The Lessons of the Virus

  |  October 2, 2001   |  Comments

After my last article, I received an email from a readersaying he couldn't care less what I thought of anything outside of marketing. This, of course, has inspired me to write about a nonmarketing topic. (But we're fairly certain Eric's thoughts will return to marketing by his next article. --Editor).

A terrorist organization is a network -- a loosely affiliated group of nodes that exhibit emergent properties as they form, execute a task, and then disband. Their organization fits within the standard model of modern complexity theory: nodes of prominence emerge naturally as the forces of coevolutionary development (namely, natural selection and auto catalysis) battle it out. That is to say that terrorists are, in a sense, born not made (and no, I don't mean that as a slight on Arabs or the Islamic culture).

Open source and complexity theory hold strategic keys to managing risk in the age of terrorism.

The Internet is also a loosely affiliated group of nodes that exhibit emergent properties. In fact, if the structures of the two organizations were lined up side by side, they would be nearly indistinguishable. As such, that which seriously damages the Internet could teach us tactical lessons about damaging a terrorist network.

The Nimda virus hurt the Internet more than corporations are willing to acknowledge. This sucker impeded performance, and certain systems are still cleaning up. A virus temporarily brought a portion of the Internet to a crawl: our first clue.

Terrorist networks are distributed intelligence. They do not respond to attacks of command and control architecture -- tank battalions are pretty useless. Hacks against computer networks, on the other hand, provide a blueprint for harm:

  1. OK, so Nimda didn't do this in theory, but in practice it might as well have. For a terrorist network, this means physical destruction of camps, training centers, and monetary sources (and cell members, if possible).

  2. Begin a denial-of-service attack.
Nimda -- at its core -- did this on an individual node basis, occupying servers with its incessant spreading. Translating this to terrorism requires some creativity. A denial-of-service attack is essentially a request for information. The analogy in the terrorist lexicon is similar to gathering intelligence at such a rapid rate that they become alerted to your encroaching presence -- on a repeated basis. This forces the network to constantly seek to reorganize connections to maintain viability.

This is where the Internet analogy incorporates complexity theory. The life cycle of a complex system (be it terrorist network, ecosystem, or Internet) runs as follows:

  • Initial conditions build to a point wherein autocatalysis (self-organization) occurs among the existing interactive elements. The autocatalysis leads to an organizational network of prominence, wherein certain nodes gain levels of importance over other nodes. The key here is the process -- the value and viability of the system is its ability to interact node-to-node.

  • Information is generated in the process between nodes, and it is at that point that the coevolutionary drives kick in. (We see this in terrorist networks in loose actions that ripple across cells that do not actually know each other -- the operation only becomes viable as the nodes process interactions with each other).

  • The system, once organized, will evolve to encourage maximum levels of diversity. The system will push itself to the edge of chaos as it seeks to remain viable. Systems on the edge achieve maximum productivity (viability) but become increasingly vulnerable to catastrophic events, which push them into a reorganizational state equivalent to extinction. Alternatively, systems that do not reach this edge become rigid in their responses to information. This brings their extinction rate to 100 percent.

  • The dynamic nature of the terrorist network implies that it lives on the edge of chaos -- a network whose viability depends upon its ability to rapidly respond to incoming information. The network is therefore vulnerable to repeated deluges of assault -- not in the physical sense but in the intelligence sense. By forcing the network to adjust to ever-tightening circles of intelligence, it's required to respond more rapidly to information requests -- effectively setting up a denial-of-service attack. Insistent, aggressive intelligence forces the network to expend its energy reorganizing and ensuring survival rather than pursuing its mission.

  • This will push the network over the edge of chaos and into a state of disarray. Whether it is able to reorganize is anyone's guess.

So the terrorist network can be fought.

For business, this means distributed approaches to organization are now doubly important. And, while I hate to admit that we can learn from the open source movement (if only because Eric S. Raymond wrote the single most asinine piece of the decade in response to the terrorist strike) -- well, it's true. We can.

ClickZ Live New York What's New for 2015?
You spoke, we listened! ClickZ Live New York (Mar 30-Apr 1) is back with a brand new streamlined agenda. Don't miss the latest digital marketing tips, tricks and tools that will make you re-think your strategy and revolutionize your marketing campaigns. Super Saver Rates are available now. Register today!

ABOUT THE AUTHOR

Eric Norlin Eric Norlin is a recognized authority on the trends, passions, and impact of the Internet. His work has been highlighted in publications such as Business Week, NTKnow, The Register, The Minneapolis Star-Tribune, and 1to1Direct. He divides his time between working on "normal" Web projects (through his partnership in UnCharted Shores) and slaving away at the edge of sanity at TDCRC. He looks forward to you hiring him for ridiculous sums of money.

COMMENTSCommenting policy

comments powered by Disqus

Get the ClickZ Analytics newsletter delivered to you. Subscribe today!

COMMENTS

UPCOMING EVENTS

UPCOMING TRAINING

Featured White Papers

Google My Business Listings Demystified

Google My Business Listings Demystified
To help brands control how they appear online, Google has developed a new offering: Google My Business Locations. This whitepaper helps marketers understand how to use this powerful new tool.

5 Ways to Personalize Beyond the Subject Line

5 Ways to Personalize Beyond the Subject Line
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.

WEBINARS

    Information currently unavailable

Jobs

    • Lead Generation Specialist
      Lead Generation Specialist (The Oxford Club) - BaltimoreThe Oxford Club is seeking a talented writer/marketer to join our growing email lead-generation...
    • Health Marketing Editor
      Health Marketing Editor (Agora Inc.) - BaltimoreCome flex your intellectual muscle as part of Agora, Inc’s (http://agora-inc.com/) legal team...
    • Marketing Systems Analyst
      Marketing Systems Analyst (OmniVista Health) - BaltimoreOmniVista Health is looking to add a Marketing Systems Analyst to our expanding team. We...