Criminal Justice Essay Paper on Exploitable Weaknesses in Terrorist Organizations’s

Exploitable Weaknesses in Terrorist Organizations’s

Social network refers to advanced technological communication platforms that people and organizations use to communicate. Social network analysis is a critical tool that attempts to discover terror activities by utilizing available data relating to terrorist groups. Social Network Analysis is a method that seeks to uncover the understandable-complex relationships that form the networks by the individual nodes in terrorist groups. The intelligence focuses on the structure of the systems rather than the features of the individuals of the group. Terrorist organizations, just like any other group is an informal organization with a series of networks of individuals. The weaknesses of terrorist groups include continuous unjustifiable killing of civilians, their unwillingness to embrace future political transitions, short-lived ideologies and attempts to negotiate for political powers with their enemies (Mobley, 2012).

            Social network analysis relies on terror information to provide unique features of terrorist groups regarding the recruitment of their members, how networks evolve overtime and the manner in which the terrorists’ radical ideas spread within the networks. Therefore, US homeland security policy can use social network analysis in its bid to effectively counteract the net war. Most terrorist organizations have no formal points of operation but have clusters that manifest in various nations of the world. The information provided by the social network analysis enables the government security agencies to identify the mapping of terrorist clusters. In addition, the process facilitates the designing of a pictorial network that is used to disrupt the supply chains of the terror groups. The security forces can use aspect to cut such supplies by eliminating the middlemen and thus prevent the occurrence of the terror attacks that the terrorist have planned. The information on the evolution of terror networks helps in the evaluation of the nature of links that exist within networks. The identification of potential suspects is possible with unearthing of the background of the formation of a terror group. An analysis of the structure of terrorist organizations facilitates the sabotage of terrorist activities (Mobley, 2012).

            The modern war on terror requires superior knowledge as opposed to military power. The use of social network analysis is likely to be an effective tool in defeating modern terror groups. With the advent of the Terrorism knowledge Portal and the complex modeling techniques, social network analysis will be able to utilize complete data. The constraints of data collection and modeling are likely to cease. There is a possibility of further research to enable the study of the characteristics of the individuals that constitute a net war. The technique can outline the evolution of the systems and thereafter find a means of destabilizing such networks. The intelligence can further give an insight on the ways that the network-recruit participants and the reasons for their acceptance to participate in terror activities (Mobley, 2012).

            In conclusion, social network analysis as a tool of combating terror has a brighter future performance if the terrorist research centers can focus on how to adjust its inefficiencies. The US government can use the social network analysis in its efforts to deal effectively with the current modern terror groups. The establishment of the website for publicly accessible information coupled with further research on complex modeling is essential to the success of social network analysis approach to combating insecurity resulting from terror threats.


Mobley, B. W. (2012). Terrorism and counter-intelligence: How terrorist groups elude detection. New York: Columbia University Press.