SEARCH WITHIN CONTENT
Citation Information : Journal of Social Structure. Volume 12, Issue 1, Pages 1-32, DOI: https://doi.org/10.21307/joss-2019-030
License : (CC BY-NC 4.0)
Published Online: 13-January-2020
Our goal in this paper is to explore two generic approaches to disrupting dark networks: kinetic and nonkinetic. The kinetic approach involves aggressive and offensive measures to eliminate or capture network members and their supporters, while the non-kinetic approach involves the use of subtle, non-coercive means for combating dark networks. Two strategies derive from the kinetic approach: Targeting and Capacity-building. Four strategies derive from the non-kinetic approach: Institution-Building, Psychological Operations, Information Operations and Rehabilitation. We use network data from Noordin Top’s South East Asian terror network to illustrate how both kinetic and non-kinetic strategies could be pursued depending on a commander’s intent. Using this strategic framework as a backdrop, we strongly advise the use of SNA metrics in developing alterative counter-terrorism strategies that are contextdependent rather than letting SNA metrics define and drive a particular strategy.
Abuza, Z. (2003). Militant Islam in Southeast Asia: Crucible of Terror. Boulder, CO: Lynne Reinner Publishers.
Anonymous (2009). “Deception 2.0: Deceiving in the Netwar Age.” Unpublished Paper. Task Force Iron, Iraq.
Arreguin-Toft, I. (2001). “How the Weak Win Wars: A Theory of Asymmetric Conflict.” International Security 26, 1: 93-128.
Arreguin-Toft, I. (2005). How the Weak Win Wars: A Theory of Asymmetric Conflict. Cambridge, UK: Cambridge University Press.
Asal, V., & Rethemeyer, R. K. (2006). “Researching Terrorist Networks.” Journal of Security Education 1, 4: 65-74.
Asal, V., & Rethemeyer, R. K. (2008). “The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks.” The Journal of Politics 70, 2: 437-449.
Azarian, G. R. (2005). The General Sociology of Harrison C. White: Chaos and Order in Networks. New York: Palgrave Macmillan.
Baker, W. E., & Faulkner, R. R. (1993). The Social-Organization of Conspiracy: Illegal Networks in the Heavy Electrical-Equipment Industry. American Sociological Review 58, 6: 837-860.
Banlaoi, R. C. (2009). Counter Terrorism Measures in Southeast Asia: How Effective Are They? Manilla, Philippines: Yuchengco Center: De La Salle University.
Batagelj, V., & Mrvar, A. (2010). Pajek 1.27. Lubjlijana, Slovenia: University of Ljubljana.
Borgatti, S. P. (2006). “Identifying Sets of Key Players in a Social Network.” Computational, Mathematical and Organizational Theory 12: 21-34.
Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). “On the Robustness of Centrality Measures under Conditions of Imperfect Data.” Social Networks 28: 124-136.
Boucek, C. (2008a). “The Sakinah Campaign and Internet Counter-Radicalization in Saudi Arabia.” CTC Sentinel 1, 9: 1-4. Available: http://carnegieendowment.org/files/CTCSentinel_Vol1Iss9.pdf [January 5, 2011].
Boucek, C. (2008b). “Saudi Arabia’s ‘Soft’ Counterterrorism Strategy: Prevention, Rehabilitation, and Aftercare.” Carnegie Papers, No. 97. Available: http://carnegieendowment.org/files/cp97_boucek_saudi_final.pdf [January 5, 2011].
Breiger, R. L. (1975). “Dual and Multiple Networks of Social Structures: A Study of Affiliation and Interaction.” Unpublished Doctoral Dissertation, Harvard University, Boston.
Brimley, S., & Singh, V. (2008). “Stumbling into the Future? The Indirect Approach and American Strategy.” Orbis 52, 2: 312-331.
Cooper, H. (2009). “Dreaming of Splitting the Taliban.” The New York Times. Available: http://www.nytimes.com/2009/03/08/weekinreview/08COOPER.html?_r=1 [January 5, 2011].
Davis, L. E., & Sisson, M. W. (2009). A Strategic Planning Approach: Defining Alternative Counterterrorism Strategies as an Illustration. Santa Monica, CA: RAND Corporation.
de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge, UK: Cambridge University Press.
Diani, M., & McAdam, D. (Eds.). (2003). Social Movements and Networks: Relational Approaches to Collective Action. Oxford and New York: Oxford University Press.
Doreian, P., Batagelj, V., & Ferligoj, A. (2005). Generalized Blockmodeling. New York and Cambridge: Cambridge University Press.
Ettlinger, N., & Bosco, F. (2004). “Thinking through Networks and their Spatiality: A Critique of the U.S. (Public) War on Terrorism and its Geographic Discourse.” Antipode 36, 2: 249-271.
Everton, S. F. (Forthcoming). “Network Topography, Key Players and Terrorist Networks.” Connections.
Felter, J., & Fishman, B. (2007). “Al-Qa’ida’s Foreign Fighters in Iraq: A First Look at the Sinjar Records.” Available: http://www.ctc.usma.edu/harmony/pdf/CTCForeignFighter.19.Dec07.pdf [January 5, 2011].
Fink, N. C., & Hearne, E. B. (2008). “Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism.” Available: http://www.ipacademy.org/media/pdf/publications/beter.pdf [January 5, 2011].
Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington DC: Center for a New American Security.
Fridovich, D. P., & Krawchuk, F. T. (2007). “Special Operations Forces: Indirect Approach.” Joint Forces Quarterly 44, 1: 24-27.
Granovetter, M. (1973). “The Strength of Weak Ties.” American Journal of Sociology 73, 6: 13601380.
Horgan, J. (2009). Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. New York: Routledge.
International Crisis Group (2006). Terrorism in Indonesia: Noordin’s Networks (No. Asia Report #114). Brussels, Belgium: International Crisis Group.
International Crisis Group (2008). Indonesia: Jemaah Islamiyah’s Publishing Industry. Brussels, Belgium: International Crisis Group.
Jones, S. G., & Libicki, M. C. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Santa Monica, CA: RAND Corporation.
Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). “Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings.” Studies in Conflict & Terrorism 31: 17-21.
Keefe, P. (2006). “Can Network Theory Thwart Terrorists?” The New York Times. Available: http://www.nytimes.com/2006/03/12/magazine/312wwln_essay.html [January 5, 2011].
Krawchuk, F. T. (ND). “Winning the Global War on Terrorism in the Pacific Region: Special Operations Forces’ Indirect Approach to Success.” Available: http://igcc.ucsd.edu/research/security/DACOR/presentations/krawchuk.pdf [January 5, 2011].
Krebs, V. (2001). “Mapping Networks of Terrorist Cells.” Connections 24, 3: 43-52.
Lempert, R. J., Trujillo, H. R., Aaron, D., Dewar, J. A., Berry, S. H., & Popper, S. W. (2008). “Comparing Alternative U.S. Counterterrorism Strategies: Can Assumption-Based Planning Help Elevate the Debate?” Available :http://www.rand.org/pubs/documented_briefings/2008/RAND_DB548.pdf [January 5, 2011; large document].
Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Campbell Systematic Reviews 2006, 2: 51. Available: http://www.rutgerscps.org/publications/Lum_Terrorism_Review.pdf [January 5, 2011].
Lum, T., & Niksch, L. A. (2006; updated 2009). “The Republic of the Philippines: Background and U.S. Relations: Congressional Research Service Report to Congress.” Available: http://www.fas.org/sgp/crs/row/RL33233.pdf [January 5, 2011].
Magouirk, J., Atran, S., & Sageman, M. (2008). “Connecting Terrorist Networks.” Studies in Conflict & Terrorism 31: 1-16.
Marks, S., Meer, T., & Nilson, M. (2005). “Manhunting: A Methodology for Finding Persons of National Interest.” Unpublished Master of Science, Naval Postgraduate School, Monterey, CA.
McAdam, D. (1982). Political Process and the Development of Black Insurgency, 1930-1970. Chicago: University of Chicago Press.
McAdam, D. (1999). Political Process and the Development of Black Insurgency, 1930-1970 (2nd ed.). Chicago: University of Chicago Press.
McCarthy, J. D., & Zald, M. N. (1977). “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82, 6: 1212-1241.
Moody, J. (2005). Fighting a Hydra: A Note on the Network Embeddedness of the War on Terror. Structure and Dynamics 1, 2. Available: http://escholarship.org/uc/item/7x3881bs [January 5, 2011].
Moon, I.-C. (2008). “Destabilization of Adversarial Organizations with Strategic Interventions.” Unpublished Doctoral Thesis, Carnegie Mellon University, Pittsburgh, PA. Available: http://www.casos.cs.cmu.edu/publications/papers/CMU-ISR-08-124.pdf [January 5, 2011].
Mortenson, G., & Bryan, M. (2009). Stones into Schools: Promoting Peace with Books, Not Bombs, in Afghanistan and Pakistan. New York: Viking.
Mortenson, G., & Relin, D. O. (2006). Three Cups of Tea: One Man’s Mission to Fight Terrorism and Build Nations... One School at a Time. New York: Viking.
Pedahzur, A., & Perliger, A. (2006). “The Changing Nature of Suicide Attacks: A Social Network Perspective.” Social Forces 84, 4: 1987-2008.
Peter, T. A. (2008). “U.S. Begins Hunting Iraq’s Bombmakers, Not Just Bombs.” The Christian Science Monitor. Available: http://www.csmonitor.com/2008/0908/p04s01-wome.html [January 5, 2011].
Popielarz, P. A., & McPherson, J. M. (1995). “On the Edge or in Between: Niche Position, Niche Overlap, and the Duration of Voluntary Association Memberships.” American Journal of Sociology 101, 3: 698-720.
Raab, J., & Milward, H. B. (2003). “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13, 4: 413-439.
Rabasa, A. (2005). “Islamic Education in Southeast Asia.” In H. Fradkin, H. Haqqani & E. Brown (Eds.), Current Trends in Islamist Ideology (pp. 97-108). Washington, D.C.: Hudson Institute.
Ramakrishna, K. (2005). “Delegitimizing Global Jihadi Ideology in Southeast Asia.” Contemporary Southeast Asia 27, 3: 343-369.
Rodriguez, J. A. (2005). The March 11th Terrorist Network: In Its Weakness Lies Its Strength. Barcelona, Spain: Departament de Sociologia i Anàlisi de les Organitzacions: Universitat de Barcelona.
Sageman, M. (2004). Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.
Schmitt, E., & Perlez, J. (2009). “Strikes Worsen Qaeda Threat, Pakistan Says.” The New York Times. Available: http://www.nytimes.com/2009/02/25/world/asia/25drones.html?scp=1&sq=Schmitt%20and%20Pe rlez,%202009&st=cse [January 5, 2011].
Simmel, G. ([1908, 1922] 1955). Conflict & The Web of Group-Affiliations (K. H. Wolff & R. Bendix, Trans.). New York: The Free Press.
Smith, C. S. (1991). The Emergence of Liberation Theology: Radical Religion and Social Movement Theory. Chicago: University of Chicago Press.
Smith, C. S. (1996). Resisting Reagan: The U.S. Central America Peace Movement. Chicago: The University of Chicago Press.
Sparrow, M. K. (1991). “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects.” Social Networks 13: 251-274.
Stark, R., & Bainbridge, W. S. (1980). “Networks of Faith: Interpersonal Bonds and Recruitment to Cults and Sects.” American Journal of Sociology 85, 6: 1376-1395.
Tsvetovat, M., & Carley, K. M. (2005). “Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence.” Journal of Social Structure 6, 2. Available: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/index.html [January 5, 2011].
U.S. Army (2007). U.S. Army/Marine Counterinsurgency Field Manual (FM 3-24). Old Saybrook, CT: Konecky & Konecky.
U.S. Director of Operations (2006). Information Operations: Joint Publication 3-13. Available: http://www.fas.org/irp/doddir/dod/jp3_13.pdf [January 5, 2011].
U.S. Special Operations Command (2003). Doctrine for Joint Psychological Operations: Joint Publication 3-53. Available: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/02_psyop-jp-353.pdf [January 5, 2011].
van Meter, K. M. (2001). “Terrorists/Liberators: Researching and Dealing with Adversary Social Networks.” Connections 3: 66-78.
White, H. C. (2008). Identity and Control: How Social Formations Emerge (2nd ed.). Princeton, NJ: Princeton University Press.
Wikipedia (2010). “Noordin Mohammed Top.” Available: http://en.wikipedia.org/wiki/Noordin_Mohammad_Top [January 5, 2011].
Wiktorowicz, Q. (2004). “Introduction: Islamic Activism and Social Movement Theory.” In Q. Wiktorowicz (Ed.), Islamic Activism: A Social Movement Theory Approach (pp. 1-33). Bloomington: Indiana University Press.
Wilson, G. (2006). “Anatomy of a Successful COIN Operation: OEF-Philippines and the Indirect Approach.” Military Review (November-December): 2-12. Available: http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_2008CRII0831_art 009.pdf [January 5, 2011].