The study of networks was not the easiest concept of the semester to understand. According to Amelia Arsenault in “Networks: Emerging Frameworks for Analysis,” one of the predominant reasons for this is the confusion of networks as a social construct versus networks as a form of network technology. But looking at networks as a way that people connect is an interesting way to examine the connections that bind different groups together.
One of the most interesting groups Arsenault applies Network Theory to is a terrorist group. Much criminal activity can now be classified as Netwars. This means the strength of the relationships or connections within the network are what decide the outcome. If a terrorist group has a star-format network, the hub will have to be taken out to defeat the cell. If they are built as a mesh network, meaning all the nodes are interconnected to each other and not just to a few central nodes, it becomes infinitely more difficult to take down a terrorist group. The government and military should use this information to be better equipped to take down terrorist organizations. This information can show them where to strike to eliminate the most important nodes in a network.
Another way networks can be used to battle terrorism is by tracing and connecting the nodes of a network to find the next node. In a 2006 New York Times magazine article, Can Network Theory Thwart Terrorists?, Patrick Radden Keefe examines how the National Security Agency uses Network Theory to make connections between terrorists to locate other members of a cell. Keefe writes about a Cleveland consultant, Valdis Krebs, who created a network map connecting all of the 19 terrorist involved in the 9/11 attacks within just a few links, using shared addresses, phone numbers, frequent flier numbers, etc. Most of these men were linked to each other through one leader. In retrospect, it has more of a reflective value, but if found beforehand, this time of work could provide preventative measures.
An issue that occurs with this kind of network mapping though is surveillance of everyone, even just innocent, everyday citizens. Because we are all supposedly linked within six degrees of separation, most of us are probably surprisingly close on network maps to people we wouldn’t expect, such as terrorists and criminals. That means many innocent people will end up being watched because of such linkages. This topic quickly morphs into the much-discussed, hot-topic battle of national security vs. individual privacy.