Disrupting cocaine trafficking networks: interdicting a combined social-functional network model
Author
Santos, Christopher P.
Date
2016-03Advisor
Carlyle, W. Matthew
Ewing, P. Lee
Second Reader
Atkinson, Michael P.
Metadata
Show full item recordAbstract
The U.S. military has supported U.S. law enforcement in counter drug-trafficking efforts since the 1980s; the interagency counterdrug approach developed during that period—and still used today—focuses primarily on interdiction of cocaine conveyances in transit from South America to Central America. Increasing violence in the countries through which the cocaine transits is evidence that this approach is not working. Furthermore, the U.S. rebalance toward Asia and a worsening shortfall of interdiction assets signal a new strategic and operational environment that requires a counter threat network (CTN) approach. Instead of simply attacking a functional trafficking network, as does an interdiction-focused strategy, we combine traditional Operations Research (OR) maximum flow and attacker-defender problems with social network analysis to directly interdict the traffickers’ social-management network (and the resources it provides) in order to obtain indirect—yet potentially more effective—disruptions of the functional network. The Drug Trafficking Organization Social-Functional Network Interdiction (DTOSFNI) model described herein can be used to provide insight in order to combat the numerous trafficking organizations in a coherent manner—rather than relying upon independent, often isolated, investigations—and inform development of the Organized Crime Drug Enforcement Task Forces (OCDETF) Consolidated Priority Organization Target (CPOT) list and its associated investigations.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
System interdiction and defense
Israeli, Eitan (Monterey, California. Naval Postgraduate School, 1999-03);We study the problem of interdicting components of an adversary's system, e.g., a war-time economy, a transportation network, etc. Basic techniques are developed and illustrated with a simple network interdiction problem, ... -
Computational methods for deterministic and stochastic network interdiction problems
Cormican, Kelly James (Monterey, California. Naval Postgraduate School, 1995-03);Using limited resources, a network interdictor attempts to disable components of a capacitated network with the objective of minimizing the maximum network flow achievable by the network user. This problem has applications ... -
RUNTIME ANALYSIS OF BENDERS DECOMPOSITION AND DUAL ILP ALGORITHMS AS APPLIED TO COMMON NETWORK INTERDICTION PROBLEMS
Trask, Timothy S., Jr. (Monterey, CA; Naval Postgraduate School, 2022-06);Attacker-defender models help practitioners understand a network’s resistance to attack. An assailant interdicts a network, and the operator responds in such a way as to optimally utilize the degraded network. This thesis ...