# Can math models of gaming strategies be used to detect terrorism networks?

##### May 16, 2013

The answer is yes, according to a paper in the SIAM Journal on Discrete Mathematics. In a paper published in the journal last month, authors Anthony Bonato, Dieter Mitsche, and Pawel Pralat describe a mathematical model to disrupt flow of information in a complex real-world network, such as a terrorist organization, using minimal resources.

Terror networks are comparable in their structure to hierarchical organization in companies and certain , where information flows in one direction from a source, which produces the information or data, downwards to sinks, which consume it. Such networks are called hierarchical social networks.

"In such networks, the flow of information is often one way," explains author Pawel Pralat. "For example, a celebrity such as Justin Bieber sends out a tweet, which is sent to millions of his followers. These followers send out their own retweets, and so on. We may therefore view hierarchical social networks as directed networks without cycles, or directed acyclic graphs (DAGs)."

Here, there is no requirement for reciprocity (the celebrity does not necessarily follow his or her followers). Similarly, in a terrorist network, the leaders pass plans down to the foot soldiers, and usually only one messenger needs to receive the message for the plan to be executed.

Disruption of the flow of information would correspond to halting the spread of news in an online social network or intercepting messages in a terror network.

The authors propose a generalized stochastic model for the flow and disruption of information based on a two-player outdoor game called "Seepage," where players who depict agents attempt to block the movement of another player, an intruder, from a source node to a sink. "The game—motivated by the 1973 eruption of the Eldfell volcano in Iceland—displays some similarities to an approach used in mathematical counterterrorism, where special kinds of DAGs are used to model the disruption of terrorist cells," says Pralat.

The motivating eruption caused a major crisis at the time, as lava flow threatened to close off the harbor, the island's main source of income. In the game, inhabitants attempt to protect the harbor by pouring water on the volcanic lava to halt its progress. A of the game pits two opponents against each other—the sludge, or intruder, against the greens, or agents— forming a directed acyclic graph, with one source (the top of the volcano) and many sinks representing the lake. The parameter, "seepage," represents the amount of contamination, and the "green number" corresponds to the number of agents required to halt it.

A previous study modeled terrorist cells as partially ordered sets (a special kind of DAG), which are often used in mathematics to analyze an ordering, sequencing, or arrangement of distinct objects. In such a system, terrorist plans are formulated by nodes at the top of the hierarchy, which represent the leaders or maximal nodes of the set. The plans are transmitted down to the nodes at the bottom: these represent foot soldiers in a terror network or minimal nodes in the set who would be presumed to carry out these plans. The assumption is that one messenger is sufficient for reception and execution of the plan. Thus, if the partially ordered set represents a courier network for a terrorist organization, the intention would be to block all routes from the maximal node to the minimal nodes by capturing or killing a subset of agents.

In this paper, the authors utilize the similarities in the previous terrorist cell model to Seepage, where greens try to prevent the sludge from moving to the sinks by blocking nodes. A number of different winning strategies employed by both players are explored when played on a DAG. The seepage and green number for disrupting a given hierarchical social network are analyzed.

The primary difference from the previous study's model is that the Seepage model is dynamic: greens can move and choose new sets of nodes over time. The authors determine that Seepage is a more realistic model of counterterrorism, as the agents do not necessarily act all at once, but over time.

The analysis is made in two types of terrorist network structures, as Pralat explains, "We consider two extreme profiles: one where the network is regular, where every agent has about the same number of connections. The second profile is power law, where some agents have many connections, but most have very few." This is analyzed by considering the total degree distribution of nodes in the DAG. In regular DAGs, each level of the DAG would have nodes with about the same out-degree (number of outgoing edges emanating from a node), while power law DAGs would have many more low-degree nodes and a few with high degrees.

Mathematical analysis allows the authors to determine what point in a network would be most effective for disrupting messages. "Our mathematical results reinforce the view that intercepting the information or message in a hierarchical social network following a power law is more difficult close to levels near the source. For regular networks, it does not matter as much where the message is disrupted," says Pralat. "Future work could look at more complex profiles of networks, along with developing effective algorithms for disrupting the flow of information in a DAG using our game-theoretic approach."

More information: Vertex-Pursuit in Random Directed Acyclic Graphs, Anthony Bonato, Dieter Mitsche and Pawel Pralat, SIAM Journal on Discrete Mathematics, 27(2), 732–756. (Online publish date: April 16, 2013). epubs.siam.org/doi/abs/10.1137/120866932

## Related Stories

#### Los Alamos reveals it's been running quantum network for two and a half years

May 7, 2013

(Phys.org) —In a recent paper available on arXiv, a team of researchers at New Mexico's Los Alamos National Laboratory has revealed they've been running a quantum network for 2 1/2 years. The network is hub-and-spoke based, ...

#### How to be a social climber: A study reveals the mechanisms of 'opportunist' societies

January 30, 2013

"He landed the job because he has connections." How many times have you heard these words? Now a study confirms what is apparently only a stereotype. The research, published in the Journal of Statistical Physics, which also ...

#### To win an election, a strongly connected voter network is key, physicists conclude

April 26, 2013

(Phys.org) —The results of a new study support what many people intuitively know about winning political elections: the party that has a more connected voter network usually receives more votes. However, the study also ...

#### New algorithm for message dissemination in decentralized networks faster than its predecessors and guarantees delivery

January 9, 2013

Ad hoc networks—communication networks set up on the fly by mobile sensors—pose problems that ordinary office networks don't. Ad hoc networks are usually decentralized, meaning that no one node knows what the network ...

#### How quickly things spread

February 21, 2012

Understanding the spread of infectious diseases in populations is the key to controlling them. If we were facing a flu pandemic, how could we measure where the greatest spreading risk comes from? This information could help ...

#### Game of go: A complex network

April 16, 2012

Could computers ever beat the best go players? Although unthinkable at this stage, this could soon become possible, thanks to CNRS theorists. For the first time, two scientists from the Theoretical Physics Laboratory and ...

## Recommended for you

#### Sexual harassment common among middle school children, study finds

December 9, 2016

The recent suicide of Brandy Vela, a teen in Texas City, Texas, was a potent reminder of the sometimes tragic consequences of bullying. According to Vela's parents, the teen fatally shot herself Nov. 29 following months of ...

#### Digitally reconstructed skull and face may reveal Robert the Bruce, king-hero of the Scots

December 9, 2016

Could this be the face of Robert the Bruce, as it has never been seen before?

#### Archeologist claims to have found proof that Hebrew was the first written alphabet

December 8, 2016

(Phys.org)—Douglas Petrovich, an archaeologist with Ontario's Wilfrid-Laurier University in Canada has sparked controversy in the ancient history scholarly community by making claims that he has found proof that Hebrew ...

#### Amber specimen offers rare glimpse of feathered dinosaur tail

December 8, 2016

Researchers have discovered a dinosaur tail complete with its feathers trapped in a piece of amber. The finding reported in Current Biology on December 8 helps to fill in details of the dinosaurs' feather structure and evolution, ...

#### Mobile money access lifted two percent of Kenyan households out of poverty: study

December 8, 2016

Since 2008, MIT economist Tavneet Suri has studied the financial and social impacts of Kenyan mobile-money services, which allow users to store and exchange monetary values via mobile phone. Her work has shown that these ...

#### Fossilized evidence of a tumor in a 255-million-year-old mammal forerunner

December 8, 2016

When paleontologists at the University of Washington cut into the fossilized jaw of a distant mammal relative, they got more than they bargained for—more teeth, to be specific.

## 5 comments

Adjust slider to filter visible comments by rank

Display comments: newest first

##### antialias_physorg
5 / 5 (1) May 17, 2013
For example, a celebrity such as Justin Bieber sends out a tweet, which is sent to millions of his followers

And I think no one would disagree with calling him an audio-terrorist.

The again 'legal' military networks are of the same order (unidirectional, acyclic) as terrorist ones - so should be vulnerable to the same types of disruption attacks.
##### Kron
1 / 5 (5) May 17, 2013
And I think no one would disagree with calling him an audio-terrorist.

His popularity serves as evidence otherwise.

Terrorist organizations model themselves around military ones. Their goals are usually opposed by governments, so they must be equipped and prepared for government intervention. Since governments deploy militia in response to aggression (both preemptive and post) terrorist cells prepare for such acts.

Your lack of understanding is astounding a_p. A person of your caliber should understand that evil exists in the world (think back to your school-yard bully). The military is the big boy equivalent to the teacher who came running to save you when the bully gave you your purple nurple.
##### kochevnik
3 / 5 (4) May 17, 2013
"Evil" is a term favored by troglodytes. You assume some sky fairy orders the universe into cowboys with black and white hats. Your own country imports "terrorists" from Africa into Syria and rebrands them "freedom fighters"
##### antialias_physorg
5 / 5 (1) May 17, 2013
A person of your caliber should understand that evil exists in the world

I'm not much into the 'good' and 'evil' thing. It tends to lead people into black/white/stereotypical thinking

There are people who want things that are at odds with each other - and every single one of them thinks they are the good guys. So calling someone 'evil' serves no purpose, since without a doubt they do the same to you.

Whether someone owns a state-funded military or a drug-funded military makes little difference. If you think state funded stuff is 'for the interest of the people' and not 'for the interest of a very few select people', then I guess you still have some growing up to do.
##### kochevnik
5 / 5 (1) May 18, 2013
In police state USA Muslims are suspects and Jews are "too good to fail." Yet even the retarded patsies hired by the FBI in their casus belli false flag drills only number eighteen in the past fifteen years. In the same fifteen years Jews committed twenty-two terrorist acts in USA, and WITHOUT the assistance of the FBI. These facts are directly from the US National Safety Counsel

USA spends five trillion dollars on the War on TERROR and yet fail to catch any Jewish terrorists who are the real threat based upon hard data. Of course I'm being facetious and just pointing out how full of shit Americans and their government are. Not a hard task if you follow the math and the money

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.