R&L Logo R&L Logo
  • GENERAL
    • Browse by Subjects
    • New Releases
    • Coming Soon
    • Chases's Calendar
  • ACADEMIC
    • Textbooks
    • Browse by Course
    • Instructor's Copies
    • Monographs & Research
    • Reference
  • PROFESSIONAL
    • Education
    • Intelligence & Security
    • Library Services
    • Business & Leadership
    • Museum Studies
    • Music
    • Pastoral Resources
    • Psychotherapy
  • FREUD SET
Cover Image
Hardback
Paperback
share of facebook share on twitter
Add to GoodReads Exam Copies eExam Copies

Understanding Dark Networks

A Strategic Framework for the Use of Social Network Analysis

Daniel Cunningham; Sean Everton and Philip Murphy

Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
  • Details
  • Details
  • Author
  • Author
  • TOC
  • TOC
  • Reviews
  • Reviews
  • Features
  • Features
Rowman & Littlefield Publishers
Pages: 388 • Trim: 6⅜ x 9½
978-1-4422-4943-1 • Hardback • March 2016 • $143.00 • (£110.00)
978-1-4422-4944-8 • Paperback • March 2016 • $80.00 • (£62.00)
Subjects: Political Science / Security (National & International), Political Science / Intelligence & Espionage, Political Science / Terrorism
Courses: Political Science; Security; Terrorism, Political Science; Security; Counterterrorism, Political Science; Security; Intelligence, Political Science; Security; International Security, Political Science; Research Methods; General
Daniel Cunningham is associate faculty for instruction in the Defense Analysis Department at the Naval Postgraduate School (NPS) in Monterey, CA. He is also a research associate in the Defense Analysis Department’s Common Operational Research Environment (CORE) Lab.

Sean Everton is an associate professor in the Department of Defense Analysis and the co-director of the CORE Lab at the Naval Postgraduate School (NPS) in Monterey, CA.

Philip Murphy is an assistant professor and the director of the Mixed-methods Evaluation and Training (META) Lab at the Middlebury Institute of International Studies in the Graduate School of International Policy Studies and a research fellow at the Naval Postgraduate School’s CORE Lab.
List of Figures
List of Tables
Introduction
Part I: Introduction to Social Network Analysis
Chapter 1: Social Networks
Chapter 2: Strategic Options for Disrupting Dark Networks
Chapter 3: Collecting, Coding, and Manipulating Social Network Data
Part II: Exploratory Social Network Analysis
Chapter 4: Topographical Features of Dark Networks
Chapter 5: Detecting Subgroups In Networks
Chapter 6: Identifying Central Actors In Networks
Chapter 7: Brokerage within Networks
Chapter 8: Positional Approaches to Analyzing Networks
Part III: Confirmatory Social Network Analysis
Chapter 9: Digging Deeper and Testing Hypotheses
Chapter 10: More Hypothesis Testing: Using Exponential Random Graph Models (Ergms) To Explain Tie Formation
Chapter 11: Longitudinal Analyses of Dark Networks
Part IV: Conclusion
Chapter 12: Lessons Learned
Appendix 1: Data Description And Codebook
Appendix 2: Glossary of Terms
Appendix 3: Analytic Software
References
Index
About the Authors
Finally! Accessible yet comprehensive, Understanding Dark Networks is a much needed and long overdue guide to analyzing covert, and all other, social networks. This is a must-read for anyone even considering using social network analysis effectively.
— Elisa Jayne Bienenstock, college research professor, College of Public Service and Community Solutions, Arizona State University


Cunningham, Everton, and Murphy’s book is most relevant for practitioners, researchers, or anyone seeking to understand dark networks. Practitioners often worry that SNA is difficult to learn and comprehend, but through Cunningham’s easily accessible writing, anyone can understand and apply it after reading this book. Understanding Dark Networks would also have utility for teaching SNA to undergraduates, graduate, postgraduate students in many fields. The early chapters are accessible to anyone, but the last section requires baseline statistical knowledge. Social Network Analysis represents the future of dark network analysis, ranging from jihadist groups to gangs. All intelligence analysts and researchers would see their research value increase with an in-depth understanding of SNA. Understanding Dark Networks should be an essential read for any practitioner or security scholar interested in learning or furthering their knowledge of SNA.


— Small Wars Journal


• Introductory text that explains how social network analysis can be used to craft strategies to track, destabilize, and disrupt dark (i.e. covert or illegal) networks.
• How-to guide written in an accessible, non-technical manner to serve those new to the technique and those who wish to know how to apply it to the study of dark networks.
• Pedagogical features include examples and applications, practical exercises, methodology, case studies, and data sets for practice.
• Each chapter includes a summary, review questions, and further reading suggestions.


Understanding Dark Networks

A Strategic Framework for the Use of Social Network Analysis

Cover Image
Hardback
Paperback
Summary
Summary
  • Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
Details
Details
  • Rowman & Littlefield Publishers
    Pages: 388 • Trim: 6⅜ x 9½
    978-1-4422-4943-1 • Hardback • March 2016 • $143.00 • (£110.00)
    978-1-4422-4944-8 • Paperback • March 2016 • $80.00 • (£62.00)
    Subjects: Political Science / Security (National & International), Political Science / Intelligence & Espionage, Political Science / Terrorism
    Courses: Political Science; Security; Terrorism, Political Science; Security; Counterterrorism, Political Science; Security; Intelligence, Political Science; Security; International Security, Political Science; Research Methods; General
Author
Author
  • Daniel Cunningham is associate faculty for instruction in the Defense Analysis Department at the Naval Postgraduate School (NPS) in Monterey, CA. He is also a research associate in the Defense Analysis Department’s Common Operational Research Environment (CORE) Lab.

    Sean Everton is an associate professor in the Department of Defense Analysis and the co-director of the CORE Lab at the Naval Postgraduate School (NPS) in Monterey, CA.

    Philip Murphy is an assistant professor and the director of the Mixed-methods Evaluation and Training (META) Lab at the Middlebury Institute of International Studies in the Graduate School of International Policy Studies and a research fellow at the Naval Postgraduate School’s CORE Lab.
Table of Contents
Table of Contents
  • List of Figures
    List of Tables
    Introduction
    Part I: Introduction to Social Network Analysis
    Chapter 1: Social Networks
    Chapter 2: Strategic Options for Disrupting Dark Networks
    Chapter 3: Collecting, Coding, and Manipulating Social Network Data
    Part II: Exploratory Social Network Analysis
    Chapter 4: Topographical Features of Dark Networks
    Chapter 5: Detecting Subgroups In Networks
    Chapter 6: Identifying Central Actors In Networks
    Chapter 7: Brokerage within Networks
    Chapter 8: Positional Approaches to Analyzing Networks
    Part III: Confirmatory Social Network Analysis
    Chapter 9: Digging Deeper and Testing Hypotheses
    Chapter 10: More Hypothesis Testing: Using Exponential Random Graph Models (Ergms) To Explain Tie Formation
    Chapter 11: Longitudinal Analyses of Dark Networks
    Part IV: Conclusion
    Chapter 12: Lessons Learned
    Appendix 1: Data Description And Codebook
    Appendix 2: Glossary of Terms
    Appendix 3: Analytic Software
    References
    Index
    About the Authors
Reviews
Reviews
  • Finally! Accessible yet comprehensive, Understanding Dark Networks is a much needed and long overdue guide to analyzing covert, and all other, social networks. This is a must-read for anyone even considering using social network analysis effectively.
    — Elisa Jayne Bienenstock, college research professor, College of Public Service and Community Solutions, Arizona State University


    Cunningham, Everton, and Murphy’s book is most relevant for practitioners, researchers, or anyone seeking to understand dark networks. Practitioners often worry that SNA is difficult to learn and comprehend, but through Cunningham’s easily accessible writing, anyone can understand and apply it after reading this book. Understanding Dark Networks would also have utility for teaching SNA to undergraduates, graduate, postgraduate students in many fields. The early chapters are accessible to anyone, but the last section requires baseline statistical knowledge. Social Network Analysis represents the future of dark network analysis, ranging from jihadist groups to gangs. All intelligence analysts and researchers would see their research value increase with an in-depth understanding of SNA. Understanding Dark Networks should be an essential read for any practitioner or security scholar interested in learning or furthering their knowledge of SNA.


    — Small Wars Journal


Features
Features
  • • Introductory text that explains how social network analysis can be used to craft strategies to track, destabilize, and disrupt dark (i.e. covert or illegal) networks.
    • How-to guide written in an accessible, non-technical manner to serve those new to the technique and those who wish to know how to apply it to the study of dark networks.
    • Pedagogical features include examples and applications, practical exercises, methodology, case studies, and data sets for practice.
    • Each chapter includes a summary, review questions, and further reading suggestions.


ALSO AVAILABLE

  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book Understanding Cybersecurity: Emerging Governance and Strategy
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book Drug Trafficking and International Security
  • Cover image for the book Intelligence and the National Security Strategist: Enduring Issues and Challenges
  • Cover image for the book Gender, Global Health, and Violence: Feminist Perspectives on Peace and Disease
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book Creative Methods in Military Studies
  • Cover image for the book Dynamics of the Changing Global Security Order: Emerging Trends and Key Issues in Asia
  • Cover image for the book Principles of Maritime Power
  • Cover image for the book The Academic-Practitioner Divide in Intelligence Studies
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book The Ecology of Violent Extremism: Perspectives on Peacebuilding and Human Security
  • Cover image for the book The Life and Work of General Andrew J. Goodpaster: Best Practices in National Security Affairs
  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book Understanding Cybersecurity: Emerging Governance and Strategy
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book Drug Trafficking and International Security
  • Cover image for the book Intelligence and the National Security Strategist: Enduring Issues and Challenges
  • Cover image for the book Gender, Global Health, and Violence: Feminist Perspectives on Peace and Disease
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book Creative Methods in Military Studies
  • Cover image for the book Dynamics of the Changing Global Security Order: Emerging Trends and Key Issues in Asia
  • Cover image for the book Principles of Maritime Power
  • Cover image for the book The Academic-Practitioner Divide in Intelligence Studies
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book The Ecology of Violent Extremism: Perspectives on Peacebuilding and Human Security
  • Cover image for the book The Life and Work of General Andrew J. Goodpaster: Best Practices in National Security Affairs
facebook icon twitter icon instagram icon linked in icon NEWSLETTERS
ABOUT US
  • Mission Statement
  • Employment
  • Privacy
  • Accessibility Statement
CONTACT
  • Company Directory
  • Publicity and Media Queries
  • Rights and Permissions
  • Textbook Resource Center
AUTHOR RESOURCES
  • Royalty Contact
  • Production Guidelines
  • Manuscript Submissions
ORDERING INFORMATION
  • Rowman & Littlefield
  • National Book Network
  • Ingram Publisher Services UK
  • Special Sales
  • International Sales
  • eBook Partners
  • Digital Catalogs
IMPRINTS
  • Rowman & Littlefield
  • Lexington Books
  • Hamilton Books
  • Applause Books
  • Amadeus Press
  • Backbeat Books
  • Bernan
  • Hal Leonard Books
  • Limelight Editions
  • Co-Publishing Partners
  • Globe Pequot
  • Down East Books
  • Falcon Guides
  • Gooseberry Patch
  • Lyons Press
  • Muddy Boots
  • Pineapple Press
  • TwoDot Books
  • Stackpole Books
PARTNERS
  • American Alliance of Museums
  • American Association for State and Local History
  • Brookings Institution Press
  • Center for Strategic & International Studies
  • Council on Foreign Relations
  • Fairleigh Dickinson University Press
  • Fortress Press
  • The Foundation for Critical Thinking
  • Lehigh University Press
  • United States Holocaust Memorial Museum
  • Other Partners...