205
Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods Amanda Elizabeth Lennon A thesis submitted in fulfilment of the requirements for the degree of Master of Arts in Political Studies,

Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Embed Size (px)

Citation preview

Page 1: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Into the Labyrinth:

An Exploration of Insurgent Groups and their Network Neighbourhoods

Amanda Elizabeth Lennon

A thesis submitted in fulfilment of the requirements

for the degree of Master of Arts in Political Studies,

The University of Auckland, 2005

Page 2: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

ABSTRACT

Although references to networks are a common feature in the current discourse on

terrorism, the bulk of attention thus far has been focused upon the al Qaeda

phenomenon, with little effort having been made to date to explore the extent to which

other insurgent groups have also cultivated network links.

As the first step towards redressing this imbalance, this study investigates six currently

active insurgent groups that are typologically different with respect to their origins,

location, ideology and goals.

Through the application of a combined qualitative and quantitative research design that

utilises the latest organisational network analysis tools, this study observes that all six

groups are indeed embedded somewhere within network structures of varying breadths

and depths.

What is more, the research identifies a number of other organisations that have a

seeming ubiquitous presence across almost all of these disparate networks.

While the observations made in this study are limited by the narrow comparative small

n case study approach, they reinforce the argument that more intensive research and

mapping needs to be conducted in the future in the attempt to discover the full extent of

networked insurgency around the globe.

ii

Page 3: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

DEDICATION

For my mother

iii

Page 4: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

ACKNOWLEDGEMENTS

I must first express my eternal gratitude to my Supervisor Dr. Paul Buchanan for all the

support, patience, and good humour given to me throughout this research project.

Many thanks also to friends and fellow students James Liddell, Shireen Hawkins, Judie

Hammond-Moores, Stephen Groves; and Christian Fjelstadt, whose encouragement and

assistance helped see me through the difficult times.

Finally, I wish to thank Warren Wells, my sunshine man, for gallantly attempting to

enforce the kind of discipline regime I needed to get the job done – “Beautiful Mate!”

iv

Page 5: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

TABLE OF CONTENTS

ABSTRACT......................................................................................................................ii

DEDICATION.................................................................................................................iii

ACKNOWLEDGEMENTS.............................................................................................iv

LIST OF TABLES...........................................................................................................vi

LIST OF FIGURES..........................................................................................................vi

LIST OF ABBREVIATIONS.........................................................................................vii

CHAPTER 1 INTRODUCTION.................................................................................1

APPROACHES TO NETWORK ANALYSIS...........................................................10LITERATURE REVIEW............................................................................................18RESEARCH DESIGN AND METHODOLOGY.......................................................35

CHAPTER 2 CASE STUDIES..................................................................................45

Case Study 1 ABU SAYYAF......................................................................................47Abu Sayyaf Network Neighbourhood.........................................................................51Case Study 2 COMMUNIST PARTY OF INDIA-MAOIST.....................................54Communist Party of India-Maoist Network Neighbourhood......................................59Case Study 3 JAMIAT UL-ANSAR...........................................................................62Jamiat ul-Ansar Network Neighbourhood...................................................................67Case Study 4 KONGRA-GEL.....................................................................................70Kongra-Gel Network Neighbourhood.........................................................................73Case Study 5 LIBERATION TIGERS OF TAMIL EELAM.....................................75Liberation Tigers of Tamil Eelam Network Neighbourhood......................................79Case Study 6 REVOLUTIONARY ARMED FORCES OF COLOMBIA.................81Revolutionary Armed Forces of Colombia Network Neighbourhood........................86

CHAPTER 3 CONCLUSION........................................................................................90

SUMMARY OF THE RESEARCH PROCESS.........................................................90RESULTS....................................................................................................................92DISCUSSION..............................................................................................................92LIMITATIONS OF THE RESEARCH.......................................................................95SUGGESTIONS FOR FUTURE RESEARCH...........................................................98

BIBLIOGRAPHY.........................................................................................................100

v

Page 6: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

LIST OF TABLES

Table 1. Summary of Network Measures Assigned to Individual Actors in this Study..43

Table 2. Summary of Network Measures Assigned to Describe Networks in this Study.........44

Table 3. Summary of nodal, dyadic and network level indicators..................................51

Table 4. Summary of nodal level centrality metrics........................................................51

Table 5. Summary of nodal, dyadic and network level indicators..................................59

Table 6. Summary of nodal level centrality metrics........................................................59

Table 7. Summary of nodal, dyadic and network level indicators..................................67

Table 8. Summary of nodal level centrality metrics........................................................68

Table 9. Summary of nodal, dyadic and network level indicators..................................73

Table 10. Summary of nodal level centrality metrics......................................................73

Table 11. Summary of nodal, dyadic and network level indicators................................79

Table 12. Summary of nodal level centrality metrics......................................................79

Table 13. Summary of nodal, dyadic and network level indicators................................86

Table 14.. Summary of nodal level centrality metrics.....................................................86

LIST OF FIGURES

Figure 1. Supplementary coding symbols used in case study graphs to follow..............46

Figure 2. Graphic representation of alleged past and present ABU SAYYAF ties.........50

Figure 3. Graphic representation of alleged past and present COMMUNIST PARTY OF

INDIA-MAOIST ties.......................................................................................................58

Figure 4. Graphic representation of alleged past and present JAMIAT UL-ANSAR ties

.........................................................................................................................................66

Figure 5. Graphic representation of alleged past and present KONGRA GEL ties........72

Figure 6. Graphic representation of alleged past and present LIBERATION TIGERS OF

TAMIL EELAM ties.......................................................................................................78

Figure 7. Graphic representation of alleged past and present REVOLUTIONARY

ARMED FORCES OF COLOMBIA ties........................................................................85

vi

Page 7: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

LIST OF ABBREVIATIONS

313 Front 313ABNES Akhil Bharat Ekta SamajaJF Al Jihadal B Al Badral F Al FaranANCL African National CongressARCF Asif Reza Commando ForceAS Abu SayyafATTF All Tripura Tiger ForceBCCI Bank of Credit and Commerce InternationalBCP(MLM) Pura Bangla Communist PartyBersatu United Front for the Independence of PattaniBKI Babbar Khalsa InternationalBSD(ML) Bangladesh Samyabadi Party – Marxist-LeninistCCOMPOSA Coordination Committee of the Maoist Parties of South AsiaCDC Colombian Drug CartelsCIA US Central Intelligence AgencyCPC(Maoist) Communist Party of CeylonCPEB(ML) Purba Bangla Sarbahara PartyCPI-Maoist Comm Party of India-MaoistCPI-ML Comm Party of India M-LCPN-Maoist Comm Party oF Nepal-MaoistCCP Colombian Communist PartyDGFI Bangladesh Director General of Forces IntelligenceDHKP-C Devrimci SolEJG Egyptian Jihad GroupELN National Liberation ArmyEROS Eelam Revolutionary OrganisersETA Basque Fatherland and LibertyFARC Revolutionary Armed Forces of ColombiaFRF Ricardo Franco FactionGAM Free Aceh MovementGARI International Revolutionary Armed GroupsGLO Gurka Liberation OrganisationGLTF Gorkha Liberation Tiger ForceGNLF Gurkha National Liberation FrontHIG Hizb-I-Islami GulbuddinHM Hizb ul MujahideenHUJI Harkat ul-Jihad-al-Islami HUJI-B Harkat ul-Jihad-al-Islami - BangladeshIG Islamic GroupIGERF Islamic Great Eastern Raiders FrontIIF International Islamic Front Against the Jews and CrusadersIILF Indonesian Islamic Liberation FrontIIRO International Islamic Relief OrganisationISI Pakistan Inter-Services Intel AgencyISYF International Seikh Youth FederationJeI Jamiat-e-IslamiJeM Jaish-e-Muhammad Mujahideen E-TanzimJI Jemaah Islamiyah

vii

Page 8: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

JiI Jamaat-e-IslamiJKLF Jammu Kashmir Liberation FrontJRA Japanese Red ArmyJuA Jamiat ul-AnsarJuI-F Jamiat Ulema-I-Islam, Fazlur Rehman FactionKFH Kurdistan Freedom HawksKLF Kashmir Liberation FrontKLO Khalistan Liberation OrganisationKLO Kamtapur Liberation OrganisationKMM Kampulan Mujahidin MalaysiaKPU Kurdish Patriotic UnionKR Khmer RougeKZF Khalistan Zindabad ForceLeJ Lashkar-I-JhangviLeT Laskar-e-ToibaLJ Laskar JihadLTTE Liberation Tigers of Tamil EelamMILF Moro Islamic Liberation FrontMJC Muttahida Juhad Council (United Jihad Council)MKP Maoist Communist Party of TurkeyMNLF Moro National Liberation FrontNDFB National Democratic front of BodolandNDFB National Democratic Front of BodolandNLFT National Liberation Front of TripuraNSCN Nationalist Socialist Council of NagalandPBSB(MLM) Purba Bangla Sarbahara Party Marxist-Leninist-MaoistPBSP(CC) Proletarian Party of Purba BanglaPBSP(MPK) Purba Bangla Sarbahara Party -MaoistPCP Sendero Luminoso (Shining Path)PFLP Popular Front for the Liberation of PalestinePGPC Pakistan Gurudwara Prabandhak CommitteePKK Kurdistan Workers’ Party/Kongra GelPIRA Provisional Irish Republican ArmyPLO Palestine Liberation OrganisationPPL Free Homeland PartyPULO Pattani United Liberation OrganisationRAW Research and Analysis Wing - Indian Intelligence Service RCCI(Maoist) Revnary Comm Centre of India-MaoistRCCI(MLM) Revnary Comm Centre of India- Marxist-Leninist-MaoistRIM Revolutionary Internationalist MovementRSM Rajah Solaiman MovementSSP Sipah e-Sahapa PakistanSWAPO South West Africa People’s OrganisationTC Tijuana CartelTiJ Tehreek –I-JihadTNG Tamil Nadu GroupsTULF Tamil United Liberation FrontULFA United Liberation Front of Asom

viii

Page 9: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

“Oh what a tangled web we weave, when we practice to deceive”

Sir Walter Scott, ‘Marmion’

CHAPTER 1

INTRODUCTION

The devastating air attacks upon the US World Trade Centre and Pentagon on

September 11, 2001 were the catalyst for a global change in perception regarding the

threats and challenges posed by some networks of non-state actors regarding issues of

security within the international political environment of a globalising world.

In November of that year, TIME Magazine published a Special Report i on al Qaeda, the

organisation charged with masterminding this event, which explored the alleged reach

of this group’s own peculiar brand of “Worldwide Web [through which] Osama bin

Laden’s network of influence reaches across five continents, creating a complex tangle

of men, money and murder” (Elliott 2001, 32-33). Whilst its commentary was

dominated by a visual identifying the parts of the globe that were said to be home to

known or suspected al Qaeda activity, or where states had placed alleged al Qaeda

suspects into custody, the investigation fell short of informing the reader of the central

issue: what actually constituted the al Qaeda ‘network’ in this context. While

moderately helpful inasmuch that it impressed upon the reader the scope of al Qaeda’s

supposed reach, what appeared on the pages in diagrammatic form was merely a one-

dimensional colour-coded map of the states of the world, accompanied by a list of

activity-related coded flags. This, however, was not a representation of a network: it

was little more than a legend of attributed incidents by geographic area.

i Michael Elliott, “Hate Club”, Special Report. Inside al Qaeda: bin Laden’s Web of Terror TIME Magazine, November 12, 2001,.30-42

1

Page 10: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Additionally, with commentary on this organisation continuing to feature prominently

in media coverage of international terrorist events, it could be construed that either al

Qaeda was the first insurgent group to organise itself transnationally in this manner, or

even that al Qaeda is the only example of this form of organisation in the current world

environment of insurgent groups. While it certainly appears that al Qaeda has evolved a

particularly hardy, extensive and flexible organisational structure, it would be premature

to assume that this particular organisation is indeed the best or only example of a covert,

militarised, transnational network active today.

Further complicating the issue concerning the network parameters of al Qaeda, various

other assertions have been made in recent years regarding possible collusion between it

and other insurgent groups with their own distinct identities and that in most cases are

espousing ideologies and goals that diverge considerably from al Qaeda’s. For example,

al Qaeda has been associated with various Colombian guerrilla organisationsii, ETA and

N17iii, Hezbollahiv, Abu Sayyafv, and Jemaah Islamiah.vi The distinction between in-

group and out-group when it comes to the alleged al Qaeda network structure in

particular appears upon closer scrutiny and even with all the research and publicity this

group has amassed, to be weakly explored and perhaps even misrepresented. This may

in part be due to the seeming tendency to classify the actions of groups associated with

the International Islamic Front for Jihad Against the Jews and Crusaders (IIF), of which

al Qaeda is a founding member, as being al Qaeda operations.vii These al Qaeda

examples prove useful in highlighting the problem of discriminating between the

internal and external organisational structures associated with an organisation. By this it

is meant that clarification is needed as to the question of how it seems to maintain what

has been described as essentially a traditional, compartmentalised vertical hierarchy at

its core, whilst having managed also to develop functioning internal and external

networked structures alongside it.ii Martin Arostegui, “Search for bin Laden links Looks South”, United Press International, Cubanet, 18 October 2001, http://www.cubanet.org/Cnews/y01/oct01/18e9.htm (accessed 25 June, 2005)iii Atmane Tazaghart, “The ‘globalization’ of terror networks”, Daily Star, Lebanonwire, 20 August 2002, http://www.lebanonwire.com/0208/02082103DS.asp (accessed 15 March 2004)iv “Have Al Qaida and Hezbollah formed a terror pact?”, Jewish Bulletin News of Northern California, 12 July 2002, http://www.jewishsf.com/bk020712/i14.shtml (.accessed 15 March, 2004)v Larry Niksch, “Abu Sayyaf: Target of Philippine-US Anti-Terrorism Cooperation.” Congressional Research Service. Library of Congress, 25 January 2002. http://www.mipt.org/pdf/CRS_RL31265.pdfvi “Jamaah Islamiah”, Center for Defense Information, 18 October 2002, http://www.cdi.org/friendlyversion/printversion.cfm?documentID=1159 (accessed 5 April 2005)vii “al Qa’ida”, Intelligence Resource Program, Federation of American Scientists, http://www.fas.org/irp/world/para/ladin.htm (accessed 9 December, 2004)

2

Page 11: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

These issues aside, while talk of al Qaeda currently dominates academic and media

discourse surrounding insurgent groups, scant attention seems to have been paid thus far

to the exploration of relationships among other similar groups.

To illustrate this point, one needs look no further than the 1960s and 1970s to find

evidence of network formation between outlawed groups and other parties. For

example, the Palestine Liberation Organisation (PLO) was established in 1964 as an

umbrella organisation that united a number of leftist or leftist-Islamic hybrid pro-

Palestinian and pro-Arab groups with differing allegiances and agendas. The PLO

Executive in 1971 consisted of Fatah: the pro-Iraq Palestine Liberation Front (PLF): the

Arab Liberation Front (ALF); the Popular Front for the Liberation of Palestine (PFLP);

the Palestine National Salvation Front (PNSF); the Palestine Popular Struggle Front

(PSF) the Palestine Liberation Army (PLA) and the Palestine Communist Party.viii The

dramatic terrorist exploits of member groups of this organisation between 1971 and

1974 “helped the PLO join a global network of such groups and gain Soviet bloc

support” (Rubin 1994, 38), a network united by their opposition to what they all saw as

Western (and Zionist) imperialism. The other groups in this network included the

Japanese Red Army (JRA)ix, June 2nd Movement, the Red Brigades, and ‘the Carlos

gang’. This “loose coalition of autonomous groups” (ibid., 147) – operating under their

own names, or in the case of exceptionally violent or politically delicate operations via

ad hoc organisationsx - included groups that worked cooperatively as part of a conscious

attempt to establish a some kind of new internationalist force.

Even back in 1966 Cuba hosted the Tricontinental Conference, whose attendees

included the Japanese Red Army (JRA), the Iranian Liberation Front, the Provisional

Irish Republican Army (PIRA), Baader Meinhofxi and the Turkish Revolutionary

People’s Liberation Front. At this conference “participants agreed to set up an

international network which included economic and financial cooperation, the exchange

of intelligence, sharing safe houses, joint training programmes and arms purchases”

(Napoleoni 2004, 70). Inspired by this approach, the then-leader of the PFLP, George

Habash, in 1972 hosted another international summit with the aim of forming a

common front against Zionism and Western imperialism.

3

Page 12: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Later, in the 1980s, the Red Army Faction (RAF) and Action Directe (AD) tried

(unsuccessfully) themselves to unite and coordinate their own PLO-like organisation –

“an anti-Imperialist front of Western European guerrillas” (Hoffman 1998, 83), and this

decade also reportedly saw the expansion of the PLO training programme towards

welcoming Italian and German anti-Zionist fascist groups.xii

During this time period, what is also interesting is that alliances and agreements were

not just being forged between relatively like-minded groups, but also between groups

whose goals and ideologies clashed. For example, one of the PLO’s alliances was with

Germany’s far right Hoffman Group, and Hoffman himself even called for a truce

between right and left so that both could focus on fighting ‘the system’ instead of each

other.xiii This approach was also enacted in Italy, where Libya and Syria funded both

leftist and rightist organisations against the state. Connected to the issue of state support

of ideologically opposed groups, and to illustrate the broad nature of the Cold War

politics that dominated the international scene in the last half of the twentieth century, in

1990 newly unified German government discovered that the East German Stasi had

given shelter to German neo-Nazis.xiv

It can be argued therefore that foundational to the nature and scale of the ‘new

terrorism’ born of the 1960s was the parallel development of new networked strategic or

tactical alliances between groups or other agents (such as states) united by a common

enemy – precursors of the “odd hybrids and symbioses” (Arquilla and Ronfeldt 2001b,

7) that are said to be manifesting themselves in today’s even more interconnected world

and that will be explored later within this research project.

Underpinning this argument is the belief that the nature of organisational structure is

increasingly becoming a strategic component of irregular group activity and relates

directly to operational scope and efficacy. “Strategy is a process, a constant adaptation

to shifting conditions and circumstances in a world where chance, uncertainty, and

ambiguity dominate.” (Murray and Grimsley 1994, 1, as quoted by Gray 1999, 19). This

definition is offered by Gray in his attempt to stress that “ … the process of strategy-

making can be critical to the quality of strategic performance. Intellectual historians,

even those in the field of war and strategy, are not apt to see strategy expressed in

organisation and process” (Gray 1999, 19).

4

Page 13: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Accordingly, Gray identifies ‘organisation’ as one of the 17 dimensions “essential for

superior strategic performance.” (ibid., 34)

The time period within which these alliances were being forged coincided with what

was came to be termed the “new age of terrorism”. (Kegley 2003, 4) This term was

based upon the opportunistic change in operational tactics enacted by some of the

groups discussed above, where thanks to such globalising events as the rapid growth in

transcontinental airline traffic and mass communications media such as television in the

late 1960s, insurgent groups saw the potential for garnering publicity for their cause on

a global level through instigating spectacular attacks. In fact Hoffman (1998, 67) claims

that 22 July 1968 was the birth date of modern terrorism, when the PFLP hijacked an

Israeli El Al passenger aircraft (this was the twelfth hijack event of 1968) flying from

Rome to Tel Aviv – because this hijack was consciously and primarily planned as a

publicity event, and because the target selection was not opportunistic but deliberate.

Associated with the early beginnings of this new terrorist model came a marked

increase in state sponsorship of these violent covert groupsxv, along with the

development of “commissioned terrorism” (ibid., 1998, 187)xvi and the establishment of

guerrilla training camps where training was for sale to any leftist group from around the

world that was prepared to pay for the service.xvii

This expansion in the means and forms of early networked agency through transnational

interconnectedness and activismxviii - both overt and covert - can be argued as being

facilitated by the globalisation process. Globalisation has been variously defined as the

“the shrinkage in space and time that the world has experienced in consequence of the

technological revolutions in transport, communications and information processing”

(Helleiner 2001, 243),xix or, as is more relevant to this research paper, the “historical

process which transforms the spatial organization of social relations and transactions,

generating transcontinental or inter-regional networks of interaction and the exercise of

power” (Held & McGrew 1998, 220). Either way, most commentators agree that it is a

process that has been going on for centuries, but has been facilitated by the rapid

development of technology in recent decades.

5

Page 14: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

One consequence of these technological advancements in communication has been a

marked increase (both in real and value terms) in the growth of new forms of domestic,

regional and transnational non-state organisations that are constituted to act

complementarily, in parallel, or conflictually in response to or in an attempt to influence

either individual states or the growing number of intergovernmental organisations.

Whereas once it was the case that the expansion of a movement or enterprise was halted

in most instances at a state border by the state itself, or a neighbouring state, the co-

dependent relationship between technological progress and the neoliberal economic

agenda was given further impetus and perhaps even a kind of moral justification at the

end of the Cold War, and is creating a more malleable global environment. State

borders have become more porous and fewer institutions such as business ventures are

now tied to or confined within the mother state and any other territories that state might

control by virtue of war or economic domination. In other words, it is now the case that,

the Multinational corporation and the transnational terrorist network both utilize the existing global economic, transportation and communication systems to organize and manage far-flung subsidiaries and to move funds, men, and material from one location to another” (Takeyh and Gvosdev 2002, 97).

When confronted with a challenge, this more ‘organic’ form of organisation that is

“networked, though still stratified” (Arquilla and Ronfeldt 2001a, 7) is thought “more

suited to dealing with rapidly changing conditions and unforeseen contingencies” (ibid.,

7). From terrorist groups to drug cartels to pro-democracy civil society actors, the trend

within globalisation is seemingly towards “network forms of organization, doctrine,

strategy, and technology” (Arquilla and Ronfeldt 2001b, Preface, v).

It is the aim of this research project to investigate the network phenomena as it pertains

to covert, insurgent groups. It argues that while there are many references both in the

media and in academic circles concerning the emergence of new transnational network

structures across various organisations and activities both overt and covert, and

seemingly universal agreement that we are experiencing on many levels a challenge to

hierarchical forms of organisation, communication and transaction by these new

networked organisational forms, there has been insufficient empirical analysis regarding

6

Page 15: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

these issues within the security field, particularly in relation to contemporary insurgent

groups outside or on the periphery of the al Qaeda sphere of activity.

There are many hundreds of groups by this definition active in the world today, a

number far too great to explore adequately within the confines of this brief research

project. It can be argued, however, that through interrogating a limited yet varied

selection of groups in this instance, evidence can be gathered that will either justify or

diminish the argument that a more in-depth study would be worth undertaking in the

future. The purpose, therefore, of constructing this model is twofold: to facilitate greater

understanding of how some insurgent groups may have organised and positioned

themselves to act or interact in the current world environment, and to explore the

contribution that network analysis – primarily organisational network analysis - may be

able to offer security studies to the study of intra- and inter-group functionality. This

study is therefore premised upon the belief that there is value in exploring both the

internal organisational structures of insurgent groups as well as looking for the

existence and nature of alliances formed between such groups.

It is first necessary to scope the universe of currently active irregular groups in order to

select a number of different case study examples, and highlight a number of candidates

for analysis from this extensive pool of organisations. In selecting the case study

groups, no account has deliberately been taken of any previous determination that may

have been given them regarding their supposed domestic or transnational status (more

about this in the research design and methodology section to follow). Additionally,

largely due to the vast amount of coverage already allocated to al Qaeda both in the

media and in professional journals, some reverse selection bias must be acknowledged

in that al Qaeda has been deliberately excluded as a case study subject in this instance –

although this action does not necessarily mean that the organisation will not have a

presence within one or more of the six mapping scenarios as an associated group, or that

organisational themes pertaining to this group specifically will not be addressed when

discussing the structures of other groups or networks.

It will be the goal of this study to discover to what extent this is the case by

interrogating a small number of case study analyses furnished by information that is

7

Page 16: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

available in the public domain, with the assistance of network analysis tools and graphic

models.

It is also necessary to stress that this study will focus primarily upon the structures and

relationships associated with the covert groups chosen for the case studies rather than,

for example, dwelling upon group ideology past its influence upon group structure and

process, or the nature of the violent and non-violent activities perpetrated by these

groups – for example, whether a certain act can be described as ‘terroristic’ by whatever

definition has been given to this much-disputed subject. Information of this type will

only be included if it serves a useful purpose in either describing the organisation or

illustrating an observation that relates to organisational structure and process.

In order to draw a conclusion as to the scale and form of any networked alliances

identified (assuming that these networks prove to be the reality – there are those who

argue that recent discourse regarding terrorist network phenomena is a blind acceptance

of an homogenising framework that through repetition and lazy thinking has been

accepted as the rule rather than the exceptionxx), the findings will be expressed through

the actual graphic mapping of organisational relationship models based around the case

study groups selected. This decision was made because it was felt important to offer the

reader a visual display that synthesises the disparate material that is often utilised in the

exploration of the components of a network. These visual representations of

organisational interconnectivity will seek to identify as much as is possible both the

breadth and nature of a group’s internal structures and inter-group alliances where

possible.

This study has been divided into three distinct sections. This first chapter serves to not

only introduce the background and motivation for this research project in general terms,

but also provides overall context to the study through the inclusion of a number of

varied but complementary sections that together set the scene for the case study exercise

in Chapter Two. In the sections below, the general theory and process behind network

analysis will be introduced. This will be followed by a literature review section that will

provide comprehensive backgrounding in the form of three separate literature reviews

of material pertinent to this subject, namely what can be generally referred to as the

literatures of terrorism, global civil society, and network analysis pertaining to covert

8

Page 17: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

groups. The final part of Chapter One will be an explanation of the methodology used in

this study, which is a synthesis of both qualitative and quantitative approaches.

Chapter Two will focus solely on the case studies. Six insurgent groups will be

researched qualitatively and the findings presented in written and graphic form. The

groups that will be examined are Abu Sayyaf (AS) – Philippines; the Communist Party

of India-Maoist (CPI-Maoist) – India; the Kurdistan Workers’ Party - recently renamed

as Kongra-Gel (PKK) - Turkey; Jamiat ul-Ansar (JuA) – Pakistan; the Liberation Tigers

of Tamil Eelam (LTTE) – Sri Lanka; and the Revolutionary Armed Forces of Colombia

(FARC) – Colombia. All but one of these groups (CPI-Maoist) have been designated as

‘Foreign Terrorist Organisations’ by the US Congress, although this group is a very new

entity whose origins will be explained in the case study discussion, and whose

constituent groups were outlawed in India under their 2002 Prevention of Terrorism Act

(POTA).

The final section of this study, Chapter Three, will be a comprehensive and expansive

discussion based upon the observations and analysis undertaken in the study. As well as

discussing the findings, there will be a section in this chapter that examines the value of

potential future research as an outcome of this study.

Before embarking on an exploration of what constitutes network analysis, however, it is

first necessary to define and explain the reasoning behind a key term utilised within this

study. The term ‘insurgent group’ has been chosen in this study over other possibilities

such as ‘terrorist group’ or ‘irregular group’ due to the fact that although insurgency

involves armed struggle, the “combination of guerrilla action, propaganda, subversion,

and political motivation” (Beckett 1999: xiii) that is associated with insurgency

provides a more expansive framework of analysis.

In other words, it could be argued that a drug cartel may have the resources to fight

unconventionally, or to use terror tactics to further its agenda, but it would be hard to

argue that a predominantly criminal gang is motivated by any strong political ideology

around which the group has built itself. Similarly, labelling a group as terrorist also has

the effect of denying any political or social structures that group has constructed. Since

terrorism is merely one tactic within an unconventional arsenal of tactics open to a wide

9

Page 18: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

variety of agents (be they insurgent group, state or cult) – and not a strategy – it would

also be overly simplistic and even misleading to use this term, popular though it now is.

This research project thus sets out to further the understanding of covert networks of

insurgent groups in the current world environment.

APPROACHES TO NETWORK ANALYSIS

AN OVERVIEW OF NETWORK ANALYSIS

Networks, and the systematic examination of their properties both by academics and

business analysts, are not a new phenomenon. Since Moreno published his sociogram in

1953 - a model depicting the interpersonal dynamics of small groups - there has been

considerable progress made in the development of sociometry and social network

analysis as a research tool in the social sciences from a number of different perspectives

– particularly during the last fifteen years .xxi

The decades that followed the publication of Moreno’s model saw the rapid

development of technology that in many ways transformed the world. One of the key

drivers of this transformation was the creation in the 1960s of what was later to become

known as the internet. Developed in a Cold War setting by the US Defense Department

Advanced Research Projects Agency (DARPA) initially as a means to counter

conventional communication breakdown in the US as a result of Soviet nuclear

bombardment, Castells offers the analogy that “To some extent, it was the electronic

equivalent of the Maoist tactics of dispersal of guerrilla forces around a vast territory to

counter an enemy’s might with versatility and knowledge of terrain” (2000, 6).

Castells argues that this new technological paradigm underpins our new “informational

society” (ibid., 61) due to its having the following five characteristics: namely that

“information is its raw material” (ibid.); its pervasive effects upon human activity; its

networking logic which is inclined towards increasing complexity and “unpredictable

patterns of development” (ibid.); its flexibility in that it shows that organisations can be

10

Page 19: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

modified or altered by the rearrangement their components; and its propensity towards

technological convergence where hitherto separate processes such as

telecommunications and computing are becoming more and more integrated. Because of

this, Castells argues “Networks are the fundamental stuff of which new organizations

are and will be made” due to “the informational power provided by the new

technological paradigm” (ibid.,168). Additionally, “Networks are open structures, able

to expand without limits, integrating new nodes as along as they are able to

communicate within the network, namely as long as they share the same communication

codes (for example, values or performance goals)” (ibid., 470).

While the networking process itself has existed for a long time, information technology

is enabling this process to become far more pervasive. Castells (1996) makes the point

that “the power of flows takes precedence over the flows of power. Presence or absence

in the network and the dynamics of each network vis a vis others are critical sources of

domination and change” (ibid., 469) and technological processes are consequently being

reflected through changes in human interaction and forms of organisation.

An aspect of the new changes wrought upon the world by this technological revolution

was the restructuring of capitalist dynamics. The traditional corporation with its vertical

hierarchy began to morph into the horizontal corporation and came to be “characterized

by greater flexibility in management; decentralization and networking of firms both

internally and in their relationships to other firms” (ibid., 1). This is said to facilitate an

improvement in the organisation’s ability to adapt to unpredicted events (ibid., 164). In

other words, the argument is that the information revolution favours networks over

hierarchies – especially all-channel networks where every node is connected to every

other node, creating a fully dynamic multiorganizational structure (Arquilla and

Ronfeldt 2001, 1). Networks are open structures, able to expand without limits. Through

their innate ability to be dynamic and open, they possibly are more able to risk

innovation without threatening the survival of the entire structure. It was the belief that

these new forms of interrelationship could be understood in much the same way as

Moreno’s small group dynamics that fuelled the further development of network

analysis tools. Network analysis has been developed with the surety that it is “an

analytical technique that enables researchers to represent relational data and explore the

nature and properties of those relations ” (Monge and Contractor 2003, 35).

11

Page 20: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Prior to discussing in more specific terms the intricacies of network analysis, it is useful

to offer definitions and explanations of some key concepts and processes used in the

field.

In the abstract, a network “is a set of interconnected nodes” (Castells 1996, 470). A

node is the unit level actor, entity or process being examined, irrespective of the

analytical perspective pursued. Network linkages are produced when nodes are

identified as being connected by one or more ties through some kind of relationship.

The relations - namely the nature of the links, being mapped - are determined in

advance by the researcher. One or more relationship dimensions can be examined

within the same network group, and thus relational approaches are termed as being

either uniplex or multiplex in scope. Additionally, up to five different levels of network

breadth can be interrogated – individual actor, dyad, triad, subgroup and global.

Monge and Contractor (2003) determine three areas of measurement within the network

analysis process. These are the qualities of ties (also called links or arcs),xxii the

measurement and analysis criteria given to individual nodes within a network, and the

measurement tools assigned to measure and describe the network as a whole.

Tie qualities can be measured in turn by whether they are direct or indirect; the

frequency of the connection; its stability over time; the level of multiplexity of the

connection (meaning the number of differing forms of ties that two nodes may share);

tie strength; and directionality – meaning that some inter-nodal ties may be

unidirectional (or asymmetric) while others may show an exchange in both directions

(deemed symmetric) across the same criteria.xxiii

The measurement criteria of these ties between nodes can in turn be measured by some

or all of the following means: degrees – the number of direct connections a node has

with other nodes; betweenness – the extent to which a node mediates between two other

nodes; and closeness – the extent to which a node reaches all other nodes within the

network and can thus monitor flows or transactions.

12

Page 21: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

These three readings analysed together give an indication of centrality – the extent to

which a node or actor is central to a network. Taking directionality (asymmetry) into

account, nodes can also sometimes be given a prestige rating based on the flow

direction of the relationship at issue, or a power rating - based on the specific

calculations made from actually merging betweenness and closeness scores. High

centrality scores demonstrate power and influence within a network. As Castells

reiterates, “the network morphology is also a source of dramatic reorganization of

power relationships. Switches connecting the networks … are the privileged instruments

of power. Thus, the switchers are the power holders” (1996, 471).

Finally, the network itself is measured by some or all of the following criteria: size;

connectivity – the extent to which nodes within the network are linked by both direct

and indirect ties; density – comparing the actual number of links within the network to

the potential maximum possible; centralisation – a ratio calculated from identifying the

most central individual node in the network and comparing it to all other nodes’

individual centrality ratings; and symmetry – the ratio of symmetric links to either the

asymmetric links, or the total number of links within a network. Once calculated,

network data is usually represented as either matrices (in this context, often called

sociomatrices) or graphs. xxiv

Practitioners of network analysis identify three forms of network: grid-based; social;

and organisational. xxvOf interest in this study are the latter two forms, particularly the

organisational. But it is still worthwhile to describe the basics of social network analysis

in order to facilitate better comprehension of the organisational-level analysis approach.

Social network analysis is premised on the belief that all social relationships exist

within some kind of network, irrespective of whether the unit actors are conscious of

this or not. This approach allows for the construction of relationship models around

‘passive’ units as well as consciously participative actors, and through the belief in the

structural inevitability of activity social network analysis techniques have interestingly

also been used to map such events as patterns of disease spread through populations.

Social network analysts also believe that relationships between nodes in a study can

usually be categorised into one of the following typologies: the chain or line model,

13

Page 22: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

where end-to-end communication between actors, or nodes, must travel through the

intermediate nodes; the hub, star, or wheel model, where a set of separate actors are tied

to a central actor and must go through that node to communicate with one of the other

actors; and the all-channel or full matrix model, where every actor is connected to every

other actor, and where the opportunity for collaboration is greatest.xxvi In addition to

these three main typologies, a number of others have also been identified, namely the

lattice; centre-periphery; clique; hybrid; and embedded models.

Additionally, attributes of interest to the network analyst include nodes that are

boundary spanners (that is, that take advantage of ‘structural holes’ in the network) –

nodes whose position in a network creates the only link between two groups (or sets of

groups); and peripheral players – nodes who are situated in an outlaying position on a

network graph but may themselves be boundary spanners between the network being

studied and other as yet unexplored networks.

This approach stresses the importance of location (is it an actor’s centrality or their

peripheral placement that renders them more powerful?); the types of linkages between

actors; and issues of reciprocity. It also tends to focus on the micro aspects of

relationships such as the formation of dyads, triads and small subgroups.xxvii Social

network analysts tend towards mathematical modelling which is often hard for the

layperson to comprehend, and is one of the motivating factors behind this project in its

drive to create a visual model that is immediately comprehensible and not obstructed by

algorithmic representation.

Organisational network analysis, an approach generated primarily by organisational and

economic sociologists, takes a crucially different approach – focusing on self-conscious

intent and participation in network formation. To the organisational network analyst, a

functioning network requires two fundamental attributes – connectedness (the structural

ability for nodes to clearly communicate with each other); and consistency (with respect

to the degree of shared goals).

Each node within a system could be an individual, group, organisation, or part of an

organisation or state for example. The ‘division of labour’ within a network may be

14

Page 23: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

segmentary or specialized, meaning that all nodes may either look alike and do similar

things, or independently specialise.

Organisational network analysis also allows for components of networks to be both

autonomous and dependent vis a vis the network. Additionally, some actors may also be

a part of other networks, and therefore of other systems of means aspiring towards other

goals.

An organisation has been defined by network practitioners as “a system of means

structured around the purpose of achieving specific goals.” (Castells 1996, 171). He

identifies two types of organisational forms, “organizations for which the reproduction

of their system of means becomes their main organizational goal; and organizations in

which goals, and the change of goals, shape and endlessly reshape the structure of

means” (ibid., 171). In other words, the former is describing a bureaucracy, and the

latter an enterprise.

Regarding relationship typologies, while organisational network analysts acknowledge

the same structural forms as do social network analysts, proponents such as Ronfeldt

and Arquilla (2001a; 2001b) argue that the boundaries of organisational networks may

be either well defined or blurred, and often can be typological hybrids – for example, a

network may consist of an all-channel directorate at core that controls a hub

configuration for specialised tasks. They also acknowledge that some or all individual

nodes within networks may themselves individually be organised via a combination of

hierarchy and network form. Regarding issues of leadership within a network, its

organisation may appear leaderless (acaphelous), or hydra-headed (polycephalous).xxviii

Castells offers a supplementary way of categorising forms of organisational

functionality. He distinguishes between two models, namely “the multidirectionality

inherent in networks of small and medium businesses, and secondly, the licencing or

subcontracting model under an umbrella corporation” (1996, 160 – italics in original

text) which like Ronfeldt and Arquilla’s hybrid still allows for a combination vertical

and horizontal management structure based on set of core-periphery relationships.

15

Page 24: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

While this section has been included to provide a brief overview of network analysis

and its processes in order to establish some backgrounding to an important part of the

particular methodological process undertaken in this study, it is also worthwhile to

summarise Monge and Contractor’s (2003) own brief literature review regarding the

state of the discipline, as they make some important points that have been taken on

board in this current study. Monge and Contractor (1996, Preface, xii – xiii) make five

observations of note. First, they argue that too few studies to date have utilised theories

in their construction of research hypotheses, and when they do, the tendency has only

been to apply single theories. Secondly, most research has focused itself at the

individual or dyad level, ignoring multiple level network analysis such as either

examining a network’s multiple levels at a single point in time, or taking into account a

network’s historicity, or ignoring other networks to which the focal network relates.

Thirdly, they argue that network analysis processes need to integrate theories of

complexity, chaos and catastrophe into their machinations. Fourthly, they criticise the

static cross-sectionality of most network analysis projects at the expense of developing

more “dynamic simulations of network evolution” (ibid., xiii). Lastly, they stress the

importance of empirically testing hypotheses through computer modelling. In response

to their observations, the authors have developed a multitheoretical approach that they

argue would “compare and integrate diverse theories and increase the explanatory

power of research efforts” (Ibid., xii).

While the above introduction to network analysis is sufficient to provide a framework

from which to comprehend the quantitative qualities of the research undertaken in this

project, there is still one sub-field of network analysis that deserves investigation due to

its direct applicability to the work undertaken: the concept of “netwar” (Arquilla and

Ronfeldt 2001a; 2001b).

NETWAR

The concept of netwar presents “an emerging mode of conflict (and crime) at societal

levels, short of traditional military warfare, in which the protagonists use network forms

of organization and related doctrines, strategies, and technologies attuned to the

16

Page 25: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

information age” (Arquilla and Ronfeldt 2001a, 4). This is a social concept that seems

to have parallels with the military concept of Fourth Generation Warfare (4GW), where

because of asymmetric weakness, insurgents choose to take the battle around (rather

than through) their enemy’s forces, blurring the distinctions between what is war and

peace, battlefields and civil space, civilian and military.

Ronfeldt and Arquilla (2001a; 2001b) argue that the majority of these netwar actors will

be non-state, and even stateless; they may be sub-national or transnational. Some of

these actors may be agents of a state (‘war’ by proxy), and some in turn may try to turn

states into their agents.

Often, actors within this netwar model will share similar principles, goals, or ideologies,

facilitating “a central ideational and operational coherence that allows for tactical

decentralization” (Arquilla and Ronfeldt 2001b, 9). While technical sophistication

especially in the area of communications is important, what is of greater value is social

cohesion and trust within the structure, an attribute that is often based upon long-

established ethnic or kinship ties and that makes a group, and hence the network, far

more difficult to undermine. The emphasis here is on culture over technology.

Ronfeldt and Arquilla argue that odd hybrids and symbioses are likely to evolve. For

example, a network may consist of an all-channel directorate at its core, but with a hub

or chain organisational structure at a lower level for tactical operations. Alternatively,

groups could function as a hybrid of both hierarchy and network for maximum

efficiency.

As well as networks being constructed around long-term strategic goals, they can also

be tactical – where for instance groups choose to band together, perhaps only

temporarily – for the coordination of a specific activity. The actors, or nodes, in this

case being insurgents and criminals (along with civil society activists) structure

themselves and their actions in ways that seek to challenge, undermine or destroy other

actors such as rival groups, corporates or governments.

Ronfeldt and Arquilla suggest five levels of analysis for organisational networks – the

structure of the organisation, the narrative that sustains its identity and values, its

17

Page 26: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

structural and functional doctrine of practice, the efficiency of its technological and

communication systems, and the quality of interpersonal trust shared between individual

group members (2001a, 10-21). Elements of these suggestions have been taken into

account in the description of group attributes included in Chapter Two of this study.

LITERATURE REVIEW

The first of the literatures to be examined is that which deals specifically with insurgent

and terrorist phenomena. This particular body of literature will be appraised first due to

the fact that it focuses directly and specifically on insurgent groups from a number of

different perspectives, and is the largest body of work to be critiqued.

There has been a post-September 11 boom in the literature on terrorism with an al

Qaeda focus, and a plethora of books and articles of varying quality have swamped both

the public and academic communities. This literature review will of course take account

of many of these newer works to the degree that they tackle issues of organisational

structure both internal and external, but will also pay due attention to many works

published earlier, including a number of books that date back to the 1970s. The

rationale behind this approach is that like most consumables, publishing houses and

academic journals respond to general trends of customer interest and demand, and the

literature on insurgency and terrorism is not immune to the forces of fashion. A second

reason for including older works that may for example include case study analyses of

groups no longer in existence, is that it is useful to identify what aspects of the subject

these works saw as being important in previous times. Thirdly, a number of the case

study groups in this research project have their origins in the 1960s, and so it makes

sense to include works that were written often with these groups in mind. Lastly and

most importantly, it is useful in exploring a selection of works produced over the last 30

or 40 years in order to determine whether any changes have taken place concerning the

nature of what issues and factors are deemed worth emphasis within the discipline. This

process will take place through the identification of any changes – omissions, additions

18

Page 27: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

or re-conceptualisations – in the terminology utilised across all this literature regarding

both intra-group or inter-group organisational dynamics, and insurgent group

typologies.

It will also be noticeable that for the first time the terms ‘terrorist’ and ‘terrorism’ will

be frequently referred to in this study. As this is a review and critique of expert

observation and opinion on the subject of covert insurgent groups and how they operate,

it would be inappropriate to not integrate the terminology these authors have chosen

themselves to use to describe their subject matter – and in most instances references

have been frequently made in the works discussed to the terrorist phenomenon. This

review will honour these authors’ choice of terminology.

The last point to make here is that as this study is focused specifically upon

organisational structures, and in particular the possible evolution of insurgent networks,

this literature review is naturally selective in the material chosen from the publications

to reflect these processes. In other words, interesting material concerning, for example,

the specifics of high profile attacks or kidnapping operations has in most cases not been

included due to their lack of relevance to the current discussion. Regarding the factors

that will be examined, the review process will in general terms begin with an overview

of the literatures’ appreciation of the immediate ‘big picture’ issues such as networks

and transnationalism, and gradually hone down its focus from the inter-group level, to

intra-group functionality, to the appreciation of basic characteristics of analysis.

Regarding literature selection, it is also worth noting that there will be a number of

works referenced in the case study chapter that will not appear in the review below. The

rationale for this omission is that the majority of these works are not analytical, but

rather supply factual information about the specific groups being studied and so would

offer very little to a thematic exploration of the subject matter. Additionally, it is a goal

of this study to minimise repetition, so the internal default logic of this study is in

favour of the case study chapter as it is this portion of the research project that the entire

work revolves around and supports.

19

Page 28: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

THE LITERATURE OF TERRORISM STUDIES

It is certainly the case that the more recent the literature, the greater mention there is of

network forms of organisation (exceptions being Kegley 2003; Pearlstein 2004). Books

and articles concerning al Qaeda that were published post-September 11 (Farley 2003;

Gunaratna 2002; Kegley 2003; Napoleoni 2004; Nyatepe-Coo and Zeisler-Vralsted

2004; Pearlstein 2004; Sageman 2004; Schweitzer & Shay 2003; Smith and Weeding

2003; Stern 2003; Takeyh and Gvosdev 2002) all naturally make reference to this high-

profile group’s network form, but to varying degrees of appreciation and complexity.

While some of these publications (Gunaratna 2004; Napoleoni 2004) show a

commendable appreciation and make a good attempt to describe the al Qaeda network

structure in some detail regarding its organisational motivations and internal processes,

others seem content merely to make reference to the issue while offering the reader little

or no definitional explanations whatsoever (Schweitzer & Shay 2003; Pearlstein 2004;

Kegley 2003; Nyatepe-Coo and Zuisler-Vralsted 2004; Takeyh and Gvosdev 2002),

while at the same time stressing the important implications of this (largely unexplained)

new organisational form, and which at least one work ties to the globalisation process

(Schweitzer & Shay 2003). A key criterion for measuring the quality of any work is

through its attention to defining the key issues within its area of interest; lack of

adherence to this basic criterial requirement is highly disappointing.

When it comes to the usage of network terminology, and the appreciation of different

forms of networked agency, the pool of literature is even further diminished. For

example, while Gunaratna (2002, 97) shows some familiarity with network dynamics

and makes reference to such factors as cells and cellular regeneration (as an interesting

cultural and metaphorical aside, he informs the reader that the Egyptian world for cells

in this context is ‘anquds’ – a bunch of grapes – when picked, its loss would not impact

the other bunches), the division of labour within al Qaeda, and associate groups that

feed into al Qaeda’s internal network, he nonetheless appears vague and almost

contradictory at times – for example when he describes al Qaeda’s network as being

based around a cellular (cluster) model, when previously he had determined the group

as been organised into four distinct entities, one of them being a pyramidic strategic and

tactical centre of command. Sageman (2004) should also be singled out as a work that

talks specifically to the issue of terrorist networks – although its title is rather

20

Page 29: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

misleading in that it is not a generic study of this phenomenon but rather an exploration

of what he terms the “global Salafi jihad” (Preface,VII) from a socio-historical

perspective. His work focuses on possible individual and group motivations and

dynamics, but nonetheless is supported by an appreciation of social network analysis.

Interestingly, in a reported interview, Sageman also referred to al Qaeda as a movement

(Wright 2004). Zanini (Jones 2004) on the other hand shows a commendable

appreciation of network definition. Perhaps influenced by his information technology

background, Zanini is successful in blending the theoretical dimensions of network

process and analysis within his discussion concerning traditional and modern

representations of organisational form. He also refers to a wide number of groups to

illustrate his points, and shows familiarity with the netwar concept discussed earlier in

this chapter, one that will be revisited again later in this review. Taking a different

approach, Stern (2003) likens the running of a terrorist network to that of running a

traditionally-conceived non-governmental organisation (NGO). She expands the

concept by arguing that like with an NGO, the mission is not static, funding sources are

important, the terrorist group is out to sell a ‘product’ and operates on a cost-benefit

approach, specialisation is encouraged, and that each group is in effect competing with

similar others for ‘market share ’(2003, 142). Stern also shows herself as being aware of

the network theory and the netwar concept (one chapter of this work is devoted to

networks), and she criticises one aspect of it in her work, namely swarm theory.

In contrast, works whose publication years pre-date the September 11 attacks

(Alexander & Swetnam 2001; Bodansky 2001; Hanle 1989; Harmon 2000; Hoffman

1998) offer the reader a different emphasis and choice of terminologies when it comes

to the network phenomenon. While Alexander and Swetnam’s work describes al Qaeda

as “a truly international network with links in some 55 countries” (2001, 31) and Prabha

(2001) takes a brief look at the networked organisation of a selection of groups that pose

a threat to Indian security, none of the other works make detailed references to networks

at all. While one of the pre-September 11 books on al Qaeda (Bodansky 2001, 51) does

make passing reference to networks when describing the type of organisation bin Laden

was building, no explicit emphasis was placed upon this term, with the alternate term

“movement” (ibid.,. 15) being given equal emphasis. What is also interesting about

Bodansky’s book is that even though it represents itself as a study of bin Laden himself,

great attention is actually given to the vital role of agencies, especially state agencies,

21

Page 30: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

that have supported and guided him towards constructing the type of organisation al

Qaeda is today, particularly the Pakistan’s Inter-Services Intelligence Agency (ISI). In

representing bin Laden and his followers as one piece of an intricate jigsaw, and not

even using the al Qaeda name, content and context in this work varies considerably

from later works with its more holistic appreciation of agency. It could be argued that

this was the case because networks did not exist before the 1990s and these books

reflected the organisational realities of the time. But as this study’s introduction

demonstrates, there were attempts being made by many insurgent groups to forge

alliances even back in the 1960s, which begs the question: what really is the difference

between a series of alliances and a network? Granted, it can be argued that there is a

distinction between a networked internal organisation of a single group such as al

Qaeda, and the type of external alliances these aforementioned groups were trying to

establish with each other. But when the literature on al Qaeda fails often to convince the

reader (though not always – see Stern 2003 for example) that it understands and can

differentiate between what parts of the ‘al Qaeda network’ belong to al Qaeda and what

belong to the umbrella group IIF of which al Qaeda is a member, then this criticism is

still a moot point.

Thus, what this review identifies is that many, particularly early, works do indeed pay

attention to internal and external organisational structures that could in turn have been

identified as networks if the term was in more common usage at that time.

Some other works talk specifically to alliances and inter-group transactions, but do not

present this information within a network framework (Cronin 2002; Kartha 2000). One

work (Pearlstein 2004) approaches the issue by marrying terrorism, international

relations theory and globalisation. In this work Pearlstein classifies terrorist groups with

three distinct typologies, namely first, second, and third generation terrorist

organisations (2004, 3), defining the new global system he sees emerging as “polyplex

…a global system in which many global actors, and many types of global actors,

interact tightly in an exceedingly difficult, unruly, congested, shrinking, nonpolar, and

swiftly evolving world” (ibid., 12 - italics in original). Something to keep in mind,

however, is Pearlstein’s insistence that new transnational terrorist organisations are self-

sufficient inasmuch as they are not state-funded, pursue their own interests

transnationally, and lack sovereign territory. Other commentators (for example,

22

Page 31: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Bodansky 2001) would probably beg to differ regarding the first two points in

particular.

There is also a selection of recent books that offer a detailed historical overview or

analysis of a particular situation or issue (Ali 2002; Bergen 2001; Napoleoni 2004;

Stern 2003). While these books do not identify themselves as offering commentary on

the network phenomenon per se, they succeed in very detailed ways in describing the

intricacies of network links and flows – in addition to supplying some important data to

a number of the case study events. All three are quality works, well researched and well

presented. Bergen (2001) writes a rather informal account of the history of bin Laden,

Ali (2002) offers the reader insight and context regarding the evolution of Islamic

fundamentalism, while Napoleoni (2004) examines the networks of covert money flows

and how these intersect with and support contemporary terrorist groups. Stern (2003) in

turn looks at the motivations behind religious terrorists and how these are utilised by

varying insurgent groups from the small-scale to the fully transnational.

A key term utilised in earlier works that points to external networking practices under

another name is ‘internationalism’. A few of the authors (Harmon 2001; Lacquer 2004)

write extensively around this term, with Lacquer noting a marked evolution in the

internationalism of terrorist groups in the 1960s and 1970s, through the increases in the

use of foreign nationals, the creation of ad hoc special-purpose organisations, and ‘third

country operations’. Harmon (2001) reminds us that traditional socialist or Marxist-

Leninist groups have always displayed an inherent internationalism, citing the IRA, and

Sendero Luminoso’s association with the Revolutionary Internationalist Movement

(RIM), as examples of this (2001, 86). He argues that other international links forged

are due to cultural similarities, such as ETA’s links with groups in Latin and Central

America, and Cuba.

As mentioned in the introduction, some authors (for example, Harmon 2001) have noted

that some groups began to make links and set up truces with other groups whose central

ideologies they opposed or whose specific goals they had no direct interest in (Karmon

2000). It appeared to be the case that consensus regarding a common enemy became a

more important factor than the myriad differences between them. Other works also hint

at this (Nyatepe-Coo and Zeisler-Vralsted 2004) in their assertions that, for example, al

23

Page 32: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Qaeda, Hamas and Hezbollah may be working together, that Hezbollah has formed a

“strange fellowship with drug smugglers in the tri-border area of South America –

Argentina, Brazil and Paraguay” (2004, 59) and through the assertion that “In recent

years, increased communication and coalition building among groups that previously

operated independently have occurred” (ibid., 51). These types of alliance should

perhaps be described as tactical alliances. Alliances identified as more strategic are also

explicitly identified in some of the literature (Gunaratna 2002), although it is argued

that operations are planned so that al Qaeda attacks strategic targets, and its associate

groups attack tactical targets. Whether this is true or not remains to be examined, but

this theory seems to be flawed inasmuch as it does not take into account the importance

of the other IIF co-founders and the status of particular individuals within these other

organisations such as Zawahiri.

When discussing the role of the state in the activities of terrorist groups, a number of

works address this issue (Chellaney 2001; Gunaratna 2002; Harmon 2001; Hoffman

1998; Nyatepe-Coo & Zeisler-Vralsted 2004; Quillen 2000; Shahar 2000; Simonsen and

Spindlove 2004; Stern 2003;; Takeyh and Gvosdev 2002; Winchell 2003), sometimes

through case study analyses. As mentioned earlier, Harmon notes the assistance the East

German Stasi offered to West German right wing groups, and Takeyh & Gvosdev argue

the point that global terrorist networks need failed states within which to base

themselves. They also make reference to Guillermo O’Donnell’s “brown zones”xxix that

can be located within Western societies - areas where state governments are reluctant to

intervene for domestic political reasons. This raises the possibility of an expanded

concept of ‘brown banks’ and ‘brown places of worship’ – concepts not explored in any

of the works explored in this review but that may be worth pursuing in another study.

Some assumptions behind assertions made, however, are questionable. For example,

Takeyh and Gvosdev (2002) argue that global terrorist organisations need failed states

from which to manage their operations. This prompts the question: what then of al

Qaeda in a post-US invasion of Afghanistan world? If it has shifted major figures of its

management structure into Pakistan or Iran as some have argued, then are these failed

states in some way? And was a Taliban-ruled Afghanistan a less legitimate state than its

current Kabul-entrenched successor regime? Of course Takeyh and Gvosdev may be

proven correct instead by the dissipation of al Qaeda’s threat perception and capability

over time, due to the lack of a safe haven as they have argued.

24

Page 33: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

There was a noticeable tendency within the earlier literature to both mention and

explore in greater detail the commonalities of organisational design across leftist

insurgent groups (Lacquer ?; Harmon 1998; Hoffman 1997), although this aspect is still

noted at least in passing by later authors (Schweitzer & Shay 2003; Jones 2004;

Nyatepe-Coo and Zeisler-Vralsted 2004; Takeyh and Gvosdev 2002). For example,

Lacquer (2004) and Harmon (2000) stress the tendency of leftist organisations to have a

strong central command structure with strong leadership – although Lacquer makes the

point that the best system probably involves some kind of strategic centralisation and

tactical decentralisation so that local membership can plan operations taking local

conditions into account. Harmon also remarks that some organisations have over time

lost their revolutionary purity, and cites FARC as an example of this– although others

(Ortiz 2002) would dispute this as a rather simplistic analysis of this group’s evolution,

instead arguing that FARC is merely responding creatively to changing domestic and

international conditions. Harmon (2000) also reminds us that cell-based structures date

back to at least the early Bolshevik days, and were also utilised by various resistance

movements during World War Two.

As far as non-ideologically situated descriptions of groups’ internal structures are

concerned, almost all (with the exception of Pearlstein for example) the literature

attempts to tackle this important matter to varying degrees of accuracy and specificity.

Many authors identified the differences between hierarchical and less centralised

leadership structures across groups (Alexander & Swetnam 2001; Drake 1996; Hanle

1989; Harmon 2000; Lacquer 2004; Gunaratna 2002; Jones 2004; Kedgley 2003;

Nyateoe-Coo and Zeisler-Vralsted 2004; Takeyh and Gvosdev ) and the differing

effects on process and potential efficacy these structures may provoke in relation to

their tasks (Moghadam 2003), sometimes within a case study-based analytical

framework (Cragin & Daly 2004).

Drake (1996) differentiated between hierarchical groups with a strong leadership core

that tended towards bureaucratic management styles, groups where the membership

enjoyed a high degree of autonomy, and groups that operated under an umbrella

organisation. Interestingly, he makes the unique observation in discussing Italy’s now-

defunct Red Brigades,xxx stating that while it was definitely an example of an

25

Page 34: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

hierarchical group, many of its decisions came from its lower ranks, with the

implication that even hierarchies can have dual-directional flows of power and

influence. He also discusses the existence of diffuse networked groups such as the

United Kingdom’s Animal Liberation Front (ALF) and Germany’s Revolutionary Cells,

where cells were completely self-contained and rarely interacted. These groups were

able to sustain this type of structure, which could be described as more of a movement,

due to the clear identification of what was the ‘enemy’ and what were the group’s (or

movement’s) long-term strategic goals. This approach would also assure the overall

security of the group, because if one cell was discovered, in addition to it being

unwilling to divulge intelligence regarding the group as a whole, it would also be unable

to do so. This type of group structure has interesting overlaps with some descriptions of

larger transnational or regional groups such as al Qaeda and Hamas regarding how they

manage their operations – although Drake also makes the point that with this level of

diffusion there is little opportunity for larger, coordinated actions that might have

greater impact. Thus Drake (1996) concludes that there is an intrinsic tension between

the need for centralised control, and the safety of decentralisation.

In a similar vein, while Harmon (2000) describes cells as being embedded within a

hierarchy where direction comes from a single point of contact above, and where cell

members may not in fact know some or all of their fellow cell members. He also makes

the point that cells may act in ignorance of the strategic purpose of the action, or may

not even know all the details even from a tactical perspective (that is, individuals in

cells may only receive information on a need-to-know basis). In a similar vein, Stern

educates us about such structures as ‘leaderless resistance’ – a structure usually

associated with right wing groups, which she also describes as “virtual networks”

(2003, 151), lone wolves, and “terrorist armies” which she also terms “commander-

cadre organizations” (ibid., 141), freelancers (she is one of the few to acknowledge the

role of freelancers) and “franchises” (ibid., 144).

Regarding organisational descriptions of al Qaeda, most of the recent literature (Gueli

2003; Gunaratna 2002; Smith 2002) is congruent regarding this issue. All authors agree

that Al Qaeda is built around a central command structure consisting of an oversight

committee (in this case, the majlis al shura), a military committee, business committee,

religious office, media committee and travel office – a vertical hierarchy – supported by

26

Page 35: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

a more informal horizontal support and operations structure. Some authors (Gunaratna

2002) also make the point that this structure was borrowed from the Egyptian Muslim

Brotherhood movement. What is interesting, however, about this description is that it

very closely resembles the central management structures of most Marxist-Leninist

organisations among others, which generally consist of a politburo to guide a military

command structure (normally divided by geographic zone), and an important

propaganda office. Is it possible that modern fundmentalist insurgent groups have taken

on board the kind of organisational structures that were hitherto the domain of

established Marxist-Leninist or Maoist groups? Gunaratna quotes the now-deceased al

Qaeda co-founder Abdullah Azzam describing al Qaeda as being the “pious group and

pioneering vanguard” (2002, 4). Additionally, an article supposedly written by a key al

Qaeda strategist in 2002 acknowledges detailed familiarity with the great military

theorists. In excerpts from the article, Abu ‘Ubeid Al-Qurashi states “In addition to the

religious obligation – become an integral part of the means to triumph in fourth-

generation warfare. Old soldiers such as von Clausewitz and Mao Zedong, have

already indicated this.” (The Middle East Media Research Institute 2002)xxxi. This article

also frankly outlines al Qaeda’s supposed combat doctrine, and shows appreciation of

other military concepts such as preventive deterrence.

Countering literature that displays often almost a tacit abstract appreciation of the al

Qaeda organisational threat, is a small body of work that is not so impressed by its

supposed organisational successes (Marquardt 2003) and supposed all-channel network

structure (McAllister 2004), or the network structures of other groups. Marquardt

criticises the US for tending to blame all Islamic-driven attacks on al Qaeda, arguing

that there are many different types of groups that pose a threat to the US, and that an

over-obsession with this one group leaves the state vulnerable to attack from others.

McAllister’s (2004) analysis criticises the supposed objective facts of al Qaeda’s

networked capacity, and is reassuring in that it dares to reinterpret the same information

used by other commentators along with network theorists in a critical and logical way.

Another work (Raufer 2003) re-examines the al Qaeda threat from a number of different

standpoints, highlighting some possible contradictions of network structure and

functionality, and challenging the assumptions made about the destructive inclinations

of Salafists. Gunaratna (2002) also seems to be downplaying al Qaeda’s ongoing

destructive capabilities in a recent work.

27

Page 36: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

One of the earlier books is largely written on the tactical role of terrorism from a

theoretical military perspective. Hanle (1989) appears to have taken a unique approach

when compared to other commentators who on the whole do not display a familiarity

with military processes. Tackling issues such as Clausewitz’s second great principle of

war – “the center of gravity” (1989, 187) he applies these theories to the subject of

insurgent agency and terrorism, showing an appreciation in the process for not only the

military aspects of any insurgency, but also its social dimensions. This holistic

appreciation of the process and practice of unconventional warfare in many ways

displays a deeper appreciation than in many works of the non-military means by which

wars can be fought. One would have thought that the appreciation of cultural factors and

the human psyche would be more prominent within non-military focused case studies,

but it seems the reverse is the case.

The depth of analysis concerning the extent of internal group structures only seems to

surface in case study works built around a particular group (Ortiz 2002; Radu 2001).

This is disappointing, as issues of group structure are important. Instead, most writers

seem to prefer to write descriptive generalisations about the terrorist phenomenon, and

only refer to specific groups in passing to illustrate their points. While thematic

explorations have their usefulness, it seems a pity to sacrifice in-depth research in

favour of grand themes and often vague generalisations. One positive effect of the

almost obsessive focus on al Qaeda in the most recent literature is perhaps that it brings

the focus round to issues concerning the complexity of an individual group, and perhaps

this will now be reflected in other works that may in turn focus their attention upon

other major insurgent groups individually.

In conclusion, while each of the works cited above has a contribution to make to the

overall discourse regarding the terrorist enterprise, only some of the later works attempt

to define what they mean by terrorist networks, while earlier works tend not to use the

term at all, even when what they are describing could be construed as such. While some

works show awareness of network analysis tools, very few have taken the step to start

integrating these processes within their studies.

28

Page 37: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

The network concept is not new: it has been at the heart of many of the descriptions of

group alliances and activities since at least the 1970s, but explored with different

terminologies. This begs the question of what are the new dimensions, if any, that the

modern network reflects, apart from the influence of new technological advances in the

form of fast communications, encoding software (such as PGP – pretty good privacy,

and steganography) and global funds transfers.

Additionally, the focus in the literature tends to be either upon individual case study

groups, or addresses the issue from a generalist perspective, with neither approaches

fully exploring issues at the mid range, such as taking a regionalist perspective, that

might include examining the interesting issue of the role of ‘umbrella group’ oversight,

where coordinating groups have been formed to manage communications and joint

projects between groups – usually at the regional level. The only group that really gets

any attention is the PLO, but other ones in existence possibly fall under the radar due to

either their indirect association with acts of violence, or the fact that they are neither

strictly an insurgent group nor a sponsoring state.

It is also disappointing that so little of the literature shows an appreciation of theories of

unconventional warfare, as apart from explaining the possible utility of a particular

guerrilla tactic, some of these theories can facilitate greater understanding of how

organisations may arrange themselves in the pursuit of their goals – the example of Che

Guevara’s foco theory springs to mind here as an example, with the organisational

implications of strategic centralisation and tactical decentralisation.xxxii

It also seems apparent that almost all the analysts are interested in al Qaeda at the

moment, at the expense of most of the myriad groups currently active today. It seems

particularly the case that Islamic groups are receiving far greater attention than, say,

powerful Maoist groups with regional ambitions. Perhaps September 11 coupled with

the end of the Cold War put paid to the notion of the ‘Communist threat,’ at least to

analysts in the Western world.

THE LITERATURE OF NETWORK ANALYSIS OF TERRORISM

29

Page 38: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

While aspects of this literature collection obviously have a commonality with that

reviewed above, it has been presented separately within this section due to the fact that

these works are using terrorist groups as a means of exploring the applicability of

network analysis techniques, and it could be argued that the measurement tools utilised

are the subject of these studies, rather than the terrorist groups themselves. These works

will also be explored in more detail than those previously, owing to the fact that they are

few, and because of their immediate relevance to the backgrounding and choice of

research design in this project. Ronfeldt and Arquilla’s (2001) article ‘Networks,

Netwars, and the Fight for the Future’ has not been included in the work to be reviewed,

owing to it being the basis for an earlier sub-section of this Chapter. Another work of

theirs, however, will be included.

Two of the works (Klerks 1999; Krebs 2002) focus their efforts at the individual level,

using social network analysis. Krebs used software tools to retrospectively piece

together published information regarding the links between the September 11 hijackers

and others, acknowledging the likely incompleteness of this information among other

problems. He also chose to grade three tie strengths within this process, depending upon

the length of time and number of transactions shared between any two or more of these

individuals. While noting that his metrics scored Mohammed Atta the highest on some

of the measurements, he acknowledges that these alone do not confirm his leadership

role, and the likelihood that there are other as yet unidentified actors whose addition to

the matrix could change the figures. Lastly, he lists four related areas of focus for future

study at the individual level: trust (from data relating to prior family and social

contacts); task (through interrogating phone records, meeting attendance and suchlike);

money and resources (through examining bank account, credit card and money transfer

records); and strategy and goals (through travel records, web site visits, or possession of

videos). Admitting that this is no simple task for any researcher, he suggests the

compromise approach that intelligence agencies share more information with each

other, and at least pay attention to those individuals who are identified in multiple

different ego-networks.

Klerks’ work actually discusses the application of social network analysis tools to the

identification of criminal networks rather than insurgent ones. Like Krebs, he also

argues for the identification of those individuals who are the connectors between two

30

Page 39: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

otherwise separate networks. He also suggests network mapping can help in identifying

other processes, such as recruitment flows. And again like Krebs, he suggests that only

networked law enforcement agencies can undermine networked criminality.

Another paper (Rothenberg 2002) takes a more general exploratory approach. While

identifying individual roles within groups – “planners and doers” (ibid., 37) –

Rothenberg also acknowledges the existence of more traditional command hierarchies

at least at the strategic level. While noting that many organisational issues are still

unanswered, he posits a number of grand hypotheses that need future exploration and

that are relevant to this research project, such as “The entire global network is a

connected component” and “The network is redundant on every level” (2002, 38) – in

other words, that individual actors can reach each other by a number of different routes

so that if one path is removed, the ‘message’ makes it to the recipient by an alternative

means, or that it is managed so that the removal of a leader among leaders has little

impact.

There is only one work to date that talks to issues at the organisational level (Fellman

and Wright 2002). While this work is largely a general exploration of what network

theory offers the analyst, along with a summary of Kreb’s research at the level of

individual links mentioned above, it also acknowledges the importance of group-level

dynamics within terrorist groups, taking into account a number of theories of social

interaction such as the structural implications of social cohesion and adhesion

processes. The article therefore argues that it is time that security agencies stopped

focusing on individuals and instead attuned their intelligence collection and analysis

systems terrorist groups at “an intermediate or organizational level” (2002, 4).

Finally, one book to date has been published on the subject of the social and

organisational network properties of covert and activist groups (Ronfeldt and Arquilla

2001b), looking at these factors from both issue and case study-based perspectives. For

example, the book’s chapters cover such activities as cyber-activism, the Zapatista

movement, the coordination behind the anti-globalisation protestors in Seattle, and

terrorism. None of these studies, disappointingly, actually tests network analysis

approaches with any kind of data manipulation.

31

Page 40: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

In conclusion, it is worth re-emphasising that the scientific mapping of the relationships

within terrorist networks is a very recent phenomenon, with the most interesting and

valuable explorations being produced by social network analysts within the fields of

management, criminal policing and sociology. All these works, however, are brief and

raise more questions than they answer, which is no surprise considering the newness of

the approach.

THE LITERATURE OF SOCIAL MOVEMENTS AND GLOBALISATION

This literature has been chosen for brief review due to its focus on the theories and

practices of domestic and transnational activist civil society groups that are said to be

challenging the dominance of nation states. Books and articles within this genre tend to

associate themselves with one of two related terminology-based conceptions, global

civil society (Cox 1999; Keck & Sikkink 1998; Smith 1998), or social movements

(Brecher 2000; Cohen & Rai 2000; Khagram et al 2002; Goodwin and Jasper 2003;

Mertes 2004), or both (Kaldor 1999; Kaldor 2003; Josselin & Wallace ?).

Enthusiasts of global civil society celebrate that ‘people-power’ is constructing new

“networks, knowledges and practices that entail a reshaping of the political architecture

of international relations” (Pasha and Blaney 1998, 418), or at least have the potential,

others argue, to challenge the current state system politically, economically or socially

(Held & McGrew, 220).

Some (like Keck & Sikkink 1998) focus positively on the networking capacity of non-

state actors such as human rights, environmental, and anti-violence groups, describing

these “transnational advocacy movements” (ibid., 1) as networked, which they in turn

define as “forms of organisation characterized by voluntary, reciprocal, and horizontal

patterns of communication and exchange” (ibid., 8). These organisations “share values

and frequently exchange information and services” (ibid., 9) through “fluid and open

relations among committed and knowledgeable actors working in specialized issue

32

Page 41: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

areas” (ibid.,.8). Keck and Sikkink argue that these networks are not powerful in the

traditional sense, so seek to use the power of their information, ideas and strategies to

alter value contexts in the world.

Others (like O’Brien et al 2001), use the study of global social movements as a way to

explore changes in the governance processes of multilateral economic institutions,

therefore drawing attention to the relationship between civil society, macro-economics

and global governance.

Khagram et al (2002) distinguish between three levels of transnational action – network,

coalition and movement (2002, 9) – where the network form, which they say has been

built solely as a communication device, is the simplest of the three. This is an

interesting suggestion, but this working definition of what constitutes a network is

unsubstantiated, and seems to confuse form with function. One work (Brecher et al

2000), when discussing the challenges associated with ‘globalisation from below’

instead defines a movement as a “network of networks” (ibid., 89), and argues that

networks facilitate the flow of both human and material resources. Yet another (Mertes

2004) takes this imagery even further with its very title, ‘A Movement of Movements’ –

only to be countered by an alternate approach (Goodwin and Jasper 2003) which tears

the tiers back down again with differentiations between social movements,

revolutionary social movements and radical social movements. While the conceptual

framework of this work is intra-state in focus, these are interesting categories for

exploration with regard to the transnational terrorist phenomenon, particularly in light

of al Qaeda being described by Sageman (2004) as being more of a movement than a

discrete organisation. Of relevance to this study also is Goodwin’s description of

organisations in which he argues that “organisations themselves are more than

instruments for attaining goals. They also carry symbolic messages in their very

structures” (2003, 167).

Although it is hard to place within any of the literatures, there is one work that is best

probably given special mention here. Criticising organisational sociologists for focusing

too much on economic organisations such as corporates over other types of

organisational forms (which is the rationale behind why this study did not encompass

the literatures of sociology and management studies in its review process) which now,

33

Page 42: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

he says, have become the fodder for other research fields (such as the one we are

currently reviewing), Mayntz (2004) laments the lack of scholarship concerning the

internal organisational structure of illegitimate or covert groups (ibid., 5) by either the

specialist terrorism or ‘peace studies’ literatures - a categorisation in which he places

Kaldor (ibid., 8). He argues that “hierarchy, organization, and network are crucial

categories” (ibid., 8) which need explicit investigation, and suggests the best way to

accomplish this is through “an analytical framework of structural properties, with one

focal dimension ranging from the end-point of an exclusively (ideal typical)

“hierarchical to the other extreme of a purely “networked” structure.” (ibid., 10) –

owing to the likely hybridic nature of extant groups (ibid., 11). Mayntz (2004, 16)

suggests that examinations such as this could ultimately assist in the development of

interorganisational theories through providing a framework for comparative analysis – a

suggestion very much at the heart of this preliminary investigation, and which although

remains undeveloped in this study, should play a part in the discussion concerning

future directions.

Other works (Kaldor 1999, 2003; Josselin & Wallace 2001), while still supportive of the

positive potential of social movements, acknowledge possible non-normative alternate

conceptions of the term. While Josselin and Wallace examine the broad notion of global

civil society from a not uncritical perspective, Kaldor (2003) acknowledges possible

non-normative alternate conceptions of the term from a postmodern dialectic

perspective that pits civility against incivility, individualism against communalism,

where it may be within the remit of global civil society to transform, transcend or

destroy.xxxiii Kaldor is also unique in that she extends her examination of civil society

and its impact into the realm of war, identifying “network warfare; armed networks of

non-state and state actors” (2003: 119, italics in original) as a new warfare type, with

“nodes in advanced industrial countries” (ibid., 121). She describes networks in this

context simply as “loose horizontal coalitions” (ibid., 121).

From the brief exploration of this literature, it is clear that a tension exists between

those authors that exclude insurgent groups from global civil society discourse, and

those that believe this kind of ‘activism’ needs to be at least acknowledged. As this is an

emergent literature (most works on the subject have been produced post-1990), there are

also issues regarding the use and definition of even commonly used terms across the

34

Page 43: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

works, which is natural for a social science sub-field that is still in effect defining itself,

but nonetheless confusing for the researcher looking for clear meanings behind

concepts.

RESEARCH DESIGN AND METHODOLOGY

This is an ambitious research project regarding both its aims and means, and

consequently the research design process, which utilises both qualitative and

quantitative research methods, is explained in detail to follow.

This research project has been constructed around the theory that it has become the

proclivity of insurgent groups for reasons of either survival or expansion to make

alliances with other groups or organisations in order to gain ideological support or

facilitate transactions, and that the organisations with which they interact are also

motivated by ideology or need – which in the case of states can mean by foreign policy

goals.

In order to explore this theory, it is necessary to produce a testable hypothesis. The

hypothesis in this instance is simple and yet is not without massive implications: that all

insurgent groups active today, no matter what their ideological of geographic focus, are

to some extent embedded within networks.

Within this brief research project, it will not be possible to test this hypothesis across

the entire universe of active insurgent groups. Rather this study will be an exploratory

comparative small n case study analysis of six insurgent groups to ascertain the value of

embarking upon a wider and more detailed study in the future. This study will utilise

35

Page 44: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

both qualitative and quantitative research methods, and will take an hypothesis-testing

approach. Grounded in descriptive inference, the case study-driven examination will

follow a ‘logic of discovery’ approach. In practice, this study will take on some of the

attributes of a pilot study, due to this being the first time that a hypothesis of this nature

has been put forward for testing in this manner. A pilot study typically samples from the

wider population of interest, and serves as a testing mechanism towards the refining of

the data collection and issue identification processes.xxxiv

The hypothesis will be tested via the utilisation of the vast resources of secondary and

tertiary research materials available in the public domain on the subject of insurgency

and terrorism. While it must be acknowledged that it would be preferable to acquire

primary data on these groups, it is the very ‘nature of the beast’ that since many groups

have been proscribed as terrorist organisations, access is not often possible, let alone the

voluntary sharing of sensitive information. The justification for continuing with this

study in the face of such a difficult data-collection challenge is that insurgency and

terrorism are important issues in today’s security environment, issues too important to

leave solely to state apparatuses to analyse. There is a role for the independent analyst,

unburdened by state foreign policy goals and restrictions, and ideally unburdened also

by their own lack of embeddedness within any bureaucratic structure and internal

culture that may incline itself towards group-think.

Owing to the lack of access to restricted intelligence material, a myriad of public

sources that will vary in their credibility levels will need to be explored for any

evidence of links between groups, as it appears that no works have been produced that

focus in any depth on describing what could be considered the rather mundane attributes

of insurgent groups. Thus the search for relevant information is a rather time consuming

activity. The sources being utilised include websites – governmental, institutional, and

those associated with some of the groups themselves; newspaper reports; academic

journals; and specialist books. Attempts will be made to triangulate (cross check) the

information collected in the hope that multiple sourcing can assist in the data

verification process (it is not unusual, however, to notice plagiarism across sources

regarding some information, so even triangulation may not serve a confirmatory role in

this instance). It must also be acknowledged that in addition to the absence or

incompleteness of information, both covert groups and government agencies can

36

Page 45: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

disperse misinformation or disinformation as part of their operational or counter-

intelligence processes. These issues are worrisome, but not to the extent that withdrawal

from this project is necessary.

Data that will be used as evidence of links between the focus groups and others is

deliberately very broad and will come from references in the material to the wide

variety of relationships and transactions to follow: known factions, splinter groups,

criminal connections, funding sources, public statements of allegiance, formal coalition,

combined operations, allegiance or connection to certain political or religious groups,

associations with charitable trusts, state support, sub-state entity support, alignment

under an umbrella organisation, material transactions, shared membership, use of

freelancers, and the use of legitimate and illegitimate front organisations and

companies.

In addition to this, note will also be made of historical links between the focal groups

and others. The rationale behind this is two-fold. Firstly, it is possible that individual

actors from groups no longer officially in existence or from states no longer wishing to

be associated with certain groups may still be positioned to offer assistance to extant

groups. Secondly, sometimes when information from different sources is contradictory

as to the current state of association between two groups, it would be irresponsible to

dismiss the connection entirely and so a judgement may need to be made regarding the

probable current nature of the relationship. If that judgement concludes that a previously

active link has probably been severed, it should still be included due to the

inconclusiveness of the evidence. The combination of these two factors therefore

necessitates the inclusion at some low level of historical factors in inter-group activity.

The research process followed will be primarily linear, although since this is an

exploratory study to determine the utility of a more comprehensive research project in

the future, the process of final analysis and suggestions also feeds into the concept of

the research wheel approach. It remains linear, however, in that once the hypothesis has

been formulated, the data and means of data-collection of the sample groups have been

specified, and the data gathered for both qualitative analysis and quantitative coding,

this will lead to the final analysis process that combines analytic induction with data

presentation.

37

Page 46: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

The discussion in the final chapter of the study, however, will likely take on a cyclic

dimension as it returns to the issue of the original theory and its associated hypothesis.

The data findings are likely to present a new and improved set of criteria that will need

to be incorporated into any later research, or a collection of hypotheses to replace or

augment the single hypothesis around which this initial study has been built.

This research will be primarily of a qualitative nature, in that it will be based around the

collection of in-depth information concerning six insurgent groups and their operational

environment. While a qualitative investigation does not lend itself to generalisation due

to its small sample size, a small-n approach is nonetheless is the most appropriate means

through which to collect the type of data required to fulfil this type of investigation.

Analysis of this data may offer insights that in the future could be explored through

other research processes more amenable to generalisation.

The comparative critical case study approach enables the case study data to be analysed

both qualitatively and quantitatively without resorting to unsubstantiated

generalisation.xxxv All six of the case studies will be interrogated for the same

information regarding attributes, ties, and secondary ties, along with some general

historical information about the focal group and a brief summary of the nature of their

militant activities.

The comparative nature of the research process is fulfilled through taking a ‘most-

similar’ approach with the selection and analysis focus of the case study groups. A

study is deemed comparative when it makes comparisons across cases selected “on the

basis of some stimulus being absent or present” (Burnham et al 2004, 60), and where

controls for variables are not capable of being as tight as with, for example, the

experimental method. The key variable types (factors) that need identification within

the comparative approach are the dependent variables (DV), the independent variables

(IDV) and other variables, a number of these will be explored in the identification

process to follow.

‘Most similar’ research designs compare cases “that are as different as possible in terms

of the independent variable(s) and as similar as possible on all the spurious and

38

Page 47: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

intervening variables (‘backdrop variables’)” (ibid., 63). “Dependent variables are the

phenomena that we want to explain in the research” (ibid., 62). For this investigation the

dependent variable is the community of active relationship/s (or lack of) the case study

groups have with other groups. In other words, this dependent variable is a state of

being relative to others - the issue being whether each of the case study groups is part of

a network or not. The independent variables, “the things we suspect influence the

dependent variable” (ibid., 62) must also differ across each other, and in this instance

will therefore be the case study groups themselves, whose very existence has been

empirically confirmed by official government decree and which would be constituent

parts of any network structure identified. These six groups thus comprise the

independent variables due to their established a priori existence separate to this research

project and wide inter-group variance as will be discussed in the exploration of group

typologies later in this section.

Regarding the category of other variables, a number of these must be acknowledged and

incorporated into the research. The key variable type from this broad category are

intervening variables, those which have “some bearing on the relationship between the

dependent and independent variables” (ibid.). Two levels of intervening variables have

been identified in this study – external and internal. The external intervening variables

can be summarised as the impact of major external events on all insurgent groups (the

primary example being the fall-out from the September 11 attacks and the impact this

has had upon the global security environment with the tightening and hardening of

various state and inter-state security apparatuses, and the attempts by these entities to

themselves develop their own networks of action and intelligence-sharing); and the

internal intervening variables are the attributes identified for exploration across all six

case studies, namely: ideology; goals (long and short term if applicable); classification

type; internal organisational structure; group size; and geopolitical focus.

What must always be avoided in ‘most similar’ comparative research is selecting on the

dependent variable (Geddes, 1990, 134-141). What this means is that case study groups

“should not be included or excluded on the basis of their values on the dependent

variable” (Burnham et al. 2004, 63). In other words, the research should be designed

around the hypothesis to be tested prior to choosing any case studies, so that there can

be no accusations of active agency in result manipulation to either confirm or falsify a

39

Page 48: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

hypothesis. This advice has been heeded in the variable identification process due to the

dependent variable being a complete unknown prior to the research process, and the

independent variables have been selected due to their typological, geographic and

situational differences.

Other variables that may be worth taking into account are antecedent variables –

variables that existed prior to and can themselves influence the independent variables –

such as the domestic political situation from which a group originates, or a group’s

origins being through a state sponsor that may have built the group’s organisational

structure around a model that ensured the state’s ability to influence or control its

actions for example. Multicollinearity issues can also impact research, where two or

more case study groups may be highly interlinked and so may distort the results,

meaning that what is presented as two distinct sets of results may in fact be basically

from the same single group and inadvertently duplicated.

At the conclusion of the individual case study analyses, an inter-group comparison

based on these criteria and the observations that have been made from them will further

enhance this research project. The comparative aspects of this study will also serve to

point out any inferences regarding causality that may be forthcoming from this small

data set, all feeding into the decision-making process concerning the potentiality of

future research.

Mindful of the risk of even accidentally selecting on the dependent variable, the case

study groups themselves were selected through the following process: from the universe

of active insurgent groups it was deemed necessary to open the hypothesis up to

falsification by selecting groups that represented a wide variance of typologies

including decade of origin, size, geographic location, general classification type,

ideology and geopolitical goals. The final groups chosen include two whose origins

were in the 1960s, two from the 1970s, and a final two whose origins lay in the late

1980s or early 1990s. Of the first two groups, one has its origins in Marxism-Leninism,

and the other in Marxism-Leninism-Maoism, while the groups that emerged in the

1970s were influenced by Marxism-Leninism. The final two groups have been most

commonly categorised as fundamentalist Islamic groups. Of these, a number have in

turn been classified as revolutionary, and others as secessionist. Some are considered to

40

Page 49: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

be ethno-nationalists, while others have been classified as ideologically or religiously

motivated. There was also a deliberate choice made in the selection process not to be

influenced by the popular assumption that there is a distinction between domestic,

international and transnational groups. In reality, the common classifications assigned to

each group tend to over-simplify their typological reality.

Some bias within the case study selection process must be acknowledged, with the

conscious decision to exclude al Qaeda from the potential case study pool for reasons

that include its current over-exposure and frequent association with the network

enterprise. Additionally, covert non-state organisations that do not utilise extreme

violence have been excluded, along with domestic single-issue pressure groups (such as

the United States’ Army of God, or the United Kingdom’s Animal Liberation Front).

Whilst the overall structure of this project is driven by the demands for good qualitative

research, the information collected was also transformed into data that was presented

and analysed quantitatively through the application of the ‘Inflow’ network analysis

software programmexxxvi. The metrics offered within this programme offer the analyst

measurements at the individual, dyadic, triadic, subgroup and global levels. The

emphasis here is on three of these levels: the single group level, with particular regard

to the relationships of the case study groups (and any interesting relationships noticed

concerning other key actors in a network); the dyadic, with respect to the geodesics

information; and the global, wherein a network’s density is measured.

At this point it is necessary to make clear that as this research is case study-based, it was

prudent to define some uniform rules concerning the parameters for all six of the

groups’ potential network neighbourhoods. For that reason, the following limitations

were placed upon the data collection process: only linkages up to two steps out from the

focal groups would be noted – in other words, only primary and secondary links where

the analogy of ‘two degrees of separation could be applied’; within this restricted

universe, all cross-links between any of the groups listed are also permitted to be noted;

in the possible instance that one of the case studies turns up a link with another of the

case study groups, the second group’s own set of links would not be re-entered into this

second matrix and thus clutter the observations through repetition; if the research

uncovered links at state level, no secondary links associated with these states would be

41

Page 50: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

noted, except in exceptional circumstances where their omission would negatively

impact the quality of the overall case analysis process.xxxvii This rationale has also been

applied in regard to the identification of humanitarian non-governmental organisations

and financial institutions within the matrix. Lastly, as this is a study of relationships at

the mid-range rather than at the individual level, no independent operatives will be

included. It must be stressed that the decision to make these rules of containment is not

driven by the assumption that these additional associations are of less importance than

groups of other kinds. Rather, it has been driven by the need to keep this initial

exploratory study as focused as possible on the immediate network neighbourhood of

the case study groups.

In this particular research project, the data interrogation and manipulation process was

as follows: following the collection of any relevant information from the various

secondary and tertiary sources, two Excel files are created – a ‘nodes’ file containing a

list of any entities the case study group (which is also included on this list) has been

identified as having some kind of relationship with either directly or indirectly, and a

‘links’ file that works its way through all the connections identified through identifying

a ‘from’ node, a ‘to’ node, the link strength (which can be scaled from 1 to 5), and a

network number (from 1 to 16). The network number correlates to the number of unique

questions regarding the nature of relationships that can be asked within the single

mapping process.

Due to the exploratory nature of this project, some of these features will be utilised only

minimally. All six case study mapping exercises will contain the same network number

of ‘1’, due to the deliberate decision to ‘ask’ each group the very simple question: ‘With

which entities has the case study group been reported to have ties?’ This decision was

made because it was considered preferable at this stage merely to determine the

existence of - or lack of - ties between the case study groups and their immediate

network neighbourhood – that is, from the independent variables to the question of the

existence and nature of the dependent variables and how they differed across case

studies.

In line with this approach, only 2 of the 5 possible strengths will be utilised: a strength

rating of ‘1’ will be given to all historical ties, and a strength of ‘5’ will be given to all

42

Page 51: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

current ties, that is, ties logged from an affirmative response to network question

number ‘1’. This decision was made because allocating a strength rating to a particular

type of relationship within this exploratory research project would essentially have been

an arbitrary exercise at this stage. The goal for this study is to establish whether or not

ties exist across these groups, not to become enmeshed in creating and justifying a

second-level scale of analysis around the rating of the intervening variables – a task for

possible future projects.

Following the data gathering process, the information was entered and then imported

into the software programme for processing. It was possible from this point to arrange

the nodes and their links in any number of visual styles, although in this instancexxxviii it

was considered best to auto arrange the dialogue (between linked nodes) through a

randomising process that was directed to produce a visual that distributes itself around

the case study group while not compromising the data facts.

From this point it was possible to measure the data. In the case studies to follow the data

has been interrogated to show the metrics listed in Tables 1 and 2 to follow. All metrics

are normalised and range between 0 and 1(Krebs).

Table 1. Summary of Network Measures Assigned to Individual Actors in this Studyxxxix

Measure Definition

Centrality Extent to which an actor is central to a network. Can be

measured by degrees, betweenness and closeness.

Degrees Number of direct links with other actors. Measures

activity within the network.

Betweenness Extent to which an actor is positioned between any other

two actors on the shortest path between those actors.

Measures control - of how much an actor controls flows

within the network.

43

Page 52: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Closeness Extent to which an actor is close to all the other actors in

the network. Measures access – how quickly a node can

access all other nodes via a minimum of steps.

Power Measure of informal power. Combines betweenness and

closeness to find nodes that have quick access yet stand in

the way of other nodes’ access. Nodes with high power

ratings are also called boundary spanners.

Table 2. Summary of Network Measures Assigned to Describe Networks in this Studyxl

Measure Definition

Group Size The number of actors in the network

Potential Ties The number of possible links within the network

Actual Ties The actual number of links within the network

Density Ratio of the number of actual links to the number of

possible links

Computing Geodesics The shortest path, the network’s connectivity or

reachability, that connects any two actors within the

network. Also includes the weighted average path length

based upon the average distance of any two actors within

the network

Average The mean score across all the metrics in the column

Centralisation The difference between the centrality scores of the most

central actor and those of all the other actors in a network

is calculated, and then used to compute a ratio comprising

of the actual sum of the differences compared to the

maximum sum of the differences

This explanation of the research design and methodology process will now conclude on

a cautious note. Like other analysts (Krebs 2002), this research acknowledges the work

of Malcolm Sparrow (1991) regarding the problems associated with mapping covert

networks. These problems are incompleteness – “the inevitability of missing links and

nodes” (Krebs 2002, 2), fuzzy boundaries – “the difficulty in deciding who to include

44

Page 53: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

and who not to include” (ibid.), and network dynamics – “these networks are not static,

they are always changing” (ibid.).

Thus it must be stressed that networking is more of a process than a destination. This

has implications for this study in that it can only profess to present an imperfect

snapshot in current space and time, and to which deletions, additions and relationship

developments should be added as newer and better information becomes available.

CHAPTER 2

CASE STUDIES

The case studies to follow will focus on what is known about each group’s internal

organisational and chain-of-command structures, and also their external relationships

with various other groups.

As mentioned in the research design and methodology section in Chapter One, the six

case studies selected for this exploratory combined qualitative and quantitative analysis

have been chosen due to their representative qualities over a number of different areas,

including their varying geographic origins and interests, and classification types. The

case studies will be presented alphabetically based upon the English rendition of each

group’s name, rather than on outcomes, or any other classification criteria.

It must also be made clear that the information presented here about each group by no

means is a summary of the totality of information available in the public domain.

Rather, what has been include is primarily a selection of empirical information about

each group as it pertains to the focus of this study, namely information on internal

organisational structure and external alliances. In order to provide context, however, a

brief synopsis is included to offer the reader a summary of each group’s origins and

alleged evolution over time, along with some other supportive information.

Each case study has been approached in the same way, and the information gleaned has

been categorised under identical headings across the case study analyses. Obviously,

45

Page 54: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

since we are dealing with an incomplete information base due to the covert nature of the

groups being studied, the information available concerning certain aspects of some

groups is greater in some cases than in others. As a general rule, it seems to be the case

that the older the group, the more information that has been collected about them,

especially concerning internal organisational structures. Also, because it seems to be the

case that the newer, religious, groups have formed as offshoots of older more

established groups before splitting completely from the mother group – and, in one of

the two cases, is the current product of a long series of group splits and mergers – the

internal organisational structure remains in an inevitably constant state of flux, making

it difficult to classify. This, however, is not enough reason to abandon scrutiny of these

newer groups. Rather, given the ongoing impact of their activities, it provides greater

impetus for identifying knowledge gaps that must be filled.

The case study exercise will follow a number of separate yet interrelated steps. First of

all, qualitative information will be provided for each of the six groups concerning group

origins and history, ideology, goals, organisational structure, geopolitical focus and

links with other groups. This information will be utilised to develop a series of figures

modelling the known internal dynamics of these groups, and also as the basis for

constructing a series of models depicting the placement of each of the case study groups

within a specific network environment, with the aim of identifying any correlations

between the two structures. Each of these six network environments will be analysed

quantitatively in order to identify any other relevant factors that impact the qualitative

observations. The case study groups will be scrutinised for similarities and differences

identified through the interrogation process.

As the research process undertaken has acknowledged historical as well as current links,

the figure (H) will be placed within the written sections of each case study to

communicate this. In addition, refer to Figure 1 below for the line and colour coding

key that will assist in the easy identification of basic nodal link and group

characteristics.

46

Page 55: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Historical link Current link

Case study group Umbrella group

Insurgent group Bank

State entity Charitable trust

Figure 1. Supplementary coding symbols used in case study graphs to follow

Case Study 1

ABU SAYYAF (Also known as Al-Harakat Al-Islamiyyah, Mujahideen Commando Freedom Fighters,

Bearer of the Sword)

History of Organisation Founder Abubakar Janjalani, fought in Afghanistan in the

1980s, and had met with Osama bin Laden. Upon his return to the Philippines he

established Abu Sayyaf with the help of Ramzi Yousefxli on the Muslim-dominated

island of Mindanao in order to fight for the establishment of a theocratic Islamic state in

the south of the country (in Minanao and the Sulu Archipeligo), as part of a global

agenda to reassert an Islamist agenda.xlii Between 1991 and 1998 the group expanded its

attack capabilities. Following Janjalani’s death (along with his second-in-command) in

a shootout in 1998, the organisation lost its chief ideologue and planner, and while not

withering away, instead fractured into “more a confederation of loosely coordinated

commands”(Cronin et al. 2004, 4) with the closest thing to a leader of the group being

Janjalani’s brother Khaddafi Janjalani who now heads one of the alleged five separate

units.xliii

While in recent years Abu Sayyaf has turned its hand more to what seems to be

publicity-grabbing and money-making criminal activities such as the kidnapping of

foreigners, it has been argued that the group still officially chooses to identify itself with

Islamic revolution through armed struggle, an example being that in addition to a

considerable ransom demanded from foreign tourist kidnappings in 2001, the group also

called for the release of certain high-profile Muslims imprisoned in the US on terrorist

charges. xliv The group appears, however, to use terror more for financial profit than

political gain. It has remained a comparatively small - though occasionally powerful –

47

Page 56: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

group, but has always been forced to compete against the much larger Moro Islamic

Liberation Front (MILF).

Ideology Politico-religious; ethno-nationalist (secessionist); criminal.

Goal To establish a separate Islamic state in the Southern Philippines.

Organisational Structure Originally more centralised, when the older Janjalani

(now deceased) was leader and chief ideologue. Currently seems to operate as a number

of largely autonomous units that each operate with their own independent agendas

under different commanders.

Geopolitical Focus Southern Philippines and Malaysia.

Areas of Operation Philippines (its strongholds are the Mindanao and Sulu

regions – although the group has also been active in Manilaxlv) and Malaysia. The group

controls large areas in Mindanao, which it uses for training and arms storage.

Strength Membership is estimated to be between 200-500,xlvi and is drawn from

the home community in which the group operates, with its overarching Moro ethnic

identity and bonds of kinship (making penetration by outside agents virtually

impossible).

Alleged Links

STATE LEVEL

Libya - Libya was involved in the negotiation process towards the release of the

kidnapped hostages in 2000. Libya is said to have forged links with AS in order to

further Libyan Islam, and to spread Qaddafi’s brand of internationalist anarchism – in

addition to merely being a Libyan tool of harassment against the US.xlvii

Philippine Army - there have been claims that the AS has been used by the Philippines

Armed Forces “as a kind of agent provocateur” (Manolo 2004, 30).

48

Page 57: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

INSURGENT GROUPS

al Qaeda – while the group was supposed to have received al Qaeda funding and

training in the early 1990s through Osama bin Laden’s brother-in-law Mohammad

Jamal Khalifa, and AS was implicated in the highly ambitious but scuttled ‘Operation

Bojinka’ along with al Qaeda operative Ramzi Yousefxlviii - who allegedly also trained

AS in the use of explosivesxlix - many observers now believe that the two groups are

unlikely to have maintained contact, due largely to Abu Sayyaf’s more criminally-

inspired profiteering activities following the death of founder Janjalani.l The Philippine

military, however, disagree, and say that even in 2001 al Qaeda was in contact with the

group, seeking to further develop the relationship.li At least one analyst has concluded

that even though AS seems to have been proven to have had sporadic contact with al

Qaeda, it is most unlikely that the latter group would want to be associated with an

organisation condemned by other Islamic groups as acting in an un-Islamic fashion lii

Link has been historical for this study; Moro National Liberation Front (MNLF) –

most of AS’s early recruits were defectors from MNLF. Has distanced itself from AS in

recent yearsliii; Moro Islamic Liberation Front (MILF) – another MNLF splinter

group. While MILF has also declared no ties to AS,liv and indeed have even signed an

interim agreement to combine efforts to clear them from their strongholds lv was said to

have allowed AS use of territory and training camps under its control as late as 2001 lvi:

Jemaah Islamiyah (JI) – supposedly has connections with both MILF and ASlvii:

Indonesian Islamic Liberation Front (IILF) – historical links alleged; Kampulan

Militan Malaysia (KMM)lviii; Rajah Solaiman Movement (RSM).lix

CRIMINAL

Unknown.

CHARITABLE TRUSTS

Islamic International Relief Organization (IIRO) – some connection in the late 1990s

– run by Mohammed Jamal Khalifa, the brother-in-law of Osama bin Laden.lx Classified

as an historical link in this study.

SECONDARY LINKS OF INTEREST

MILF and al Qaeda MNLF; KMM and JI, LJ and PULOlxi; PULO-Bersatu.lxii

49

Page 58: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Saudi Arabia

Bersatu

MILF

PULO

GAM

LJ

JI

MNLF IIRO

IILF

Philippine army

RSM

Libya

KMM

al QaedaAS

50

Page 59: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Figure 2. Graphic representation of alleged past and present ABU SAYYAF ties

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

Abu Sayyaf Network Neighbourhood

Group Size 16 Computing geodesicsPotential Ties 240 44 paths of length 1Actual Ties 44 112 paths of length 2Density 18% 94 paths of length 3

44 paths of length 4 32 paths of length 5 0 paths of length 6

Weighted Avg. Path Length: 2.72

Table 3. Summary of nodal, dyadic and network level indicators

CENTRALITY METRICSDegrees Betweenness Closeness Power

0.600 AS 0.619 AS 0.625 AS 0.622 AS0.333 al Qaeda 0.195 al Qaeda 0.577 al Qaeda 0.386 al Qaeda0.267 GAM 0.190 GAM 0.536 KMM 0.351 KMM 0.267 KMM 0.167 KMM 0.484 IIRO 0.330 GAM0.200 IIRO 0.148 PULO 0.484 Libya 0.309 IIRO0.200 JI 0.133 IIRO 0.469 GAM 0.275 Libya0.200 PULO 0.067 Libya 0.441 JI 0.257 PULO0.133 LJ 0.057 LJ 0.405 LJ 0.231 LJ0.133 Libya 0.005 JI 0.405 MILF 0.223 JI0.133 MILF 0.000 Bersatu 0.405 MNLF 0.203 MILF0.133 MNLF 0.000 IILF 0.395 IILF 0.203 MNLF0.067 Bersatu 0.000 MILF 0.395 Philippine army 0.197 IILF0.067 IILF 0.000 MNLF 0.395 RSM 0.197 Philippine army0.067 Philippine army 0.000 Philippine army 0.366 PULO 0.197 RSM0.067 RSM 0.000 RSM 0.333 Saudi Arabia 0.167 Saudi Arabia0.067 Saudi Arabia 0.000 Saudi Arabia 0.273 Bersatu 0.136 Bersatu

0.183 Average 0.099 Average 0.437 Average 0.268 Average

51

Page 60: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

0.476 Centralisation 0.555 Centralisation 0.416 Centralisation

Table 4. Summary of nodal level centrality metrics

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

ANALYSIS

Even though there are doubts about just how important this group now is within the

Asian region, and questions over its motivations, Abu Sayyaf still has a number of

active links with groups that themselves are embedded within the wider South East

Asian network of Islamic insurgents.

These measurements rate Abu Sayyaf with the highest metrics across all centrality

indicators, although these figures have been impacted by the large number of probable

terminated past links that are no longer active.

What the graph does show is that Abu Sayyaf lies at the centre of a ‘star’ network

configuration, where some of the other actors must utilise AS as a go-between should

they need to interact. There are also smaller ‘stars’ within this graph, such as the one

that surrounds KMM, as well as elements of the chain model communication process.

The only example of a possible active all-channel sub-structure is the relationship

between al Qaeda, KMM and GAM.

Internal intervening variables of interest here must include the changes in the

organisation’s structure following the death in 1998 of the Abu Sayyaf founder and his

second-in-command, which precipitated the fracturing of the group into a number of

loosely connected autonomous units each under the control of its own commander. The

financial successes of the group as a result of their utilisation of kidnapping for ransom

practices may well also have impacted the group’s operational focus and the type of

recruits attracted to the organisation – which may in turn influence the strategic

ideology of the group.

52

Page 61: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

What is of interest in the metrics is the high rating of al Qaeda, KMM and GAM. While

from the perspective of the case study group al Qaeda may be relatively insignificant,

when one looks at the network overall this group rates very highly across the centrality

metrics, and does have active relationships with both KMM and GAM. Al Qaeda should

perhaps be considered an important antecedent variable in relation to Abu Sayyaf, in

that it appears it used to have some kind of relationship with the group, and even though

this relationship has probably been severed at least at the group level (individual

members of al Qaeda may still be in contact with some Abu Sayyaf members), the part

an historical association of importance plays in a group’s acquired strategies,

capabilities and self-perception should not be underestimated.

There seems to be no distinct peripheral players of interest within this graph, except

perhaps for JI and al Qaeda – but the identification of these two groups is more to do

with the quantity of qualitative information that is known about these groups than their

actual positioning on the graph – an observation which perhaps gives justification for an

analytical approach that combines both qualitative and quantitative processes as is the

case here.

There are also indications that within this discrete network KMM may be described as a

potential structural hole due to its placement between AS and JI, al Qaeda and LJ and

AS and LJ. Of course further research would be required to confirm the apparent lack of

ties between each of these dyads, but this does not deny the utility of the network

analysis process regarding its role of identifying actors for further scrutiny.

53

Page 62: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Case Study 2

COMMUNIST PARTY OF INDIA-MAOIST

History of Organisation Formed in September 2004 as the result of a merger

between two major Communist groups in India, the Maoist Communist Centre of India

(MCCI) and the Communist Party of India (Marxist-Leninist) People’s War (CPI-ML),

following almost 10 years of negotiation over political, ideological and organisational

issueslxiii probably mediated by leaders of the Revolutionary Internationalist Movement

(RIM)lxiv and including strong support from the CPN-Maoist of Nepal. This follows the

earlier merger in 1998 of CPI-ML People’s War with CPI-ML Party Unity under the

banner of the former group’s name (both were splinter groups of the original CPI-ML

that formed in 1969) which was directly associated with an increase in insurgent

activities.lxv People’s War argues that since its inception in 1980 it has pursued an

agenda to unite all ideologically similar (currently around 40 groups) predominantly

Naxalitelxvi groups in this fashion.lxvii In the 1990s, however, territorial and leadership

clashes between the MCCI and CPI-ML has resulted in the deaths of civilians and

hundreds of group supporters from both sides – a period of time now referred to as the

“Black Chapter”.lxviii But largely due to a marked increase in state-level operations

against Maoists in Bihar from 2000 under the Prevention of Terrorism Act (POTA) of

2002, the two groups realised the advantage in uniting to fight a common enemy.lxix

54

Page 63: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Ideology Marxism-Leninism-Mao thoughtlxx, with a belief in the destruction of

class enemies through extreme violence. Ideological differences between the two groups

had first to be resolved, however, with CPI-ML rooted in Marxist-Leninist thought,

while the MCCI was a Maoist organisation. Maoism won out, with CPI-ML officially

embracing Maoism as the higher stage of Marxist-Leninist philosophy) of protracted

armed struggle, dismissing any notion of participation in ‘bourgeois’ state elections.

The means advocated is via Protracted People’s War via the People’s Liberation

Guerrilla Armylxxi, with the countryside as the “center of gravity of the party’s work,

while the urban work will be complimentary to it.”lxxii Secondly, and this is a

development within the new group, the acceptance of protracted war denies the

possibility of sufficient mass consciousness and that power is so be seized immediately,

and so greater emphasis is so be put into both building up the party and its supporters at

the grassroots level through a more nuanced reading of the political and social ‘terrain’

of the regions concerned. lxxiii

Goals Long Term To seize powerlxxiv and ultimately establish a voluntary

Union of Socialist Republics of India through new democratic revolution.lxxv

Short Term Creating a revolutionary corridor, the Compact

Revolutionary Zone (CRZ) of control extending from Nepal, through northern and into

central and parts of southern India.

lxx “Joint Declaration”, http://www.wpb.be/guests/india.htmlxxi Nihar Nayak, “Left Wing Extremism: Synchronized Onslaught”, 2, The PLGA itself is also divided into three sub-armies.lxxii Communist Party of India-Maoist, Left-wing Extremist Group, South Asia Terrorism Portal, http://www.satp.org/satporgtp/countries/india/terroristoutfits/CPI_M.htm (accessed 28 March 2005), 3lxxiii Ibid., 2lxxiv Ibid.lxxv Ibid.

55

Page 64: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Organisational Structure While some sources state that the new group’s

organisational structure is unconfirmed except for the position of General Secretary, one

source believes that it remains a hierarchical structure, with a Central Committee,

Regional Bureaux, Zonal or State Committees, District or Division Committees and

Squad Area Committeeslxxvi much like that of the CPN-Maoist. If this is the case, then

like the Nepali Maoists military orders will come from the Central Committee through

the regional or state level commanders who will also be members of the Central

Committee (or the more elite Politburo, should the Central Committee have one) right

down to cell committee level. With the increased emphasis on ‘hearts and minds’

activities since the latest merger, and the utilisation of grassroots part-timers it is also

likely that as with the CPN-Maoist, there will be further developments regarding the

parallel development of military and non-military educational structures working

complementarily.

The leadership is said to be educated and ambitious, and not necessarily from the poorer

classes, while the cadres are largely from deprived backgrounds.

Geopolitical Focus Primarily India - the newly merged group is active in 156 districts

of 13 states, including Andhra Pradesh, Chhattisgarth, Jharkhand, Bihar, Orissa, Uttar

Pradesh, Madhya Pradesh, Maharashtra, West Bengal, Karnataka, Tamil Nadu,

Utteranchai and Kerala. Attempts are also reported being made to establish a presence

in Gujurat, Haryana, Punjab, Rajasthan and Himachal Pradesh.

Strength A combined membership of around 6500 cadres is estimated.

Alleged Links

STATE LEVEL

Pakistani Inter-Services Agency (ISI) – this agency is charged with having a role in

developing the links between the Nepalese and Indian Maoists.lxxvii

lxxvi Ibid.,3. This source names CPI-ML General Secretary ‘Ganapathi’ as being appointed as leader of the new combined grouplxxvii “Nepal Terror Groups – Communist Party of Nepal-Maoist”, South Asia Terrorism Portal,http://www.satp.org/satporgtp/counties/nepal/terroristoutfits/index.htm (accessed 28 March, 2005)

56

Page 65: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

UMBRELLA GROUPS

Coordination Committee of the Maoist Parties and Organisations of South Asia

(CCOMPOSA) – formed in 2001 to unite the revolutionary groups of this region lxxviii –

in other words, a united front that encompasses South Asia, including India, Nepal,

Bhutan, Bangladesh and Sri Lanka; Revolutionary Internationalist Movement (RIM).lxxix

INSURGENT GROUPS

Communist Party of Nepal – Maoist (CPN-Maoist) – now operating to varying extents

within 68 of the 75 districts of Nepal. The groups are said to have made contact around

1990, leading to the sharing of knowledge between the groups concerning guerrilla

warfare training and bomb manufacturing techniques;lxxx Liberation Tigers of Tamil

Eelam (LTTE) – links alleged, perhaps pertaining to cooperation over arms

procurement and training; National Democratic Front of Bodoland (NDFB); Sendero

Luminoso (PCP) – CPI-Maoist allegedly has some connections with the Peruvian

Communist Party, more commonly known as Shining Path, possibly through RIM.

CRIMINAL

Unknown.

CHARITABLE TRUSTS

Unknown.

SECONDARY LINKS OF INTEREST

CCOMPOSA – other members of CCOMPOSA include PBSP (CC) Bangladesh, CPEB

(ML) Red Flag Bangladesh, CPI-ML Naxalbari India, RCCI (MLM) India and CPI

(Maoist) Nepal. Additionally, there are two associated groups, PBSB (MBRM)

Bangladesh and the newly formed Bhutan Communist Party (MLM).lxxxi

RIM – in addition to the Communist Party of Nepal (Maoist), members include the

Ceylon Communist Party (Maoist), Communist Party of Afghanistan, Communist Party

of Bangladesh (Marxist-Leninist), Communist Party of Peru (Shining Path), Communist

Party of Turkey (Marxist-Leninist), Marxist-Leninist Communist Organisation of

Tunisia, Maoist Communist Party of Italy, Proletarian Party of Purba Bangla,

57

Page 66: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Revolutionary Communist Group of Colombia, Revolutionary Communist Party of

USA and the Communist Party of Iran.lxxxii

CPN-Maoist – said to have connections with other Indian insurgent groups including

the United Liberation Front of Assam (ULFA), the Kamtapur Liberation Organisation

(KLO), the Gurkha National Liberation Front (GNLF) and the Gurkha Liberation

Organisation (GLO), and Akhil Bharat Ekta Samaj (ABNES) – officially a Nepalese

welfare organisation, but suspected of having close ties with CPN-Maoist. lxxxiii

Additionally, CPN-M is said to have links with Sri Lanka’s Liberation Tigers of Tamil

Eelam (LTTE).

58

Page 67: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

MKP

PBSB(MLM)

ABNES

KLO

ULFARIM

RCCI(MLM)

RCCI(Maoist)

PGPCPCP

PBSP(MPK)

PBSP(CC)

NSCN

NDFB

LTTE

LeT

ISYFISI

Habib Bank

GNLF

GLTF

GLO

CPP

CPN-Maoist

CPI-ML

CPI-Maoist

CPEB(ML)

CPC(Maoist)CCOMPOSA

BSD(ML)

BCP(MLM)

Figure 3. Graphic representation of alleged past and present COMMUNIST PARTY OF INDIA-MAOIST ties

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

Communist Party of India-Maoist Network NeighbourhoodGroup Size 31 Computing geodesicsPotential Ties 930 84 paths of length 1Actual Ties 84 396 paths of length 2Density 9% 576 paths of length 3

160 paths of length 4 0 paths of length 5

59

Page 68: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Weighted Average Path Length: 2.67

Table 5. Summary of nodal, dyadic and network level indicators

CENTRALITY METRICSDegrees Betweenness Closeness Power

0.433 CPN-Maoist 0.563 CCOMPOSA 0.638 CPN-Maoist 0.570 CCOMPOSA 0.400 CCOMPOSA 0.470 CPN-Maoist 0.600 CPI-Maoist 0.554 CPN-Maoist0.333 CPI-Maoist 0.320 CPI-Maoist 0.577 CCOMPOSA 0.460 CPI-Maoist0.267 ISI 0.256 ISI 0.484 ISI 0.370 ISI0.133 ULFA 0.014 ULFA 0.441 ULFA 0.227 ULFA0.100 KLO 0.002 NDFB 0.435 KLO 0.217 KLO0.100 PCP 0.000 ABNES 0.423 PCP 0.211 PCP0.100 RIM 0.000 BCP(MLM) 0.423 RIM 0.211 RIM0.067 ABNES 0.000 BSD(ML) 0.417 ABNES 0.208 ABNES0.067 ISYF 0.000 CPC(Maoist) 0.417 LTTE 0.208 LTTE0.067 LTTE 0.000 CPEB(ML) 0.395 GLO 0.199 NDFB0.067 LeT 0.000 CPI-ML 0.395 GLTF 0.197 GLO0.067 NDFB 0.000 CPP 0.395 GNLF 0.197 GLTF0.033 BCP(MLM) 0.000 GLO 0.395 NDFB 0.197 GNLF0.033 BSD(ML) 0.000 GLTF 0.395 NSCN 0.197 NSCN0.033 CPC(Maoist) 0.000 GNLF 0.380 CPP 0.190 CPP0.033 CPEB(ML) 0.000 Habib Bank 0.380 MKP 0.190 MKP0.033 CPI-ML 0.000 ISYF 0.370 BCP(MLM) 0.185 BCP(MLM)0.033 CPP 0.000 KLO 0.370 BSD(ML) 0.185 BSD(ML)0.033 GLO 0.000 LTTE 0.370 CPC(Maoist) 0.185 CPC(Maoist)0.033 GLTF 0.000 LeT 0.370 CPEB(ML) 0.185 CPEB(ML)0.033 GNLF 0.000 MKP 0.370 CPI-ML 0.185 CPI-ML0.033 Habib Bank 0.000 NSCN 0.370 PBSB(MLM) 0.185 PBSB(MLM)0.033 MKP 0.000 PBSB(MLM) 0.370 PBSP(CC) 0.185 PBSP(CC)0.033 NSCN 0.000 PBSP(CC) 0.370 PBSP(MPK) 0.185 PBSP(MPK)0.033 PBSB(MLM) 0.000 PBSP(MPK) 0.370 RCCI(MLM) 0.185 RCCI(MLM)0.033 PBSP(CC) 0.000 PCP 0.370 RCCI(Maoist) 0.185 RCCI(Maoist)0.033 PBSP(MPK) 0.000 PGPC 0.333 ISYF 0.167 ISYF0.033 PGPC 0.000 RCCI(MLM) 0.333 LeT 0.167 LeT 0.033 RCCI(MLM) 0.000 RCCI(Maoist) 0.330 Habib Bank 0.165 Habib Bank 0.033 RCCI(Maoist) 0.000 RIM 0.330 PGPC 0.165 PGPC

0.090 Average 0.052 Average 0.407 Average 0.230 Average

0.366 Centralisation 0.528 Centralisation 0.486 CentralisationTable 6. Summary of nodal level centrality metrics

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

ANALYSIS

This network visual shows the existence of four interconnecting ‘star’ configurations of

varying sizes. These surround the focal group (CPI-Maoist), a similar Nepal-based

60

Page 69: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

group (CPN-Maoist) and two other entities – a state agency (the Pakistani ISI) and an

umbrella group (CCOMPOSA). Of the four sub-networks, the only link that does not

exist is between ISI and CCOMPOSA, and thus excludes this subset of groups as

comprising an all-channel network.

This case study is an interesting example of a largely regional network that shows

strong association with an important umbrella organisation that appears to wield

considerable power. The groups associated with CCOMPOSA seem to appreciate the

utility of joining together in developing a strategic alliance, and the creation of CPI-

Maoist from a merger between two previously conflictual groups under the probable

facilitation of CCOMPOSA, shows that practicality is winning over ideological divides.

The official adoption of the Maoist approach to insurgency over the more rigid Marxist-

Leninist view is also an interesting (but none too surprising) development. Only time

will tell, however, as to whether CPI-Maoist was created as a defensive or offensive

alliance.

Regarding centrality metrics, CPI-Maoist does not rate highest in any of the four

measurements, this honour being shared by CPN-Maoist and CCOMPOSA – with

CCOMPOSA being the outright winner through its topping of the ‘Power’ metrics. ISI

runs a constant fourth in all categories, rating much higher than the averages in all but

‘Betweenness’. From a critical point of view concerning the methodology this is

affirming, in that it demonstrates at least some success in proving that data collection

was not intentionally biased in favour of the case study group.

It appears that either CPI-Maoist or CPN-Maoist could be identified as possible

structural holes in the network, controlling any communications between the ISI and

any number of groups including CCOMPOSA, as they are both placed centrally within

potential chains of communication from ISI to these outlaying groups.

Regarding peripheral players, it is worth noting the inclusion of the LTTE in this graph

– a observation that will be expanded upon at the end of this section.

The intervening variables of interest within this network configuration, apart from the

influence of umbrella and state groups, seem to be the belief that the short term goal of

61

Page 70: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

setting up some kind of expansive compact revolutionary zone is possible (that is,

gaining control of territory) – providing incentive for more intensive inter-group

cooperation (which in turn increases the influence of CCOMPOSA and perhaps the

more powerful groups within it as a consequence) which has the potential of

diminishing strategic and tactical autonomy at the group level.

Case Study 3

JAMIAT UL-ANSAR

(Also known as Harakat ul-Mujahideen, HuM, Harakat ul-Ansar, HuA,, Al-Hadidlxxxiv,

Partisans Movement in Kashmir, Party of the Volunteers, Movement of Holy Warriors)

lxxxiv See ASIO

62

Page 71: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

History of Organisation A Sunni Islamist group based in Pakistan and currently

operating primarily in Kashmir. May have its origins in Hizb-ul-Mujahedin, a group

formed in Pakistan in the 1980s to coordinate volunteers fighting the Soviets.lxxxv An

alternate history states that it was founded in Pakistan as a breakaway faction of Harkat-

ul-Jihad-al-Islami (HuJI)lxxxvi in order to fight in Afghanistan by Fazlur Rehman Kahlil

in 1985 under the original name Harkat ul-Mujahedeen.lxxxvii

After the Soviet withdrawal from Afghanistan in 1989, the group switched its focus to

the Kashmir region.

In 1993 with the alleged assistance of the Pakistani ISIlxxxviii it remerged with Harkat-ul-

Jehad-al-Islami (HuJI) to become Harkat-ul-Ansar (HuA), and then in 1997 changed its

name back again to Harkat-ul-Mujahideen in response to HuA being designated a

terrorist organisation, and allegedly signed the IIF declaration in 1998. In 2001,

following the updated redesignation of HuM as a terrorist organisation by both the US

and Pakistan, it changed its name again this time to Jamiat ul-Ansar (JuA)lxxxix and was

again outlawed by the Pakistani government in 2003.xc

Ideology Politico-religious (pan-Islamic); secessionist; revolutionary.

Goals Short Term To bring about the secession of Jammu and Kashmir from

India.xci

Long Term The accession of Jammu and Kashmir to a Pakistan under

Islamic rule. xcii

Organisational Structure Little has been written about JuA’s internal management

structure, except for the identification of Khalil as being its current Secretary General,

and Maulina Farooq Kashmiri its Chief.xciii It is also said to mount operations under a

number of different aliasas that may include Al-Faran and Al-Almi.

63

Page 72: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Geopolitical Focus Based in Muzaffarabad (capital of Pakistan-controlled Kashmir),

its primary focus is the Jammu and Kashmir region. It is also said to have been active in

Bosnia, Chechnya, India, Myanmar, the Philippines and Tajikistan.xciv

Links

STATE LEVEL

Pakistan Inter-Services Intelligence Agency (ISI) - Multiple sources charge that JuA has

connections with the ISI that originated during the Afghan war with the Soviets, and is

credited by many as working in conjunction with the CIA to transport weapons to the

mujahideen,xcv transferring funds through the now-defunct Bank of Credit and

Commerce International (BCCI).xcvi

Jamiat Ulema-I-Islam, Fazlur Rehman Faction (JUI-F) - JuA is said to be aligned with

this radical Pakistani political party

UMBRELLA GROUPS

United Jihad Council (MJC) - JuA is also a member of the United Jihad Council (also

known as the Muttahida Jihad Council), an umbrella organisation allegedly established

by the ISI in the early 1990s in order to coordinate more successful militant operations

in the Jammu and Kashmir region, and to foster ‘muwakhaat’ (‘agreement on the basis

of brotherhood’) – an end to inter-group distrust and dysfunction – between the various

groups.xcvii At some point in time the MJC was restructured to both increase ISI control

and improve its command and control capabilities (such as to introduce the rule that no

members would be allowed to launch an attack without prior Council approval), and a

number of militant groups merged with each other (for operations in that region only) to

simplify operations.xcviii

INSURGENT GROUPS

International Islamic Front for Jihad Against the Jews and Crusaders (IIF) - As a

signatory to the IIF fatwa, JuA is charged with maintaining links with this organisation,

but their nature is unclear; al Qaeda – JuA supposedly share members with the group

commonly known by this namexcix. JuA reportedly trained al Qaeda fighters in their

camps in Pakistan and Afghanistan until the latter were bombed by the US in 2001;

64

Page 73: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Jaish-e-Muhammad Mujahideen E-Tanzeem (JeM) – Also known as Army of the

Prophet, Mohammed. Shortly after his release from an Indian prison following the 1999

HuA airline hijacking, Azhar announced the formation of a new HuA faction, JeM,

endorsed by the heads of three religious schools in Pakistan and again assisted by the

ISI, and which split from HuA in 2001 and to which many HuA militants switched their

allegiance (severely weakening the parent organisation).c Although formed through

splitting off from HuA, and based in Karachi,ci it is said to have links with JUI-F as well

as a sharing members with 313, HuM, HuJI, Lashkar-I-Omar;cii Harkat-ul-Jihad-al-

Islami – Bangladesh (HUJI-B) - led by Shauqat Osman, an organisation that aims to

establish Islamic rule in Bangladesh.; Lashkar-e-Toiba (LeT) – also known as Army of

the Righteous, the armed wing of Pakistani-based religious organisation Markaz-ud-

Dawa-wal-Irshad (MDI) that was formed in 1989 or 1990. It is also sometimes known

as Jamaat ud-Dawa. As well as freeing Kashmir from Indian control, the group has also

hinted that its long-term aim is to establish Islamic rule in India also, and so is a pan-

Islamic organisation.ciii In 2002 an important al Qaeda figure, Abu Zubaydah was

captured in an LeT safehouse in Pakistan. In 2003 the group split into two independent

wings under separate leadership, one politico-religious and the other military. That same

year also saw the FBI arresting 11 suspected LeT supporters in Virginia, USA.civ; 313 –

a separate Pakistani terrorist group formed out of individuals who are members of other

groups including LeJ, HuM and JeM. It does not focus its operations on the Jammu and

Kashmir regions, but to date has concentrated on attacking either Pakistani government

officials or members of the Pakistani Shi’ite community.cv; Sipah I-Sahaba Pakistan

(SSP)cvi; Lashkar I Jhangvi (LeJ): Hizb-ul-Mujahideen (HM) ; Liberation Tigers of

Tamil Eealam (LTTE ).

CRIMINAL

Unknown.

CHARITABLE TRUSTS

Al-Akhtar Trust - runs medical centres in Pakistan, was also accused by the US in 2003

of moving supplies and fighters into Afghanistan in conjunction with another charity,

the al Rashid Trust. It is also said to have links with JeM, LeT and LeJ.

65

Page 74: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

SECONDARY LINKS OF INTEREST

MJC - Hizb-ul-Mujahideen, Jamiat-ul-Mujahideen, Al-Jihad, Al-Barq, Ikhwan-ul-

Mussalmin, Tariq-ul-Mujahideen, Lashkar-e-Taiba, Al-Badar, Tehrik-I-Jihad; JUI-F –

links with Harakat ul-Jihad-I-Islami (HUJI), also known as the Movement of Islamic

Holy War, a militant group of the Deobandi school.; HUJI – links with HUJI-

Bangladesh (HUJI-B) led by Shauqat Osman, that aims to establish Islamic rule in

Bangladesh.; HUJI-B – said to have been established in 1992 with direct finance from al

Qaeda. Linked to Asif Reza Commando Force (ARCF), ISI, LeT and HuJI. Trained by

25-man Taliban team in 2001. cvii; JeM - For fundraising, JeM joined with the anti-Shia

group Sipah e Sahaba Pakistan (SSP), and its military arm, Lashkar e Jhangvi.cviii JM is

also said to have strong support from some individuals within the ISI

viii Barry Rubin, Revolution Until Victory?: the Politics and History of the PLO (Cambridge: Harvard University Press, 1994)ix Also known as the Anti-Imperialist International Brigade (AIIB). See Japanese Red Army (JRA), Terrorist Group Profiles, Naval Postgraduate School, http://library.nps.navy.mil/home/tgp/jra.htm (accessed 24 February, 2003)x Such as the Munich Olympic Games hostage siege, where responsibility was claimed by the hitherto unknown Black Septemberxi The Baader Meinhof group later morphed into what came to be known as the Red Army Faction (RAF)xii C.J.M. Drake, Terrorists’ Target Selection (New York: Palgrave, 1998), 77xiii Christopher C. Harmon, Terrorism Today, (London : Frank Cass, 2000), 90xiv Ibid., 200xv Bruce Hoffman, Inside Terrorism, (New York: Colombia University Press, 1998), 186-189xvi Bruce Hoffman, Inside Terrorism, 187. Hoffman’s examples include Libya’s hiring of the JRA, and the operations Abu Nidal performed on behalf of either Syria, Iraq or Libya. Give some egs here re. alleged commissioned terrorism –eg JRA?IIBxvii Bruce Hoffman, Inside Terrorism, 82xviii This term is used here in a non-normative sense to describe the motivations of actors, be they individuals or groups, who are working energetically in the pursuit of political or social goals.xix It must be acknowledged that this definition is one of two attributes Helleiner ascribes to globalisation. The second attribute is consequentially linked to the first, in that the form globalisation takes will be the outcome of the choices made by humankind regarding how to respond to this time-space shrinkage regarding political, economic and social issuesxx For example, see Carlyle A. Thayer, “No Al Qaeda isn’t everywhere”, Far Eastern Economic Review, 21 August 2003, Vol. 166, Issue 33, 20; Kimberly A. McCloud and Adam Dolnik, “Debunk the myth of Al Qaeda”, Christian Science Monitor, 23 May 2002, http://www.csmonitor.com/2002/0523/p11s02-coop.html (accessed 15 April, 2003); Erich Marquardt, “Al-Qaeda’s Exaggerated Organizational Strength”, Global Policy Forum, http://www.globalpolicy.org/wtc/terrorism/2003/0902exaggerated.htm (accessed 15 February, 2005)xxi Peter R. Monge and Noshir S.Contractor, Theories of Communication Networks, (New York: Oxford University Press, 2003), Foreword, viiixxii Peter R. Monge and Noshir S.Contractor, Theories of Communication Networks, 35xxiii Ibid., 31xxiv Peter R. Monge and Noshir S.Contractor, Theories of Communication Networks, 36xxv John Arquilla and David Ronfeldt, “Networks, Netwars, and the Fight for the Future”, First Monday, 2001a, http://www.firstmonday.org/ezproxy.auckland.ac.nz/issues/issue6_10/ronfeldt/index.html (accessed 22 July, 2004)xxvi John Arquilla and David Ronfeldt, “Networks, Netwars, and the Fight for the Future”, 8xxvii Stanley Wasserman and Katherine Faust, Social Network Analysis: Methods and Applications (Cambridge: Cambridge University Press 1994), Introduction, viiixxviii John Arquilla and David Ronfeldt, Networks and Netwars (Santa Monica: RAND 2001b), 9

66

Page 75: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

LeT – links to former Taliban regime and al Qaeda. Also to other Sunni militant groups

in Pakistan, such as the Sipah-e-Sahaba Pakistan (SSP) and Lashkar-e-Jangvi (LeJ), and

the Kashmiri Hizb-ul-Mujahideen (HM). As well as the ISI, LeT is also supposed to

receive assistance form the Pakistani Army.

xxix They refer us to Guillermo O’Donnell, On the State, Democratization, and Some Conceptual Problems (A Latin American View with Glances at Some Post-Communist Countires), working paper no. 192 (Notre Dame, Indiana: Helen Kellogg Institute for International Studies, 1993)xxx Though a new group, the New Red Brigades, is now suspected to have established itself in recent yearsxxxi MEMRI, Special Dispatch Series – No. 344, February 10 2002, athttp://www.memri.org/bin/articles.cgi?Page=subjects&Area=jihad&ID=SP34402. Date of access 8 September, 2003xxxii For example, see Che Guevara, Guerrilla Warfare (Lincoln: University of Nebraska Press), 1998xxxiii Mary Kaldor, Global Civil Society: An Answer to War (Cambridge: Polity Press 2003), 1-12. Kaldor offers five different versions of the civil society concept: societas civilis, bourgeois society, activist, neoliberal and postmodern. She herself identifies herself as most strongly identifying with the activist conception, where through the development of and participation in what she terms “a global public sphere” (8) where the focus is upon the active distribution of state power and the internationalisation of the growing supra-state issue of governance.xxxiv Peter Burnham et al, Research Methods in Politics (New York: Palgrave, 2004), 39xxxv Ibid., 31xxxvi Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.comxxxvii The rationale behind this decision being that the issue of state sponsorship of insurgent groups is a massive subject in its own right, and any attempt to integrate it in overly-simplistic terms would not do justice to the issue, and would serve to distract the focus away from the case studies themselvesxxxviii As recommended by the software designerxxxix Based on a synthesis of the definitions provided by Monge and Contractor, Theories of Communication Networks (2004), 35 and Valdis Krebs , “An Introduction to Social Network Analysis,” http://www.orgnet.com/sna/html (accessed 6 May, 2005)xl Ibid.xli Eusaquito P. Manalo, “The Philippine Response to Terrorism: The Abu Sayyaf Group”, (computer printout of Masters Thesis approved for public release, Naval Postgraduate School, December 2004), http://www.fas.org/irp/world/para/manalo.pdf. (accessed 28 March, 2005), 67. Ramzi Yousef was convicted of masterminding the 1993 bombing of the US World Trade Center, and was also said to be involved in both the “Oplan Bojinka’ plot and plans to assassinate Pope John Paul II on his visit to the Philippinesxlii Eusaquito P. Manalo, “The Philippine Response to Terrorism: The Abu Sayyaf Group”, http://www.fas.org/irp/world/para/manalo.pdf. (accessed 28 March, 2005), 74xliii Eusaquito P. Manalo, “The Philippine Response to Terrorism: The Abu Sayyaf Group”, http://www.fas.org/irp/world/para/manalo.pdf. (accessed 28 March, 2005), 72xlivEusaquito P. Manalo, “The Philippine Response to Terrorism: The Abu Sayyaf Group”, http://www.fas.org/irp/world/para/manalo.pdf . (accessed 28 March, 2005), 68xlv Manny Mogato, “Blasts in Philippine Capital, South Kill 10”, Reuters, 14 February 2005, http://www.tiscali.co.uk/news/newswire.php/news/reuters/2005/02/14/world/atleast10dieinphilippineblasts.html (accessed 26 June, 2005)xlvi “Patterns of Global Terrorism, 2002” US Department of State, www.state.gov/s/ct/rls/pgtrpt/ 2002 / (accessed 26 June, 2005), 102; Kim Cragin and Sara A. Daly, “The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World”, RAND (Santa Monica: RAND, 2004), www.rand.org/publications/MR/MR1782/MR1782.sum.pdf (accessed 26 June, 2005), 77xlvii Christopher C. Harmon, Terrorism Today, 11 xlviii Kim Cragin and Sara A. Daly, “The Dynamic Terrorist Threat”, 78xlix Ibid.

67

Page 76: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

ISI – also accused of training members of non-Islamic Indian insurgents in India such as

the Babar Khalsa International (BKI) and the International Seikh Youth Federation

(ISYF), who have been violently agitating for decades for a independent Seikh state,

Khalistan, in what is Indian Punjab. Interestingly, it is alleged that the ISI has also been

keen on creating alliances between the Khalistani and Kashmiri groups,cixalthough

another source declares the opposite.cx The ISI also allegedly has some connection with

Tamil groups in India, as well as the CPI-Maoist and CPN-Maoist.

l Audrey Kurth Cronin et al., “Foreign Terrorist Organizations”, Congressional Research Service, 6 February 2004, http://www.fas.org/irp/world/para/ (accessed 26 June, 2005), 4li Eusaquito P. Manalo, “The Philippine Response to Terrorism?’, 80lii Ibid., 78liii Larry Niksch, “Abu Sayyaf: Target of Philippine-U.S. Anti-Terrorism Cooperation”, Congressional Research Service, 25 January 2002, http://www.fas.org/sgp/crs/terror/index.html (accessed 26 June 2005), 5liv Ibid.lv “MILF agrees to ‘interdict’ criminals, syndicates”, luwaran.com, 29 December 2004, http://www.luwaran.com/ (accessed 30 December, 2004)lvi Eusaquito P. Manalo, “The Philippine Response to Terrorism?’, 86lvii “Jemaah Islamiah”, Center for Defense Information, 18 October 2002, http://www.cdi.org/friendlyversion/printversion.cfm?documentID=1159 (accessed 5 Apri,l 2005)lviii “The Terror Lurking Within Asia”, , , 11 October 2001, http://special.scmp.com/waronterrorism/comment/ZZZ39X1XMSC.html (accessed 26 June, 2005)lix “Troubled return of the Faithful”, Special Report, Philippine Center for Incestigative Journalism, April-June 2003 Issue, http://www.pcij.org/imag/SpecialReport/balik-islam3.html (accesses 26 June 2005)lx Graham H. Turbiville, Jr., “Bearers of the Sword: Radical Islam, Philippines Insurgency, and Regional Stability”, Military Review, March-April 2002, Http://fmso.leavenworth.army.mil/FMSOPUBS/ISSUES/sword.htm (accesses 15 February, 2005)lxi Terrorist Group Profile – KMM, Terrorism Knowledge Base, National Memorial Institute for the Prevention of Terrorism (MIPT), http://www.tkb.org?group.jsp?groupID=4401lxii Terrorist Group Profile – Bersatu, MIPT, http://www.tkb.org/Group.jsp?groupID=3569 (accessed 20 June, 2005)lxiii “Joint Declaration by Communist Party of India (Marxist-Leninist People’s War, and Communist Party of India (Marxist-Leninist) Party Unity”, Press Release,http://www.wpb.be/guests/india.htm (accessed 28 March, 2005)lxiv Nihar Nayak, Institute for Conflict Management, “Left Wing Extremism: Synchronized Onslaught”, South Asia Intelligence Review, Volume 2, Number 28, January 26, 2004, South Asia Terrorism Portal,http://www.satp.org/satporgtp/sair/Archives/2_28.htm. (accessed 28 March, 2005), 1lxv Ibid.lxvi B. Rahman, “Maoists Gain Momentum in India”, Paper 1251, South Asia Analysis Group, http://www.saag.org/%5Cpapers13%5Cpaper1251.html. (accessed 28 March, 2005). The term ‘Naxalite’ is derived from the eastern Indian town of Naxalbari where the original CPI-ML party was born. At least one commentator has suggested that this term has been used by Indian authorities in preference to the term ‘Maoist’ so as not to offend China and possibly undermine India’s improved relationship with that state.lxvii For a more in-depth exploration of the history of this group, see ‘Left-wing Extremist Group: Communist Party of India-Maoist (CPI-Maoist) online at the South Asia Terrorism Portal,http://www.satp.org/satporgtp/countries/india/terroristoutfits/CPI_M.htm. (accessed 28 March, 2005)lxviii “South Asia: a living volcano of proletarian revolution”, http://cpnm.org/new/ccomposa/cco_news/cops2.htm. (accessed 28 March, 2005). For the Communist Party of Nepal’s ‘spin’ on this event.lxix Nihar Nayak, “Left Wing Extremism: Synchronized Onslaught”, 2; “South Asia: a living volcano of proletarian revolution”, 3lxxviii “South Asia: a living volcano of proletarian revolution”, 4

68

Page 77: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

lxxix RIM homepage, http://www.awtw.org/rim/ (accessed 16 December, 2004)lxxx “Nepal Terror Groups – Communist Party of Nepal-Maoist”, South Asia Terrorism Portal, http://www.satp.org/satporgtp/counties/nepal/terroristoutfits/index.htm. (accessed 28 March, 2005)lxxxi See Endnote 65lxxxii RIM, http://www.awtw.org/rim/ (accessed 16 December, 2004)lxxxiii ABNES, South Asia Terrorism Portal, http://satp.org/satporgtp/countries/india/terroristoutfits/ABNES.htm (accessed 5 May 2005)lxxxv Sources are unclear regarding this matter. For example, while Loretta Napoleoni states that Harkat-ul-Ansar’s original name was Hizb-ul-Mujahedin (HM), and gives its formation date as 1980 in Karachi, Pakistan, the Federation of American Scientists (FAS) merely list HM as a group with which JuA has cooperated, and FAS states that it is mainly comprised of ethnic Kashmiris and names Syed Salahuddin as its leader. The group still exists, and is described by Stern as being the largest Kashmiri militant group. Salahuddin is also identified by Stern as head of the United Jihad Council.lxxxvi Harakat ul-Mujahideen, Terrorist Group Profile, MIPT, http://www.tkb.org/Group.jsp?groupID=50 (accessed 5 January 2005)lxxxvii Loretta Napoleoni, Terror Inc (London: Penguin Books, 2004), 192lxxxviii “Terrorist Groups: An Overview”, South Asia Terrorism Portal, http://www.satp.org/satporgtp/countries/india/states/jandk/terrorist_outfits/index.html (accessed 19 April, 2005)lxxxix “Jaish, Harkat change names: Report”, Rediff, http://www.rediff.com/news/news/2003.mar/12pak.htm (acessed 7 January 2005)xc “Harakat ul- Mujahidin”, Federation of American Scientists, http://www.fas.org/irp/world/para/hum.htm (accessed 12 September 2004)xci “Harkat ul-Ansar”, South Asia Terrorism Portal, http://www.satp.org/satporgtp/countries/india/states/jandk/terrorit_outfits/harkat_ul_ansar (accessed 19 April 2005)xcii Ibid.xciii “Harakat ul Mujahidin”, Foreign Terrorist Organizations, (Congressional Research Service, 2004)xciv Jessica Stern, Terror in the Name of God (New York: Harper Collins, 2004), 192xcv Loretta Napoleoni, Terror Inc. 177xcvi Tariq Ali, The Clash of Fundamentalisms London: Verso, 2002), 209xcvii “Muttahida Jehad Council”, South Asia Terrorism Portal, http://www.satp.org/satporgtp/countries/india/states/jandk/terorist_outfits/mjc.htm (accessed 19 April 2005)xcviii SATP - MJCxcix “Terrorist Organization: Harakat ul-Mudjahidin”, MIPT Knowledge Base, http://www.tkb.org/MoreRelatedGroups.jsp?groupID=50 (accessed 23 April, 2005)c “Harakat ul Mujahidin”, Foreign Terrorist Organizationsci SATP - JeMcii “Jaish-e-Mohammad”, Terrorist Group Profile, MIPT Terrorism Knowledge Base, http://www.tkb.org/Group.jsp?groupID=58 (accessed 23 April 2005)ciii Kshitij Prabha, “Terror Enterprise: Organisation, Infrastructure and Resources”, Strategic Analysis, Volume 25, Number 9, December 2001civ “Lashkar-e-Tayyiba”, Foreign Terrorist Organizations, 56cv “313”, MIPT Terrorism Knowledge Base, http://www.tkb.org/Group.jsp?groupID=3902

69

Page 78: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Saudi Arabiaal Rashid Trust

al Akhtar Trust

al F

MJF

aJF

313

IF

al B

JiI

JKLF

HeI

Pakistan army

IG

JuI-F

KZF

NDFB

ATTF

NLFTDGFI

CIA

JuU

EJG

ARCF

ULFA

TiJ

Taliban

SSPMJC

LTTE

LeT

LeJJuA

JeM

JeI

ISYF

ISI

IIF

HUJI-B

HUJI

HM

HIG

BKI

BCCIal Qaeda

313

Figure 4. Graphic representation of alleged past and present JAMIAT UL-ANSAR ties

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

Jamiat ul-Ansar Network NeighbourhoodGroup Size 46 Computing geodesicsPotential Ties 2070 170 paths of length 1

70

Page 79: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Actual Ties 170 828 paths of length 2Density 8% 1642 paths of length 3

938 paths of length 4 72 paths of length 5 0 paths of length 6

Weighted Avg. Path Length: 2.98Table 7. Summary of nodal, dyadic and network level indicators

CENTRALITY METRICSDegrees Betweenness Closeness Power

0.333 LeT 0.364 ISI 0.563 LeT 0.460 ISI0.311 JuA 0.292 MJC 0.556 ISI 0.408 LeT0.267 ISI 0.253 LeT 0.536 JuA 0.402 MJC0.267 MJC 0.209 HM 0.511 MJC 0.354 HM0.222 HM 0.172 DGFI 0.500 HM 0.349 JuA0.222 JeM 0.163 JuA 0.484 JeM 0.284 HUJI-B0.200 HUJI-B 0.132 IIF 0.459 HUJI-B 0.278 DGFI0.156 IIF 0.109 HUJI-B 0.417 al Qaeda 0.273 JeM0.156 SSP 0.062 JeM 0.413 SSP 0.270 IIF0.156 al Qaeda 0.028 SSP 0.409 IIF 0.220 SSP0.133 LeJ 0.022 BCCI 0.402 LeJ 0.213 al Qaeda0.111 DGFI 0.022 CIA 0.395 BKI 0.204 LeJ0.089 313 0.010 al Qaeda 0.395 ISYF 0.197 BKI0.089 Taliban 0.009 313 0.395 KZF 0.197 ISYF0.089 al Rashid Trust 0.006 LeJ 0.388 Taliban 0.197 KZF0.067 BCCI 0.002 JeI 0.388 al Rashid Trust 0.195 BCCI0.067 CIA 0.001 HUJI 0.385 DGFI 0.195 CIA0.067 JuI-F 0.000 313 0.375 JuI-F 0.194 Taliban0.044 BKI 0.000 ARCF 0.369 BCCI 0.194 al Rashid Trust0.044 HUJI 0.000 ATTF 0.369 CIA 0.188 JuI-F0.044 ISYF 0.000 BKI 0.369 LTTE 0.187 3130.044 JeI 0.000 EJG 0.366 313 0.184 LTTE0.044 KZF 0.000 HIG 0.363 Pakistan army 0.181 JeI0.044 LTTE 0.000 HeI 0.360 JeI 0.181 Pakistan army0.044 Saudi Arabia 0.000 IF 0.352 al Akhtar Trust 0.176 al Akhtar Trust0.022 313 0.000 IG 0.341 313 0.170 3130.022 ARCF 0.000 ISYF 0.341 IF 0.170 IF0.022 ATTF 0.000 JKLF 0.341 MJF 0.170 MJF0.022 EJG 0.000 JiI 0.341 TiJ 0.170 TiJ0.022 HIG 0.000 JuI-F 0.341 aJF 0.170 aJF0.022 HeI 0.000 JuU 0.341 al B 0.170 al B0.022 IF 0.000 KZF 0.341 al F 0.170 al F0.022 IG 0.000 LTTE 0.336 HIG 0.168 HIG0.022 JKLF 0.000 MJF 0.336 HeI 0.168 HeI0.022 JiI 0.000 NDFB 0.336 JKLF 0.168 JKLF0.022 JuU 0.000 NLFT 0.336 JiI 0.168 JiI0.022 MJF 0.000 Pakistan army 0.324 HUJI 0.162 HUJI0.022 NDFB 0.000 Saudi Arabia 0.317 ARCF 0.158 ARCF0.022 NLFT 0.000 Taliban 0.292 EJG 0.146 EJG

71

Page 80: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

0.022 Pakistan army 0.000 TiJ 0.292 IG 0.146 IG0.022 TiJ 0.000 ULFA 0.292 JuU 0.146 JuU0.022 ULFA 0.000 aJF 0.280 ATTF 0.140 ATTF0.022 aJF 0.000 al Akhtar Trust 0.280 NDFB 0.140 NDFB0.022 al Akhtar Trust 0.000 al B 0.280 NLFT 0.140 NLFT0.022 al B 0.000 al F .280 ULFA 0.140 ULFA0.022 al F 0.000 al Rashid Trust 0.273 Saudi Arabia 0.136 Saudi Arabia

0.082 Average 0.040 Average 0.373 Average 0.206 Average

0.262 Centralisation 0.331 Centralisation 0.393 Centralisation

Table 8. Summary of nodal level centrality metrics(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

ANALYSIS

The largest of the networks created within this research project, this case study analysis

demonstrates the sheer number of groups operating in and around Pakistan today, and

provides a good example of the impact of antecedent variables in that many of these

groups were either founded in response to or as a result of the anti-Soviet guerrilla war

in Afghanistan in the 1980s – a war that shaped their perceptions and provided

extensive educational opportunities at both the strategic and tactical levels.

The graph itself demonstrates an all-channel network at its centre, surrounded by a

number of ‘star’ configurations. Note that LTTE is a peripheral player in this network.

Although the graph was built around the case study group Jamiat ul-Asar, this group

only rates highly on the ‘Degrees’ metrics, sharing the top spot with fellow insurgents

Laskar-e-Toiba. Other agents with high ratings include the Pakistani ISI, the MJC and

HM – all at the centre of the three main ‘star’ configurations noted above. Overall, the

ISI has the highest ‘Power’ rating within the graph – an interesting position for a state

agent to be in even in its local environment, especially given Pakistan’s official position

on the ‘war on terror’. There are interesting issues here regarding either Pakistan’s

official and unofficial foreign policy goals, or concerning continuing issues of internal

division between or within Pakistan’s state agencies.

72

Page 81: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Again, these results affirm to some extent the lack of bias in the data collection process.

As mentioned above, MJC scored very highly across all metrics. This is an important

umbrella organisation, set up (allegedly by the ISI as a proxy agent) to coordinate the

various Pakistani groups in their activities in the Kashmir region, and so the issue of

multicollinearity must be raised.

There are indications of other possible examples of multicollinearity within this case

study, as many of the groups share members as well as occasionally undertaking

operations together, in addition to many of the actors merging the Kashmir divisions of

their groups under the umbrella MJC.

External intervening variables of particular interest might include the influence of

entities such as MJC and the ISI on the case study group, the tensions between different

sectors of the Pakistani government regarding both their domestic and external interests

and responsibilities, and the sheer number of groups alongside which Jamiat ul-Ansar

must operate and compete for support.

Case Study 4

KONGRA-GEL

73

Page 82: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

(Other names include Kurdistan Workers’ Party, PKK, KADEK, Kongra-Gel, Kurdistan

Freedom and Democracy Congress?

History of Organisation Founded in 1978 by former Chairman Abdullah Ocalan,

Kongra-Gel, better known by its earlier name, the Kurdistan Workers’ Party (PKK), set

out to destroy the Turkish government as the means toward the establishment of a

Kurdish state, United Democratic Kurdistan.cxi The Kurdish region, however, crosses

into a number of nation states including Turkey, Iran, Iraq, Armenia and Syria. After

spending some years establishing the organisation, and competing against other Kurdish

groups for dominance, the group began its armed activity against both the Turkish

authorities and the traditional Kurdish elite who maintained their dominance through

supporting the state. In 1999 Ocalan was arrested in Kenya and extradited to Turkey

where he now remains in a Turkish jail. In jail Ocalan announced that the PKK should

halt its militant activities, and in 2002 the PKK changed its name to the Kurdistan

Freedom and Democracy Congress (KADEK) supposedly in acquiescence to his request

and announced a 3-stage path to the peaceful gaining of Kurdish autonomy – but

maintained its military training programme. In 2003 the group changed its name again,

this time to Kongra-Gel.

Ideology Ethno-nationalism; Marxism-Leninism.

Goals Secession - the establishment of an independent Kurdistan in south

eastern Turkey – although another source states its aim is to establish a larger

independent ‘United Democratic Kurdistan’ that includes not only south eastern Turkey

but also includes parts of Syria, Iran and Iraq.cxii

74

Page 83: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Organisation The group was established around the leadership of one man,

Abdullah Ocalan, who micro-managed every action Stalin-style, and whose instructions

had to be obeyed.cxiii Original members of the group who might have challenged his

authority were allegedly killed off,cxiv and intellectual prowess was discouraged within

the organisation.cxv The rural tradition of subservience to one’s feudal or tribal lord was

encouraged to transfer to Ocalan as unchallenged leader. The group became the centre

of its members’ lives.cxvi Nevertheless, groupings of the PKK did operate in different

parts of the countrycxvii under various guerrilla commanders.cxviii

Geopolitical Focus Turkey, although the group is said to largely base itself over the

border in Iran.

Links

STATE LEVEL

Syria (historical) - the PKK was allowed to establish training camps in the Syrian-

controlled Lebanese Bekaa Valleycxix until the group’s eviction in 1998.

INSURGENT GROUPS

Devrimci Sol (DHKP-C), also known as the Revolutionary People’s Liberation Party-

Front – a Marxist revolutionary group who believes the Turkish regime is controlled by

the West and must be overthrown;cxx Islamic Great Eastern Raiders Front (IBDA-C) –

Ally;cxxi Maoist Communist Party (MKP), formerly known as the Turkish Communist

Party/Marxist-Leninist (TKP/ML) – a relatively small and obscure communist, anti-

Western guerrilla group that is a member of RIM ; Kurdistan Freedom Hawks (KFH) –

a suspected splinter group of the PKK; Islamic Great Eastern Raiders Front (IGERF) ;

Kurdish Patriotic Union (KPU) – another suspected PKK splinter group.

CRIMINAL

The PKK ‘taxes’ ethnic Kurdish drug traffickers.

CHARITABLE TRUSTS

Unknown.

75

Page 84: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

SECONDARY LINKS OF INTEREST

None.

RIM

MKP

KPUIGERF

DHKP-C

KFHSyriaPKK

Figure 5. Graphic representation of alleged past and present KONGRA GEL ties

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

76

Page 85: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Kongra-Gel Network Neighbourhood

Group Size 8 Computing geodesicsPotential Ties 56 16 paths of length 1Actual Ties 16 32 paths of length 2Density 29% 8 paths of length 3

0 paths of length 4

Weighted Average Path Length: 1.86

Table 9. Summary of nodal, dyadic and network level indicators

CENTRALITY METRICSDegrees Betweenness Closeness Power

0.857 PKK 0.857 PKK 0.875 PKK 0.866 PKK0.429 MKP 0.286 MKP 0.636 MKP 0.461 MKP0.286 DHKP-C 0.000 DHKP-C 0.583 DHKP-C 0.292 DHKP-C0.143 IGERF 0.000 IGERF 0.500 IGERF 0.250 IGERF0.143 KFH 0.000 KFH 0.500 KFH 0.250 KFH 0.143 KPU 0.000 KPU 0.500 KPU 0.250 KPU0.143 RIM 0.000 RIM 0.500 Syria 0.250 Syria 0.143 Syria 0.000 Syria 0.412 RIM 0.206 RIM

0.286 Average 0.143 Average 0.563 Average 0.353 Average

0.762 Centralisation 0.816 Centralisation 0.772 Centralisation

Table 10. Summary of nodal level centrality metrics(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com

ANALYSIS

77

Page 86: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

As is made obvious in the graph, the PKK is an example of an insurgent group that has

made very few links with other entities and, one could argue, may have paid the price

for this approach.

This graph resembles a ‘star’ configuration with the PKK at its centre. With only one

exception, all communication between the other groups must be brokered through the

PKK – which gives this group a lot of relative power within the network. Nearly all the

other actors within this network, are small domestic Turkish organisations with little

power, and the state that once offered PKK leader Ocalan a safe haven has long since

abandoned both him and his group in pursuit of its foreign policy goals.

Thus, while the PKK rates extremely highly across all four indications of centrality, this

does not necessarily mean much when one looks at the wider environment within which

the PKK is operating. This case therefore serves as a good example of how data can

produce measurements that on their own look impressive, but after the addition of

qualitative analysis can nonetheless be rendered insignificant.

The second group of interest here is the MKP, which rates second in the centrality

metrics. Although no other relationships were uncovered between this group and any

others, the fact that it also has links to the DHKP-C and the internationalist RIM,

coupled with its Communist ideology (which is internationalist in outlook) indicates

that this group deserves greater scrutiny.

The internal intervening variable of most interest is probably the management processes

of the PKK. As noted earlier, PKK leader Ocalan was a dictatorial leader, which could

have influenced the group when it came to forging external alliances. This was not a

man who was willing to cede his power and authority, and by this it could be construed

that he may have feared this outcome should his group align with any external insurgent

groups more powerful than his own. Although he now languishes in a Turkish jail, it

appears his organisation still defers to his will and so this situation persists. This

suggestion of the relationship between internal management structures and the external

environment is an important one, and deserves further investigation.

78

Page 87: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Case Study 5

LIBERATION TIGERS OF TAMIL EELAM

(Also operating under known front organisations including the World Tamil Association

(WTA), World Tamil Movement (WTM), Federation of Associations of Canadian Tamils

(FACT), Ellalan Force, Sangillan Force, Tamil Centre for Human Rights, Tamil

Information Centre)

History of Organisation Founded in 1976 by its leader Velupillai Brabharakaran,

the Liberation Tigers of Tamil Eelam (LTTE) has been described as the dominant ethnic

Tamil (Hindu) separatist group in Sri Lanka. Sri Lanka was basically in a state of civil

war from 1983 until 2002 when the Norwegian government was successful in brokering

a cease-fire. Internal political strife within the government of the day, however,

destabilised the peace process, with the Sri Lankan President accusing the Norwegians

of pro-Tamil bias, and refusing to support the development of any kind of federal

system that would diminish Sri Lankan state sovereignty.

Considered, at least until 2001, to be the world’s most ruthless and comprehensive para-

state terrorist organisation, it has been described as “the prototype for the type of

insurgent organization that the world is likely to witness in the next decade” (Chalk

2000, 8). The LTTE maintains an elite fighting wing, an air force, an amphibious group,

a suicide commando group, a women’s division, cxxii an intelligence group, an

international procurement group, and a political office. It is the only terrorist group to

have assassinated two heads of state.cxxiii

Ideology Ethno-nationalist; Marxist-Leninist.

79

Page 88: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Goals Long Term Secession - the establishment of an independent state,

Tamil Eelam, in what is currently the Tamil-dominated northeast region of Sri Lanka.

Short Term Limited autonomy - in recent years the group has softened

its demands regarding complete rights of secession, and has indicated that it would be

satisfied with being granted rights of regional self-determination, with the possible

granting of an autonomous Tamil-run area within a Sri Lankan federal structure.

Organisational Structure The LTTE is said to be organised along a two-tier

structure with a dominant military wing supported by a subordinate political wing.

Oversight of both elements is managed by a Central Committee, which also supports an

International Secretariat that is responsible for raising funds, purchasing and shipping

supplies of weapons, and for garnering favourable publicity outside of Sri Lanka.

Prabhakaran maintains his position as Chairman of the Central Committee and

Commander of the LTTE armed forces,cxxiv and encourages a ‘cult of personality’

around his leadership, which includes his supposed hand-picking of all suicide

recruits.cxxv

All LTTE members are said to be fighting cadres, with the exception of only a few

advisors. Management of the LTTE is handled through dividing its activities into at

least six strategic areas, namely political, military, intelligence (which includes internal

security and counter-intelligence as well as deep penetration, the planting of sleeper

agents and front line intelligence-gathering), women, finance and procurement. The

organisation is then further divided geographically into seven commands under district

commanders who answer to Prabhakaran, with the fighters within each command sub-

divided into various political and military wings and by their specialist skills.

Operational commanders within the military wings are said to command their fighters

from the front so as to maximise all opportunities in real time.

The group plans for redundancy in its operations outside LTTE safe areas, sending a

number of independent squads out with the same mission so that if one group is

captured or killed, another may still get through.

Cellular intelligence networks are cultivated in hostile areas and coordinated from

LTTE-controlled areas where the ‘handler’ is safe. A parallel LTTE military

80

Page 89: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

intelligence network utilises agents in the Sri Lankan security forces to verify

intelligence gathered. Small support cells are used for ‘Black Tiger’ suicide attacks.

Outside Sri Lanka the LTTE is said to have built a considerable support ‘network’ that

operates in more than 40 countries, with international coordination at least until recently

being run from the UK and France.

Geopolitical Focus The LTTE control significant areas in the northern and eastern

provinces of Sri Lanka, where they are able to openly recruit, train, and store munitions.

The group effectively functions as a para-state organisation, with its own civil

administration that includes the provision of banks, postal services, broadcasting

stations, police, courts and taxation services. The LTTE have been militarily active in

other parts of Sri Lanka including the capital Colombo, and India.

Strength The group is estimated to have a guerrilla force of around 8,000 - 14,000

members trained for unconventional or semi-conventional combat. The LTTE is also

said to be developing its conventional force capability.

Links

STATE LEVEL

Tamil National Alliance, Indiacxxvi - a collection of Tamil political groups.

INSURGENT GROUPS

Historical links with some Palestinian groups, including Hamas and Hizbollah, the

PLO, Morocco’s Polisario, and with the socialist Palestinian Front for the Liberation of

Palestine (PFLP) in particular which provided early training of troops and supplied

arms; Communist Party of India-Maoist (CPI-Maoist); Communist Party of Nepal-

Maoist; (CPN-Maoist); the Revolutionary Armed Forces of Colombia (FARC); and

the Khalistan Liberation Front (KLF).

CRIMINAL

There are allegations that the group traffics narcotics through its international arms

smuggling network, although nothing has been proven except at an individual

membership level. The LTTE navy has also been accused of running arms to Abu

81

Page 90: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Sayyaf (AS) and Moro Islamic Liberation Front (MILF) on behalf of Jamiat ul-Ansar

(JuA), and of accepting arms from the Pakistan Inter-Services Intelligence Agency

(ISI),cxxvii the Pakistani equivalent of the United States’ Central Intelligence Agency

(CIA).

SECONDARY LINKS OF INTEREST

See discussion below.

TNG

MJC

EROS

Myanmar

SWAPOANCL KR

HM

APWG

Syria

TULF

ULFA

PMK

RAWPKK

JRA

JuA

MILF

AS

PLO

PFLP

Polisario

KLF

Libya

FARC

CPN-Maoist

ISICPI-Maoist

LTTE

82

Page 91: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Figure 6. Graphic representation of alleged past and present LIBERATION TIGERS OF TAMIL EELAM ties

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com)

Liberation Tigers of Tamil Eelam Network NeighbourhoodGroup Size 29 Computing geodesicsPotential Ties 812 64 paths of length 1Actual Ties 64 606 paths of length 2Density 8% 188 paths of length 3

8 paths of length 4 0 paths of length 5

Weighted Average Path Length: 2.16

Table 11. Summary of nodal, dyadic and network level indicators

CENTRALITY METRICSDegrees Betweenness Closeness Power

0.893 LTTE 0.978 LTTE 0.903 LTTE 0.940 LTTE 0.107 EROS 0.140 PFLP 0.519 PFLP 0.329 PFLP0.107 HM 0.034 HM 0.509 HM 0.272 HM0.107 JuA 0.034 JuA 0.509 JuA 0.272 JuA 0.107 PFLP 0.001 EROS 0.500 EROS 0.251 EROS 0.071 MJC 0.000 ANCL 0.491 PLO 0.246 PLO0.071 PLO 0.000 APWG 0.491 RAW 0.246 RAW0.071 RAW 0.000 AS 0.483 ANCL 0.241 ANCL0.036 ANCL 0.000 CPI-Maoist 0.483 APWG 0.241 APWG0.036 APWG 0.000 CPN-Maoist 0.483 AS 0.241 AS0.036 AS 0.000 FARC 0.483 CPI-Maoist 0.241 CPI-Maoist0.036 CPI-Maoist 0.000 ISI 0.483 CPN-Maoist 0.241 CPN-Maoist0.036 CPN-Maoist 0.000 JRA 0.483 FARC 0.241 FARC0.036 FARC 0.000 KLF 0.483 ISI 0.241 ISI0.036 ISI 0.000 KR 0.483 KLF 0.241 KLF0.036 JRA 0.000 Libya 0.483 KR 0.241 KR0.036 KLF 0.000 MILF 0.483 Libya 0.241 Libya0.036 KR 0.000 MJC 0.483 MILF 0.241 MILF0.036 Libya 0.000 Myanmar 0.483 Myanmar 0.241 Myanmar0.036 MILF 0.000 PKK 0.483 PMK 0.241 PMK0.036 Myanmar 0.000 PLO 0.483 Polisario 0.241 Polisario0.036 PKK 0.000 PMK 0.483 SWAPO 0.241 SWAPO0.036 PMK 0.000 Polisario 0.483 Syria 0.241 Syria0.036 Polisario 0.000 RAW 0.483 TNG 0.241 TNG0.036 SWAPO 0.000 SWAPO 0.483 TULF 0.241 TULF

83

Page 92: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

0.036 Syria 0.000 Syria 0.483 ULFA 0.241 ULFA0.036 TNG 0.000 TNG 0.346 JRA 0.173 JRA0.036 TULF 0.000 TULF 0.346 MJC 0.173 MJC0.036 ULFA 0.000 ULFA 0.346 PKK 0.173 PKK

0.079 Average 0.041 Average 0.487 Average 0.264 Average

0.874 Centralisation 0.971 Centralisation 0.877 CentralisationTable 12. Summary of nodal level centrality metrics

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.comANALYSIS

The LTTE’s external network is a clear example of a ‘star’ configuration, with the

LTTE sitting in a clear central position within this matrix, topping all centrality

measurements with ratings well above the other groups.

When viewing this particular case study graph, however, it is important to be mindful of

the data input rules established for this project and explained in some detail in the

methodology section. Closer inspection of the graph and the groups within it will show

that a good number of these constitute the case study groups themselves but whose own

networks are excluded from this network as a means of containing the studies and

avoiding repetition. In fact, when the historical links are removed as well, then little

remains.

This approach has therefore rendered the metrics for this case study almost irrelevant

(though not invalid, under the rules of the study) when these two points are taken into

account. But by putting more emphasis into analysing the qualitative data, some useful

observations and ideas for future quantitative study may still be generated.

It is obvious both from the brief exploration of the group’s internal structures that in

themselves also resemble networks, and from the nature of the groups identified within

this graph, that the LTTE is a very powerful organisation both domestically and

globally. If one visualises what an integrated graph would look like – a network of all

the case study networks – one can see that the LTTE is likely to exist as an important

structural hole, a relationship broker across myriad groups and networks. Given the

qualitative information known about the group, especially concerning its international

shipping capabilities and its wide network of overt and covert front organisations, lobby

84

Page 93: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

groups, and affiliated organisations, it can be construed that probably out of all the six

case study groups, it is the LTTE that deserves a much deeper level of investigation.

Case Study 6

REVOLUTIONARY ARMED FORCES OF COLOMBIA

History of Organisation The largest guerrilla group in Colombia, and the oldest in

the Latin American continent.cxxviii Formed in 1964 by Manuel Marulanda Velez and

some other members of the Communist Party of Columbia originally as a Marxist,

rural-based, pro-Soviet guerrilla army.cxxix During the 1980s it expanded its

predominantly rural membership to include militants from the urban middle classes.cxxx

After the end of the Cold War it is said to have “underwent a deep and complex

strategic transition” that encompassed its profile, ideology, and political and military

operational processes.cxxxi In 1998 the Colombian government granted FARC a

‘demilitarised zone’ of 42,000 square kilometres as a goodwill gesture after reaching a

ceasefire with the groupcxxxii - an act that assisted FARC to present itself as almost a

parallel state,cxxxiii or a state within a state - although this has now been retracted (FARC,

however, still controls the area). FARC is now said to operate over about 40% of the

country, including the capital city Bogota. Peace negotiations with the government

ended unsuccessfully in 2002. In 2002 FARC was still being described as the world’s

largest and richest terrorist organisation.cxxxiv

Ideology Marxist-Leninist – although over time has focused on presenting a more

inclusive ‘Bolivarian’ nationalist-leftist message, with greater emphasis on critiquing

the government’s inadequacies than on a socialist revolution that would overthrow a so-

called illegitimate regime type.cxxxv

85

Page 94: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Goals Long Term Originally, FARC’s goal was the revolutionary overthrow

of Colombian regime and the establishment of a Marxist state. Now, its message is a

little vague as to its long term aspirations in that it seems to want to be considered a

credible alternative to the current government.cxxxvi

Short Term Maintenance and expansion of FARC’s financial and

territorial control within Colombia, and the continuing destabilisation of the Colombian

government.cxxxvii

Organisational Structure FARC is said to be run by a Secretariat of seven

individuals, including a leader (while FARC Founder Pedro Marin is still described as

the group’s leader, another source identifies former leader of FARC’s southern front,

Jorge Briceno, as FARC’s new military and ideological head. cxxxviii At least one of the

seven is said to be responsible for military affairs, and another for international

relationships. Its command and control system is said to consist of “a hierarchy of

midlevel leaders who meet periodically to formulate basic strategic guidance, allowing

the leaders discretion in the way that they achieve their overall objectives” (Cragin and

Daly 2004, 41). Communication of these general objectives to the local leadership is

said to be made through radio transmission stations.cxxxix There have, however,

reportedly been some problems in the communication process between top and mid-

level leaders.cxl

The organisation has a military-type structure, allegedly divided into several fluid and

moveable urban fronts – and from 1996 adding at least four mobile blocks. It also is

said to divide its members into small cells that are not in contact with each other, but

that each have communication links with some level of FARC central command

through which they receive their operational instructions.cxli Unlike most other guerrilla

armies, FARC militants wear uniforms.

FARC’s innovative new “decentralized organic” (Ortiz 2002, 127) organisational

structure has been attributed as one of the key reasons for its growth and

consolidation.cxlii

86

Page 95: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Membership Approximately 4,500cxliii to 18,000cxliv armed combatants plus perhaps

thousands more members.cxlv

Geopolitical Focus Primarily Colombia (the FARC has been described as a state-

shell organisation in that it displays four of the suggested nine main characteristics of a

modern statecxlvi), although is said to also operate in the border areas of Venezuela,

Panama, Peru, Brazil and Ecuador. It is alleged that FARC has also been identified as

present in Venezuela, Panama and Ecuador, and of maintaining offices in Cuba, Mexico

and Europe.cxlvii FARC also supposedly does business in the notorious Paraguayan

‘Triborder Region’cxlviii city of Ciudad del Este – “a Mecca for terror and crime

organisations” (Napoleoni 2004, 229) including IRA, ETA, Hizbollah and Islamic

Jihad.

Links

STATE LEVEL

Cuba - FARC was said to at one point have had ties to the Soviet Union and Cuba, cxlix

and the Cuban connection may still be active with the allegation that Cuba is supplying

military training to both FARC and the ELN on its soil;cl Colombian Communist Party

(CCP) – remains associated with FARC, although the CCP now disputes any formal

relationship.cli FARC was also involved in setting up an electoral alliance called the

Union Patriotica (UP) with other leftist groups including the CCP, from which FARC

later withdrew.clii

INSURGENT GROUPS

Ricardo Franco Faction (FRF) – a criminal faction of FARC; National Liberation

Army (ELN) – a group that is both a rival and an ally of FARC. It has been alleged that

these two groups met in the mid-1990s to discuss the next phase of the Colombian

insurgency programme;cliii Provisional Irish Republican Army (PIRA) – alleged in

2001 when three supposed IRA explosives experts were caught travelling in Colombia

with false passportscliv - all of them with past or present ties to Sinn Fein.clv Interestingly,

after 2001 there seemed to be a marked improvement in bomb-making, urban tactics

and targeting that may or may not be linked to this visit. Other commentators suggested

that the men were there to teach urban warfare techniques to a hitherto primarily rural-

focused insurgent group.clvi Initial contact was alleged to have happened in Cuba (the

87

Page 96: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

IRA also supposedly made contact in Cuba with FARC’s leftist guerrilla adversary in

Colombia, the ELN), and at least 15 IRA members are alleged to have travelled to

Colombia since 1998. The alliance was said to be based around a deal where either

cocaine profits,clvii money or weaponsclviii were exchanged for training assistance;

Basque Fatherland and Liberty (ETA) – allegedly has links with FARC, supposedly

sharing weapons technology;clix Free Homeland Party (PPL) of Paraguay – suggested

to be a mainly economic alliance;clx Japanese Red Army (JRA) – the Japanese Red

Army has allegedly been detected as providing training for FARC, possibly made

possible through the FARC’s relationship with Hezbollah;clxi Liberation Tigers of Tamil

Ealam (LTTE) – it was asserted in 1995 that the LTTE and FARC had established

links, possibly through the LTTE’s alleged acquisition of larger, ocean-crossing

vessels.clxii

CRIMINAL

Colombian Drug Cartels (CDC) – FARC’s alliances with Colombian drug cartels are

estimated to reap the group US$200-400 million annually.

Tijuana Cartel, Mexico (TC)– FARC was accused of being involved in a guns-for-drugs

swap with this criminal group in 2000.clxiii

CHARITABLE TRUSTS

Unknown.

SECONDARY LINKS OF INTEREST

ETA with Herri Batasuna – the (now outlawed) Spanish political party, commonly

referred to as ETA’s political wing; Haika – in 2000 the ETA-aligned Spanish Jarrai

(youth) organisation merged with its France-based counterpart, Gazteriak, to form

Haika;clxiv Cuba – it has been alleged that some ETA members have received sanctuary

in Cubaclxv; Internationalist Revolutionary Armed Groups (GARI) – ETA is suspected

to be associated with this umbrella organisation.

IRA with ETA – the IRA and ETA are alleged to be building closer ties,clxvi perhaps

through each group’s political wings;clxvii Palestine Liberation Organisation (PLO) –

88

Page 97: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

following an Israeli Defense Forces (IDF) operation in the Jenin refugee camp, an

allegation surfaced that the pipe bombs discovered there show remarkable similarity to

IRA bomb technology.clxviii The Jenin refugee camp, referred to in some circles as the

‘suicide capital’ of the Palestinian Territories,clxix is said to be home to a number of

Palestinian insurgent groups, including Palestinian Islamic Jihad (PIJ), Fatah/Tanzim/al

Aqsa and Hamas.clxx

89

Page 98: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

CCP-UP

HB

TCFRF

PFLP

PLO

QLC

PRT

M-19 GARI

Libya

CDC

PPL

Cuba

Hezbollah

JRA

FMLN

LTTE

Haika

ETA

PIRAELN

CGSB

FARC

Figure 7. Graphic representation of alleged past and present REVOLUTIONARY ARMED FORCES OF COLOMBIA ties

(Inflow 3.1 Software, Copyright © 1988-2005, Valdis Krebs, http://www.orgnet.com

Revolutionary Armed Forces of Colombia Network Neighbourhood

Group Size 24 Computing geodesics

90

Page 99: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Potential Ties 552 68 paths of length 1Actual Ties 68 264 paths of length 2Density 12% 320 paths of length 3

78 paths of length 4 0 paths of length 5

Weighted Avg. Path Length: 2.56

Table 13. Summary of nodal, dyadic and network level indicators

CENTRALITY METRICSDegrees Betweenness Closeness Power

0.609 FARC 0.746 FARC 0.719 FARC 0.732 FARC0.304 ETA 0.282 ETA 0.548 ETA 0.415 ETA0.217 CGSB 0.173 CGSB 0.535 Cuba 0.331 CGSB0.217 Cuba 0.089 PIRA 0.523 PIRA 0.306 Cuba0.217 PIRA 0.078 Cuba 0.489 CGSB 0.306 PIRA0.130 ELN 0.068 LTTE 0.469 ELN 0.264 LTTE0.130 JRA 0.040 JRA 0.460 LTTE 0.246 JRA0.130 LTTE 0.020 M-19 0.451 JRA 0.236 ELN0.130 M-19 0.005 PLO 0.442 Hezbollah 0.221 Hezbollah0.087 Hezbollah 0.003 ELN 0.426 CCP-UP 0.213 CCP-UP0.087 Libya 0.003 PFLP 0.426 CDC 0.213 CDC0.087 PFLP 0.000 CCP-UP 0.426 FMLN 0.213 FMLN0.087 PLO 0.000 CDC 0.426 FRF 0.213 FRF0.087 QLC 0.000 FMLN 0.426 PPL 0.213 PPL0.043 CCP-UP 0.000 FRF 0.426 TC 0.213 TC0.043 CDC 0.000 GARI 0.390 M-19 0.205 M-190.043 FMLN 0.000 HB 0.371 Libya 0.188 PLO0.043 FRF 0.000 Haika 0.371 PLO 0.185 Libya0.043 GARI 0.000 Hezbollah 0.359 GARI 0.180 GARI0.043 HB 0.000 Libya 0.359 HB 0.180 HB0.043 Haika 0.000 PPL 0.359 Haika 0.180 Haika0.043 PPL 0.000 PRT 0.343 QLC 0.172 QLC0.043 PRT 0.000 QLC 0.333 PFLP 0.168 PFLP0.043 TC 0.000 TC 0.333 PRT 0.167 PRT

0.123 Average 0.063 Average 0.434 Average 0.248 Average

0.530 Centralisation 0.713 Centralisation 0.60 Centralisation

Table 14.. Summary of nodal level centrality metrics

ANALYSIS

91

Page 100: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

From an historical perspective, it appears that the early FARC forged its links with two

distinct types of group: with fellow insurgents active on the domestic Colombian scene,

and with sympathetic ‘Communist’ states, primarily through Cuba – the USSR’s main

representative in the Americas. Around the same time as receiving some state

sponsorship, FARC was a member of the CGSB, an umbrella group that brought

together all the active leftist groups within Colombia in order that they be in a position

to negotiate with the Colombian government. This group rated highly across the

centrality scores, and yet did not survive into the present day. FARC had already

withdrawn from the group, however, some time before its eventual disbandment, and

this departure may have been a contributing factor. Many of the CGSB member groups

are now no longer in existence.

Instead, as a consequence of a long-term internal restructuring programme, coupled

with a diminishment in state support, FARC expanded its relationship horizons to

include a number of well-established primarily European insurgent groups such as

PIRA and ETA, along with the LTTE and at least two groups from the Middle East with

a known presence in Latin America. If correct, the JRA connection is particularly

interesting as this long-standing internationalist group that was thought to be based

within the formerly Syrian-controlled Bekka Valley region of Lebanon, has been rarely

heard of for a number of years.

This graph, like the others, shows multiple ‘star’ configurations, the largest in the

constellation belonging to FARC, but with other smaller stars around both PIRA and

ETA. There also appears to be a small all-channel network between these three groups,

and PIRA’s position also indicates that it is a structural hole – a potential broker

between either FARC or ETA, and the PLO (which is, as explained in Chapter One, an

umbrella group itself, and embedded in its own vast networks of networks).

The metrics show that FARC has the highest centrality scores within the identified

network, as demonstrated by its topping of degrees, betweenness and closeness, and

power. FARC’s scores, when compared to the averages of these three measurements,

underline the strength of these observations. This means that as well as having the most

direct links with other actors, FARC also serves as the ‘broker’ between many of the

peripheral groups, a position that grants it high relative power within this network

92

Page 101: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

structure, although PIRA’s position appears stronger within the overall international

environment.

ETA, in comparison, although coming second to FARC across all three centrality

metrics, lags way behind on the degrees and betweenness ratings, which results in a

much lower overall power rating.

Cuba and PIRA also rate reasonably highly across the measurements in relation to both

their closeness to the case study group, and their relative power within the network as it

has been identified. Cuba may have been weakened by the collapse of the USSR, but

these metrics demonstrate that it is still a key supporter of insurgency both in Europe as

well as the Americas.

It seems, however, that FARC’s relationship with PIRA - while there must be some

ideological symmetry - is primarily a transactional one, with bomb-making expertise

coming from PIRA and being traded possibly for money or drugs that PIRA can on-sell.

In Colombia itself, although FARC still seems to have on-going contact with its

ideological ally and rival the ELN, FARC has chosen to work very closely with

Colombian drug cartels – both for financial reward, and probably because this type of

arrangement also serves to increase regional destabilisation.clxxi It can be logically

construed that these cartels in turn are nodes in their own extensive criminal networks

that would need to have been established for the transport and sale of narcotics across

the globe.

As part of FARC’s consolidation process, and perhaps what makes it attractive to some

of these groups, is its control over territory – which means therefore that access itself is

controlled by the group, rendering these zones no-go areas for state military and

intelligence services and safe-havens for any ‘invited guests’.

The question of the influence of intervening variables needs to be addressed. It could be

the case that FARC has solidified its position through its control over territory, its

strong financial position or the ideological adaptations it has made in the past decade

and the subsequent changes this has had upon group structure and strategic preferences.

93

Page 102: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Further investigation would be required to attempt to rate these (or other) characteristics

any order of importance.

94

Page 103: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

CHAPTER 3

CONCLUSION

SUMMARY OF THE RESEARCH PROCESSThis research project was the result of recognising that there could be knowledge gained

through the application of ‘new tools’ to ‘old information’. Much data exists in the

myriad books, articles and online resources pertaining to terrorism and insurgency, and

although in many instances it is incomplete - or the result of expert conjecture rather

than verified fact - much also seems to have been under-utilised by security analysts.

This study was designed as the first step in an attempt to address this.

The rationale behind the methodological approach taken to view aspects of this public

information afresh, was that it seemed inconceivable that when it came to networking

that al Qaeda could be the only group (or movement) actively pursuing this

organisational approach across the bubbling mass of insurgency, revolt and revolution

that constitutes the contested international system in which we live. Surely if leftist

groups in particular had been striving to forge both strategic and tactical alliances at

least as far back as the 1960s, then it was likely that this process was still going on in

today’s increasingly interconnected environment?

Through taking on board this assumption, it became clear that it constituted the

foundation of a theory that needed to be tested, a theory that argued that insurgent

groups were highly likely to have made and be continuing to make alliances with other

organisations insurgent and otherwise in an attempt to further their own ends, or at least

not to see their power diminished.

An hypothesis was formed to test this theory. It argued the simple case that all currently

active insurgent groups, no matter what their geographic or ideological location, are

consciously embedded within networks.

As it was both premature - and unrealistic in a practical sense - to fully test this

hypothesis across the hundreds of insurgent groups currently in existence within the

95

Page 104: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

confines of this short study, it was nevertheless an issue well suited to preliminary

testing through a comparative small n case study approach, where six publicly identified

and diverse insurgent groups would have the information known about them closely

scrutinised for information that alleged the existence of links. Along with this important

information, other general group attributes would also be noted – attributes that all

groups had in common– in order to produce a brief yet informative case study data set.

As far as can be understood from the literature and from expert opinion (Valdis Krebs,

personal communication, 21 June, 2005),clxxii it appears that while works have been

published that promote the application of network analysis approaches to covert groups,

nothing has been published to date that attempts to apply these tools empirically to

actual case study research.

For the purposes of this unique study that set out to determine from a ‘most similar’

comparative approach both the existence and then the breadth of any networked links

across legitimate and illegitimate groups, the six proscribed case study groups

themselves were determined to be the independent variables, thus avoiding any

criticism of selecting on the dependent variable. The dependent variable in this study

(and the focus of the study was to determine this) was specified as being any

relationships identified between the independent variables and other groups –

relationships that at the beginning of the exercise existed only hypothetically.

Following the layering of the various background components that included an

explanation of network theory, the reviews of relevant literatures, and a detailed

methodology section, the focus of the study turned to the actual case studies themselves.

After the collection of information around the six groups, the data was entered onto

‘Inflow’ for quantitative analysis, and the quantitative results interpreted qualitatively.

The results and their implications will be discussed and appraised in the discussion that

follows:

96

Page 105: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

RESULTSThe research process undertaken in this study supports the hypothesis to the extent that

all six insurgent groups examined were shown to be embedded within networked

relationships.

DISCUSSIONThe validation of this hypothesis gives weight to the theory that insurgent groups

operating in the current environment are predisposed towards forging alliances with

other groups in order to further their goals, whether these goals be long or short term in

nature.

Each of the six groups studied were shown to have forged links either within their

immediate domestic environment, regionally, or globally.

Within the confines of the collection rules discussed in the methodology, including for

example the fact that only links of up to two steps out from the case study groups were

to be included in the study, the size and shape of each network varied considerably.

One of networks for example consisted of only 8 entities, while the largest displayed 46

organisations. These compare with the average number of nodes across the six groups

of 25.7clxxiii organisations.

The average weighted path length across all the groups averaged out at 2.5clxxivsteps, this

figure being the shortest path length between any two groups in the network. The

individual results of each case study matched this figure fairly closely.

Network density across the groups ranged from 8% to 29%, with an average density of

14%. There is a correlation between the size of the group and its density with the larger

networks displaying small density ratings, and the smaller networks rating more highly,

which is to be expected, as the larger the group the more potential the cross-ties.

The ‘star’ configuration type dominated the graphs (although mention must be made

again here of the inaccuracy of the LTTE map for reasons discussed in the analysis of

97

Page 106: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

this group’s measurements), although all-channel and chain models were also

represented though to a lesser extent. This may indicate some accidental bias regarding

the case study groups chosen in that they all turned out to be reasonably large and well-

established groups within their home environments. Alternatively, this could suggest

that it is the ‘star’ model that may somehow dominate the landscape of insurgent groups

through some kind of propensity within groups to cluster with equitable or weaker

entities, be this driven by group-level psychological factors or structural inevitability.

The dominance of the ‘star’ model may also, for example, may be genuinely universal

as an indicator of when groups reach a certain size or strength, as they perhaps court

numbers of weaker groups while at the same time forging a few key alliances with

similar or larger sized groups who may be rivals as well as allies. It is worth noting here

that groups with high ‘Power’ ratings can either be conduits or suppressors of

transaction flows between other groups, a position that would be coveted. The “Power’

metrics are a synthesis of the ‘Betweenness’ and ‘Closeness’ ratings - ‘Closeness’

giving an indication of the level of autonomy a group enjoys within the network, and

‘Betweenness’ depicting the strength of the position a group holds with regard to the

other groups and their inter-group interactions.

The ‘star’ models are supported by pockets of all-channel relationships in key strategic

areas, with chain models perhaps demonstrating alliances built around short-term needs,

and which may have the potential to be transformed into either of the other two

configurations over time as trust is built and needs dictate.

The case study approach also had the side effect of drawing attention to other groups

within the graphs, in these cases usually either the groups that rated surprisingly highly

across the centrality metrics, or those identified at the periphery of more than one of the

cases. In at least two of the case studies the focal groups did not rate the highest in the

qualitative analysis section - results which were reassuring methodologically speaking -

and also valuable in the identification of possible ‘key players’ within a network that

deserve deeper scrutiny.

Other groups, or types of groups, whose presence or position across a minimum of two

graphs indicate a potential level of importance worth investigating. Some groups have

98

Page 107: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

been shown to rate highly in more than one graph and the implication is that that may

have connections to other networks as yet unexplored. Additionally, with the

identification of some groups (such as the LTTE or ISI) as peripheral players across a

number of graphs, these groups also can be singled out for future research.

The other area of interest is the role of umbrella organisations – groups that usually

themselves are not well known or that have not often been publicly associated with acts

of violence. Umbrella groups such as the MJC and CCOMPOSA seem to perform

important coordinating functions across their members, and could be seen to be acting

as ‘force multipliers’ in some instances. It is yet to be seen just how influential these

organisations are in affecting overall processes at the nodal level, and just what

individuals may actually comprise the umbrella group – that is, whether member groups

themselves are present in the umbrella groups’ management teams, or whether they are

run by ‘outsiders.’

This research also demonstrates the ongoing involvement of state support and

facilitation of insurgency. While some commentators have argued that ‘new’ terrorist

groups are notable by their self-sufficiency, it could be argued that in some cases this

seems far from the case, and that just as in the 1960s and 1970s, states or sub-state

entities are utilising armed covert groups as the means towards achieving their own

foreign policy goals.

The issue of territorial control is also present in this study. A number of the groups that

score high centrality metrics also currently have, or are close to having, control over

large swathes of land within which they are in effect the de facto government. These

central government no-go areas are safe-havens for not only the groups themselves, but

this condition also makse alliances with these groups attractive to other organisations

whose hospitality they may use to their advantage.

In concluding this discussion, it must be acknowledged again that this has been a study

reliant upon the quality of information in the public arena. While the existence of the

dependent variables has been established in all six instances, it is still the case that the

actual nature – the qualities – of these dependent variables has not been made clear. The

99

Page 108: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

next section of this conclusion will explore the limitations and weaknesses of the

research process undertaken, with regard to both its methodology and findings.

LIMITATIONS OF THE RESEARCH

This study was an exploratory comparative small n case study analysis of six insurgent

groups using qualitative and quantitative methods, designed primarily to test an

hypothesis, but also to establish the utility of employing network analysis in future

studies, whether this be to a deeper level within the same six case study groups and their

networks, or across a larger number of case study groups.

While the research design methods used proved to be successful tools in the process

undertaken to either prove or invalidate the hypothesis, it could be argued that due to

the small number of case studies interrogated, the hypothesis has in reality been only

partially proven. What is meant here is that the validation of the hypothesis in this

context has merely satisfied the conditions of being a necessary step, but not yet a

sufficient one. To be both necessary and sufficient, the hypothesis would have to be

applied to the universe of insurgent groups in existence – a research project of massive

proportions.

Along with the insights that potentially can be generated through the network analysis

process, there are a number of issues of concern in this particular research approach

which need to be addressed.

In this exploratory exercise smaller, insignificant groups were ranked with the same

status as larger ones within the measurements, which had the knock-on effect of

contributing to a moderately significant actor appearing more important than the actual

qualitative information inferred. The implementation of a more nuanced collection of

questions in any further studies (which correspond to a network number – the software

used in this study allows up to 16 questions to be ‘asked’) may help to alleviate this, as

multiple or uni-directional links will increase the status of certain nodes over others.

100

Page 109: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Secondly, with the construction of models that show both past and present links,

sometimes an historical actor received a high centrality score, which seemed

inappropriate when either a link does not exist any more, or when an agent no longer

exists. This may be overcome in future research project either by the full utilisation of

the strengths categories (rating an historical link as ‘1’ alongside higher ratings of 2 to

5), or by splitting up the research of each group into a series of temporally-specific time

periods in a longitudinal study so that current relative importance is not distorted and

changes in the network structure are observed over time.

Lastly, it is important to stress the general point that the network identification process

when it comes to covert groups is only as good as the data – so vital nodes and links can

be missed. Each map in some ways creates a ‘false world’ as much as it reveals a real

one, because with only creating discrete ‘worlds’ there is no place for the ‘network of

networks’ within which these isolated examples may be embedded

What also is not clear is evidence that the networking arrangement necessarily leads to

the satisfaction of a group’s operational goals. While it does appear to be the case that

there is a correlation between the size and breadth of a network and individual group

efficacy, more nuanced research would need to be undertaken to establish this.

While the existence of networks was conclusively proven across all case studies, little is

yet known about the actual attributes of the networks. While some information was

forthcoming in the research regarding the nature of links between at least some of the

groups, a conscious decision was made not to code the nature of these transactions with

strength ratings in this study. This decision was made for three reasons. The primary

rationale was due to the simplicity of the hypothesis that did not require this information

in order for it to be answered. Secondly, the allocation of strength ratings to different

types of transactions (such as arms for drugs deals, financial support, or joint

operations) can only really be described as an arbitrary process with a high degree of

subjectivity. This does not mean that this process should not be attemptedclxxv, only that

the strength allocation process deserves a good deal of attention before being

implemented. Lastly, the fact that the quantity and quality of the information varied

greatly across the case studies made it likely that while some networks would show

great depth regarding quality of attributes, others would offer poor representation. This

101

Page 110: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

in turn would negatively impact the overall research project, as there would be too much

variation across what could be considered the intervening variables. It would then

undermine the positive aspects of a ‘most similar’ comparative approach.

The research also did not focus on the internal differences between groups across the

case studies. The descriptive information provided for all groups - for example their

ideology, breadth of geopolitical focus, size, command and control structure, operations

or goals - could also be described as potential intervening variables. For example, it

could be the case that that correlations exist between the nature of a group’s internal

structure and the type of alliances it forms. Conversely, through being part of a network

a group’s internal structures and processes may be transformed. It is even possible that

these flows of influence flow in both directions simultaneously. Although correlation

does not imply causation, or the direction of the causality, unless these issues are

explored, and any confounding variables also identified, the process of group formation

and evolution within (and possibly without) of a network structure will not be fully

understood.

There is also the issue of active rivalry between groups, which cannot be determined

within the ‘inclusive’ network analysis approach of the type performed in this study.

The ‘strengths’ measurement does not calculate in the negative to demonstrate

destructive interactions between groups. While it may be the case that networks may

contain groups that harbour extreme animosity towards each other, mistakes could be

made in trying to recognise this merely through the lack of evidence of any constructive

transactions between them – as this may be more the consequence of the machinations

of a third group that holds a high ‘Power’ rating and whose interests are served by

keeping two potential allies apart.

Also not examined here is any analysis at the individual level. During the research

process it became apparent some groups had strong links with individuals rather than

groups, and some of these individuals were members of more than one group. It could

be hypothesised then that the actions and bonds across individuals also may serve to

influence group dynamics both within and without. This study does not explore these

factors.

102

Page 111: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

SUGGESTIONS FOR FUTURE RESEARCH

Through the cautious appreciation of the results obtained in this particular study, this

research project concludes with the recommendation that it would be a worthwhile

venture to amend and extend the methodological processes utilised herein in order that

they be applied to future research.

The focus of this research could be directed in one of two directions. On the smaller

scale, a new comparative case study analysis could be designed around the same six

groups, this time taking a ‘most different’ comparative approach, paying far more

attention to identifying and stressing the differences between the intervening variables

than in this study where it was their similarities that were stressed. In a ‘most different’

approach, similarities across the independent variables are stressed, which means that in

this case for instance it would not be the differing typologies of the groups that would

be taken into account, but rather their insurgent nature would be the key point of issue

regarding their similarities. Shifting the focus around across the same set of variables

would provoke a deeper rather than more general piece of research. To this end, should

the same ‘Inflow’ software as described in the methodology section be used, the full

repertoire of both network numbers and link strengths should also be utilised. By this it

is meant that a good number of discrete questions should be asked of the groups, such as

“With which groups do you collaborate with on projects?;” “ From which organisations

do you receive financial assistance?;” or “From whom do you receive training?”.

The software is also capable of taking directionality into account, meaning that flows

can be logged as being either uni-directional or bi-directional within each of the

questions. The more the number of links of different types between groups noted, the

greater the metrics will be for the most active groups. In addition to this, the strengths of

the links can be logged, for instance if assistance was known to be a one-off, then the

strength rating would be low – say a ‘1’ on the scale of one to five. If two groups were

formally aligned and were known to meet regularly to coordinate activities, then the

strength ratings would be closer to the top end of the scale. An approach like this (which

of course, as mentioned above, would be dependent on the quality of information

103

Page 112: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

discoverable in the public arena), would produce a mapping result that again would be

narrow, but also deep.

An alternative approach would be to keep the methodology at the basic level that has

been used in this study, but to extend the pool of groups wider. The first step of this

process would logically be the inclusion of all six groups within a single mapping

project, keeping the same 2-step rule in place so that this integrated ‘network of

networks’ is still kept manageable. The insights gained from this wide and shallow

approach would give the clearest indication of exactly what groups hold the greatest

positions of ‘Power’ across multiple networks – and so isolate them for further scrutiny.

From a counter-insurgency or ‘counter-terrorism’ point of view, this could be a useful

exercise in isolating the groups that ‘feed’ key elements in the network. Striking at these

groups could have the effect of starving the network from without, saving time and

energy by avoiding the targeting many groups individually and in piecemeal fashion.

While it is not the purpose of this study to prognosticate as to the practical application

of responses to the insights made herein, this example has been given to illustrate in

general terms the practical consequences of what this research may provide.

Neither of these new approaches have even taken into account the agency of the

individual. As in reality it appears that relationships and transactions operate

concurrently at both these levels, and the best approach in the long term would be to

develop analytic tools that can integrate both approaches within a 3-dimensional model

that marries network graphs with venn-style diagrams which can demonstrate

overlapping subsets of sets. As organisational network analysis itself is but in its

infancy, this synthesising of the social and the organisational approaches is likely a long

way off, but is an idea for software developers to consider into the future.

In conclusion, as Kegley (2003, Preface, p. VII) states, “There is arguably a notable lag

between the perceived new realities and issues and topics addressed by much of the

existing literature”. This unique research project was designed specifically as one small

way to respond to this challenge, and it does not rely on myths to impart the knowledge

that there is indeed a monster in the Labyrinth.

104

Page 113: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

BIBLIOGRAPHY

Books and Monographs

Alexander, Yonah. Palestinian Secular Terrorism. Ardsley: Transnational Publishers,

2003.

Alexander, Yonah, and Michael S. Swetnam. Usama bin Laden’s al-Qaida: Profile of a

Terrorist Network. Ardsley: Transnational Publishers, 2001.

Ali, Tariq. The Clash of Fundamentalisms. London: Verso, 2003.

Arquilla, John, and David Ronfeldt, eds. Networks and Netwars. Santa Monica: RAND,

2001b

Beckett, Ian F.W. Encyclopedia of Guerrilla Warfare. Santa Barbara: ABC CLIO, 1999

Bodansky, Yossef. Bin Laden: The Man Who Declared War on America. New York:

Prima, 2001

Boriotti, Susan, and Donna Dennis, eds. Foreign Terrorist Organizations: History

Tactics and Connections. New York: Nova Science, 2004.

Brecher, Jeremy, Tim Costello, and Brendan Smith. Globalization from Below: The

Power of Solidarity. Cambridge: South End Press, 2000

Castells, Manuel. The Rise of the Network Society. Second Edition. Oxford: Blackwell,

2000

Cohen, Robin, and Shirin M. Rai, eds. Global Social Movements. London: The Athlone

Press, 2000

105

Page 114: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Cronin, Audrey Kurth, Huda Aden, Adam Frost, and Benjamin Jones. Foreign Terrorist

Organizations. Congressional Research Service: The Library of Congress, 2004.

Davies, Barry. Terrorism: Inside a World Phenomenon. London: Virgin, 2003

Dershowitz, A. M. Why Terrorism Works: Understanding the Threat, Responding to the

Challenge. New Haven: Yale University Press, 2002

Esposito, John L. Unholy War. Oxford: Oxford University Press, 2002.

Goodwin, Jeff, and James M. Jasper. The Social Movements Reader: Cases and

Concepts. Oxford: Blackwell, 2003

Gray, Colin S. Modern Strategy. Oxford: Oxford University Press, 1999.

Gunaratna, Rohan. Inside Al Qaeda: Global Network of Terror. New York: Columbia

University Press, 2002

Hanle, Donald. Terrorism: The Newest Face of Warfare. New York: Pergamon Brassey,

1989

Harmon, Christopher C. Terrorism Today. London: Frank Cass, 2000

Hoffman, Bruce. Inside Terrorism. New York: Columbia University Press, 1998

Jones, David Martin, ed. Globalisation and the New Terror. Cheltenham: Edward Elgar

Publishing, 2004.

Kaldor, Mary. New and Old Wars: Organized Violence in a Global Era. Stanford:

Stanford University Press, 1999.

Kaldor, Mary. Global Civil Society: An Answer to War. Cambridge: Polity Press, 2003.

Kean, John. Global Civil Society? Cambridge: Cambridge University Press, 2003.

106

Page 115: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Keck, Margaret E., and Kathryn Sikkink. Activists Beyond Borders. New York: Cornall

University, 1998.

Kegley, Charles W. Jr. The New Global Terrorism: Characteristics, Causes, Controls.

Upper Saddle Rivre: Prentice Hall, 2003

Khagram, Sanjeev, James V. Riker, and Kathryn Sikkink, eds. Restructuring World

Politics: Transnational Social Movements, Networks, and Norms. Minneapolis:

University of Minnesota Press, 2002

Monge, Peter R. and Noshir S. Contractor. Theories of Communication Networks.

Oxford: Oxford University Press, 2003.

Napoleoni, Loretta. Terror Inc. London: Penguin Books, 2004

Nyatepe-Coo, Akorlie A., and Dorothy Zeisler-Vralsted. Understanding Terrorism:

Threats in an Uncertain World. Upper Saddle River: Pearson Prentice Hall, 2004

Pearlstein, Richard M. Fatal Future? Transnational Terrorism and the New Global

Disorder. Austin: University of Texas Press, 2004

Pettiford, Lloyd and David Harding. Terrorism: The New World War. Leicester:

Arcturus, 2003

Rapoport, David C., ed. Inside Terrorist Organizations. London: Frank Cass, 2001

Rubin, Barry M. Revolution until Victory?: the Politics and History of the PLO.

Cambridge: Harvard University Press, 1994.

Sageman, Marc. Understanding Terror Networks. Philadelphia: University of

Pennsylvania Press, 2004.

Scott, W. Richard. Organizations: Rational, Natural and Open Systems. Upper Saddle

River: Prentice Hall, 1981

107

Page 116: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Schweitzer Yoram, and Shaul Shay. The Globalization of Terror. New Brunswick:

Transaction Publishers, 2003.

Simonsen, Clifford, and Jeremy R. Spindlove. Terrorism Today: The Past, the Players,

the Future. 2nd ed. Upper Saddle River: Pearson Prentice Hall, 2004

Sparrow, Malcolm K. “The Application of Network Analysis to Criminal Intelligence:

An Assessment of the Prospects.” Social Networks 13 (1991): 251-274

Stern, Jessica. Terror in the Name of God. New York: Harper Collins, 2003.

Wasserman S. & K. Faust. (1994). Social Network Analysis. Cambridge: Cambridge

University Press.

Wasserman, S., and J. Galaskiewicz, eds. Advances in Social Network Analysis.:

Research in the Social and Behavioral Sciences. Thousand Oaks: Sage, 1994.

Articles and Chapters

Arquilla, John and David Ronfeldt. “Networks, Netwars, and the Fight for the Future.”

First Monday 6 (2001a). http:// www.firstmonday.org/issues/issue6_10/ronfeldt/

(accessed 22 July 2004).

Bagley, Bruce Michael. “The State and the Peasantry in Contemporary Colombia.”

Latin American Issues 6.

http://webpub.allegheny.edu/group/LAS/LatinAmIssues/Articles/Vol6/LAI_vol_6.htm

(accesses 5 May 2005)

Burnham, Peter, Karin Gilland, Wyn Grant, Zig Layton-Henry. Research Methods in

Politics. New York: Palgrave, 2004. Chapter 2.

108

Page 117: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Carpenter, T., and George Karakostas and David Shallcross. “Practical Issues and

Algorithms for Analysing Terrorist Networks.” Telcordia Technologies.

http://fano.ics.uci.edu/cites/Document/Practical-issues-and-algorithms-for-analyzing-

terrorist-networks.html (accessed 9 December 2004)

Cox, Robert W. “Civil Society at the turn of the Millennium: Prospects for an

Alternative World Order.” Review of International Studies 25 (1999): 3-28

Chellaney, Brahma. “Fighting Terrorism in Southern Asia: The Lessons of History.”

International Security 26, iss. 3 (December 2001): 94-117

Cox, R. ‘Civil Society at the turn of the millennium: prospects for an alternative world

order’, Review of International Studies (1999), 25, pp.3-28

Cragin, Kim, and Sara A. Daly. “The Dynamic Terrorist Threat: An Assessment of

Group Motivations and Capabilities in a Changing World.” RAND. Project Air Force.

www.rand.org/publications/MR/MR1782/MR1782.pdf

Cronin, Audrey Kurth. “Globalization and International Terrorism.” International

Security 27.3 (2002-2003): 30-58

Dekker, A. “Applying Social Network Analysis Concepts to Military C4ISR

Architectures.” Connections 24, iss. 3 (2002): 93-103.

Desmond, Edward. “The Insurgency in Kashmir (1989-1991).” Contemporary South

Asia 4, iss. 1 (1995): 5-17

Dombroski, M. & K. Carley. “NETEST: Estimating a Terrorist Network’s Structure”,

Graduate Student Best Paper Award, CASOS 2002 Conference

http://www.casos.cs.cmu.edu/events/conferences/student_papers/Dombroski.pdf.

(accessed 7 December 2004).

Elliott, Michael. “Hate Club”. Special Report: Inside al Qaeda: bin Laden’s Web of

Terror TIME Magazine, November 12, 2001:.30-42

109

Page 118: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Ehrenfeld, Rachel. “IRA+PLO=Terror.” National Review, 21 August 2002.

http://www.nationalreview.com/comment/comment-ehrenfeld082102.asp (accessed 22

September 2003).

Ergil, Dogu. “Suicide Terrorism in Turkey.” Civil Wars 3, no. 1 (Spring 2000): 37-54

Farley, Jonathan David. “Breaking Al Qaeda Cells: A Mathematical Analysis of

Counterterrorism Operations (A Guide to Risk Assessment and Decision Making).”

Studies in Conflict & Terrorism 26 (2003): 399-411

Fellman, Philip Vos, and Roxana Wright. “Modelling Terrorist Networks – Complex

Systems at the Mid-Range.” Institute of Social Psychology. London School of

Economics. www.psych.lse.ac.uk/complexity/.Conference/FellmanWright.pdf

(accessed 7 June 2003)

Freeman, Linton C. “Visualizing Social Networks. “Journal of Social Structure.

http://www.cmu.edu/joss/content/articles/volume1/Freeman.html (accessed 7 January

2005).

Filler, Alfredo L. “The Abu Sayyaf Group: A Growing Menace to Civil Society.”

Terrorism and Political Violence 14, no. 4 (Winter 2002): 131-162

Gueli, Richard. “Bin Laden and Al-Qaeda: Challenging the Assumptions of

Transnational Terrorism.” Strategic Review for Southern Africa 25, iss. 2 (2003): 22-55

Gunaratna, Rohan. “International and Regional Implications of the Sri Lankan Tamil

Insurgency.” International Policy Institute for Counterterrorism, 2 December 1998.

http://www.ict.org.il/articles/articledet.cfm?articleid=57 (accessed 5 April 2005).

Gunaratna, Rohan. “The Post-Madrid Face of Al Qaeda.” Washington Quarterly 27, iss.

3: 91-100

Hoffman, Bruce. “Change and Continuity in Terrorism.” Studies in Conflict &

Terrorism 24 (2001): 417-428

110

Page 119: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Hoffman, Bruce. “Rethinking Terrorism and Counterterrorism Since 9/11.” Studies in

Conflict & Terrorism 25 (2002): 303-316

Hoff, Peter D., Adrian E. Raftery, and Mark S. Handcock. “Latent Space Approaches to

Social Network Analysis.” Journal of the American Statistical Association 97, iss. 460

(December 2002): 1090

Jamieson, Alison. “Transnational Organized Crime: A European Perspective.” Studies

in Conflict & Terrorism 24 (2001): 377-387

Jenkins, Brian. “Terrorism and Beyond: 1 21st Century Perspective.” Studies in Conflict

& Terrorism 24 (2001): 321-327

Jones, David Martin, Michael L.R.Smith, and Mark Weeding. “Looking for the Pattern:

Al Qaeda in Southeast Asia – The genealogy of a Terror Network.” Studies in Conflict

& Terrorism 26 (2003): 443-457

Joshi, Manoj. “On the Razor’s Edge: The Liberation Tigers of Tamil Eelam.” Studies in

Conflict & Terrorism 19 (1996): 19-42

Kartha, Tara. “Countering Transnational Terrorism.” Strategic Analysis 23, no. 11

(2000).

Klerks, P. “The network Paradigm Applied to Criminal Organisations: Theoretical

Nitpicking or a relevant doctrine for investigators? Recent developments in the

Netherlands”. Connections 24, iss. 3 (2001): 53-65,

Krebs, Valdis. “Uncloaking Terrorist Networks.” First Monday.7, no. 4 (April 2002),

http://firstmonday.org/issues/issue7_4/krebs/index.html (accessed 7 June 2003).

Iacovou, Christos. “From MNLF to Abu Sayyaf: The Radicalisation of Islam in the

Philippines.” International Policy Institute for Counter-Terrorism. 11 July 2000

http://www.ict.org.il/articles/articledet.cfm?articleid=116 (accessed 16 February 2005)

111

Page 120: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Jensen, Carl J. III. “Beyond the Tea Leaves: Futures Research and Terrorism.”

American Behavioural Scientist 44, iss. 6 (2001): 914-938

Laqueur, Walter. “The Terrorism to Come.” Policy Review online. Policy Review no.

126. http://www.policyreview.org/aug04/laqueur.html (accessed 28 June 2005).

Mayntz, Renate. Organizational Forms of Terrorism: Hierarchy, Network, or a Type sui

generis?” Max Planck Institute for the Study of Societies. MPIfG Discussion Paper 04/4,

2004. http://:www.mpi-fg-koeln.mpg.de

McAllister, Brad. “Al Qaeda and the Innovative Firm: Demythologising the Network.”

Studies in Conflict & Terrorism 27 (2004): 297-319

McCloud, Kimberly A., and Adam Dolnik. “Debunk the Myth of Al Qaeda.” Christian

Science Monitor, 23 May 2002.http://www.csmonitor.com/2002/0523/p11s02-

coop.html (accessed 14 April 2003)

Lacquer, W. ‘The Terrorism to Come’. Policy Review, August 2004, at

http://www.policyreview.org/aug04/lacquer. Date of access 12 August 2004

Looney, R. (2002). ‘Following the Terrorist Informal Money Trail’, Strategic Insight,

National Security Affairs Department, US Naval Postgraduate School

Karmon, Ely. “Strange Bedfellows – An examination of the coalitions among terrorist

organizations.” International Policy Institute for Counter-Terrorism, 2000

http://www.ict.org.il/articles/articledet.cfm?articleid=20

Marquardt, Erich. “Al-Qaeda’s Exaggerated Organizational Strength.” Global Policy

Forum. Power and Interest News Report, 2 September 2003.

http://www.globalpolicy.org/wtc/terrorism/2003/0902exaggerated.htm (accessed 15

February 2005)

Mishra, Shitanshu. “Exploitation of Information and Communication Technology by

Terorist Organisations.” Strategic Analysis 27, iss. 3 (2003)

112

Page 121: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Moghadam, Assaf. “Palestinian Suicide Terrorism in the Second Intifada: Motivations

and Organizational Aspects.” Studies in Conflict & Terrorism 26 (2003): 65-92

Niksch, Larry. “Abu Sayyaf: Target of Philippine-US Anti-Terrorism Cooperation.”

Congressional Research Service. Library of Congress, 25 January 2002.

http://www.mipt.org/pdf/CRS_RL31265.pdf

Ortiz, Roman D. “Insurgent Strategies in the Post-Cold War: The Case of the

Revolutionary Armed Forces of Colombia.” Studies in Conflict & Terrorism 25 (2002):

127-143

Pasha, Mustapha Jamal, and David Blaney. “Elusive Paradise: The Promise and Peril of

Global Civil Society.” Alternatives 23 (1998): 417-450

Prabha, Kshitij. “Terror Enterprise: Organisation, Infrastructure and Resources.

Strategic Analysis 15, no. 9 (December 2001).

http://www.ciaonet.org/olj/sa/sa_dec01prk01.html.

Quillen, Chris. “State Sponsored Terrorism: A Growing Threat?” Discussion paper. The

Terrorism Research Center, 2000. www.terrorism.com.

Radu, Michael. “The Rise and Fall of the PKK.” Orbis 45, iss. 1 (Winter 2001): 47-63

Raufer, Xavier. “Al Qaeda: A Different Diagnosis.” Studies in Conflict & Terrorism 26

(2003): 391-398

Rogers, Steven. “Beyond the Abu Sayyaf.” Foreign Affairs 83, iss.1 (2004): 15-21

Rothemberg, R. “From Whole Cloth: Making up the terrorist network”. Connections 24,

iss. 2 (2002): 36-42

Sagarin, Raphael. “Adapt or Die.” Foreign Policy (September/October 2003).

http://www.ciaonet.org/olj/fp/fp_sepoct03c.html.

113

Page 122: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Shahar, Yael. “Seeking a New Image, or Polishing an Old One?” International Policy

Institute for Counter Terrorism, 2000. http://www.ict.org.il/articles/articledet.cfm?

articleid=427 (accessed 22 May 2005)

Smith, Jackie. “Global Civil Society?” American Behavioral Scientist 42, no. 1

(September 1998): 93-108

Smith, Paul J. “Transnational Terrorism and the al Qaeda model: Confronting new

realities.” Parameters 32, iss. 2: 33-47

Takeyh, Ray and Niklas Gvosdev. “Do Terrorist Networks Need a Home?” Washington

Quarterly 25:3 (Summer 2002): 97-108

Tazaghart, A. “The ‘globalization’ of terror networks.” Lebanon Wire, 20 August 2002.

http://www.lebanonwire.com/0208/02082013DS.asp (accessed 5 April 2005)

Thayer, Carlyle A. “No, Al Qaeda Isn’t Everywhere.” Far Eastern Economic Review

166, iss. 33 (2003): 20-22.

Turbiville, Graham H. “Bearers of the Sword: Radical Islam, Philippines Insurgency,

and Regional Stability.” Military Review, March-April 2002. Foreign Military Studies

Office. http://fmso.leavenworth.army.mil/FMSOPUBS/ISSUES/sword.htm (accessed

15 February 2005)

Watts, D. “Networks, Dynamics, and the Small-World Phenomenon.” American

Journal of Sociology 105, iss. 2, (Septmeber 1999):.493

Whine, Michael. “The New Terrorism”. International Policy Institute for Counter

Terrorism, 2002. http://www.ict.org.il/articles/articledet.cfm?articleid=427.

Whitaker, Raymond. “If they Capture Bin Laden or his Deputy will al-Qa’ida fall?”

Independent, 21 March 2004. http://news.independent.co.uk/world/politics/story.jsp?

story=503423.

114

Page 123: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Williamson, Hugh, and Manik de Silva. “To Catch a Tiger.” Far Eastern Economic

Review 161, iss. 15: 29

Winchell, Sean P. “Pakistan’s ISI: The Invisible Government.” International Journal of

Intelligence and Counterintelligence 16 (2003): 374-388

Electronic Resources

Arostegui, Martin. “IRA men held in Colombia linked to Cuba.” United Press

International. The Cuban American National Foundation, 17 August 2001.

http://www.canf.org/News/archived/010817newsb.htm (accessed 22 September 2003)

Center for Defense Information. “Globalizing Terrorism: The FARC-IRA Connection.”

5 June 2002. http://www.cdi.org/friendlyversion/printversion.cfm?documentID=1563

(accessed 5 April 2005)

Center for Defense Information. “Jemaah Islamiah.” 18 October 2002, .

http://www.cdi.org/friendlyversion/printversion.cfm?documentID=1159 (accessed 5

April 2005)

Communist Party of Nepal-Maoist. “South Asia: a living volcano of proletarian

revolution.”10 April 2004. http://cpnm.org/new/ccomposa/cco_news/cops2.htm

(accessed 28 Match 2005)

Council on Foreign Relations. “Terrorism Questions & Answers.”

http://www.terrorismanswers.com/groups/ (accessed 20 February 2003)

cvi “In the Spotlight: Sipah-I-Sahaba Pakistan”, Center for Defense Information, 9 July 2004, http://www.cdi.org/friendlyversion/printversion.cfm?documentID=2308 (accessed 5 April 2005)cvii South Asia Assessment 2003, athttp://www.satp.org/satporgtp/southasia/index.html. (accessed 29 March, 2005) and http://satp.org/satporgtp/countries/bangladesh/terroristoutfits/Huj.htm. (accessed 28 March, 2005)cviii Loretta Napoleoni, Terror Inc. 195

115

Page 124: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Federation of American Scientists. “Liberation Movements, Terrorist Organizations,

Substance Cartels, and Other Para-State Entities.” http://www.fas.org/irp/world/para/

(accessed 9 December 2004).

Gibson, Helen. “Global Networking: Trading in Terror?” TIME Europe, 25 August

2003. http://www.time.com/time/europe/eu/printout/0,9869,172708,00.html (accessed

22 September 2003)

cxxviii Roman D. Ortiz, “Insurgent Strategies in the Post_Cold War: The Case of the Revolutionary Armed Forces of Colombia”, Studies in Conflict & Terrorism, Vol. 25, 2002, 127cxxix See http://exastricientia.fateback.com/terrorists.htm. Date of access 1 October 2003cxxx Roman D. Ortiz, “Insurgent Strategies”, 135cxxxi Ibid.,. 130cxxxii The DMZ is also said to be “a Club Med for terrorists” – see “Memory, Truth and Justice: Comparative Perspectives on National Reconciliation”,http://memoria.fiu.edu/memoria/documents/terror.htm (accessed 1 October, 2003)cxxxiii Roman D. Ortiz, “Insurgent Strategies”, 136cxxxiv Mark F. Wong, “The IRA in Colombia – the Global Links of International Terrorism”, lecture before the Committee on International Relations, US House of Representatives, April 24, 2002,http://wwwa.house.gov.international_relations/107/wong0424.htm (accessed 22 September, 2003)cxxxv Roman D. Ortiz, “Insurgent Strategies”, 130cxxxvi Ibid.cxxxvii “Revolutionary Armed Forces of Colombia”, Terrorist Group Profile, MIPT Terrorism Knowledge Base, http://www.tkb.org/Group.jsp?groupID=96 (accessed 30 April, 2005)cxxxviii Ibid.cxxxix Kim Cragin and Sara A.Daly, “The Dynamic Terrorist Threat”, 41cxl Ibid.cxli “Memory, Truth and Justice: Comparative Perspectives on National Reconciliation”, http://memoria.fiu.edu/memoria/documents/terror.htm (accessed 1 October, 2003)cxlii Roman D. Ortiz, “Insurgent Strategies”, 127cxliii National Security Institute, Terrorist Profiles, http://nsi.org/Library/Terrorism/profterr.txt (accessed 5 October, 2004)cxliv “Patterns of Global Terrorism”, 2002, 120 estimates 12,000 combatants, while Ballentine and Sherman say 18,000 combatantscxlv “Foreign Terrorist Organizations”, Congressional Research Service, FARC, 81cxlvi See Loretta Napoleoni, Terror Inc.,87 as she credits Professor Christopher Pierson’s identification of nine characteristics of statehood, namely sovereignty, constitutionality, rule of law, impersonal power, legitimacy of authority, monopoly on the means of violence, territoriality, taxation and public bureaucracy - the latter four being shared with state-shells. By this definition, however, a number of legally-recognised states in the modern world would also not be considered legitimatecxlvii Foreign Terrorist Organizations”, Congressional Research Service, FARC, 81cxlviii “Memory, Truth and Justice: Comparative Perspectives on National Reconciliation”, http://memoria.fiu.edu/memoria/documents/terror.htm (accessed 1 October, 2003)cxlix “Global Terrorism”, 76cl Martin Arostegui, “IRA men held in Colombia linked to Cuba”, 17 August 2001, The Cuban American National Foundation, http://www.canf.org/News/archived/010817newsb.htm (accessed 22 September, 20030cli Bruce Michael Bagley, “The State and the Peasantry in Contemporary Colombia”, Latin American Issues (online), Volume 6, 22 at http://webpub.allegheny.edu/group/LAS/LatinAmIsssues/Articles/Vol6/LAI_vol_6.htm.(accessed 5 May, 2005)clii Roman D. Ortiz, “Insurgent Strategies”, 134cliii Christian Gutierrez, “Colombia at War”, April 2003, unpublished Thesis, Central Connecticut State University, http://fred.ccsu.edu:8000/archive/00000126/02/etd-2003-17.htm (accessed 5 May, 2005)cliv “Memory, Truth and Justice: Comparative Perspectives on National Reconciliation”,

116

Page 125: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Global Guerrillas. “Mapping Terrorist Networks.” 23 April, 2004.

http://globalguerrillas.typepad.com/globalguerrillas/2004/04/mapping_terrori.html

(accessed 1 December 2004).

Gould, Harold A., and Franklin C. Spinney. “Fourth Generation Warfare Is Here.”

Defense Week, 15 October 2001.

http://www.defense-and-society.org/fcs/gould_spinney_4GW.htm (accessed 9

September 2003).

http://memoria.fiu.edu/memoria/documents/terror.htm (accessed 1 October 2003). It must be acknowledged, however, that the three men were found not guilty in their eventual trialclv Helen Gibson, “Global Networking: Trading in Terror?”, TIME Europe, 25 August 2003, http://www.time.com/time/europe/eu/printout/0,9869,172708,00.html (accessed 22 September, 2003)clvi Nigel Vinson, Security Analyst, quoted in “Global Networking”, TIME Europeclvii “Memory, Truth and Justice”clviii Helen Gibson, “Global Networking”, TIME Europeclix Ibid.clx “The Long Reach of Colombia’s FARC”, Stratfor, February 16, 2005, http://www.stratfor.info/Print.neo?storyId=244214 (accessed 23 February, 2005)clxi Roman D. Ortiz, “Insurgent Strategies”, 139clxii Rohan Gunaratna, “International and Regional Implications of the Sri Lankan Tamil Insurgency”, 1998, International Policy Institute for Counter-Terrorism (ICT), 14, http://www.ict.org.il/articles/articledet.cfm?articleid=57 (accessed 5 April, 2005)clxiii Roman D. Ortiz, “Insurgent Strategies”, 138clxiv “Gazteriak”, MIPT Terrorism Knowledge Base, http://www.tkb.org/Group.jsp?groupID=3508 (accessed 30 April, 2005)clxv “Basque Fatherland and Liberty”, Intelligence Resource Program, Federation of American Scientists,http://www.fas.org/irp/world/para/eta.htm (accessed 9 December, 2004)clxvi Helen Gibson, “Global Networking”, TIME Europeclxvii “ETA”, Exastriscientia, http://exastriscientia.fateback.com/terrorists.htm. (accessed 1 October, 2003)clxviii Paul Berry, “Palestinian/IRA similarities in bomb making revealed in recent report”, http://paulberry.org.uk/assemblydetail.asp?id=13 (accessed 10 May, 2005), and Rachel Ehrenfeld, “IRA+PLO=Terror”, National Review Online, 21 August 2002, http:// www.nationalreview.com/comment/comment-ehrenfeld082102.asp (accessed 10 May, 2005)clxix “Jenin The Capital of the Palestinian Suicide Terrorists”, Intelligence and Terrorism Information Center, Center for Special Studies, http://www.intelligence.org.il/eng/bu/jenin/jenin_e.htm (accessed 10 Ma,y 2005)clxx “Palestinian Terror Operatives arrested or killed in the Jenin refugee camp”, 23 April 2002,http://kokhavivpublications.com/2002/isreal/09/0204232120.html (accessed 10 May, 2005)clxxi “The Long Reach of Colombia’s FARC”, Stratfor, 16 February 2005, http://www.stratfor.info/Print.neo?storyId=244214 (accessed 23 February, 2005)clxxii Valdis Krebs indicated in an e-mail response to the author’s enquiry regarding the possible existence of any other similar studies, that while it is likely that some classified studies of this nature exist, he is unaware of any in the public domain internationally, and believes this study will be the firstclxxiii The actual average number of nodes was 25.66, calculated up to the next decimal pointclxxiv The actual figure was 2.49, and was calculated up to the next decimal pointclxxv See Valdis Krebs, “Mapping Networks of Terrorist Cells”, Connections, Volume 24, Issue 3, 44 for the rationale he used in coding the strengths of the ties between the September 11 hijackers

117

Page 126: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

Intelligence and Terrorism Information Center. Center for Special Studies. “Jenin: The

Capital of Palestinian Suicide Terrorists.”

http://www.intelligence.org.il/eng/bu/jenin_e.htm (accessed 5 October 2005)

International Policy Institute for Counter Terrorism. “Terrorist Organization Profiles

from the ICT Database.” http://www.ict.org.il/inter_ter/org.cfm.

Middle East Information Center. “Non-Muslim Terrorist Groups of the World.”

http://middleeastinfo.org/forum3996 (accessed 5 October 2004)

National Memorial Institute for the Prevention of Terrorism. Terrorism Knowledge

Base. http://www.tkb.org/ (accessed 30 April 2005)

National Memorial Institute for the Prevention of Terrorism “Kurdistan Workers’

Party.” Terrorism Knowledge Base. http://www.tkb.org/Group.jsp?groupID=63

(accessed 23 April 2005).

Naval Postgraduate School. “Terrorist Group Profiles: Index of Groups. Dudley Knox

Library. http://library.nps.navy.mil/home/tgp/tgpndx.htm.

Raman, B. “Maoists Gain Momentum in India.” South Asia Analysis Group. Paper no.

1251. http://www.saag.org/%5Cpapers13%5Cpaper1251.html (accessed 28 March

2005).

Simon, Sheldon W. “The War on Terrorism: Collaboration and Hesitation.” Pacific

Forum CSIS, 1st Quarter 2002. http://www.csis.ord/pacfor/cc/0201Qus_asean.html.

South Asia Terrorism Portal. “Terrorist Group Profiles.” http://satp.org/satporgtp/

(accessed 19 April 2005)

South Asia Terrorism Portal. “Liberation Tigers of Tamil Eelam.”

http://satp.org/satporgtp/countries/shrilanka/terroristoutfits/Ltte.htm (accessed 23 April

2005).

118

Page 127: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

South Asia Terrorism Portal. “Communist Party of India-Maoist.”

http://satp.org/satporgtp/countries/shrilanka/terroristoutfits/CPI_M.htm (accessed 28

Match 2005).

Spinney, Chuck. “Is 4GW al-Qa’ida’s Official Combat Doctrine?”. http://www.d-n-

i.net/fcs/comments/c438.htm (accessed 9 September 2003).

Strategic Forecasting, Inc. “The Long Reach of Colombia’s FARC.”

http://www.stratfor.info/Print.neo?storyId=244214

Strategic Forecasting, Inc. “Colombia: A Resurgent, Lethally Effective FARC.”

http://www.stratfor.info/Print.neo?storyId=243527

Strategic Forecasting, Inc. “Terrorist with Bin Laden Connections Arrested in

Colombia.” Global Intelligence Update.

cix SATP – ref both groupscx Clifford E. Simonsen and Jeremy R. Spindlove, Terrorism Today: The Past, the Players, the Future, 2nd

edition, (Prentice Hall, New Jersey, 287)cxi Dogu, p. 41cxii “Kadek”, Terror Organisations in Turkey, FORSNET, http://www.teror.gen.tr/english/turkey/separatist/pkk/aim.html. (accessed 22 September, 2003)cxiii Dogu Ergil, “Suicide Terrorism in Turkey”, Civil Wars, Vol. 3, No. 1 (Spring 2000), 39cxiv Ibid., 37cxv Ibid., 40cxvi Ibid., 42cxvii Ibid., 46cxviii Ibid.,. 47cxix “Kurdistan Workers’ Party”, MIPT Terrorism Knowledge Base, http://www.tkb.org/Group.jsp?groupID=116 (accessed 30 April, 2005)cxx MIPTcxxi MIPTcxxii Called, respectively, the Charles Anthony Regiment, the ‘Air Tigers’ (although they are said to not be operating any aircraft at present – their focus is more defensive, with their maintenance of anti-aircraft weapons), the ‘Sea Tigers’, the ‘Balck Tigers’, and the ‘Freedom Birds’ cxxiii Namely Sri Lankan Prime Minister Ranasinghe Premadasa and former Indian Prime Minister Rajiv Gandhi. Plus the partial blinding of the current Sri Lankan President cxxiv See Peter Chalk, ‘Liberation Tigers of Tamil Eealam’s (LTTE) International Organisation and Operations – A Preliminary Analysis’, Canadian Security Service, 17 March 2000, p. 3, athttp://www.csis-scrs.gc.ca/eng/comment/comm77_e.html. Date of access 12 September 2003. An almost identical account can be found at South Asian Terrorism Portal, athttp://www.satp.org/satporgtp/countries/shrilanka/terroristoutfits/Ltte.htm. Date of access 23 April 2005.cxxv Charu Lata Joshi, “Ultimate Sacrifice”, Far Eastern Economic Review, June 1, 2000. Volume 163, Issue 22, 66cxxvi Ranga Jayasuriya, “Tigers lament internationalisation”, Daily News, Sri Lanka, 27 June 2003,http://www.dailynews.lk/2003/06/27/fea03.html. (accessed 1 October, 2003)cxxvii B. Raman, “THE LTTE: The Metamorphosis”, South Asia Analysis Group, Paper number 448, 29 April 2002, http://www.saag.org/papers5/paper448.html (accessed 23 April, 2005)

119

Page 128: Into the Labyrinth: An Exploration of Insurgent Groups and their Network Neighbourhoods

http://informationwar.orf/terrorist_network/terrorist_arrested_in_Colombia.htm

(accessed 5 April 2005)

Notes

120