Conspiracy Theories

by Brian Hayes

Published 10 August 2006

The new issue (September-October) of American Scientist is available on the Web, and subscribers to the ink-and-paper edition should receive copies soon. My “Computing Science” column is more topical than I would like, given today’s headlines. I examine some ideas from graph theory and social-networking studies that intelligence agencies may (or may not—who knows?) be using to detect terrorist conspiracies.

Tags for this article: modern life.

Publication history

First publication: 10 August 2006

Converted to Eleventy framework: 22 April 2025

More to read...

600613

Pick a number, N, then try searching for it on the web via Bing or Google (or maybe the leet version of Google).

My God, It’s Full of Dots!

Dots dapple the interior of a square. There’s always room for one more, but in the end the entire area is covered. To pull off this trick, it turns out you need to know something about zeta functions.

The Middle of the Square

The first random-number generator for a digital computer has long been held up as an example of what not to do. How bad was it?

737: The MAX Mess

By all appearances, the rogue behavior of the 737 MAX control system was triggered by a malfunction in a single sensor. That’s not supposed to happen in aviation.