Metageographies of terrorism
We have already discussed the metageography of nation-states in Chapter 5. The meta-
geography of a network contains two important components, nodes and conduits. The
political outcomes of the network are a product of the actions of the people located at
different nodes and the way they facilitate flows between nodes. For example, for a
terrorist network to function money, people, weapons, explosives and other equipment,
and information must move from node to node. The different nodes in a network will
have different functions: training, gathering information, planning, finance, and execu-
tion of terrorist acts, for example. Terrorist networks are organized to minimize the
amount of contact between nodes so that if one node is identified and engaged by
counter-terrorist forces the whole network is not disrupted (Flint, 2003a). Terrorist
groups have developed networks in this way over a number of years. For example, the
IRA operated different cells of bombers on the British mainland without them knowing
of each others existence. Al-Qaeda, as we shall discuss in greater detail later, is a
different model, a network of loosely affiliated movements, perhaps best thought of as
an “idea” or common cause than as an “organization” with its implications of central-
ized control and bureaucratic hierarchy.
An abstract model of a terrorist network requires the definition of particular nodes
(commonly referred to as “cells”) and the connections (or flows) between them. A
terrorist attack requires successful cooperation between cells located across the globe.
What are the types of cells in a terrorist network? In what types of places are different
types of cells located? How are the cells connected? These questions require the com-
bination of the architecture of networks and the geography of places.
First, the structure of the network must be understood. What may be called “core
nodes” are the cells that provide the highest level of planning and purpose of the network.
“Peripheral nodes” are the cells that undertake the attacks, the bombers, hijackers,
kidnappers, etc. In between are “junction nodes” that translate the plans into action by
coordinating funding, training, recruitment, and equipping of the “peripheral nodes.”
Identifying and destroying the “junction nodes” will maximize the disruption of the
network (Hoffman, 2002) because they are the most connected of all the nodes.
To target “junction nodes” they must first be located. The intersection of networks
and territory determines particular categories of places that are most suitable for the
1111
2
3
41
5
6
7
8
91
10
1
2
31111
4
5
6
7
8
9
20
1
2
3
4
5
6
7
8
9
30
1
2
3
4
51
6
7
8
9
40
1
2
3
4
5111
G E O P O L I T I C A L M E T A G E O G R A P H I E S
173
Do'stlaringiz bilan baham: