Strategies for Combating Dark Networks

Publications

Share / Export Citation / Email / Print / Text size:

Journal of Social Structure

International Network for Social Network Analysis

Subject: Social Sciences

GET ALERTS

eISSN: 1529-1227

DESCRIPTION

0
Reader(s)
0
Visit(s)
0
Comment(s)
0
Share(s)

SEARCH WITHIN CONTENT

FIND ARTICLE

Volume / Issue / page

Archive
Volume 21 (2020)
Volume 20 (2019)
Volume 19 (2018)
Volume 18 (2017)
Volume 17 (2016)
Volume 16 (2015)
Volume 15 (2014)
Volume 14 (2013)
Volume 13 (2012)
Volume 12 (2011)
Volume 11 (2010)
Volume 10 (2009)
Related articles

VOLUME 12 , ISSUE 1 (December 2011) > List of articles

Strategies for Combating Dark Networks

Nancy Roberts / Sean F. Everton

Keywords : Dark networks, counter-terrorism, counter-insurgency, strategy

Citation Information : Journal of Social Structure. Volume 12, Issue 1, Pages 1-32, DOI: https://doi.org/10.21307/joss-2019-030

License : (CC BY-NC 4.0)

Published Online: 13-January-2020

ARTICLE

ABSTRACT

Our goal in this paper is to explore two generic approaches to disrupting dark networks: kinetic and nonkinetic. The kinetic approach involves aggressive and offensive measures to eliminate or capture network members and their supporters, while the non-kinetic approach involves the use of subtle, non-coercive means for combating dark networks. Two strategies derive from the kinetic approach: Targeting and Capacity-building. Four strategies derive from the non-kinetic approach: Institution-Building, Psychological Operations, Information Operations and Rehabilitation. We use network data from Noordin Top’s South East Asian terror network to illustrate how both kinetic and non-kinetic strategies could be pursued depending on a commander’s intent. Using this strategic framework as a backdrop, we strongly advise the use of SNA metrics in developing alterative counter-terrorism strategies that are contextdependent rather than letting SNA metrics define and drive a particular strategy.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

Abuza, Z. (2003). Militant Islam in Southeast Asia: Crucible of Terror. Boulder, CO: Lynne Reinner Publishers.

Anonymous (2009). “Deception 2.0: Deceiving in the Netwar Age.” Unpublished Paper. Task Force Iron, Iraq.

Arreguin-Toft, I. (2001). “How the Weak Win Wars: A Theory of Asymmetric Conflict.” International Security 26, 1: 93-128.

Arreguin-Toft, I. (2005). How the Weak Win Wars: A Theory of Asymmetric Conflict. Cambridge, UK: Cambridge University Press.

Asal, V., & Rethemeyer, R. K. (2006). “Researching Terrorist Networks.” Journal of Security Education 1, 4: 65-74.

Asal, V., & Rethemeyer, R. K. (2008). “The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks.” The Journal of Politics 70, 2: 437-449.

Azarian, G. R. (2005). The General Sociology of Harrison C. White: Chaos and Order in Networks. New York: Palgrave Macmillan.

Baker, W. E., & Faulkner, R. R. (1993). The Social-Organization of Conspiracy: Illegal Networks in the Heavy Electrical-Equipment Industry. American Sociological Review 58, 6: 837-860.

Banlaoi, R. C. (2009). Counter Terrorism Measures in Southeast Asia: How Effective Are They? Manilla, Philippines: Yuchengco Center: De La Salle University.

Batagelj, V., & Mrvar, A. (2010). Pajek 1.27. Lubjlijana, Slovenia: University of Ljubljana.

Borgatti, S. P. (2006). “Identifying Sets of Key Players in a Social Network.” Computational, Mathematical and Organizational Theory 12: 21-34.

Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). “On the Robustness of Centrality Measures under Conditions of Imperfect Data.” Social Networks 28: 124-136.

Boucek, C. (2008a). “The Sakinah Campaign and Internet Counter-Radicalization in Saudi Arabia.” CTC Sentinel 1, 9: 1-4. Available: http://carnegieendowment.org/files/CTCSentinel_Vol1Iss9.pdf [January 5, 2011].

Boucek, C. (2008b). “Saudi Arabia’s ‘Soft’ Counterterrorism Strategy: Prevention, Rehabilitation, and Aftercare.” Carnegie Papers, No. 97. Available: http://carnegieendowment.org/files/cp97_boucek_saudi_final.pdf [January 5, 2011].

Breiger, R. L. (1975). “Dual and Multiple Networks of Social Structures: A Study of Affiliation and Interaction.” Unpublished Doctoral Dissertation, Harvard University, Boston.

Brimley, S., & Singh, V. (2008). “Stumbling into the Future? The Indirect Approach and American Strategy.” Orbis 52, 2: 312-331.

Cooper, H. (2009). “Dreaming of Splitting the Taliban.” The New York Times. Available: http://www.nytimes.com/2009/03/08/weekinreview/08COOPER.html?_r=1 [January 5, 2011].

Davis, L. E., & Sisson, M. W. (2009). A Strategic Planning Approach: Defining Alternative Counterterrorism Strategies as an Illustration. Santa Monica, CA: RAND Corporation.

de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge, UK: Cambridge University Press.

Diani, M., & McAdam, D. (Eds.). (2003). Social Movements and Networks: Relational Approaches to Collective Action. Oxford and New York: Oxford University Press.

Doreian, P., Batagelj, V., & Ferligoj, A. (2005). Generalized Blockmodeling. New York and Cambridge: Cambridge University Press.

Ettlinger, N., & Bosco, F. (2004). “Thinking through Networks and their Spatiality: A Critique of the U.S. (Public) War on Terrorism and its Geographic Discourse.” Antipode 36, 2: 249-271.

Everton, S. F. (Forthcoming). “Network Topography, Key Players and Terrorist Networks.” Connections.

Felter, J., & Fishman, B. (2007). “Al-Qa’ida’s Foreign Fighters in Iraq: A First Look at the Sinjar Records.” Available: http://www.ctc.usma.edu/harmony/pdf/CTCForeignFighter.19.Dec07.pdf [January 5, 2011].

Fink, N. C., & Hearne, E. B. (2008). “Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism.” Available: http://www.ipacademy.org/media/pdf/publications/beter.pdf [January 5, 2011].

Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington DC: Center for a New American Security.

Fridovich, D. P., & Krawchuk, F. T. (2007). “Special Operations Forces: Indirect Approach.” Joint Forces Quarterly 44, 1: 24-27.

Granovetter, M. (1973). “The Strength of Weak Ties.” American Journal of Sociology 73, 6: 13601380.

Horgan, J. (2009). Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. New York: Routledge.

International Crisis Group (2006). Terrorism in Indonesia: Noordin’s Networks (No. Asia Report #114). Brussels, Belgium: International Crisis Group.

International Crisis Group (2008). Indonesia: Jemaah Islamiyah’s Publishing Industry. Brussels, Belgium: International Crisis Group.

Jones, S. G., & Libicki, M. C. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Santa Monica, CA: RAND Corporation.

Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). “Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings.” Studies in Conflict & Terrorism 31: 17-21.

Keefe, P. (2006). “Can Network Theory Thwart Terrorists?” The New York Times. Available: http://www.nytimes.com/2006/03/12/magazine/312wwln_essay.html [January 5, 2011].

Krawchuk, F. T. (ND). “Winning the Global War on Terrorism in the Pacific Region: Special Operations Forces’ Indirect Approach to Success.” Available: http://igcc.ucsd.edu/research/security/DACOR/presentations/krawchuk.pdf [January 5, 2011].

Krebs, V. (2001). “Mapping Networks of Terrorist Cells.” Connections 24, 3: 43-52.

Lempert, R. J., Trujillo, H. R., Aaron, D., Dewar, J. A., Berry, S. H., & Popper, S. W. (2008). “Comparing Alternative U.S. Counterterrorism Strategies: Can Assumption-Based Planning Help Elevate the Debate?” Available :http://www.rand.org/pubs/documented_briefings/2008/RAND_DB548.pdf [January 5, 2011; large document]. 

Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Campbell Systematic Reviews 2006, 2: 51. Available: http://www.rutgerscps.org/publications/Lum_Terrorism_Review.pdf [January 5, 2011]. 

Lum, T., & Niksch, L. A. (2006; updated 2009). “The Republic of the Philippines: Background and U.S. Relations: Congressional Research Service Report to Congress.” Available: http://www.fas.org/sgp/crs/row/RL33233.pdf [January 5, 2011].

Magouirk, J., Atran, S., & Sageman, M. (2008). “Connecting Terrorist Networks.” Studies in Conflict & Terrorism 31: 1-16.

Marks, S., Meer, T., & Nilson, M. (2005). “Manhunting: A Methodology for Finding Persons of National Interest.” Unpublished Master of Science, Naval Postgraduate School, Monterey, CA.

McAdam, D. (1982). Political Process and the Development of Black Insurgency, 1930-1970. Chicago: University of Chicago Press.

McAdam, D. (1999). Political Process and the Development of Black Insurgency, 1930-1970 (2nd ed.). Chicago: University of Chicago Press.

McCarthy, J. D., & Zald, M. N. (1977). “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82, 6: 1212-1241.

Moody, J. (2005). Fighting a Hydra: A Note on the Network Embeddedness of the War on Terror. Structure and Dynamics 1, 2. Available: http://escholarship.org/uc/item/7x3881bs [January 5, 2011].

Moon, I.-C. (2008). “Destabilization of Adversarial Organizations with Strategic Interventions.” Unpublished Doctoral Thesis, Carnegie Mellon University, Pittsburgh, PA. Available: http://www.casos.cs.cmu.edu/publications/papers/CMU-ISR-08-124.pdf [January 5, 2011].

Mortenson, G., & Bryan, M. (2009). Stones into Schools: Promoting Peace with Books, Not Bombs, in Afghanistan and Pakistan. New York: Viking.

Mortenson, G., & Relin, D. O. (2006). Three Cups of Tea: One Man’s Mission to Fight Terrorism and Build Nations... One School at a Time. New York: Viking.

Pedahzur, A., & Perliger, A. (2006). “The Changing Nature of Suicide Attacks: A Social Network Perspective.” Social Forces 84, 4: 1987-2008.

Peter, T. A. (2008). “U.S. Begins Hunting Iraq’s Bombmakers, Not Just Bombs.” The Christian Science Monitor. Available: http://www.csmonitor.com/2008/0908/p04s01-wome.html [January 5, 2011].

Popielarz, P. A., & McPherson, J. M. (1995). “On the Edge or in Between: Niche Position, Niche Overlap, and the Duration of Voluntary Association Memberships.” American Journal of Sociology 101, 3: 698-720.

Raab, J., & Milward, H. B. (2003). “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13, 4: 413-439.

Rabasa, A. (2005). “Islamic Education in Southeast Asia.” In H. Fradkin, H. Haqqani & E. Brown (Eds.), Current Trends in Islamist Ideology (pp. 97-108). Washington, D.C.: Hudson Institute.

Ramakrishna, K. (2005). “Delegitimizing Global Jihadi Ideology in Southeast Asia.” Contemporary Southeast Asia 27, 3: 343-369.

Rodriguez, J. A. (2005). The March 11th Terrorist Network: In Its Weakness Lies Its Strength. Barcelona, Spain: Departament de Sociologia i Anàlisi de les Organitzacions: Universitat de Barcelona.

Sageman, M. (2004). Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.

Schmitt, E., & Perlez, J. (2009). “Strikes Worsen Qaeda Threat, Pakistan Says.” The New York Times. Available: http://www.nytimes.com/2009/02/25/world/asia/25drones.html?scp=1&sq=Schmitt%20and%20Pe rlez,%202009&st=cse [January 5, 2011].

Simmel, G. ([1908, 1922] 1955). Conflict & The Web of Group-Affiliations (K. H. Wolff & R. Bendix, Trans.). New York: The Free Press.

Smith, C. S. (1991). The Emergence of Liberation Theology: Radical Religion and Social Movement Theory. Chicago: University of Chicago Press.

Smith, C. S. (1996). Resisting Reagan: The U.S. Central America Peace Movement. Chicago: The University of Chicago Press.

Sparrow, M. K. (1991). “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects.” Social Networks 13: 251-274.

Stark, R., & Bainbridge, W. S. (1980). “Networks of Faith: Interpersonal Bonds and Recruitment to Cults and Sects.” American Journal of Sociology 85, 6: 1376-1395.

Tsvetovat, M., & Carley, K. M. (2005). “Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence.” Journal of Social Structure 6, 2. Available: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/index.html [January 5, 2011].

U.S. Army (2007). U.S. Army/Marine Counterinsurgency Field Manual (FM 3-24). Old Saybrook, CT: Konecky & Konecky.

U.S. Director of Operations (2006). Information Operations: Joint Publication 3-13. Available: http://www.fas.org/irp/doddir/dod/jp3_13.pdf [January 5, 2011]. 

U.S. Special Operations Command (2003). Doctrine for Joint Psychological Operations: Joint Publication 3-53. Available: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/02_psyop-jp-353.pdf [January 5, 2011]. 

van Meter, K. M. (2001). “Terrorists/Liberators: Researching and Dealing with Adversary Social Networks.” Connections 3: 66-78.

White, H. C. (2008). Identity and Control: How Social Formations Emerge (2nd ed.). Princeton, NJ: Princeton University Press.

Wikipedia (2010). “Noordin Mohammed Top.” Available: http://en.wikipedia.org/wiki/Noordin_Mohammad_Top [January 5, 2011].

Wiktorowicz, Q. (2004). “Introduction: Islamic Activism and Social Movement Theory.” In Q. Wiktorowicz (Ed.), Islamic Activism: A Social Movement Theory Approach (pp. 1-33). Bloomington: Indiana University Press.

Wilson, G. (2006). “Anatomy of a Successful COIN Operation: OEF-Philippines and the Indirect Approach.” Military Review (November-December): 2-12. Available: http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_2008CRII0831_art 009.pdf [January 5, 2011].

EXTRA FILES

COMMENTS