Why failing terrorist groups persist revisited: a social network approach to AQIM network resilience
Baker, Tyler D.
MetadataShow full item record
To date, most analyses of the Al Qaeda in the Islamic Maghreb (AQIM) network have focused on qualitative analysis to determine trends and patterns in the group's evolution over time. Seldom has a combination of quantitative tools been used to derive inferences about the nature of the organization and its changing strategy. In this paper, the author draws on a combination of geospatial analysis and social network analysis in order to explore how the network has changed over time in response to efforts from local and international security forces to disrupt it. The analysis enables the community of interest to draw conclusions with regard to the resiliency of the network and its long-term goals in the Sahel region. Evidence indicates that AQIM is evolving into a less dense but more ethnically diverse organization that is rapidly restoring the operational capacity it lost during the 2013 French intervention in Mali. Despite major Western military efforts to suppress it, AQIM is increasingly able to conduct spectacular attacks across west Africa, further destabilizing an already precarious security environment. The thesis concludes with recommendations for crafting a strategy tailored to degrading and containing the threat from AQIM and its affiliates.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Hernandez, Armando; Galeano, Rick; Escobar, Mario (Monterey, California. Naval Postgraduate School, 2012-12);This is a qualitative and quantitative study of the semi-submersible network operating out of the southwestern portion of Colombia. This study combines both of these aspects to provide strategic options for kinetic, ...
O’Connor, Patrick R. (Monterey, California: Naval Postgraduate School, 2015-12);The purpose of this thesis is to illuminate the pathways of Iranian influence in Iraq in order to provide U.S. decision makers with a possible strategy to counter Iran’s malignant influence there. By using a combination ...
Sample entropy and random forests a methodology for anomaly-based intrusion detection and classification of low-bandwidth malware attacks Hyla, Bret M. (Monterey, California. Naval Postgraduate School, 2006-09);Sample Entropy examines changes in the normal distribution of network traffic to identify anomalies. Normalized Information examines the overall probability distribution in a data set. Random Forests is a supervised ...