This Article 
 Bibliographic References 
 Add to: 
Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions
September/October 2007 (vol. 22 no. 5)
pp. 40-49
Il-Chul Moon, Carnegie Mellon University
Kathleen M. Carley, Carnegie Mellon University
Over time, people change whom they interact with and where they are. Understanding how changes in social and geospatial relations interact is critical to a number of areas--from general social change to counternarcotics and counterterrorism. For instance, as terrorists attempt different tasks, they move to new locations and interact with different groups. This article introduces a simple theoretical multiagent model for reasoning about the criticality of agents and locations as agent interactions coevolve in geographical and social spaces. The model simulates social changes in whom agents interact with and spatial changes in where they relocate to as a function of learning and social-network evolutions. The analysis suggests that terrorists will disperse around the world rather than gather at a specific location. However, terrorists who have been the center of social networks will stay the same. This model helps us gain insights into the complexities of organizations evolving in the social and the geospatial dimensions simultaneously. This article is part of a special issue on social computing.

1. D.C. Feldman and H.B. Tompson, "Expatriation, Repatriation, and Domestic Geographical Relocation: An Empirical Investigation of Adjustment to New Job Assignments," J. Int'l Business Studies, vol. 24, 1993, pp. 507–529.
2. D.M. Wegner, "Transactive Memory: A Contemporary Analysis of the Group Mind," Theories of Group Behavior, B. Mullen and G.R. Goethals, eds., Springer, 1986, pp. 185–205.
3. J. Arquilla and D. Ronfeldt, eds., Networks and Netwars: The Future of Terror, Crime, and Militancy, tech. report MR-1382-OSD, Rand, 2001;
4. K.M. Carley, J.S. Lee, and D. Krackhardt, "Destabilizing Networks," Connections, vol. 24, no. 3, 2001, pp. 31–44, 2001.
5. T.A.B. Snijders, C. Steglich, and M. Schweinberger, "Modeling the Co-evolution of Networks and Behavior," Longitudinal Models in the Behavioral and Related Sciences, K. Van Montfort, H. Oud, and A. Satorra, eds., Lawrence Erlbaum, 2006, pp. 41–71.
6. J. Epstein, J.D. Steinbruner, and M.T. Parker, "Modeling Civil Violence: An Agent-Based Computational Approach," working paper no. 20, Center on Social and Economic Dynamics, Brookings Inst., 2001.
7. M. Bergkvist et al., "A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains," Proc. Joint Workshop Multiagent and Multiagent-Based Simulation, LNAI 3415, Springer, 2005, pp. 236–247.
8. J. Diesner and K.M. Carley, "Revealing and Comparing the Organizational Structure of Covert Networks with Network Text Analysis," Program and Abstracts: XXV Int'l Sunbelt Social Network Conf. Program, 2005, p. 138; .
9. K.M. Carley et al., "Toward an Interoperable Dynamic Network Analysis Toolkit," to be published in Decision Support Systems, vol. 43, no. 4, 2007, pp. 1324–1347.
10. M. McPherson, L. Smith-Lovin, and J.M. Cook, "Birds of a Feather: Homophily in Social Networks," Ann. Rev. Sociology, vol. 27, 2001, pp. 415–444.
11. D.J. Watts, P.S. Dodds, and M.E.J. Newman, "Identity and Search in Social Networks," Science, vol. 296, no. 5571, 2002, pp. 1302–1305.
12. O. Sorenson and T.E. Stuart, "Syndication Networks and the Spatial Distribution of Venture Capital Investments," Am. J. Sociology, vol. 106, 2001, pp. 1546–1588.
13. C.T. Butts, "Spatial Models of Large-Scale Interpersonal Networks," doctoral dissertation, Dept. Social and Decision Sciences, Carnegie Mellon Univ., 2002.
14. M. Sageman, Understanding Terror Networks, Univ. Pennsylvania Press, 2004, pp. 142–146.
15. S. Keller-McNulty et al., Defense Modeling, Simulation, and Analysis: Meeting the Challenge, Nat'l Academies Press, 2006, pp. 64–73.
1. J. Jonas and J. Harper, Effective Counterterrorism and the Limited Role of Predictive Data Mining, policy analysis 584, Cato Inst., Dec 2006.
2. R.J. Mooney et al., "Relational Data Mining with Inductive Logic Programming for Link Discovery," Data Mining: Next Generation Challenges and Future Directions, H. Kargupta et al., eds., AAAI Press, 2004, pp. 239–254.
3. V.P. Janeja, V. Atluri, and N.R. Adam, "Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatiosemantic Associations," Proc. 2004 Ann. Nat'l Conf. Digital Government Research, 2004, pp. 1–10.
4. H. Chen, F. Wang, and D. Zeng, "Intelligence and Security Informatics for Homeland Security: Information, Communication, and Transportation," IEEE Trans. Intelligent Transportation Systems, vol. 5, no. 4, 2004, pp. 329–341.
5. K.M. Carley, "Computational Organization Science: A New Frontier," Proc. Nat'l Academy of Science, vol. 99, no. 3, 2002, pp. 7314–7316.
6. K.M. Carley and D.M. Svoboda, "Modeling Organizational Adaptation as a Simulated Annealing Process," Sociological Methods and Research, vol. 25, no. 1, 1996, pp. 138–168.
7. C. Schreiber and K.M. Carley, "Going beyond the Data: Empirical Validation Leading to Grounded Theory," Computational and Mathematical Organization Theory, vol. 10, 2004, pp. 155–164.
8. K.M. Carley, "On Generating Hypotheses Using Computer Simulations," Systems Eng., vol. 2, no. 2, 1999, pp. 69–77.

Index Terms:
distributed artificial intelligence, coherence and coordination, multiagent systems, social networks
Il-Chul Moon, Kathleen M. Carley, "Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions," IEEE Intelligent Systems, vol. 22, no. 5, pp. 40-49, Sept.-Oct. 2007, doi:10.1109/MIS.2007.91
Usage of this product signifies your acceptance of the Terms of Use.