Targeting Social Network Analysis in Counter IED Operations

Approved for public release; distribution is unlimited. === The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organ...

Full description

Bibliographic Details
Main Author: Giles-Summers, Brandon.
Other Authors: Gregg, Heather
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/5703
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-5703
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-57032015-08-06T16:02:40Z Targeting Social Network Analysis in Counter IED Operations Giles-Summers, Brandon. Gregg, Heather Everton, Sean Naval Postgraduate School (U.S.). Defense Analysis Approved for public release; distribution is unlimited. The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organization (JIEDDO) has spent billions of dollars to execute its operational mandate: defeat the device, attack the network, and train the force. JIEDDO has excelled in training the force and defeating the device, but lagged behind in providing necessary information to facilitate attack-the-network operations. To facilitate AtN operations, JIEDDO created a Counter-IED Operation Integration Center (COIC), which provides analysis, but utilizes metrics that are not necessarily intuitive. Rather than metrics, what commanders need is a clear understanding of what attack the network means in order to create lines of operations that undermine networks that use IEDs. The goal of this thesis, therefore, is to define attack-the-network, introduce social network analysis, provide a focused discussion on how to apply social relational information to operations, determine a targeted person's relevance, provide operational commanders with a basic matrix to gain perspective on social interactions of network members, and offer case studies illuminating the difficulties inherent in network targeting. 2012-03-14T17:46:28Z 2012-03-14T17:46:28Z 2011-06 Thesis http://hdl.handle.net/10945/5703 743229300 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited. === The purpose of this research is to provide insights to Commanders in the field for attack-the-network (AtN) operations in the fight against Improved Explosive Devices (IED). Established in 2006, the Improved Explosive Devices Defeat Organization (JIEDDO) has spent billions of dollars to execute its operational mandate: defeat the device, attack the network, and train the force. JIEDDO has excelled in training the force and defeating the device, but lagged behind in providing necessary information to facilitate attack-the-network operations. To facilitate AtN operations, JIEDDO created a Counter-IED Operation Integration Center (COIC), which provides analysis, but utilizes metrics that are not necessarily intuitive. Rather than metrics, what commanders need is a clear understanding of what attack the network means in order to create lines of operations that undermine networks that use IEDs. The goal of this thesis, therefore, is to define attack-the-network, introduce social network analysis, provide a focused discussion on how to apply social relational information to operations, determine a targeted person's relevance, provide operational commanders with a basic matrix to gain perspective on social interactions of network members, and offer case studies illuminating the difficulties inherent in network targeting.
author2 Gregg, Heather
author_facet Gregg, Heather
Giles-Summers, Brandon.
author Giles-Summers, Brandon.
spellingShingle Giles-Summers, Brandon.
Targeting Social Network Analysis in Counter IED Operations
author_sort Giles-Summers, Brandon.
title Targeting Social Network Analysis in Counter IED Operations
title_short Targeting Social Network Analysis in Counter IED Operations
title_full Targeting Social Network Analysis in Counter IED Operations
title_fullStr Targeting Social Network Analysis in Counter IED Operations
title_full_unstemmed Targeting Social Network Analysis in Counter IED Operations
title_sort targeting social network analysis in counter ied operations
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/5703
work_keys_str_mv AT gilessummersbrandon targetingsocialnetworkanalysisincounteriedoperations
_version_ 1716816447169101824