Targeting Social Network Analysis in Counter IED Operations
Approved for public release; distribution is unlimited. === The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organ...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/5703 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-5703 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-57032015-08-06T16:02:40Z Targeting Social Network Analysis in Counter IED Operations Giles-Summers, Brandon. Gregg, Heather Everton, Sean Naval Postgraduate School (U.S.). Defense Analysis Approved for public release; distribution is unlimited. The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organization (JIEDDO) has spent billions of dollars to execute its operational mandate: defeat the device, attack the network, and train the force. JIEDDO has excelled in training the force and defeating the device, but lagged behind in providing necessary information to facilitate attack-the-network operations. To facilitate AtN operations, JIEDDO created a Counter-IED Operation Integration Center (COIC), which provides analysis, but utilizes metrics that are not necessarily intuitive. Rather than metrics, what commanders need is a clear understanding of what attack the network means in order to create lines of operations that undermine networks that use IEDs. The goal of this thesis, therefore, is to define attack-the-network, introduce social network analysis, provide a focused discussion on how to apply social relational information to operations, determine a targeted person's relevance, provide operational commanders with a basic matrix to gain perspective on social interactions of network members, and offer case studies illuminating the difficulties inherent in network targeting. 2012-03-14T17:46:28Z 2012-03-14T17:46:28Z 2011-06 Thesis http://hdl.handle.net/10945/5703 743229300 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited. === The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organization (JIEDDO) has spent billions of dollars to execute its operational mandate: defeat the device, attack the network, and train the force. JIEDDO has excelled in training the force and defeating the device, but lagged behind in providing necessary information to facilitate attack-the-network operations. To facilitate AtN operations, JIEDDO created a Counter-IED Operation Integration Center (COIC), which provides analysis, but utilizes metrics that are not necessarily intuitive. Rather than metrics, what commanders need is a clear understanding of what attack the network means in order to create lines of operations that undermine networks that use IEDs. The goal of this thesis, therefore, is to define attack-the-network, introduce social network analysis, provide a focused discussion on how to apply social relational information to operations, determine a targeted person's relevance, provide operational commanders with a basic matrix to gain perspective on social interactions of network members, and offer case studies illuminating the difficulties inherent in network targeting. |
author2 |
Gregg, Heather |
author_facet |
Gregg, Heather Giles-Summers, Brandon. |
author |
Giles-Summers, Brandon. |
spellingShingle |
Giles-Summers, Brandon. Targeting Social Network Analysis in Counter IED Operations |
author_sort |
Giles-Summers, Brandon. |
title |
Targeting Social Network Analysis in Counter IED Operations |
title_short |
Targeting Social Network Analysis in Counter IED Operations |
title_full |
Targeting Social Network Analysis in Counter IED Operations |
title_fullStr |
Targeting Social Network Analysis in Counter IED Operations |
title_full_unstemmed |
Targeting Social Network Analysis in Counter IED Operations |
title_sort |
targeting social network analysis in counter ied operations |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/5703 |
work_keys_str_mv |
AT gilessummersbrandon targetingsocialnetworkanalysisincounteriedoperations |
_version_ |
1716816447169101824 |