< < <
Date Index
> > >
Network Perspectives on Fighting Terrorists
by Threehegemons
19 September 2001 20:02 UTC
< < <
Thread Index
> > >
This article, which includes commentary from a number of sociologists including 
Manuel Castells, generated some lively debate on the Social Networks list about 
the political role of sociologists.

Steven Sherman

Disconnect the Dots 
Maybe We Can't Cut Off Terror's Head, but We Can Take Out Its Nodes 
     The essence of this first war of the 21st century is that it's not like 
the old ones. (David Suter - for The Washington Post) 
 




 America Attacked 
I N &#8211; D E P T H  C O V E R A G E



_____Top Stories_____ 

&#8226; Pakistan Army Reports Afghan Troop Movements (Reuters, Sep 17, 2001) 
&#8226; Bush Gets More International Support For U.S. Campaign Against 
Terrorism (The Washington Post, Sep 17, 2001) 
&#8226; New Powers Sought for Surveillance (The Washington Post, Sep 17, 2001) 
&#8226; Region Struggles to Regain Footing (The Washington Post, Sep 17, 2001) 
&#8226; 'It Will Never Be the Same' (The Washington Post, Sep 17, 2001) 
&#8226; Full Coverage 
 
 
 

___ The Victims ___
Type Full or Partial Name:
  
&#8226; Full List So Far



___ Online Extras ___
&#8226; Photo Galleries
&#8226; List of Live Discussions
&#8226; Audio & Video Coverage
&#8226; Texts, Transcripts Archive


_____Graphics_____ 


 Aviation U.S. Airport Status Reagan National Closed Tighter Security Rules Air 
Defense's Response Hijacked Flight Paths Animated Flight Paths Boeing 767-200ER 
Plan Boeing 757-200 Plan Travel After the Gulf War _____________________  
 Investigation Terrorism Suspects Bin Laden Overview Pakistan at a Glance 
Afghanistan at War A Volatile Region Key Points - 9/14 Evidence Search - 9/13 
_____________________  
 World Trade Center Searchers' Tools Anatomy of an Attack Attack Sequence From 
Birth to Rubble Manhattan Map - 9/12 _____________________  
 Pentagon Navy Command Center Shoring Up Damage Rescue Efforts - 9/13 Pentagon 
Attack/Map _____________________  

 
 
 

___ Terrorism ___
Background:
&#8226; Attacks and Organizations


___ Osama bin Laden ___

 At a Glance:
&#8226; Bin Laden and His Group, Al Qaeda
&#8226; Bin Laden's Regional Neighbors

Background:
&#8226; Architect of Global Terrorism
&#8226; Bin Laden: a 'Master Impresario'
&#8226; CIA's Covert War on Bin Laden
&#8226; Video: Bob Woodward on the CIA

 
 
 

_____Editorials_____ 

&#8226; A New Week (The Washington Post, Sep 17, 2001) 
&#8226; More Editorials 

_____Opinions_____ 

&#8226; Allies With Agendas (The Washington Post, Sep 17, 2001) 
&#8226; Two Cheers For War (The Washington Post, Sep 17, 2001) 
&#8226; Playground Patrol (The Washington Post, Sep 17, 2001) 
&#8226; Terror's Aftermath (The Washington Post, Sep 17, 2001) 
&#8226; More Opinions 
 
 
 

    
  E-Mail This Article
  
  Printer-Friendly Version 
  
  Subscribe to The Post 
  
 
 
 
 
By Joel Garreau
Washington Post Staff Writer
Monday, September 17, 2001; Page C01 


The essence of this first war of the 21st century is that it's not like the old 
ones.

That's why, as $40 billion is voted for the new war on terrorism, 35,000 
reservists are called up and two aircraft carrier battle groups hover near 
Afghanistan, some warriors and analysts have questions:

In the Information Age, they ask, how do you attack, degrade or destroy a 
small, shadowy, globally distributed, stateless network of intensely loyal 
partisans with few fixed assets or addresses?

If bombers are not the right hammer for this nail, what is?

Bombers worked well in wars in which one Industrial Age military threw steel at 
another. World War II, for instance, was a matchup of roughly symmetrical 
forces.

This is not true today.

That's why people who think about these things call this new conflict 
"asymmetric warfare." The terrorist side is different: different organization, 
different methods of attack -- and of defense.

"It takes a tank to fight a tank. It takes a network to fight a network," says 
John Arquilla, senior consultant to the international security group Rand and 
co-author of the forthcoming "Networks and Netwars: The Future of Terror, Crime 
and Militancy."

He asks: "How do you attack a trust structure -- which is what a network is? 
You're not going to do this with Tomahawk missiles or strategic bombardment."

"It's a whole new playing field. You're not attacking a nation, but a network," 
says Karen Stephenson, who studies everything from corporations to the U.S. 
Navy as if they were tribes. Trained as a chemist and anthropologist, she now 
teaches at Harvard and the University of London. "You have to understand what 
holds those networks in place, what makes them strong and where the leverage 
points are. They're not random connections," she says.

Human networks are distinct from electronic ones. They are not the Internet. 
They are political and emotional connections among people who must trust each 
other in order to function, like Colombian drug cartels and Basque separatists 
and the Irish Republican Army. Not to mention high-seas pirates, smugglers of 
illegal immigrants, and rogue brokers of weapons of mass destruction.

But how to establish a target list in a network?

The good news is that in the last decade we have developed a whole new set of 
weapons to figure that out.

An industry has arisen to help corporations build new networks and junk old 
hierarchical bureaucracies in the age of merging and emerging companies, says 
Kathleen Carley, director of the Center for Computational Analysis of Social 
and Organizational Systems at Carnegie Mellon University. New tools have been 
developed that analyze how an organization interacts, yielding a kind of X-ray 
that shows where the key links are.

There is a general set of principles to any network, says Stephenson, whose 
company, NetForm, has developed software that mathematically analyzes networks.

She points out that typically a network is made up of different kinds of nodes 
-- pivotal people.

The critical ones are "hubs," "gatekeepers" and "pulsetakers," she believes. 
Hubs are the people who are directly connected to the most people; they know 
where the best resources are and they act as clearinghouses of information and 
ideas, although they often are not aware of their own importance. Gatekeepers 
are those connected to the "right" people. They are the powers around the 
throne, and often they know their own importance. Pulsetakers are indirectly 
connected to a lot of people who know the right people. They are "friends of a 
friend" to vast numbers of people across widely divergent groups and interests.

The classic example of how to use this analysis is "finding the critical 
employee in the company -- the lone expert who knows how to fix the machine," 
Carley says. Ironically, without network analysis, managers frequently don't 
recognize who that is and the nature of his importance.

"But there's no reason it can't be turned around in the opposite way," she 
says. There's no reason organizational glitches, screw-ups, jealousies and 
distrust that slow and degrade performance can't be intentionally introduced." 
A network's ability to adapt to new challenges can be degraded.

Carley says: "One of the things that leads to the ability to adapt is who knows 
who and who knows what. The higher that is, the better the group's flexibility. 
But you can reduce the number of times the group can communicate or congregate. 
Or you can rotate personnel rapidly." And in war, this may have to be done by 
capturing or killing them. "You can also segregate the things people are doing, 
so they learn only on a need-to-know basis. The more isolated the tasks are, 
the more you inhibit their ability to function as a team.

"Imagine in your office if you knew who went to whom for advice," Carley says. 
"If you found a set of people who gave out more advice than anyone else and 
then removed them from the network, so they can't communicate with others, you 
would infringe on the ability of the network to operate."

In the case of terror networks, people are linked by family ties, marriage ties 
and shared principles, interests and goals. They thus can be all of one mind, 
even though they are dispersed and devoted to different tasks. They "know what 
they have to do" without needing a single-central leadership, command or 
headquarters.

There is no precise heart or head that can be targeted, Arquilla says. Even if 
you take out an Osama bin Laden, his organization, al Qaeda ("The Base"), still 
has the resilience of a classic human network. Bin Laden's, for instance, is 
made up of an estimated two dozen separate militant Islamic groups in the 
Philippines, Lebanon, Egypt, Kashmir, Algeria, Indonesia and elsewhere, with 
hundreds of cells, some of them located in Western Europe and even the United 
States, as we've discovered in the past week.

On the other hand, depending on the structure of the network, removing a few 
key nodes can sometimes do a lot of good, says Frank Fukuyama, author of the 
seminal work "Trust: The Social Virtues and the Creation of Prosperity" and now 
a professor at the School of Advanced International Studies at Johns Hopkins 
University.

"Some are so tightly bound to each other that they are not embedded in other 
networks. Kill a few nodes, and the whole thing collapses. Take the case of the 
Sendero Luminoso [Shining Path] in Peru. It couldn't have been that 
hierarchical. It was designed for the mountains of Peru. It couldn't have been 
terribly centralized. It had a scattered cell structure. It was hard to 
infiltrate. It was dispersed. And yet when you got [Shining Path founder and 
leader Abimael] Guzman and a few top aides, the entire thing fell apart.

"The idea that there is no end of terorrists, no way to stamp them all out, 
that if you kill a hundred, another hundred will spring up -- I would be very 
careful of that assumption. The network of people who are willing to blow 
themselves up has to be limited. Sure, there are sympathizers and bagmen and 
drivers. But the actual core network of suicide bombers is probably a much 
smaller population. It is also tightknit and hard to infiltrate. But it is 
limited. It is not obvious to me that there is an endless supply."

Another tactic: advancing the cause of the weakest link.

"Suppose I've got a really powerful pulsetaker," says Stephenson, "vying for a 
position of dominance. But I also know that a member of the blood kin group is 
moving forward who is weaker. If you arrange an accident to eliminate the 
pulsetaker, and let the weaker family member come in, you've helped corrupt the 
network."

The beauty of seeding weakness into an organization is that you can degrade its 
effectiveness while still monitoring it, and not causing a new and potentially 
more efficient organization to replace it. "You don't want to blow away the 
organization. You want to keep some fraudulent activity going on so you can 
monitor it. If you blow them away, you lose your leads," says Stephenson. 
"Better the devil you know. Like [Moammar] Gaddafi. Keep him alive, because you 
know him. Who knows what sort of clever mastermind might replace him."

Intelligence is crucial to analyze the network's weak links so you can destroy 
it.

"You're talking about what amounts to a clan or a tribe or brotherhood of blood 
and spilled blood. That is really tough to crack. Trying to infiltrate it -- 
we're talking years," says David Ronfeldt, a senior social scientist at Rand. 
However, from outside the network you can also look for patterns that stand out 
from the norm, like who talks to whom, e-mail exchanges, telephone records, 
bank records and who uses whose credit card, says Ronfeldt.

"I would attack on the basis of their trust in the command and control 
structures by which they operate," says Arquilla. "If they believe they are 
being listened to, they will be inhibited. If we were to reduce their trust in 
their infrastructure, it would drive them to non-technical means -- force them 
to keep their heads down more. A courier carrying a disk has a hell of a long 
way to go to communicate worldwide. If you slow them down, interception is more 
likely."

Human networks are distinct from electronic networks. But technology is the sea 
in which they swim.

"What made nets vulnerable historically is their inability to coordinate their 
purpose," says Manuel Castells, author of "The Rise of the Network Society," 
the first volume of his trilogy, "The Information Age."

"But at this point," he says, "they have this ability to be both decentralized 
and highly focused. That's what's new. And that's technology. Not just 
electronic. It's their ability to travel everywhere. Their ability to be 
informed everywhere. Their ability to receive money from everywhere."

This is why Arquilla is dubious about some traditional intelligence-gathering 
techniques, and enthusiastic about new ones. For instance: You can talk about 
turning one of the network members over to your side, but "that's problematic," 
he says. "You don't know if they're playing you as a double agent or are simply 
psychotic." He is also dubious about the value of satellite reconnaissance in 
determining what we need to know about these networks.

However, Arquilla likes the idea of understanding how the network works by 
using clandestine technical collection. For instance, he says, when any 
computer user surfs on the Web -- looking for travel tickets, say -- more often 
than not a piece of software, called a cookie, is transmitted to his computer. 
The device monitors his every move and reports back to some database what he's 
done.

Now, Arquilla says, "think of something much more powerful than cookies." They 
exist, he says. One way to use them is by creating "honey pots." This involves 
identifying Web sites used by activists or setting up a Web site that will 
attract them, and seeding them with these intelligent software agents. When the 
activists check in, they can't leave without taking with them a piece of 
software that allows you to backtrack, getting into at least one part of the 
enemy network. "That likely gives you his/her all-channel connections, and 
maybe even some hints about hubs or the direction of some links," says Arquilla.

There are other possibilities.

"You know those little cameras that some people have on top of their monitors? 
Let me just say that it is entirely possible to activate those and operate them 
and look through them without the machine being turned on," he says.

Software also exists that "allows you to reconstruct every single keystroke. 
One after the other. Why is that important? If you do find the right machine, 
you can reconstruct everything that happens. Even with unbreakable encryption, 
you have all the keystrokes."

Much of this is hardly new, of course. Divide and conquer has worked for a long 
time. Whenever the police got a Mafia wiseguy -- Joe Valachi, for instance -- 
to betray the others, no Mafiosi could trust another one as much anymore. 
Machiavelli, in "The Prince" of 1505, wrote about the strategic deployment of 
betrayal to undermine trust.

What's different is our technological ability to track groups in real time and 
see patterns that may be invisible on the surface. "Our technology is 
sufficient that you can now handle realistic-ized groups. We can deal with 30 
to several thousand," says Carley. "You couldn't do that before."

In 1996, Arquilla and Ronfeldt wrote a slim but highly prescient volume called 
"The Advent of Netwar" for the National Defense Research Institute, a federally 
funded research and development center sponsored by the Office of the Secretary 
of Defense, the Joint Chiefs of Staff and the defense agencies.

It predicts that in a war between human networks, the side with superior 
intelligence wins. It also makes some tactical suggestions about countering 
human networks with counter-networks that actually have been used to combat 
computer hackers.

They include:

&#8226; Find a member of the enemy group who is clearly a harmless idiot; treat 
him as if he were the most important figure and the only one worthy of being 
taken seriously.

&#8226; Single out competent and genuinely dangerous figures; write them off or 
call their loyalty to the cause into question.

&#8226; Control the stories people tell each other to define their reason for 
living and acting as they do. The terrorist story, says Ronfeldt, "gives these 
people common cause -- us versus them. Right now the U.S. would seem to have 
the edge at the worldwide level. But within the region, there was the dancing 
in the streets in Palestine. Part of the story is that America's evil, and that 
America's presence is to blame for so many of the problems in the Middle East. 
We have to attack that part."

&#8226; Find the list of demands extorted by the network; grant some that make 
no sense and/or disturb and divide their political aims.

&#8226; Paint the enemy with PR ugly paint so that they seem beyond the pale, 
ridiculous, alien, maniacal, inexplicable.

&#8226; Destroy their social support networks by using "helpful" but 
differently valued groups that are not perceived as aggressive.

&#8226; Divide and conquer; identify parts of the network that can be pacified 
and play them against former allies.

&#8226; Intensify the human counter-networks in one's own civil society.

Adds Manuel Castells: "We should be organizing our own networks, posing as 
Islamic terrorist networks. We should then demand to join one of these networks 
and then destroy the trust structures. Only way to infiltrate. Oldest technique 
in the world."

Few of these ideas involve flattening Kabul, all of these analysts note.

Stephenson worries that massing the Navy near Afghanistan is "a symbolic show 
of old-fashioned strength. It's not about that anymore. This whole playing 
ground has shifted."

"In order to do anything, you cannot be blind," says Castells. "The most 
extraordinary vulnerability of the American military is it looks like they do 
not have many informants inside Afghanistan. It also looks like the majority of 
the components of this network do not relate directly or essentially to 
nation-states. That is new Unless we have a fundamental rethinking of strategic 
matters, it's going to be literally, literally exhausting and impossible. It 
will be desperate missile attacks at the wrong targets with a lot of suffering. 
Massive bombardments turn around the opinion in many ways."

"Basically," says Ronfeldt, "you have to find somebody to wipe out."



© 2001 The Washington Post Company


< < <
Date Index
> > >
World Systems Network List Archives
at CSF
Subscribe to World Systems Network < < <
Thread Index
> > >