Terrorist networks Flashcards
What is the primary utility of Social Network Analysis (SNA) in studying terrorism, according to Perliger and Pedahzur?
A. Predicting the outcomes of terrorist attacks.
B. Identifying countries vulnerable to terrorism.
C. Estimating the financial resources of terrorist groups.
D. Understanding the structures and dynamics of terrorist organizations.
D. Understanding the structures and dynamics of terrorist organizations.
Which type of network structure is increasingly common in modern terrorist organizations?
A. Hierarchical networks
B. Decentralized networks
C. State-sponsored networks
D. Bureaucratic networks
B. Decentralized networks
What is a major challenge associated with applying SNA to terrorist networks?
A. The inability to identify key actors.
B. Limited access to advanced analytical tools.
C. Data reliability and ethical concerns.
D. Lack of interest from counter-terrorism agencies.
C. Data reliability and ethical concerns.
What is the main conclusion of Perliger and Pedahzur’s study?
A. SNA is limited in its applications for counter-terrorism.
B. SNA should be integrated into broader analytical frameworks for counter-terrorism strategies.
C. Terrorist networks cannot be effectively mapped using SNA.
D. Hierarchical networks are more resilient to counter-terrorism measures.
B. SNA should be integrated into broader analytical frameworks for counter-terrorism strategies.
Which centrality measure identifies individuals who are the most connected within a network?
A. Betweenness centrality
B. Closeness centrality
C. Eigenvector centrality
D. Degree centrality
D. Degree centrality
What does betweenness centrality reveal about a network actor?
A. Their role as a broker or facilitator between groups
B Their ideological influence.
C. Their overall importance within the network.
D. Their proximity to the center of the network.
A. Their role as a broker or facilitator between groups
Why might over-reliance on quantitative data in SNA be problematic for counter-terrorism?
A. It oversimplifies complex relationships.
B. It requires excessive computational resources.
C. It excludes financial aspects of terrorism.
D. It makes SNA less transparent.
A. It oversimplifies complex relationships.
What is Mullins’ recommendation for using SNA in counter-terrorism?
A. Focus exclusively on centrality measures.
B. Combine centrality metrics with qualitative understanding.
C. Prioritize targeting operational leaders.
D. Avoid using SNA for fragmented networks.
B. Combine centrality metrics with qualitative understanding.
What does Hofmann argue about the networks of lone-actor terrorists?
A. They operate completely in isolation.
B. They are often embedded in broader ideological or social networks.
C. They rely solely on online resources for their planning.
D. They lack any form of external support or influence.
B. They are often embedded in broader ideological or social networks.
What type of networks do lone-actors often engage with before carrying out attacks?
A. Corporate networks
B. Family networks
C. Ideological or extremist networks
D. Political party networks
C. Ideological or extremist networks
How does Hofmann suggest counter-terrorism efforts should approach lone actors?
A. By focusing solely on their psychological profiles.
B. By emphasizing their ideological and social connections.
C. By targeting their access to weapons.
D. By isolating them from online platforms.
B. By emphasizing their ideological and social connections.
What role do ideologists typically play in terrorist networks according to Milla et al (2020)?
A. They focus on financial transactions.
B. They act as operational leaders planning attacks.
C. They influence recruitment and group cohesion.
D. They isolate the group from external influences.
C. They influence recruitment and group cohesion.
Which role in terrorist networks is primarily associated with maintaining group cohesion and radicalization?
A. Ideological leaders
B. Operational leaders
C. Financial leaders
D. Technical leaders
A. Ideological leaders
What does Milla et al. recommend as a counter-terrorism strategy based on their findings?
A. Disrupting financial operations of terrorist groups.
B. Prioritizing the targeting of ideologists.
C. Strengthening urban surveillance systems.
D. Focusing on low-ranking members to weaken the network.
B. Prioritizing the targeting of ideologists.
What is terrorism?
A. A form of political violence to prompt a particular response in a given population.
B. A strategy focused exclusively on military targets.
C. Violence against civilians without political motivation.
D. A form of crime unrelated to ideology.
A. A form of political violence to prompt a particular response in a given population.