Leaderless Covert Networks: A Quantitative Approach
AbstractAbstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert networks organize according to leaderless principles, i.e., clear leaders can not be identified. This flat organizational structure is quite robust to destabilization tactics which target the most important persons in a network. There exist several centrality measures to express the importance of persons in a network. The most recent one introduced in the field of covert networks is a game theoretical centrality measure which takes into account both the structure of the covert network, which usually reflects a communication structure, as well as non-network features, which represent individual parameters like financial means or bomb building skills, see Lindelauf et al. (2011). The question we try to answer in this chapter is whether there is a relationship between the quality of a covert network based on their optimality with respect to the trade-off between secrecy and information and the variance of the game theoretic centrality measures of the respective individuals in the network. The leaderless hypothesis seems to suggest that good covert networks do not have a high distinction between centrality of the individuals, i.e., they are leaderless. We investigate this by looking at homogeneous networks and heterogeneous networks in which the links between individuals are weighted. We find that (approximate) optimal networks have low variance in game-theoretic centrality, i.e., we find evidence that supports the leaderless hypothesis. However, if the networks are heterogeneous in the sense that, for instance, certain individuals communicate much more often than others, we find that the variance increases significantly. Finally, we look at the Jemaah Islamiyah 2002 Bali bombing. We find that the operational network used to conduct and to coordinate the bombing not only facilitated both secrecy and efficiency but also adhered to the leaderless principle.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by Tilburg University, Center for Economic Research in its series Discussion Paper with number 2012-057.
Date of creation: 2012
Date of revision:
Contact details of provider:
Web page: http://center.uvt.nl
terrorism; network analysis; centrality; game theory;
Find related papers by JEL classification:
- C71 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Cooperative Games
This paper has been announced in the following NEP Reports:
- NEP-ALL-2012-07-29 (All new papers)
- NEP-GTH-2012-07-29 (Game Theory)
- NEP-ICT-2012-07-29 (Information & Communication Technologies)
- NEP-NET-2012-07-29 (Network Economics)
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Lindelauf, R. & Hamers, H.J.M. & Husslage, B.G.M., 2011. "Game Theoretic Centrality Analysis of Terrorist Networks: The Cases of Jemaah Islamiyah and Al Qaeda," Discussion Paper 2011-107, Tilburg University, Center for Economic Research.
- Kóczy Á., László, 2012.
"Elméleti játékok, 2012. 8th Spain-Italy-Netherlands Meetings on Game Theory (SING8)
[Theoretical Games 2012. The 8th Spain-Italy-Netherlands Meeting on Game Theory (SING8)]," Közgazdasági Szemle (Economic Review - monthly of the Hungarian Academy of Sciences), Közgazdasági Szemle Alapítvány (Economic Review Foundation), vol. 0(11), pages 1257-1261.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Richard Broekman).
If references are entirely missing, you can add them using this form.