Have a personal or library account? Click to login
Strategies for Combating Dark Networks Cover
Open Access
|Jan 2020

References

  1. Abuza, Z. (2003). Militant Islam in Southeast Asia: Crucible of Terror. Boulder, CO: Lynne Reinner Publishers.10.1515/9781685851200
  2. Anonymous (2009). “Deception 2.0: Deceiving in the Netwar Age.” Unpublished Paper. Task Force Iron, Iraq.
  3. Arreguin-Toft, I. (2001). “How the Weak Win Wars: A Theory of Asymmetric Conflict.” International Security 26, 1: 93-128.10.1162/016228801753212868
  4. Arreguin-Toft, I. (2005). How the Weak Win Wars: A Theory of Asymmetric Conflict. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511521645
  5. Asal, V., & Rethemeyer, R. K. (2006). “Researching Terrorist Networks.” Journal of Security Education 1, 4: 65-74.10.1300/J460v01n04_06
  6. Asal, V., & Rethemeyer, R. K. (2008). “The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks.” The Journal of Politics 70, 2: 437-449.10.1017/S0022381608080419
  7. Azarian, G. R. (2005). The General Sociology of Harrison C. White: Chaos and Order in Networks. New York: Palgrave Macmillan.10.1057/9780230596719
  8. Baker, W. E., & Faulkner, R. R. (1993). The Social-Organization of Conspiracy: Illegal Networks in the Heavy Electrical-Equipment Industry. American Sociological Review 58, 6: 837-860.
  9. Banlaoi, R. C. (2009). Counter Terrorism Measures in Southeast Asia: How Effective Are They? Manilla, Philippines: Yuchengco Center: De La Salle University.
  10. Batagelj, V., & Mrvar, A. (2010). Pajek 1.27. Lubjlijana, Slovenia: University of Ljubljana.
  11. Borgatti, S. P. (2006). “Identifying Sets of Key Players in a Social Network.” Computational, Mathematical and Organizational Theory 12: 21-34.
  12. Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). “On the Robustness of Centrality Measures under Conditions of Imperfect Data.” Social Networks 28: 124-136.
  13. Boucek, C. (2008a). “The Sakinah Campaign and Internet Counter-Radicalization in Saudi Arabia.” CTC Sentinel 1, 9: 1-4. Available: http://carnegieendowment.org/files/CTCSentinelVol1Iss9.pdf [January 5, 2011].
  14. Boucek, C. (2008b). “Saudi Arabia’s ‘Soft’ Counterterrorism Strategy: Prevention, Rehabilitation, and Aftercare.” Carnegie Papers, No. 97. Available: http://carnegieendowment.org/files/cp97boucek saudi final.pdf[January 5, 2011].
  15. Breiger, R. L. (1975). “Dual and Multiple Networks of Social Structures: A Study of Affiliation and Interaction.” Unpublished Doctoral Dissertation, Harvard University, Boston.
  16. Brimley, S., & Singh, V. (2008). “Stumbling into the Future? The Indirect Approach and American Strategy.” Orbis 52, 2: 312-331.10.1016/j.orbis.2008.01.009
  17. Cooper, H. (2009). “Dreaming of Splitting the Taliban.” The New York Times. Available: http://www.nvtimes.com/2009/03/08/weekinreview/08COOPER.html? r=1 [January 5, 2011].
  18. Davis, L. E., & Sisson, M. W. (2009). A Strategic Planning Approach: Defining Alternative Counterterrorism Strategies as an Illustration. Santa Monica, CA: RAND Corporation.
  19. de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511806452
  20. Diani, M., & McAdam, D. (Eds.). (2003). Social Movements and Networks: Relational Approaches to Collective Action. Oxford and New York: Oxford University Press.10.1093/0199251789.001.0001
  21. Doreian, P., Batagelj, V., & Ferligoj, A. (2005). Generalized Blockmodeling. New York and Cambridge: Cambridge University Press.
  22. Ettlinger, N., & Bosco, F. (2004). “Thinking through Networks and their Spatiality: A Critique of the U.S. (Public) War on Terrorism and its Geographic Discourse.” Antipode 36, 2: 249-271.10.1111/j.1467-8330.2004.00405.x
  23. Everton, S. F. (Forthcoming). “Network Topography, Key Players and Terrorist Networks.” Connections.
  24. Felter, J., & Fishman, B. (2007). “Al-Qa’ida’s Foreign Fighters in Iraq: A First Look at the Sinjar Records.” Available: http://www.ctc.usma.edu/harmony/pdf/CTCForeignFighter.19.Dec07.pdf [January 5, 2011].
  25. Fink, N. C., & Hearne, E. B. (2008). “Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism.” Available: http://www.ipacademy.org/media/pdf/publications/beter.pdf [January 5, 2011].
  26. Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington DC: Center for a New American Security.
  27. Fridovich, D. P., & Krawchuk, F. T. (2007). “Special Operations Forces: Indirect Approach.” Joint Forces Quarterly 44, 1: 24-27.
  28. Granovetter, M. (1973). “The Strength of Weak Ties.” American Journal of Sociology 73, 6: 13601380.
  29. Horgan, J. (2009). Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. New York: Routledge.10.4324/9780203874738
  30. International Crisis Group (2006). Terrorism in Indonesia: Noordin’s Networks (No. Asia Report #114). Brussels, Belgium: International Crisis Group.
  31. International Crisis Group (2008). Indonesia: Jemaah Islamiyah’s Publishing Industry. Brussels, Belgium: International Crisis Group.
  32. Jones, S. G., & Libicki, M. C. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Santa Monica, CA: RAND Corporation.
  33. Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). “Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings.” Studies in Conflict & Terrorism 31: 17-21.
  34. Keefe, P. (2006). “Can Network Theory Thwart Terrorists?” The New York Times. Available: http://www.nvtimes.com/2006/0.3/12/magazine/.312wwlnessay.html [January 5, 2011].
  35. Krawchuk, F. T. (ND). “Winning the Global War on Terrorism in the Pacific Region: Special Operations Forces’ Indirect Approach to Success.” Available: http://igcc.ucsd.edu/research/security/DACOR/presentations/krawchuk.pdf [January 5, 2011].
  36. Krebs, V. (2001). “Mapping Networks of Terrorist Cells.” Connections 24, 3: 43-52.
  37. Lempert, R. J., Trujillo, H. R., Aaron, D., Dewar, J. A., Berry, S. H., & Popper, S. W. (2008). “Comparing Alternative U.S. Counterterrorism Strategies: Can Assumption-Based Planning Help Elevate the Debate?” Available: http://www.rand.org/pubs/documented briefings/2008/RAND DB548.pdf [January 5, 2011; large document].
  38. Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Campbell Systematic Reviews 2006, 2: 51. Available: http://www.rutgerscps.org/publications/Lum Terrorism Review.pdf [January 5, 2011].
  39. Lum, T., & Niksch, L. A. (2006; updated 2009). “The Republic of the Philippines: Background and U.S. Relations: Congressional Research Service Report to Congress.” Available: http://www.fas.org/sgp/crs/row/RL33233.pdf [January 5, 2011].
  40. Magouirk, J., Atran, S., & Sageman, M. (2008). “Connecting Terrorist Networks.” Studies in Conflict & Terrorism 31: 1-16.
  41. Marks, S., Meer, T., & Nilson, M. (2005). “Manhunting: A Methodology for Finding Persons of National Interest.” Unpublished Master of Science, Naval Postgraduate School, Monterey, CA.
  42. McAdam, D. (1982). Political Process and the Development of Black Insurgency, 1930-1970. Chicago: University of Chicago Press.
  43. McAdam, D. (1999). Political Process and the Development of Black Insurgency, 1930-1970 (2nd ed.). Chicago: University of Chicago Press.10.7208/chicago/9780226555553.001.0001
  44. McCarthy, J. D., & Zald, M. N. (1977). “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82, 6: 1212-1241.10.1086/226464
  45. Moody, J. (2005). Fighting a Hydra: A Note on the Network Embeddedness of the War on Terror. Structure and Dynamics 1, 2. Available: http://escholarship.org/uc/item/7x.3881bs [January 5, 2011].
  46. Moon, I.-C. (2008). “Destabilization of Adversarial Organizations with Strategic Interventions.” Unpublished Doctoral Thesis, Carnegie Mellon University, Pittsburgh, PA. Available: http://www.casos.cs.cmu.edu/publications/papers/CMU-ISR-08-124.pdf [January 5, 2011].
  47. Mortenson, G., & Bryan, M. (2009). Stones into Schools: Promoting Peace with Books, Not Bombs, in Afghanistan and Pakistan. New York: Viking.
  48. Mortenson, G., & Relin, D. O. (2006). Three Cups of Tea: One Man’s Mission to Fight Terrorism and Build Nations... One School at a Time. New York: Viking.
  49. Pedahzur, A., & Perliger, A. (2006). “The Changing Nature of Suicide Attacks: A Social Network Perspective.” Social Forces 84, 4: 1987-2008.10.1353/sof.2006.0104
  50. Peter, T. A. (2008). “U.S. Begins Hunting Iraq’s Bombmakers, Not Just Bombs.” The Christian Science Monitor. Available: http://www.csmonitor.com/2008/0908/p04s01-wome.html [January 5, 2011].
  51. Popielarz, P. A., & McPherson, J. M. (1995). “On the Edge or in Between: Niche Position, Niche Overlap, and the Duration of Voluntary Association Memberships.” American Journal of Sociology 101, 3: 698-720.10.1086/230757
  52. Raab, J., & Milward, H. B. (2003). “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13, 4: 413-439.10.1093/jopart/mug029
  53. Rabasa, A. (2005). “Islamic Education in Southeast Asia.” In H. Fradkin, H. Haqqani & E. Brown (Eds.), Current Trends in Islamist Ideology (pp. 97-108). Washington, D.C.: Hudson Institute.
  54. Ramakrishna, K. (2005). “Delegitimizing Global Jihadi Ideology in Southeast Asia.” Contemporary Southeast Asia 27, 3: 343-369.10.1355/CS27-3A
  55. Rodriguez, J. A. (2005). The March 11th Terrorist Network: In Its Weakness Lies Its Strength.
  56. Barcelona, Spain: Departament de Sociologia i Anàlisi de les Organitzacions: Universitat de Barcelona.
  57. Sageman, M. (2004). Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.10.9783/9780812206791
  58. Schmitt, E., & Perlez, J. (2009). “Strikes Worsen Qaeda Threat, Pakistan Says.” The New York Times. Available: http://www.rņytiffiθŞ.com/2009/02/25/woŗld/aşia/25dŗoņeş.html?şç2=1&şq=Şçhmitt%20aņd%20Pe rlez.%202009&st=cse [January 5, 2011].
  59. Simmel, G. ([1908, 1922] 1955). Conflict & The Web of Group-Affiliations (K. H. Wolff & R. Bendix, Trans.). New York: The Free Press.
  60. Smith, C. S. (1991). The Emergence of Liberation Theology: Radical Religion and Social Movement Theory. Chicago: University of Chicago Press.
  61. Smith, C. S. (1996). Resisting Reagan: The U.S. Central America Peace Movement. Chicago: The University of Chicago Press.10.7208/chicago/9780226763330.001.0001
  62. Sparrow, M. K. (1991). “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects.” Social Networks 13: 251-274.
  63. Stark, R., & Bainbridge, W. S. (1980). “Networks of Faith: Interpersonal Bonds and Recruitment to Cults and Sects.” American Journal of Sociology 85, 6: 1376-1395.10.1086/227169
  64. Tsvetovat, M., & Carley, K. M. (2005). “Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence.” Journal of Social Structure 6, 2. Available: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCariey/index.html [January 5, 2011].
  65. U.S. Army (2007). U.S. Army/Marine Counterinsurgency Field Manual (FM 3-24). Old Saybrook, CT: Konecky & Konecky.
  66. U.S. Director of Operations (2006). Information Operations: Joint Publication 3-13. Available: http://www.fas.org/irp/doddir/dod/jp3 13.pdf [January 5, 2011].
  67. U.S. Special Operations Command (2003). Doctrine for Joint Psychological Operations: Joint Publication 3-53. Available: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/02 psyop-jp-3-53.pdf [January 5, 2011].
  68. van Meter, K. M. (2001). “Terrorists/Liberators: Researching and Dealing with Adversary Social Networks.” Connections 3: 66-78.
  69. White, H. C. (2008). Identity and Control: How Social Formations Emerge (2nd ed.). Princeton, NJ: Princeton University Press.
  70. Wikipedia (2010). “Noordin Mohammed Top.” Available: http://en.wikipedia.org/wiki/Noordin Mohammad Top [January 5, 2011].
  71. Wiktorowicz, Q. (2004). “Introduction: Islamic Activism and Social Movement Theory.” In Q.
  72. Wiktorowicz (Ed.), Islamic Activism: A Social Movement Theory Approach (pp. 1-33). Bloomington: Indiana University Press.
  73. Wilson, G. (2006). “Anatomy of a Successful COIN Operation: OEF-Philippines and the Indirect Approach.” Military Review (November-December): 2-12. Available: http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview 2008CRII0831 art 009.pdf [January 5, 2011].
DOI: https://doi.org/10.21307/joss-2019-030 | Journal eISSN: 1529-1227 | Journal ISSN: 2300-0422
Language: English
Page range: 1 - 32
Published on: Jan 13, 2020
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2020 Nancy Roberts, Sean F. Everton, published by International Network for Social Network Analysis (INSNA)
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.