Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art in methods to study and understand dark networks.
The Third Edition of this best-selling text has been fully revised and updated to include coverage of the many developments on social network analysis (SNA) over the last decade. Written in a clear and accessible style, the book introduces these topics to newcomers and non-specialists and gives sufficient detail for more advanced users of social network analysis. Throughout the book, key ideas are discussed in relation to the principal software programs available for SNA.
The book provides a comprehensive overview of the field, outlining both its theoretical basis and its key techniques. Drawing from the core ideas of points, lines and paths, John Scott builds a framework of network analysis that covers such measures as density, centrality, clustering, centralisation, and spatialisation. He identifies the various types of clique, component, and circle into which networks are formed, and he outlines an approach to socially structured positions within networks. A completely new chapter in this edition discusses recent work on network dynamics and methods for studying change over time. A final chapter discusses approaches to network visualisation.
Continue reading “Social Network Analysis”
Exponential random graph models (ERGMs) are increasingly applied to observed network data and are central to understanding social structure and network processes. The chapters in this edited volume provide a self-contained, exhaustive account of the theoretical and methodological underpinnings of ERGMs, including models for univariate, multivariate, bipartite, longitudinal and social-influence type ERGMs. Each method is applied in individual case studies illustrating how social science theories may be examined empirically using ERGMs. The authors supply the reader with sufficient detail to specify ERGMs, fit them to data with any of the available software packages and interpret the results.
Why buy a multi-billion-dollar satellite and go to extreme lengths to try to avoid governmental detection when you can just buy a bit of airtime and send one of several million messages going out at any given time?—from Bombs and Bandwidth
Information Technology (IT) has become central to the way governments, businesses, social movements and even terrorist and criminal organizations pursue their increasingly globalized objectives. With the emergence of the Internet and new digital technologies, traditional boundaries are increasingly irrelevant, and traditional concepts—from privacy to surveillance, vulnerability, and above all, security—need to be reconsidered. In the post-9/11 era of “homeland security,” the relationship between IT and security has acquired a new and pressing relevance. Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.
Contributors include: Ralf Bendrath, Michael Dartnell, Robert J. Deibert, Dorothy Denning, Chris Hables Gray, Rose Kadende-Kaiser, Susan Landau, Robert Latham, Timothy Lenoir, Martin Libicki, Carolyn Nordstrom, Rafal Rohozinski, Marc Rotenberg, Janice Gross Stein, Rachel Yould.
To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.
Continue reading “Cyber Intelligence Sharing and Protection Act – H.R. 3523 – 112th Congress”