Intelligence collection, targeting and interdiction of dark networks
Tangeman, Darrin K.
MetadataShow full item record
To interdict dark networks and prevent terrorist attacks, security forces require consistent access to relevant intelligence and targeting data. Dark networks often react to a security force’s targeting pressure by obscuring their activities and becoming increasingly covert. Network adaptation to targeting pressure can frequently lead to intelligence gaps and lulls in targeting that may be both predictable and preventable if identified early. This study will examine the efficacy of the two prevailing modes of targeting and their impact on resilient dark networks. To achieve this goal, this thesis will conduct a multivariate path analysis using temporal, geospatial, and relational data of a select dark network as these two modes of intelligence collection and targeting are employed against the network over time. By achieving this goal, this thesis will generate policy recommendations for operationalizing the outcomes of this study in order to better formulate how the prevailing modes of targeting can more effectively be implemented to address adaptive terrorist threats.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Spinello, Michael J.; Mahoney, Justin R. (Monterey, California. Naval Postgraduate School, 2008-12);In this thesis, we examine the role of intelligence in the cycle of contention between the state and emergent insurgent movements within the context of violent contentious politics. This thesis explores the implications ...
Belding, Andrew R. (Monterey, California: Naval Postgraduate School, 2017-03);The effective distribution of offensive weapon capabilities to naval units at the tactical edge is a critical focus for Navy leaders. A direct byproduct of this priority is the need to employ sensor and data collection ...
Zhao, Ying; Kendall, Walter; Young, Bonnie; Germershauser, Zachary (Monterey, California. Naval Postgraduate School, 2015);The amount of data generated by intelligence, surveillance, and reconnaissance (ISR) sensors has become an overwhelming challenge for decision makers involved in CID and the CTAP environment that Big Data architecture and ...