K. Kamneva. Proceedings of the 8th International Command and Control Research, Vienna, VA, Evidence Based Research, (2003)
Abstract
Most commanders, politicians and intelligence agents have at least
an intuitive understanding of hierarchies and how to affect their
behavior. However, covert organizations, such as terrorist organizations,
have network structures that are distinct from those in typical
hierarchical organizations. In particular, they tend to be more
cellular and distributed. This makes it difficult to apply the lessons
of experience in determining how best to destabilize these groups.
This problem is further compounded by the vast quantities of, yet
incomplete, information. What is needed is a set of tools and an
approach to assessing destabilization strategies that takes these
difficulties in to account and provides analysts with guidance in
assessing destabilization tactics. Such an approach is forwarded
in this paper. In addition, initial lessons learned are discussed.
The particular approach is extensible and scales well to groups
composed of 1000’s of members.
%0 Conference Paper
%1 Kamneva2003
%A Kamneva, Kathleen M. Carley Matthew Dombroski Max Tsvetovat Jeffrey Reminga Natasha
%B Proceedings of the 8th International Command and Control Research
%C Vienna, VA
%D 2003
%K terrorism imported terror_interdiction CSS739
%T Destabilizing Dynamic Covert Networks
%X Most commanders, politicians and intelligence agents have at least
an intuitive understanding of hierarchies and how to affect their
behavior. However, covert organizations, such as terrorist organizations,
have network structures that are distinct from those in typical
hierarchical organizations. In particular, they tend to be more
cellular and distributed. This makes it difficult to apply the lessons
of experience in determining how best to destabilize these groups.
This problem is further compounded by the vast quantities of, yet
incomplete, information. What is needed is a set of tools and an
approach to assessing destabilization strategies that takes these
difficulties in to account and provides analysts with guidance in
assessing destabilization tactics. Such an approach is forwarded
in this paper. In addition, initial lessons learned are discussed.
The particular approach is extensible and scales well to groups
composed of 1000’s of members.
@inproceedings{Kamneva2003,
abstract = {Most commanders, politicians and intelligence agents have at least
an intuitive understanding of hierarchies and how to affect their
behavior. However, covert organizations, such as terrorist organizations,
have network structures that are distinct from those in typical
hierarchical organizations. In particular, they tend to be more
cellular and distributed. This makes it difficult to apply the lessons
of experience in determining how best to destabilize these groups.
This problem is further compounded by the vast quantities of, yet
incomplete, information. What is needed is a set of tools and an
approach to assessing destabilization strategies that takes these
difficulties in to account and provides analysts with guidance in
assessing destabilization tactics. Such an approach is forwarded
in this paper. In addition, initial lessons learned are discussed.
The particular approach is extensible and scales well to groups
composed of 1000’s of members.},
added-at = {2006-04-05T06:00:15.000+0200},
address = {Vienna, VA},
author = {Kamneva, Kathleen M. Carley Matthew Dombroski Max Tsvetovat Jeffrey Reminga Natasha},
biburl = {https://www.bibsonomy.org/bibtex/2dc816571b60279caf535ae15c72ce767/spwilcox},
booktitle = {Proceedings of the 8th International Command and Control Research},
institution = {Institute for Software Research International,},
interhash = {28163b85d92ff6d20aaddf0f43618e22},
intrahash = {dc816571b60279caf535ae15c72ce767},
keywords = {terrorism imported terror_interdiction CSS739},
organization = {Evidence Based Research},
owner = {Wilcox Steven P},
timestamp = {2006-04-05T06:00:15.000+0200},
title = {Destabilizing Dynamic Covert Networks},
year = 2003
}