Abstract
Covert networks are often difficult to reason about, manage and destabilize. In part, this is because they are a complex adaptive system. In addition, this is due to the nature of the data available on these systems. Making these covert networks less adaptive, more predictable, more consistent will make it easier to contain or constrain their activity. But, how can we inhibit adaptation? Herein, covert networks are characterized as dynamic multi-mode multi-plex networks. Dynamic network analysis tools are used to assess their structure and identify effective destabilization strategies that inhibit the adaptivity of these groups.
Similar content being viewed by others
References
Borgatti SP (2002) The key player problem. In: Proceedings from National Academy of Sciences Workshop on Terrorism, Washington DC
Butts C (2001) Network inference, error, and informant (In)accuracy: A bayesian approach. To appear in social networks
Carley KM, Krackhardt D (1999) A typology for C$^2$ Measures. In: Proceedings of the 1999 International Symposium on Command and Control Research and Technology. June, Newport, RI
Carley KM, Reminga J (2004) ORA: Organization risk analyzer. Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI-04–101
Carley KM, Ren Y (2001) Tradeoffs between performance and adaptability for C3I architectures. In: Proceedings of the 2000 International Symposium on Command and Control Research and Technology
Carley KM (1991) A theory of group stability. American Sociological Review 56(3):331–354
Carley KM (1999) On the evolution of social and organizational networks. In: Steven B. Andrews and David Knoke (eds), Vol. 16 special issue of Research in the Sociology of Organizations.on Networks In and Around Organizations. JAI Press, Inc. Stamford, CT, pp. 3–30
Carley KM (2003) Dynamic network analysis. In: Ronald Breiger, Kathleen Carley, and Philippa Pattison, (eds), dynamic social network modeling and analysis: Workshop summary and papers, Committee on Human Factors, National Research Council, National Research Council. pp. 133-145
Carley KM (2004) Estimating vulnerabilities in large covert networks. In: Proceedings of the 9th International Command and Control Research and Technology Symposium. Conference held at Loews Coronado Resort, CA. Evidence Based Research, Vienna, VA
Carley KM, Lee J-S, Krackhardt D (2001) Destabilizing networks Connections 24(3):31–34
Carley KM (1990) Group stability: A Socio-Cognitive Approach. In: Lawler E, Markovsky B, Ridgeway C and Walker H (eds), Advances in group processes: Theory and research. Vol. VII. Greenwhich, CN: JAI Press, pp. 1–44
Carley KM (2002) Smart agents and organizations of the future, the handbook of new media. In: Lievrouw L and Livingstone S (eds), Ch. 12, Thousand Oaks, CA, Sage, pp. 206–220
Carley KM, Ren Y, Krackhardt D (2000) Measuring and modeling change in C3I architecture. In: Proceedings of the 2000 International Symposium on Command and Control Research and Technology, Naval Postgraduate School, Monterey, CA, June 26–28, 2000
Carley K M (1991) A theory of group stability. American Sociological Review 56(3):331–354
Clark RP (1984) The basque insurgents: Eta, 1952–1980, University of Wisconsin Press
Dombroski M, Fischbeck P, Carley KM (2003) Estimating the shape of covert networks. In: Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Vienna, VA
Holmes RM, Holmes ST (2002) Profiling violent crimes: An investigative tool (3rd ed). Sage
Kamneva N and Kathleen MC (2004) A network optimization approach for improving organizational design. Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI-04–102
Krackhardt D, Carley K (1998) A PCANS model of structure in organization. In:Proceedings of the 1998 International Symposium on Command and Control Research and Technology, pp. 113–119
Lawrence P, Lorsch J (1967) Differentiation and integration in complex organizations. Administrative Science Quarterly (12):1–47
Lin Z and Carley KM (2003) Designing stress resistant organizations: Computational theorizing and crisis applications, Kluwer, Boston, MA
Magdon-Ismail M, Goldberg M, Wallace W, Siebecke D (2003) Locating hidden groups in communication networks using hidden markov models. In: Chen, H. Miranda, R. Zeng, D.D. Demchak, C. Schroeder, J. Madhusudan, T. (eds), Proceedings of Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Springer-Verlag Heidelberg
McPherson JM, Smith-Lovin L (1987) Homophily in voluntary organizations: Status distance and the composition of face-to-face groups. American Sociological Review 52:370–379
Neville J, Adler M, Jensen D (2003) Clustering relational data using attribute and link information. In: Proc. Text Mining and Link Analysis Workshop, Eighteenth International Joint Conference on Artificial Intelligence.
Rossmon KD (1999) Geographic profiling, CRC press
Schreiber C, Carley KM (2004) Construct–-A multi-agent network model for the co-evolution of agents and socio-cultural environments Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI-04–109
Turvey BE (2002) Criminal profiling, Academic press
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported in part by the Office of Naval Research (ONR), United States Navy Grant No. N00014-97-1-0037. Additional support was provided by the NSF IGERT for research and training in CASOS and by the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon University (http://www.casos.cs.cmu.edu). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Office of Naval Research, the National Science Foundation or the U.S. government.
Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Computational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area.
Rights and permissions
About this article
Cite this article
Carley, K.M. Destabilization of covert networks. Comput Math Organiz Theor 12, 51–66 (2006). https://doi.org/10.1007/s10588-006-7083-y
Issue Date:
DOI: https://doi.org/10.1007/s10588-006-7083-y