deal of effort has been expended examining their nature and structure in order to aid in the development of interventions to prevent further violence. Analysts and scholars have been particularly interested in identifying structural features that enhance (or diminish) VE resilience to exogenous and endogenous shocks. As many have noted, VEs typically seek to balance operational security and capacity/efficiency. Some argue that their desire for secrecy outweighs their desire for efficiency, which leads them to be less centralized with few internal connections. Others argue that centralization is necessary because security is more easily compromised and that internal density promotes solidarity and limits countervailing influences. Unsurprisingly, scholars have found evidence for both positions. In this paper, we analyze the Noordin Top terrorist network over time to examine the security-efficiency tradeoff from a new perspective. We find that the process by which they adopt various network structures is far more complex than much of the current literature suggests. The results of this analysis highlight implications for devising strategic options to monitor and disrupt dark networks.
Article History:
Received 26 April 2014
Received in revised form 9 Sept 2014
Accepted 17 Sept 2014
Keywords:
dark networks, terrorism, social network analysis.
© 2015 Criminology, Criminal Justice, Law & Society and The Western Society of Criminology Hosting by Scholastica. All rights reserved.
Violent extremist networks (aka covert networks, dark networks) are an ongoing concern for countries around the globe. Their nature and structure have been examined for the purpose of developing interventions that destabilize, disrupt, or otherwise prevent further violence. Identifying structural features that enhance (or diminish) their resilience to exogenous and endogenous shocks is of particular interest. As many have noted, groups generally seek to balance operational security and capacity/efficiency (see e.g., Combatting Terrorism Center, 2006; Crossley, Edwards, Harries, &
Stevenson, 2012; McCormick & Owen, 2000; Morselli, Giguere, & Petit, 2007). A consensus, however, has not been reached as to which features...




