Intelligence collection, targeting and interdiction of dark networks

Approved for public release; distribution is unlimited === To interdict dark networks and prevent terrorist attacks, security forces require consistent access to relevant intelligence and targeting data. Dark networks often react to a security force’s targeting pressure by obscuring their activities...

Full description

Bibliographic Details
Main Author: Tangeman, Darrin K.
Other Authors: Everton, Sean
Published: Monterey, California: Naval Postgraduate School 2014
Online Access:http://hdl.handle.net/10945/42736
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-42736
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-427362014-11-27T16:19:56Z Intelligence collection, targeting and interdiction of dark networks Tangeman, Darrin K. Everton, Sean Schroeder, Robert Defense Analysis Approved for public release; distribution is unlimited To interdict dark networks and prevent terrorist attacks, security forces require consistent access to relevant intelligence and targeting data. Dark networks often react to a security force’s targeting pressure by obscuring their activities and becoming increasingly covert. Network adaptation to targeting pressure can frequently lead to intelligence gaps and lulls in targeting that may be both predictable and preventable if identified early. This study will examine the efficacy of the two prevailing modes of targeting and their impact on resilient dark networks. To achieve this goal, this thesis will conduct a multivariate path analysis using temporal, geospatial, and relational data of a select dark network as these two modes of intelligence collection and targeting are employed against the network over time. By achieving this goal, this thesis will generate policy recommendations for operationalizing the outcomes of this study in order to better formulate how the prevailing modes of targeting can more effectively be implemented to address adaptive terrorist threats. 2014-08-13T20:18:01Z 2014-08-13T20:18:01Z 2014-06 Thesis http://hdl.handle.net/10945/42736 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited === To interdict dark networks and prevent terrorist attacks, security forces require consistent access to relevant intelligence and targeting data. Dark networks often react to a security force’s targeting pressure by obscuring their activities and becoming increasingly covert. Network adaptation to targeting pressure can frequently lead to intelligence gaps and lulls in targeting that may be both predictable and preventable if identified early. This study will examine the efficacy of the two prevailing modes of targeting and their impact on resilient dark networks. To achieve this goal, this thesis will conduct a multivariate path analysis using temporal, geospatial, and relational data of a select dark network as these two modes of intelligence collection and targeting are employed against the network over time. By achieving this goal, this thesis will generate policy recommendations for operationalizing the outcomes of this study in order to better formulate how the prevailing modes of targeting can more effectively be implemented to address adaptive terrorist threats.
author2 Everton, Sean
author_facet Everton, Sean
Tangeman, Darrin K.
author Tangeman, Darrin K.
spellingShingle Tangeman, Darrin K.
Intelligence collection, targeting and interdiction of dark networks
author_sort Tangeman, Darrin K.
title Intelligence collection, targeting and interdiction of dark networks
title_short Intelligence collection, targeting and interdiction of dark networks
title_full Intelligence collection, targeting and interdiction of dark networks
title_fullStr Intelligence collection, targeting and interdiction of dark networks
title_full_unstemmed Intelligence collection, targeting and interdiction of dark networks
title_sort intelligence collection, targeting and interdiction of dark networks
publisher Monterey, California: Naval Postgraduate School
publishDate 2014
url http://hdl.handle.net/10945/42736
work_keys_str_mv AT tangemandarrink intelligencecollectiontargetingandinterdictionofdarknetworks
_version_ 1716726069795487744