Improving nonlethal targeting: a social network analysis method for military planners
Download
Author
Brown, Jason C.
Date
2018-12Advisor
Roberts, Nancy
Everton, Sean
Metadata
Show full item recordAbstract
Nonlethal strategies are an essential part in the military targeting process to defeat and disrupt terrorist and insurgent networks. The majority of nonlethal options of military power come through Information Operations, including the use of deception. This thesis explores how a deception plan against a terrorist network can be informed and prepared using social network analysis methods. Selecting targets that fragment the network becomes the object of the deception, whereas the actual targets of deception are individuals who are connected to these fragmentation nodes. A simulation of how information diffuses through the network helps identify how rapidly and how far a misinformation message might spread. Social network analysis also shows where intelligence collection might be incorporated to provide feedback about the success of message dissemination and the deception effort.
Description
Outstanding Thesis
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
A Technique for Presenting a Deceptive Dynamic Network Topology
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ... -
Deception: Theory and Practice
Monroe, James D. (Monterey, California. Naval Postgraduate School, 2012-06);This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a ... -
Toward a robust method of presenting a rich, interconnected deceptive network topology
West, Austin (Monterey, California: Naval Postgraduate School, 2015-03);Every day, adversaries bombard Department of Defense computer networks with scanning traffic in order to gather information about the target network. This reconnaissance is typically a precursor to attacks designed to ...