Improving nonlethal targeting: a social network analysis method for military planners
Brown, Jason C.
MetadataShow full item record
Nonlethal strategies are an essential part in the military targeting process to defeat and disrupt terrorist and insurgent networks. The majority of nonlethal options of military power come through Information Operations, including the use of deception. This thesis explores how a deception plan against a terrorist network can be informed and prepared using social network analysis methods. Selecting targets that fragment the network becomes the object of the deception, whereas the actual targets of deception are individuals who are connected to these fragmentation nodes. A simulation of how information diffuses through the network helps identify how rapidly and how far a misinformation message might spread. Social network analysis also shows where intelligence collection might be incorporated to provide feedback about the success of message dissemination and the deception effort.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ...
Monroe, James D. (Monterey, California. Naval Postgraduate School, 2012-06);This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a ...
West, Austin (Monterey, California: Naval Postgraduate School, 2015-03);Every day, adversaries bombard Department of Defense computer networks with scanning traffic in order to gather information about the target network. This reconnaissance is typically a precursor to attacks designed to ...