2012
DOI: 10.1017/cbo9781139136877
|View full text |Cite
|
Sign up to set email alerts
|

Disrupting Dark Networks

Abstract: Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
110
0
4

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 214 publications
(114 citation statements)
references
References 255 publications
0
110
0
4
Order By: Relevance
“…Our analyses are based on unique Swedish co-offending data from the Swedish National Council for Crime Prevention and gang membership data from the Swedish Police. We analyze the organizational patterns with the help of social network analysis, a powerful tool that has been previously applied to understanding criminal collaboration and organizational dynamics in general (Everton 2012), and Hells Angels in particular (Morselli 2009a, b).…”
Section: Aim Of This Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Our analyses are based on unique Swedish co-offending data from the Swedish National Council for Crime Prevention and gang membership data from the Swedish Police. We analyze the organizational patterns with the help of social network analysis, a powerful tool that has been previously applied to understanding criminal collaboration and organizational dynamics in general (Everton 2012), and Hells Angels in particular (Morselli 2009a, b).…”
Section: Aim Of This Studymentioning
confidence: 99%
“…Continuing along this research tradition, the pioneering works by Morselli (2009b), McGloin (2005) and Sarnecki (2001) formally introduced SNA as a method for the analysis of criminal collaboration. Later on, SNA tools were gradually applied to a wider selection of crime-related phenomena besides cooffending, such as organized crime, extremism, cybercrime (Morselli 2014), and disruption of hidden networks (Everton 2012), to name a few examples. Talking specifically about Hells Angels, Morselli (2009a) observed in his study of HAMC in Quebec that there is a widespread criminal market involving HAMC.…”
Section: Social Network Analysismentioning
confidence: 99%
“…The criminal (covert) nature of the organizations behind the networks necessitates quick, nearly immediate real-time analysis and reaction for authorities to successfully counter their activities (Everton, 2012a;Dudas, 2013). Covert networks can be resilient (Milward & Raab, 2006;Everton, 2012b;Senekal, 2014), often overlap with other covert networks (Senekal 2014), and act more like traditional organizations (Raab & Milward, 2003) in their attempts to organize and exhibit structure to their activities.…”
Section: Social Mediamentioning
confidence: 99%
“…These difficulties and challenges have not stopped researchers and analysts from analyzing covert networks (Roberts & Everton, 2011;Everton, 2012b). Indeed, the practice dates back to countries' analyzing their enemies ' communication patterns in WWII (van Meter, 2001).…”
Section: Social Mediamentioning
confidence: 99%
See 1 more Smart Citation