StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Myths of Negotiating Dark Networks - Article Example

Cite this document
Summary
In the report “The Myths of Negotiating Dark Networks” the author takes a critical view of the emergent paradigm of “dark networks” within international relations, which emphasizes the threats to international security from global networks of terrorism, drug and nuclear materials smuggling, and insurgency…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
The Myths of Negotiating Dark Networks
Read Text Preview

Extract of sample "The Myths of Negotiating Dark Networks"

The Myths of Negotiating Dark Networks Mette Eilstrup-Sangiovanni and Calvert Jones (2008) take a critical view of the emergent paradigm of “dark networks” within international relations, which emphasizes the threats to international security from global networks of terrorism, drug and nuclear materials smuggling, and insurgency. They reject the “prevailing pessimism about the ability of states to combat illicit networks” as premature (2008: 8) and argue that a closer inspection of the idea of “networks” is required to understand their true implications.

The authors contend that clandestine networks in the international system are susceptible to a variety of weaknesses that distinguish them from legal networks. They clarify that “in contrast to hierarchies, networks lack top-down command and authoritative dispute settlement” (2008: 11). While they acknowledge the commonly cited advantages of networked actors – efficient communication and information processing, scalability, adaptability, resilience, and learning capacity – they rightfully caution that all of these may not apply to every type of network.

Eistrup-Sangiovanni and Jones identify three kinds of networks: the chain network, the wheel network, and the all-channel network. Illicit networks are primarily of the first two variants and many, if not most, suffer from “inefficiencies and short life-cycles” (2008: 17). The scholarship on networks, they claim, pays scant attention to historical evidence and extant studies of terrorism, insurgency, and organized crime. Dark networks suffer from information limitations and communication failures, poor decision-making and excessive risk-taking, restrictions on scope and structural adaptability, collective action problems due to (lack of) coordination, frequent security breaches, and learning disabilities (2008: 19-33).

Using these limitations as an analytical framework, Eistrup-Sangiovanni and Jones examine the organizational structure of the al-Qaida, which appears to be a robust network-based threat in the 21st century. The al-Qaida’s potency draws a lot from a hierarchical organization, which has been increasingly difficult to maintain as the group comes under sustained international pressure. Its capacity to undertake major operations – like the “9/11” attacks – dwindles as it more closely resembles a loosely structured network of actors; indeed, there have been more foiled attempts than successful attacks since 2001 (2008: 35-40).

Two important implications arise here: hierarchy remains important in illicit organizations, without which they do not retain potency over the long-term; and, a network structure in illicit groups may reduce threats emanating from them and a closer scrutiny of networks may help states devise counteractive strategies. While the first point is entirely acceptable, the second requires further research and empirical validation.In essence, the approach used by the authors is an eclectic clubbing of diverse social scientific perspectives on networks, without any clear methodological focus.

Moreover, why there should be any necessary distinction between hierarchy and networks remains unclear; the two may, in fact, appear at once. In addition, the historical evidence provided in the analysis occurred within particular social, political, cultural, economic (and even geographical) contexts; it is difficult to take such disparate cases and weave a general pattern. Given the state of affairs in present-day Pakistan, it becomes difficult to accept some of the core claims of the article.

How strategies of counterterrorism can evolve through this particular assessment of networks goes unexplored; in any case, terrorism persists unabated. Even so, the authors’ analysis offers a refreshing perspective in understanding international organized crime.ReferenceEilstrup-Sangiovanni, M. & Jones, C. (2008) ‘Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think.’ International Security, 33, 2: 7-44.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Myths of Negotiating Dark Networks Article Example | Topics and Well Written Essays - 500 words”, n.d.)
The Myths of Negotiating Dark Networks Article Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/social-science/1554128-global-terrorism
(The Myths of Negotiating Dark Networks Article Example | Topics and Well Written Essays - 500 Words)
The Myths of Negotiating Dark Networks Article Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/social-science/1554128-global-terrorism.
“The Myths of Negotiating Dark Networks Article Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/social-science/1554128-global-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Myths of Negotiating Dark Networks

James J Hill and E H Harriman Compare and Contrast

Harriman provides us with new insights into the controversies and the myths that surround the career of one of American's greatest businessmen.... nbsp;… Aside from the dark side of Hill, Malone shows the readers of Malone's positive side in the way he emphasizes how Hill aggressively and thoroughly planned the expansion of his business: he started with Canada from 1881-1883, then all over the northern tier states and territories of the western US from 1886-1893....
7 Pages (1750 words) Term Paper

Letter from a Birmingham Jail

The interconnectedness of global networks of terror justifies government strikes anywhere in the world.... Name Instructor Course Date Martin Luther King: Just and Unjust Laws.... In his “Letter from a Birmingham Jail,” Martin Luther King, Jr.... distinguishes between just and unjust laws – those that are just on face value but unjust in application....
31 Pages (7750 words) Essay

SKILL DEVELOPMENT PAPER

This would include learning negotiating skills which is not only vital in closing deals in business but in resolving any other conflict with other people.... Skill Development Paper Introduction The recent weeks have given me opportunities to turn inwards and evaluate my own skills as a future professional in a globalized setting....
25 Pages (6250 words) Essay

Expanding the Australian-Based Volare Restaurant

Volare is an Italian restaurant in Gold Coast Australia, specialising in a wide variety of authentic Italian dishes in the traditional style of Italy.... Like most other restaurants of this variety, the majority of fresh and frozen ingredients are purchased locally or through the… It has been determined that in order to boost profitability and expand the Volare brand, the business should consider India as a new, international location for Volare Restaurant. After procuring a suitable location for the To expedite training, several professional chefs and executive leadership will perform a series of training programs to familiarise the staff with Italian cooking procedures, ingredients lists and how to conform to Volare administrative guidelines....
6 Pages (1500 words) Essay

Companies That Fueled the Tech Bubble

That avalanche of capital was laid at the doorstep of countless companies whose busineses would never turn a profit.... But that didnt stop them from taking it. Perhaps the greatest speculative… bubble the stock market has ever seen, the tech bubble finally reached its apex with a handshake on the tenth day of the new millenium with the merger of AOL and Time Warner....
9 Pages (2250 words) Research Paper

Medical-Dental Outreach Project for Children

The author of the "Medical-Dental Outreach Project for Children" paper focuses on a project that is about a charitable project to be endeavored by the members of St.... Clare High School's Batch 1983 graduates in commemoration of the school's centennial event.... nbsp;… Choosing a worthy project for a charitable cause entails a lot of consideration as to its relevance, feasibility, availability of resources, and cost....
25 Pages (6250 words) Case Study

WAN Technologies Currently Used within the UK and European Markets

Asynchronous data transfer is network technology designed for both local area networks and wide area networks.... The fifth topic is about the tools that are used in computer networks and lastly, is the security of the network both the physical security of the network components and the security of the data that is sent via the network....
8 Pages (2000 words) Report

Introduction to Computing - Building Information Systems

… The paper "Introduction to Computing - Building Information Systems" is a great example of an essay on information technology.... Building information systems is a very difficult task partly due to the exertion of ascertaining the intended users' requirements, but majorly because of the complexity that arises from a large number of interactions between the humans and the machines....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us