Skip to main content
Log in

Combating terrorist networks: An evolutionary approach

  • Published:
Computational & Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

This paper will briefly examine how Al Qaeda evolved from an insurgency assistance group to a terrorist network of sophistication and global reach. It argues that Al Qaeda filled the needs of Islamist insurgencies and then developed into a complex system of networks by co-opting other groups, hijacking their agendas and transforming their ideologies during the late 1990s to the present. Al Qaeda thus has global and local aspects. Locally-oriented “associate” organizations may have somewhat variant structures and will vary in their goals, targets, and ideology. In some ways, these groups are more vulnerable to discovery by local authorities and disruption. They tend to lack the training, professionalism, education and capacity to ensure strict security measures and discipline within their own ranks. They lack resources such as weaponry and human social capital, such as experience or specific kinds of knowledge that Al Qaeda has been able to provide. Because they are only loosely coupled to the parent organization, both parent and “child” network receive “force multiplier” benefits while minimizing risks and costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Arquilla J, Ronfeldt D (2001) Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: Rand Corporation.

  • Bergen P (2001) Holy War, Inc. Inside the secret world of Osama Bin Laden. Free Press, New York

  • Byman DL, Chalk P, Bruce H, William R, David B (2001) Trends in outside support for insurgent movements. Washington, D.C. : Rand.

  • Carr C (2003) The lessons of terror: A history of warfare against civilians. Revised edition. Random House, New York

  • Gunaratna R (2002) Inside Al Qaeda: Global network of terror. Columbia University Press, New York

  • Grannovetter M (1978) The strength of weak ties

  • Hefner R (1999) Religion: Evolving pluralism. In Indonesia Beyond Suharto: Polity, Economy, Society, Transition. Asia Society. Armonk, NY: M.E. Sharp. pp. 205–236

  • International Crisis Group (2002) Indonesia Backgrounder: How the Jemaah Islamiyya Terrorist Network Operates. Asia pp. 43

  • Metz S (1993) The future of insurgency report. Strategic Studies Institute, U.S. Army War College, Carlisle Barracks, PA 17013-5050. Available at http://www.carlisle.army.mil/ssi/pubs/1993/insurg/insurg.pdf

  • Milgram S (1967) The small world problem. Psychology Today, 2:60–67

    Google Scholar 

  • Wright L (2002) Profiles: The man behind bin laden. The New Yorker. http://www.newyorker.com/printable/?fact/020916fa_fact2

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rebecca Goolsby.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Goolsby, R. Combating terrorist networks: An evolutionary approach. Comput Math Organiz Theor 12, 7–20 (2006). https://doi.org/10.1007/s10588-006-7081-0

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-006-7081-0

Keywords

Navigation