NETWORKS, NODES, HUBS, COMPUTER VIRUSES AND AL QAIDA
Dr. Von has an excellent summative essay up today on how network theory applies in different scenarios:
“One can understand from this model how computer viruses are so effective and can spread so quickly around the world. If a single, typical node (perhaps my computer) is ‘infected’ by a virus sent out (normally via email) to the Internet, and if that node were to somehow contain it and not send an email out to anyone else, nothing would happen to the rest of the network. But if I were to send emails to a number of friends and acquaintances, or if the virus were sent to numerous nodes in the network, as each node sent out emails the virus spreads to each of those nodes, and before long it is possible to have a cascading effect. Now, if a hub is infected, and it is linked to many, many other nodes of the Internet network, large numbers of nodes of the Internet may be infected almost simultaneously, perhaps before an ‘antidote’ piece of software can be made available. On the other hand, let’s suppose hubs are ‘cured’ of a virus relatively quickly, but some of the small, peripheral nodes are infected. The virus is not extinguished just because hubs are cured. In fact, computer viruses can persist for long periods of time (6 months to as long as 14 months after antidote software is available) even without infected hubs because they can still move around, albeit slowly, between the poorly connected nodes of the network.
One interesting aspect of this is to think of a social network such as Al Qaeda. This organization follows scale-free network structures, rather than some other types of social network structures. Other types may be a hub-and-spoke structure like a dictatorship, where a central hub runs the entire network. A tree structure is also possible, with a set chain of command (much like a typical military organization, where more minor decisions can be made locally in parts of the network, and major, global decisions made by someone like the President or a top general, and this decision cascades down to lower parts of the network simultaneously. Al Qaeda is neither of these, but rather a ‘web without a spider.’ An analysis was done after the 9/11 attacks to determine the structure of the cell responsible for the attacks (this is outlined in Barabasi’s book). Mohamed Atta was indeed a hub of the suspected 34-person cell. But, he only had links with 16 other nodes. Marwan Al-Shehhi was linked with only 14 other members of the cell. Most of the other members only may have had one or two known links to other nodes, which is a signature structure for a scale-free network. If we assume the entire Al Qaeda organization is similarly structured, what we are fighting is indeed a network that is very flexible and can tolerate some number of internal failures. If Atta was captured prior to 9/11, that event would not have necessarily crippled the cell, and the attacks may have very well gone as planned. The reason is that the other nodes still had the links to hold together the cell, so even taking out the leader of the cell does not disconnect all the other links. Killing Bin Laden will not in itself cripple Al Qaeda for the same reason. In fact we have seen this because a number of Bin Laden’s very well-connected lieutenants (i.e. other hubs) have been killed or captured, and yet the attacks and killing by the periphery of Al Qaeda continue unabated. This is completely analogous to viruses in the Internet, where if a hub is ‘cured’ (i.e. Bin Laden removed) the virus may still be able to do damage through poorly connected nodes (small cells on the periphery of Al Qaeda’s network, acting almost independently). This is part of the power of a scale-free network structure.”
Jessica Stern, author of Terror in the Name of God: Why Religious Militants Kill and Superterrorism Fellow for the Council on Foreign Relations, also draws on network theory, considering al Qaida to be ” a hybrid organization” that now consists of a ” network of networks” that contains ” leaderless resisters, lone-wolf avengers, commanders and cadres, free-lancers and franchises. A flexible organizational-operational pattern that would be quite close to what John Robb calls the ” Open-Source ” warfare model of terrorism.
” State-sponsored Terrorism” is of course, network warfare. During the Cold War, both the United States and the Soviet Union sponsored state actor and subnational proxies in order to wage geopolitical competition with a circuit-breaker of plausible deniability that prevented direct superpower confrontation and escalation to nuclear war. Proxies were kept on relatively short leashes, whenever possible. The Reagan administration, hardly a group that was soft on Communism, agonized and delayed providing the Afghan Mujahedin stinger missiles precisely because those proxies were seen ( correctly ) even within sections of the CIA as unreliable and uncontrollable, compared to, say, the Contras.
The Soviets were less discriminating with their aid but when a proxy wandered away from Moscow’s playbook, as with Gaddafi’s bombing in West Germany that provoked the Reagan administration to attempt to kill the Libyan strongman in a military attack, the Soviets cooly let their proxy take their lumps. This contrasts with their attitude toward more loyal proxies like Hafez Assad, whom the Soviets backed to the extent of replacing much of the Syrian air force shot down over Lebanon by the Israelis.
Networks have the capacity to become self-sustaining enterprises. When Superpower aid dried up across the board in the early 1990’s – terrorists, guerillas and rogue state actors turned to various black market enterprises and Transnational Organized Crime networks to move drugs, diamonds, arms, WMD technology, slave labor and other forms of contraband to create revenue streams. Taking a page from the old 1930’s Comintern, these networks formed legal front organizations, charitiable foundations and even business enterprises in the Core and Seam states to raise additional revenue streams and launder illicit income. By the mid 1990’s, Cold War proxies were morphing into “ Non-state Actors” that were independent players on national, regional or global scales.
This is the strategic environment of the GWOT. Not a world of nation-states but a network of networks in which nation-states are merely one of the major hubs.
October 4th, 2005 at 12:34 pm
I’ve stumbled across your blog when I done some internet
marketing research in Google. You’re doing a pretty nice job
here, keep up the good work 🙂
Sincerely,
Tosh
Webmaster/Publisher
computer gadget
October 7th, 2005 at 12:48 pm
Hey, you have a great blog here! I’m definitely going to bookmark you!
I have a computer virus site/blog. It pretty much covers ##KEYWORD## related stuff.
Come and check it out if you get time 🙂
October 11th, 2005 at 4:51 pm
Your Computer is running slow? Then you should better scan it for adware, spyware and other malware. I have Pro Products on my free spyware remove Site.
October 13th, 2005 at 1:31 am
Hey, you have a great blog here! I’m definitely going to bookmark you!
I have a ##KEYWORD## site/blog. It pretty much covers ##KEYWORD## errors and related stuff.
Come and check it out if you get time 🙂
October 13th, 2005 at 6:13 pm
Dicecities.net
Large selection of Websites for sale, starting as low as $19.99 come by and check it out.