Connectivity among terrorist groups: A two models business maturity approach

Kevin C. Desouza, Tobin Hensgen

Research output: Contribution to journalArticlepeer-review

12 Scopus citations


The reality of terrorism has become ubiquitous. Terrorist groups continue to garner front-page exposure, which contributes to their agenda, while stories of hostage dilemmas, suicide bombings, assassinations, and a variety of nefarious criminal activities lead the unsuspecting to wonder, "What's next?" In order to begin to understand terrorism researchers should first understand how these terrorist groups operate and, far more importantly, what motivates others to co-operate with terrorists. No terrorist group operates in isolation. It is assured a priori that terrorist groups have to collaborate with other entities in order to further their agenda. In the conventional sense, terrorists have limited resources, limited capabilities, and limited reach. Without co-operation and support in support of criminal enterprises, they would function in isolation; their impact would be isolated. This article outlines two models that demonstrate how cooperation between terrorists and recognized, albeit criminal, institutions contribute to terrorist successes. The first, a resource model, outlines some of the resources that bind two or more terrorist groups. The second, an alliance model, layers different levels of collaborative engagements between terrorist groups and these institutions. Both models are descriptive in nature and contribute to an understanding of how terrorist groups must engage in the fundamentals of established economic practices in order to succeed.

Original languageEnglish (US)
Pages (from-to)593-613
Number of pages21
JournalStudies in Conflict and Terrorism
Issue number7
StatePublished - Jul 2007
Externally publishedYes

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Sociology and Political Science
  • Safety Research
  • Political Science and International Relations


Dive into the research topics of 'Connectivity among terrorist groups: A two models business maturity approach'. Together they form a unique fingerprint.

Cite this