FIGHTING DARK NETWORKS: USING SOCIAL NETWORK ANALYSIS TO IMPLEMENT THE SPECIAL OPERATIONS TARGETING PROCESS FOR DIRECT AND INDIRECT APPROACHES
dc.contributor.advisor | Everton, Sean F. | |
dc.contributor.advisor | Denning, Dorothy E. | |
dc.contributor.author | Erlacher, Matthew D. | |
dc.date | Mar-13 | |
dc.date.accessioned | 2013-05-08T20:41:48Z | |
dc.date.available | 2013-05-08T20:41:48Z | |
dc.date.issued | 2013-03 | |
dc.identifier.uri | http://hdl.handle.net/10945/32815 | |
dc.description.abstract | Since the September 11, 2001, terrorist attacks, the United States military has been engaged against transnational networks, a domain for which many of its processes were not designed and are not well-suited. A significant part of the militarys struggle of the last decade of war has been a lack of a framework for understanding and measuring changes in social networks, especially insurgent or terrorist networks known as dark networks. This thesis puts forth an experimental framework called the Special Operations Network Analysis Process, or SONAP, to solve that problem. SONAP combines the CARVER target analysis method with Social Network Analysis and a systems framework for identifying and bounding social mechanisms that support dark networks, as well as a means for identifying and evaluating changes in networks. This framework is then applied to a 2006 open-source data set of an Indonesian terrorist network. The result is a demonstrated utility in not only understanding the structure of that dark network, but also in designing an intervention strategy, along with means to measure structural and operational changes in that network. | en_US |
dc.description.uri | http://archive.org/details/fightingdarknetw1094532815 | |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.title | FIGHTING DARK NETWORKS: USING SOCIAL NETWORK ANALYSIS TO IMPLEMENT THE SPECIAL OPERATIONS TARGETING PROCESS FOR DIRECT AND INDIRECT APPROACHES | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Defense Analysis (DA) | |
dc.subject.author | social network analysis | en_US |
dc.subject.author | dark networks | en_US |
dc.subject.author | special operations | en_US |
dc.subject.author | irregular warfare | en_US |
dc.subject.author | targeting | en_US |
dc.subject.author | direct approach | en_US |
dc.subject.author | indirect approach | en_US |
dc.subject.author | terrorism | en_US |
dc.subject.author | counterterrorism | en_US |
dc.subject.author | counterinsurgency | en_US |
dc.subject.author | pseudo operations | en_US |
dc.subject.author | effects-based operations | en_US |
dc.subject.author | effects-based thinking | en_US |
dc.subject.author | systems thinking | en_US |
dc.subject.author | social systems | en_US |
dc.description.service | Major, United States Army | en_US |
etd.thesisdegree.name | Master Of Science In Defense Analysis | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Defense Analysis | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.