After the events of 9/11, U.S. counterterrorism became more proactive in that the Patriot Act allowed the authorities far more freedom to directly attack terrorist network structures. We argue that rational terrorists will attempt to thwart such policies and restructure themselves to be less penetrable. We model the trade-off between security and intragroup communication faced by terrorists. The model is used to derive the anticipated changes in network structure and the consequent changes in the type, complexity, and success rate of potential terrorist attacks.
Arce, Daniel G., and Todd Sandler. 2005. Counterterrorism: A game-theoretic approach, Journal of Conflict Resolution49 (2): 183-200.
2.
Arquilla, John, David Ronfeldt, and Michele Zanini. 1999. Networks, netwar, and unformation-age terrorism. In Countering the New Terrorism, edited by Ian Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, and Michele Zanini, chap. 3. Santa Monica, CA: RAND.
3.
Brams, Steven, Hande Mutlu, and Shawn Ramirez. 2006. Influence in terrorist networks: From undirected to directed graphs. Studies in Conflict and Terrorism29 (7), 679-694.
4.
Bueno de Mesquita, Ethan. 2005. The quality of terror. American Journal of Political Science49 (3): 515-530.
5.
Carley, Kathleen, Matthew Dombroski, Max Tsvetovat, Jeffrey Reminga, and Natasha Kamneva. 2003. Destabilizing dynamic covert networks. In Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington D.C. www.sandia.gov/ACG/focusareas/previousfocusareas/seldon/papers/a2c2_carley_2003_destabilizing.pdf (accessed May 2, 2006).
6.
Enders, Walter, and Todd Sandler. 1993. The effectiveness of anti-terrorism policies: A vector-autoregression-intervention analysis. American Political Science Review87 (4): 829-844.
7.
Enders, Walter, and Todd Sandler. 2004. What do we know about the substitution effect in transnational terrorism? In Research on terrorism: Trends, achievements and failures, edited by Andrew Silke, 119-137. London: Frank Cass.
8.
Enders, Walter, and Todd Sandler. 2006. The political economy of terrorism. Cambridge, UK: Cambridge University Press.
9.
Faria, João R.2003. Terror cycles. Studies in Nonlinear Dynamics and Econometrics7 (1): 1-11.
10.
Faria, João R., and Daniel G. Arce. 2005. Terror support and recruitment. Defence and Peace Economics16 (4): 263-273.
11.
Farley, Jonathan David. 2003. Breaking al Qaeda cells: A mathematical analysis of counterterrorism operations (A guide for risk assessment and decision making). Studies in Conflict and Terrorism26: 399-411.
12.
Gambill, Gary. 2002. Sponsoring terrorism: Syria and Hamas. Middle East Intelligence Bulletin4 (10). http://www.meib.org/articles/0210%7B%5C_%7Ds1.htm (accessed May 2, 2006).
13.
Krebs, V. E.2001. Mapping networks of terrorist cells. Connections24 (3): 43-52.
14.
National Commission on Terrorist Attacks Upon the United States (2004). The 9/11 Commission Report. New York: Norton.
15.
Merrari, Ariel. 1999. Terrorism as a strategy of struggle: Past and future. Terrorism and Political Violence11 (4): 52-65.
16.
Rodriguez, Jose. 2004. The March 11th terrorist network: In its weakness lies its strength. Department of Sociology Analysis of Organizations: University of Barcelona. www.ub.es/epp/redes.htm (accessed May 2006).
17.
Sparrow, Malcolm. 1991. The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks13: 251-274
18.
Wilkinson, Paul. 2005. Concerted effort needed to beat al-Qaeda. Transcript of radio interview available at www.abc.net.au/pm/content/2005/s1412793.htm (accessed April 2006).