[1]the physics arXiv blog _________________________________________________________________ [2]How terrorists groups resemble manufacturing firms Posted: 21 Jun 2009 09:10 PM PDT Terrorist organisations may be best understood as companies whose principle product is violence, suggests a new study of terror attacks Understanding how terrorist groups operate is hard, not least because of a severe lack of information about how they recruit, organise and plan their activities. So it's no surprise then that working out how best to stop these organisations is tricky. Now Aaron Clauset from the Santa Fe Institute in New Mexico and his pal, Kristian Skrede Gleditsch, say they've found an important new insight into terrorist activity that could help to solve this problem. The analysis is based on the one set of reliable data that we do have: the number and severity of terrorist attacks and rough idea of the size and age of the groups that carried them out (they've looked at the data from 1998 to 2005). Clauset and Gledistch say that a simple analysis of this data shows that the frequency of attacks increases over time in a pattern that is common to all groups: the time between attacks plotted against the group's experience decreases according to a power law. That can be explained in two ways. First, terrorist groups are born clumsy and increase their attack rate primarily because their members learn to be more efficient. In manufacturing industry, this kind of organisational learning is called learning by doing and is widely studied. Second, the terrorist groups are born small and increase their attack rate by recruiting new, replaceable, members, a process called organisation growth and is again well studied by economists. Perhaps economics can help. "In this light, terrorist groups may best be understood as firms whose principal product is political violence, and whose production rates depend largely on organizational growth and the availability of low-skill labor," say Clauset and Gledistch. That may well be an important insight because it implies that certain kinds of easily accessible organisations such as non-profit companies and groups of political activists, might be good models of terrorist groups from which additional insights can be gained. For example, it may be possible to determine whether the activity a group is best reduced by limiting its growth or by disrupting its organisation. But there is a puzzle in this data, say Clauset and Gledistch. The severity of terrorist attacks is independent of the size and experience of the organisation. So contrary to what you might expect, young and old terrorist groups are equally likely to carry out extremely severe attacks. "Internal factors seem to play a marginal role in the severity of any particular attack," say Clauset and Gledistch. Here's one explanation. Similar kinds of power laws are common in the real world: in the size of stock market crashes, the number of deaths in wars and the severity of forest fires. In these cases, the size of the conflagration has nothing to do with the size event that triggered it but everything to do with the network in which the event took place. Perhaps the same is true with terrorist attacks: the severity of the attack has more to do with the properties of the system being attacked than the organisation doing the attacking. Ref: [3]arxiv.org/abs/0906.3287: The Developmental Dynamics of Terrorist Organizations [4][ISMAP:di] [5][ISMAP:di] [6][arXivblog?d=yIl2AUoC8zA] [7][arXivblog?d=dnMXMwOfBR0] [8][arXivblog?i=7MnzJ1YcE9k:CCprs3blmIE:gIN9vFwOqvQ] [9][arXivblog?d=7Q72WNTAKBA] [10][arXivblog?i=7MnzJ1YcE9k:CCprs3blmIE:V_sGLiPBpWU] [11][arXivblog?d=l6gmwiTKsz0] [12][arXivblog?d=qj6IDK7rITs] You are subscribed to email updates from [13]Technology Review Feed - arXiv blog To stop receiving these emails, you may [14]unsubscribe now. Email delivery powered by Google Inbox too full? [15]Add to Google Google Inc., 20 West Kinzie, Chicago IL USA 60610 References Visible links 1. http://www.technologyreview.com/ 2. http://feedproxy.google.com/~r/arXivblog/~3/7MnzJ1YcE9k/click.phdo 3. http://arxiv.org/abs/0906.3287 4. https://feedads.g.doubleclick.net/~a/IF-y765bnEMq_VKGmS85N7v3Llk/0/da 5. https://feedads.g.doubleclick.net/~a/IF-y765bnEMq_VKGmS85N7v3Llk/1/da 6. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:yIl2AUo... 7. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:dnMXMwO... 8. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:gIN9vFw... 9. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:7Q72WNT... 10. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:V_sGLiP... 11. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:l6gmwiT... 12. http://feeds2.feedburner.com/~ff/arXivblog?a=7MnzJ1YcE9k:CCprs3blmIE:qj6IDK7... 13. http://www.technologyreview.com/ 14. http://feedburner.google.com/fb/a/mailunsubscribe?k=118r9-S4Z0vJg-AkQPASPmDm... 15. http://fusion.google.com/add?source=atgs&feedurl=http://feeds2.feedburner.com/arXivblog Hidden links: 16. http://fusion.google.com/add?source=atgs&feedurl=http://feeds2.feedburner.com/arXivblog 17. http://ads.pheedo.com/click.phdo?s=cd8a8d490e4f3c4a37c539869bca4129&p=1 ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE