The answer is yes, according to a paper in the SIAM Journal on Discrete Mathematics.
In a paper published in the journal last month, authors Anthony Bonato, Dieter Mitsche, and Pawel Pralat describe a mathematical model to disrupt flow of information in a complex real-world network, such as a terrorist organization, using minimal resources.
Terror networks are comparable in their structure to hierarchical organization in companies and certain online social networks, where information flows in one direction from a source, which produces the information or data, downwards to sinks, which consume it. Such networks are called hierarchical social networks.
“In such networks, the flow of information is often one way,” explains author Pawel Pralat. “For example, a celebrity such as Justin Bieber sends out a tweet, which is sent to millions of his followers. These followers send out their own retweets, and so on. We may therefore view hierarchical social networks as directed networks without cycles, or directed acyclic graphs (DAGs).”
Here, there is no requirement for reciprocity (the celebrity does not necessarily follow his or her followers). Similarly, in a terrorist network, the leaders pass plans down to the foot soldiers, and usually only one messenger needs to receive the message for the plan to be executed.
Disruption of the flow of information would correspond to halting the spread of news in an online social network or intercepting messages in a terror network.
The authors propose a generalized stochastic model for the flow and disruption of information based on a two-player outdoor game called “Seepage,” where players who depict agents attempt to block the movement of another player, an intruder, from a source node to a sink. “The game—motivated by the 1973 eruption of the Eldfell volcano in Iceland—displays some similarities to an approach used in mathematical counterterrorism, where special kinds of DAGs are used to model the disruption of terrorist cells,” says Pralat.
The motivating eruption caused a major crisis at the time, as lava flow threatened to close off the harbor, the island’s main source of income. In the game, inhabitants attempt to protect the harbor by pouring water on the volcanic lava to halt its progress. A mathematical model of the game pits two opponents against each other—the sludge, or intruder, against the greens, or agents— forming a directed acyclic graph, with one source (the top of the volcano) and many sinks representing the lake. The parameter, “seepage,” represents the amount of contamination, and the “green number” corresponds to the number of agents required to halt it.
A previous study modeled terrorist cells as partially ordered sets (a special kind of DAG), which are often used in mathematics to analyze an ordering, sequencing, or arrangement of distinct objects. In such a system, terrorist plans are formulated by nodes at the top of the hierarchy, which represent the leaders or maximal nodes of the set. The plans are transmitted down to the nodes at the bottom: these represent foot soldiers in a terror network or minimal nodes in the set who would be presumed to carry out these plans. The assumption is that one messenger is sufficient for reception and execution of the plan. Thus, if the partially ordered set represents a courier network for a terrorist organization, the intention would be to block all routes from the maximal node to the minimal nodes by capturing or killing a subset of agents.
In this paper, the authors utilize the similarities in the previous terrorist cell model to Seepage, where greens try to prevent the sludge from moving to the sinks by blocking nodes. A number of different winning strategies employed by both players are explored when played on a DAG. The seepage and green number for disrupting a given hierarchical social network are analyzed.
The primary difference from the previous study’s model is that the Seepage model is dynamic: greens can move and choose new sets of nodes over time. The authors determine that Seepage is a more realistic model of counterterrorism, as the agents do not necessarily act all at once, but over time.
The Latest Bing News on:
Detect terrorism networks
- The extremist watchers: How a network of researchers is searching for the next hate-fueled attackon July 3, 2022 at 2:24 am
Meet the people who track hate and conspiracy theories in real time: "It looks like I’m just on my phone, but I’m actually trying to save the world.” ...
- Putin wages 'economic terrorism' in Ukraine through mining operation: official warnson July 2, 2022 at 4:59 am
Russian President Vladimir Putin has waged "economic terrorism" in Ukraine by stocking ... services to deploy drones to efficiently detect buried mines left behind by Russian forces after they ...
- UNODC Builds Capacity of Uzbekistan Law- Enforcement Agencies in Disrupting Drug Trafficking Networks and Illicit Financial Flowson July 1, 2022 at 9:41 am
UNODC Builds Capacity of Uzbekistan Law- Enforcement Agencies in Disrupting Drug Trafficking Networks and Illicit Financial Flows. Modern national and transnational drug-trafficki ...
- Islamic extremists sidestep Facebook’s content policeon June 29, 2022 at 9:02 pm
director of Tech Against Terrorism, a nonprofit organization that works with smaller social networks, but not Facebook, in combating the rise of extremist content online. He added he was not surprised ...
- Facebook did little to moderate posts in the world’s most violent countrieson June 29, 2022 at 9:02 pm
Across the Middle East, clunky algorithms to detect terrorist content incorrectly deleted nonviolent ... governments like that of Bashar al-Assad in Syria, to use the social network to spread violent ...
- 20 Men Convicted for 2015 Paris Terrorist Attacks That Killed 130on June 29, 2022 at 2:08 pm
Twenty men who committed a series of deadly shootings and bombings across Paris, France in 2015, have been convicted for their roles in the attacks.
- French court finds 19 people guilty of terrorism-related charges in 2015 Paris attacks trialon June 29, 2022 at 11:32 am
French court finds 19 people guilty of terrorism-related charges in 2015 Paris attacks trial. 24/7 coverage of breaking news and live events ...
- Creation of a network of national correspondents of police authoritieson June 29, 2022 at 7:16 am
At a conference on the theme of policing in the digital era, attended by senior representatives of the Ministries of the Interior and directors of the national police forces of the member States, the ...
- Oslo attacks: Pride protesters defy Norway police warningson June 27, 2022 at 5:43 pm
Police described the attack as "Islamist terrorism" and ... of "an extremist Islamist network". Last month intelligence officers interviewed him but did not detect any "violent intent".
- How Australian lawmakers have used 9/11 to threaten civil libertieson June 27, 2022 at 9:55 am
With a dramatic rise in secrecy laws and attacks on journalism in Australia, there are many ways outsiders can support journalists and whistleblowers.
The Latest Google Headlines on:
Detect terrorism networks
The Latest Bing News on:
Terror networks
- Explained: What is the IS-KP, the terror outfit behind Kabul gurdwara attack?on July 3, 2022 at 8:00 pm
Formed in 2015, the IS-KP is the regional affiliate of the Islamic State of Iraq and Syria (ISIS), also known as ISIL (Islamic State of Iraq and the Levant). Khorasan refers to a region that falls in ...
- UAE, US strengthen cooperation in field of combating money laundering and terrorist financingon July 3, 2022 at 5:00 pm
A UAE delegation visited Washington, D.C. and met with officials from the U.S. Department of the Treasury, including representatives from the Office of Terrorist Financing and Financial Crimes, the ...
- Why Is It So Difficult to Get Off a Terrorist List?on July 3, 2022 at 7:01 am
Sham's unusual request to be removed from the U.S. terrorism lists is unlikely to be fulfilled, but this reflects bureaucratic inertia and political incentives as much as the group's radical politics.
- Ninth Meeting of the Law Enforcement Coordination Group Focused on Countering Hizballah’s Terrorist Activitieson July 1, 2022 at 11:32 pm
There is growing recognition among partners about the need to cooperate on efforts to counter Hizballah’s global terrorist networks.
- 20 Men Convicted for 2015 Paris Terrorist Attacks That Killed 130on June 29, 2022 at 2:08 pm
Twenty men who committed a series of deadly shootings and bombings across Paris, France in 2015, have been convicted for their roles in the attacks.
- As Key French Terror Trial Ends, Europe Faces New Security Landscapeon June 28, 2022 at 6:58 am
One of France’s most high-profile trials in history wraps up this week amid a sharply changing security landscape across Europe, where the war in Ukraine and far-right violence have reshaped threat ...
- Terror loving PA/Fatah use all means of communication to promote terror and end of Israelon June 28, 2022 at 2:09 am
Terror is promoted and terrorist murderers are glorified The PA and Fatah use every means of communication at their disposal to promote and endorse violence and terror. From songs broadcasted on ...
- Terror alert raised in Norway after 2 killed, 10 wounded in shooting at nightclub in Osloon June 25, 2022 at 4:39 pm
The PST security service raised its terror alert level from "moderate" to "extraordinary" — the highest level — after the attack.
- Norway shaken by attack that kills 2 during Pride festivalon June 25, 2022 at 11:06 am
Two people were killed and more than a dozen injured early Saturday in a mass shooting in Oslo, Norwegian police said, as the city was gearing up for an annual Pride parade. The shooting happened ...
- Norway shooting that left two people dead during Pride festival is investigated as terror acton June 25, 2022 at 7:22 am
Norwegian authorities have raised their terror alert to the highest level after a shooting left 2 dead and many wounded during Pride week in Oslo.