Temporal Dynamics in Covert Networks: A Case Study of the Structure behind the Paris and Brussels Attacks

This paper analyzes the network behind the Paris and Brussels attacks and related plots that were organized in the name of Islamic State. It answers the questions how the network was structured and how it developed over time. The database used contains highly reliable information from the judiciary...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Remmers, Jasmijn M. (Autor)
Tipo de documento: Electrónico Artículo
Lenguaje:Inglés
Publicado: 2022
En: Terrorism and political violence
Año: 2022, Volumen: 34, Número: 1, Páginas: 131-154
Acceso en línea: Volltext (lizenzpflichtig)
Journals Online & Print:
Gargar...
Verificar disponibilidad: HBZ Gateway
Palabras clave:

MARC

LEADER 00000caa a22000002c 4500
001 1789489725
003 DE-627
005 20220221095349.0
007 cr uuu---uuuuu
008 220214s2022 xx |||||o 00| ||eng c
024 7 |a 10.1080/09546553.2019.1671373  |2 doi 
035 |a (DE-627)1789489725 
035 |a (DE-599)KXP1789489725 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Remmers, Jasmijn M.  |e VerfasserIn  |4 aut 
245 1 0 |a Temporal Dynamics in Covert Networks: A Case Study of the Structure behind the Paris and Brussels Attacks 
264 1 |c 2022 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This paper analyzes the network behind the Paris and Brussels attacks and related plots that were organized in the name of Islamic State. It answers the questions how the network was structured and how it developed over time. The database used contains highly reliable information from the judiciary and the intelligence community. It is therefore among the first to allow for statistical analysis of the typology of a covert network, while also being reliable and detailed enough to admit for an analysis of the covert network chronological development. The findings are that the network was centralized and thus vulnerable to targeted attacks against the most central nodes. The network developed in three phases: (1) construction of local cells, predominantly based on pre-existing ties; (2) travel to Islamic State and merger with a larger network; (3) consolidation before carrying out an attack. In addition, it is found that (1) most network analyses of covert networks understate the importance of peripheral nodes, and (2) that analyzing the final configuration of the network alone does not necessarily lead to correct conclusions, as it ignores the underlying structures of pre-existing networks. 
650 4 |a Temporal dynamics 
650 4 |a Covert networks 
650 4 |a Brussels attacks 
650 4 |a Paris attacks 
650 4 |a Social Network Analysis 
650 4 |a Terrorism 
650 4 |a Islamic State 
651 4 |a Verviers 
773 0 8 |i Enthalten in  |t Terrorism and political violence  |d London : Cass, 1989  |g 34(2022), 1, Seite 131-154  |h Online-Ressource  |w (DE-627)349234795  |w (DE-600)2080322-9  |w (DE-576)113563507  |x 1556-1836  |7 nnas 
773 1 8 |g volume:34  |g year:2022  |g number:1  |g pages:131-154 
856 4 0 |u https://doi.org/10.1080/09546553.2019.1671373  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4056350787 
LOK |0 003 DE-627 
LOK |0 004 1789489725 
LOK |0 005 20220214051547 
LOK |0 008 220214||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2022-02-13#2FE9D7A923309A61E85128DFDF03F4510244F5AD 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota  |a tiep 
ORI |a SA-MARC-krimdoka001.raw