Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-jbqgn Total loading time: 0 Render date: 2024-07-04T05:48:13.806Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  05 August 2015

Luke M. Gerdes
Affiliation:
United States Military Academy
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Illuminating Dark Networks
The Study of Clandestine Groups and Organizations
, pp. 227 - 249
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ackerman, G. A., & Pinson, L. (2011). Speaking truth to sources: Introducing a method for the quantitative evaluation of open-sources in event data. National Consortium for the Study of Terrorism and Responses to Terrorism (START) Working Paper. College Park, MD.Google Scholar
Alberts, D., & Hayes, R. (2005). Power to the edge: Command and control in the information age. Boca Raton, FL: CRC Press.Google Scholar
AlSumait, L., Barbara, D., & Domeniconi, C. (2008). On-line LDA: Adaptive topic models for mining text streams with applications to topic detection and tracking. IEEE International Conference on Data Mining (ICDM), 3–12.Google Scholar
Andrich, D. (1988). Rasch models for measurement. Newbury Park, CA: Sage.Google Scholar
Arquilla, J. (2008). Worst enemy: The reluctant transformation of the American military. Chicago, IL: Ivan R. Dee.Google Scholar
Arquilla, J. (2009). Aspects of netwar & the conflict with al Qaeda. Monterey, CA: Information Operations Center, Naval Postgraduate School.Google Scholar
Arquilla, J., & Ronfeldt, D. (2001). The advent of netwar (revised). In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 1–25). Santa Monica, CA: RAND.Google Scholar
Arreguin-Toft, A. (2001). How the weak win wars: A theory of asymmetric conflict. International Relations, 26(1), 93128.Google Scholar
ARTIS Research. (2009, June). REL codebook – public. Retrieved from: http://doitapps.jjay.cuny.edu/jjatt/files/Relations_Codebook_Public_Version2.pdf.Google Scholar
Asal, V. H., & Rethemeyer, R. K. (2006). Researching terrorist networks. Journal of Security Education, 1, 6574.Google Scholar
Asal, V. H., (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. Journal of Politics, 70(2), 437–49.Google Scholar
Asal, V. H., (2009). Islamist use and pursuit of CBRN terrorism. In Ackerman, G. & Tamsett, J. (Eds.), Jihadists and weapons of mass destruction (pp. 335–58). Boca Raton, FL: CRC Press.Google Scholar
Axelrod, R., & Cohen, M. D. (2000). Harnessing complexity: Organizational implications of a scientific frontier. New York: Basic Books.Google Scholar
Baker, W. E., & Faulkner, R. R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58(6), 837–60.Google Scholar
Bakker, R. M., Raab, J., & Milward, H. B. (2011). A preliminary theory of dark network resilience. Journal of Policy Analysis and Management, 31, 3362.Google Scholar
Barabási, A.-L. (2002). Linked: How everything is connected to everything else and what it means for business, science, and everyday life. New York: Basic Books.Google Scholar
Barabási, A.-L. (2009). Scale-free networks: A decade and beyond. Science, 325(5939), 412–13.Google Scholar
Barabási, A.-L., Albert, R., & Jeong, H. (1999). Mean-field theory for scale-free random networks. Physica A, 272, 173–87.Google Scholar
Barabási, A.-L., & Bonabeau, E. (2003). Scale-free networks. Scientific American, 288, 60–9.Google Scholar
Barthelemy, M., & Amaral, L. A. N. (1999). Small-world networks: Evidence for a crossover picture. Physical Review Letters, 82, 3180–3.Google Scholar
Bavelas, A. (1948). A mathematical model for group structures. Human Organization, 7(3), 1630.Google Scholar
Bavelas, A. (1950). Communication patterns in task oriented groups. The Journal of the Acoustical Society of America, 22(6), 725–30.Google Scholar
Bavelas, A., & Barret, D. (1951). An experimental approach to organizational communication. Personnel, 27, 366–71.Google Scholar
Baxter, G. J., Dorogovtsev, S. N., Goltsev, A. V., & Mendes, J. F. (2011). Heterogeneous k-core versus bootstrap percolation on complex networks.Physical Review E, 83, 051134.Google Scholar
Bayat, A. (2007). Making Islam democratic: Social movements and the post-Islamist turn. Stanford, CA: Stanford University Press.Google Scholar
Bayir, M. A., Demirbas, M., & Eagle, N. (2009). “Discovering spatiotemporal mobility profiles of cellphone users.” Paper presented at the World of Wireless, Mobile, and Multimedia Networks & Workshops.Google Scholar
Beauchamp, M. A. (1965). An improved index of centrality. Behavioral Science, 10(2), 161–3.Google Scholar
Beckmann, N., Kriegel, H.-P., Schneider, R., & Seeger, B. (1990). The R*-tree: An efficient and robust access method for points and rectangles. ACM SIGMOD Record, 19(2), 322–31.Google Scholar
Bell, J. R. (2014). Subgroup centrality measures. Network Science, 2(2), 277–97.Google Scholar
Belsley, D. A., Kuh, E., & Welsch, R. E. [1980] (2004). Regression diagnostics: Identifying influential data and sources of collinearity. Hoboken, NJ: Wiley.Google Scholar
Bentley, J. L. (1975). Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9), 509–17.Google Scholar
Berman, E. (2009). Radical, religious, and violent: The new economics of terrorism. Cambridge, MA: MIT Press.Google Scholar
Bernard, H. R., Killworth, D., Kronenfeld, D., & Sailer, L. (1984). On the validity of retrospective data: The problem of informant accuracy. Annual Review of Anthropology, 13, 495517.Google Scholar
Bertetto, J. (2012, November 15). Countering criminal street gangs: Lessons from the counterinsurgent battlespace. Small Wars Journal. Retrieved from: http://smallwarsjournal.com/jrnl/art/countering-criminal-street-gangs-lessons-from-the-counterinsurgent-battlespace.Google Scholar
Bienenstock, E. J., & Bonacich, P. (1992). The core as a solution to exclusionary networks. Social Networks, 14, 231–43.Google Scholar
Bienenstock, E. J., (1993). Game theory models for exchange networks: Experimental results. Sociological Perspectives, 36(2), 117–35.Google Scholar
Blau, P. M. (1964). Exchange and power in social life. New Brunswick, NJ: Transaction.Google Scholar
Blau, P. M. (1994). Structural contexts of opportunities. Chicago, IL: University of Chicago Press.Google Scholar
Blondel, V. D., Guillaume, J.-L., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics, 10, 10008.Google Scholar
Bollobas, B. (1985). Random graphs. London: London Mathematical Society Monographs, Academic Press.Google Scholar
Bollobas, B., & Riordan, O. (2004). Robustness and vulnerability of scale-free random graphs. Internet Mathematics, 1(1), 135.Google Scholar
Bolz, F., Dudonis, K., & Schulz, D. (2002). Counterterrorism handbook: Tactics, procedures, and techniques. Boca Raton, FL: CRC Press.Google Scholar
Bonacich, P. (1972). Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology, 2(1), 113–20.Google Scholar
Bonacich, P. (1979). A single measure for point and interval predictions of coalition theories. Behavioral Science, 23, 8593.Google Scholar
Bonacich, P. (1987). Power and centrality a family of measures. American Journal of Sociology, 92, 1170–82.Google Scholar
Bonacich, P. (1991). Simultaneous group and individual centralities. Social Networks, 13(2), 155–68.Google Scholar
Bonacich, P., & Bienenstock, E. J. (1997). Latent classes in exchange networks: Sets of positions with common interest. Journal of Mathematical Sociology, 22(1), 128.Google Scholar
Borgatti, S. P. (2006). Identifying sets of key players in a social network. Computational and Mathematical and Organizational Theory, 12, 2134.Google Scholar
Borgatti, S. P. (2009). 2-Mode concepts in social network analysis. In Meyers, R. A. (Ed.), Encyclopedia of Complexity and Social Science (pp. 8279–91). New York: Springer.Google Scholar
Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). On the robustness of centrality measures under conditions of imperfect data. Social Networks, 28(2), 124–36.Google Scholar
Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). UCINET 6 for Windows. Columbia, SC: Analytic Technologies.Google Scholar
Bott, E. (1955). Urban families: Conjugal roles and social networks. Human Relations, 8, 345–84.Google Scholar
Bowden, M. (2012, October 12). The death of Osama bin Laden: How the US finally got its man. The Guardian. Retrieved from: http://www.theguardian.com/world/2012/oct/12/death-osama-bin-laden-us.Google Scholar
Brafman, O., & Beckstrom, R. A. (2006). The starfish and the spider: The unstoppable power of leaderless organizations. New York: Portfolio.Google Scholar
Brandes, U., Robins, G., McCranie, A., & Wasserman, S. (2013). What is network science?Network Science, 1(1), 115.Google Scholar
Breiger, R. L., Ackerman, G. A., Asal, V. H., Melamed, D., Milward, H. B., Rethemeyer, R. K., & Schoon, E. (2011). Application of a profile similarity methodology for identifying terrorist groups that use or pursue CBRN weapons. In Salerno, J., Yang, S. J., Nau, D., & Chai, S. (Eds.), Social computing, behavioral-cultural modeling and prediction (pp. 2633). Berlin, Germany: Springer.Google Scholar
Breiger, R. L., Carley, K. M., & Pattinson, P. (Eds.) (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: National Academic Press.Google Scholar
Breiger, R. L., & Melamed, D. (2014). The duality of organizations and their attributes: Turning regression modeling “inside out.”Research in the Sociology of Organizations, 40, 263–75.Google Scholar
Breiger, R. L., Schoon, E., Melamed, D., Asal, V. H., & Rethemeyer, R. K. (2014). Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade. Social Networks, 36, 2339.Google Scholar
Bright, D. A., & Delaney, J. J. (2013). Evolution of a drug trafficking network: Mapping changes in network structure and function across time. Global Crime, 14(2–3), 238–60.Google Scholar
Bright, D. A., Greenhill, C., & Levenkova, N. (2010). “Attack of the nodes: Scale-free criminal networks and vulnerability to targeted law enforcement interventions.” Paper presented at the 2nd Illicit Networks Workshop, Wollongong, Australia.Google Scholar
Bright, D. A., Greenhill, C., (2014). Dismantling criminal networks: Can node attributes play a role? In Morselli, C. (Ed.), Crime and networks. New York: Routledge.Google Scholar
Bright, D. A., Hughes, C. E., & Chalmers, J. (2012). Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate. Crime, Law, and Social Change, 57(2), 151–76.Google Scholar
Burns, J., & Cowell, A. (2013, May 23). Britain knew of 2 suspects in the killing of a soldier. New York Times.Google Scholar
Burt, R. S. (1982). Toward a structural theory of action. Waltham, MA: Academic Press.Google Scholar
Bush, G. W. (2008, January 28). President Bush delivers State of the Union Address. Retrieved from the White House Web page: http://georgewbush-whitehouse.archives.gov/news/releases/2008/01/20080128-13.html.Google Scholar
Callahan, D., Shakarian, P., Nielsen, J., & Johnson, A. (2012). “Shaping Operations to Attack Robust Terror Networks.” Paper presented at the International Conference on Social Informatics. Washington, DC.Google Scholar
Cameron, D. (2014, August 29). Threat level from international terrorism raised: PM press statement. Retrieved from Government of the United Kingdom Web page: https://www.gov.uk/government/speeches/threat-level-from-international-terrorism-raised-pm-press-conference.Google Scholar
Carley, K. M. (1990). Group stability: A socio-cognitive approach. In Lawler, E., Markovsky, B., Ridgeway, C., & Walker, H. (Eds.), Advances in group processes: Theory and research, Vol. VII (pp. 144). Greenwich, CT: JAI Press.Google Scholar
Carley, K. M. (2002). Smart agents and organizations of the future. In Lievrouw, L. & Livingston, S. (Eds.), The handbook of new media (pp. 206–20).Thousand Oaks, CA: Sage.Google Scholar
Carley, K. M. (2003). Dynamic network analysis. In Breiger, R., Carley, K. M., & Pattinson, P. (Eds.), Dynamic social network modeling and analysis: Workshop summary and papers (pp. 133–45). Washington, DC: National Academic Press.Google Scholar
Carley, K. M. (2004). ORA: Organization risk analyzer. Retrieved from the Carnegie Mellon University Web page: http://www.casos.cs.cmu.edu/publications/papers/carley_2004_oraorganizationrisk.pdf.Google Scholar
Carley, K. M. (2006a). A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action: Visualizing Network Information Meeting Proceedings, RTO-MP-IST-063. Neuilly-sur-Seine, France.Google Scholar
Carley, K. M. (2006b). Destabilization of covert networks. Computational and Mathematical Organization Theory, 12, 5166.Google Scholar
Carley, K. M. (2007). Casos dataset. Retrieved from the Center for Computational Analysis of Social and Organizational Systems Web page: http://www.casos.cs.cmu.edu/tools/data2.php.Google Scholar
Carley, K. M. (2014). ORA: A toolkit for dynamic network analysis and visualization. In Alhajj, R. & Rokne, J. (Eds.), Encyclopedia of social network analysis and mining, Springer.Google Scholar
Carley, K. M., & Pfeffer, J. (2012). Dynamic network analysis (DNA) and ORA. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part I (pp. 265–74). Boca Raton, FL: CRC Press.Google Scholar
Carley, K. M., Bigrigg, M. W., & Diallo, B. (2012). Data-to-model: A mixed initiative approach for rapid ethnographic assessment. Computational and Mathematical Organization Theory, 18(3), 300–27.Google Scholar
Carley, K. M., Columbus, D., Bigrigg, M. W., & Kunkel, F. (2011). AutoMap user’s guide 2011. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-11e108.Google Scholar
Carley, K. M., Columbus, D., & Landwehr, P. (2013). AutoMap user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report, CMU-ISR-13–105.Google Scholar
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Vienna, VA.Google Scholar
Carley, K. M., Lee, J.-S., &. Krackhardt, D. (2001). Destabilizing networks. Connections, 24(3), 7992.Google Scholar
Carley, K. M., Martin, M. K., & Hirshman, B. (2009). The etiology of social change. Topics in Cognitive Science, 1(4), 621–50.Google Scholar
Carley, K. M., Pfeffer, J., Liu, H., Morstatter, F., & Goolsby, R. (2013, August). Near real time assessment of social media using geo-temporal network analytics: Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.Google Scholar
Carley, K. M., Reminga, J., & Kamneva, N. (1998). Destabilizing terrorist networks. Institute for Software Research, 45.Google Scholar
Carley, K. M., Reminga, J., (2003). Destabilizing terrorist networks: Proceedings of the 8th International Command and Control Research and Technology Symposium. Evidence Based Research, Track 3. Washington, DC. Retrieved from: http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf.Google Scholar
Carley, K. M., Reminga, J., Storrick, J., & Columbus, D. (2013). ORA user’s guide 2013. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Pittsburgh, PA, Technical Report CMUISR- 13–108.Google Scholar
Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., & Shir, E. (2007). A model of Internet topology using k-shell decomposition. PNAS, 104(27), 11150–4.Google Scholar
Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194–7.Google Scholar
Chao, L. (2013, February 4). Brazil: The social media capital of the universe. Wall Street Journal. Retrieved from: http://online.wsj.com/news/articles/SB10001424127887323301104578257950857891898.Google Scholar
Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: user movement in location-based social networks: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY.Google Scholar
Clarke, R. A., Aga, G. P., Cressey, R. W., Flynn, S. E., Mobley, B. W., Rosenback, E., Simon, S., Wechsler, W. F., & Wolosky, L. S. (2004). Defeating the jihadists: A blueprint for action. New York: Century Foundation Press.Google Scholar
Clauset, A., Newman, M. E., & Moore, C. (2004). Finding community structure in very large networks. Physical Review E, 70(6), 066111.Google Scholar
Clinton, H. R., & Espinosa, P. (2010, March 29). Joint statement of the Merida Initiative High-Level Consultative Group on Bilateral Cooperation Against Transnational Organized Crime. Retrieved from the U.S. Department of State Web page: http://www.state.gov/secretary/20092013clinton/rm/2010/03/139196.htm.Google Scholar
Coleman, J. S. (1990). Foundations of social theory. Cambridge, MA: Harvard University Press.Google Scholar
Coll, S. (2004). Ghost wars: The secret history of the CIA, Afghanistan, and bin Laden, from the Soviet invasion to September 10, 2001. New York: Penguin.Google Scholar
Conboy, K. (2006). The second front. Jakarta, Indonesia: Equinox Press.Google Scholar
Cook, K. S., & Cheshire, C. (2013). Social exchange, power, and inequality in networks. In Wittek, R., Snijders, T., & Nee, V. (Eds.), The handbook of rational choice social research (p. 185). Stanford, CA: Stanford University Press.Google Scholar
Cook, K. S., Emerson, R. M., Gilmore, M. R., & Yamagishi, T. (1983). The distribution of power in exchange networks: Theory and experimental results. American Journal of Sociology, 89, 275305.Google Scholar
Coronges, K. A., Miller, K. M., Tamyo, C. I., & Ender, M. G. (2013). A network evaluation of attitudes toward gays and lesbians among U.S. military cadets. Journal of Homosexuality, 60(11), 1557–80.Google Scholar
Costenbender, E., & Valente, T. W. (2003). The stability of centrality measures when networks are sampled. Social Networks, 25, 283307.Google Scholar
CRAN. (2014). Comprehensive R archive network. Retrieved from: http://cran.us.r-project.org/.Google Scholar
Crelinsten, R. (2002). Analysing terrorism and counter-terrorism: A communication model. Terrorism and Political Violence, 14(2), 77122.Google Scholar
Csardi, G., & Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1695. Retrieved from: http://igraph.org.Google Scholar
Dahl, O.-J., & Nygaard, K. (1966). SIMULA: An ALGOL-based simulation language. Communications of the ACM, 9(9), 671–8.Google Scholar
Davulcu, H., Ahmed, S., Gokalp, S., Temkit, H., Taylor, T., Woodward, M., & Amin, A. (2010). Analyzing sentiment markers describing radical and counter-radical elements in online news. IEEE Symposium on Social Intelligence and Networking (SIN), 335–40.Google Scholar
de Nooy, W., Mrvar, A., & Batagelj, V. (2011). Exploratory social network analysis with Pajek (revised and expanded edition). Cambridge: Cambridge University Press.Google Scholar
Dekker, D., Krackhardt, D., & Snijders, T. A. B. (2007). Sensitivity of MRQAP tests to collinearity and autocorrelation conditions. Psychmetrika, 72(4), 563–81.Google Scholar
Department of the Army. (2006, December). Field Manual 3–24 MCWP 3–33.5: Counterinsurgency. Retrieved from the University of Louisville ROTC Web site: http://louisville.edu/armyrotc/files/FM%203–24%20Counterinsurgency.pdf/view.Google Scholar
Diesner, J. (2012). “Uncovering and managing the impact of methodological choices for the computational construction of socio-technical networks from texts” (Doctoral dissertation). Available from ProQuest Dissertations and Theses database (AAI3536166).Google Scholar
Diesner, J., & Carley, K. M. (2005, April). Exploration of communication networks from the Enron email corpus: Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005. Newport Beach, CA.Google Scholar
Diesner, J., (2005). “Revealing and comparing the organizational structure of covert networks with network text analysis.” Paper presented at XXV International Sunbelt Social Network Conference Program, Redondo Beach, CA.Google Scholar
Diesner, J., (2012, June). Impact of relation extraction methods from text data on network data and analysis results: Proceedings ofthe ACM Web Science Conference (WebSci 2012). Evanston, IL.Google Scholar
Diesner, J., Frantz, T. L., & Carley, K. M. (2005). Communication networks from the Enron email corpus: It’s always about the people. Enron is no different. Computational and Mathematical Organizational Theory, 11(3), 201–28.Google Scholar
Diesner, J., Tambayong, L., & Carley, K. M. (2012). Extracting socio-cultural networks of the Sudan from open-source, large-scale text data. Computational and Mathematical Organizational Theory, 18(3), 328–39.Google Scholar
Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1, 269–71.Google Scholar
Dishman, C. (2005). The leaderless nexus: When crime and terror converge. Studies in Conflict & Terrorism, 28, 237–52.Google Scholar
Doreian, P., & Stockman, F. N. (1997). Evolution of social networks. Amsterdam: Gordon and Breach Publishers.Google Scholar
Durkheim, E. (2004). The cultural logic of collective representations. In Lemert, C. (Ed.), Social theory: The multicultural and classic readings (pp. 90–9). Philadelphia, PA: Westview Press.Google Scholar
Eagle, N. (2011). Mobile phones as sensors for social research. Emergent Technologies in Social Research, 492521.Google Scholar
Eagle, N., & Pentland, A. S. (2006). Reality mining: Sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255–68.Google Scholar
Eagle, N., Pentland, A. S., & Lazer, D. (2009). Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106, 15274–8.Google Scholar
Efron, B., & Tibshirani, R. (1993). An introduction to the bootstrap. Chapman and Hall.Google Scholar
Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the dangers of illicit networks. International Security, 33(2), 37.Google Scholar
Emerson, R. M. (1962). Power-dependence relations. American Sociological Review, 27, 3141.Google Scholar
Emerson, R. M. (1981). Social exchange theory. In Rosenberg, M. & Turner, R. H. (Eds.), Social psychology: Sociological perspectives (pp. 3065). New York: Basic Books.Google Scholar
EPFL. (2014). The Scala programming language. Retrieved from: http://www.scala-lang.org/.Google Scholar
Epstein, J. (2006). Generative social science: Studies in agent-based computational modeling. Princeton, NJ: Princeton University Press.Google Scholar
Erickson, B. H. (1981). Secret societies and social structure. Social Forces, 60, 188210.Google Scholar
Everett, M. G., & Borgatti, S. P. (2012). Categorical attribute based centrality: E-I and G-F centrality. Social Networks, 34(4), 562–9.Google Scholar
Everton, S. F. (2012a). Network topography, key players and terrorist networks. Connections, 32(1), 1219. Retrieved from: http://www.insna.org/PDF/Connections/v32/Connections_Everton_AP.pdf.Google Scholar
Everton, S. F. (2012b). Disrupting dark networks. Cambridge: Cambridge University Press.Google Scholar
Everton, S. F., & Cunningham, D. (2012). Detecting significant changes in dark networks. Behavioral Sciences of Terrorism and Political Aggression, 5(2).Google Scholar
Everton, S. F., (2013). Terrorist network adaptation to a changing environment. In Morselli, C. (Ed.), Crime and networks (pp. 287308). London: Routledge.Google Scholar
Faust, K. (1997). Centrality in affiliation networks. Social Networks, 19, 157–91.Google Scholar
Finkel, R. A., & Bentley, J. L. (1974). Quad trees a data structure for retrieval on composite keys. Actainformatica, 4(1), 19.Google Scholar
Finn, P., & Tate, J. (2009, June 16). CIA says it misjudged role of high-value detainee Abu Zubaida, transcript shows. Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2009/06/15/AR2009061503045.html.Google Scholar
Flintoff, C. (2010, April 5). Marines tap social sciences in Afghan war effort. NPR. Retrieved from http://www.npr.org/templates/story/story.php?storyId=125502485.Google Scholar
Flynn, M., Pottinger, M., & Batchelor, P. (2010). Fixing intel: A blueprint for making intelligence relevant in Afghanistan. Washington, DC: Center for a New American Security.Google Scholar
Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1), 3541.Google Scholar
Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–39.Google Scholar
Freeman, L. C. (2004). The development of social network analysis: A study in the sociology of science. Vancouver, BC: Empirical Press.Google Scholar
Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger.Google Scholar
Galula, D. [1964] (2006). Counterinsurgency warfare: Theory and practice. Westport, CT: Praeger Security International.Google Scholar
Gambetta, D. (2009). Codes of the underworld: How criminals communicate. Princeton, NJ: Princeton University Press.Google Scholar
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Upper Saddle River, NJ: Pearson Education.Google Scholar
Gartenstein-Ross, D. (2011, October 19). Terrorism and the coming decade. Retrieved from the Global Brief Web page: http://globalbrief.ca/blog/2011/10/19/terrorism-and-the-coming-decade-of-fragility/.Google Scholar
Gerdes, L. M. (2012). “On the edge of Al-Qaida? Assessing Al-Qaida’s changing role in terrorist plots and attacks” (Doctoral Dissertation). Available from the University of Pittsburgh.Google Scholar
Gerdes, L. M. (2014). MAPPing dark networks: A data transformation strategy to study clandestine organizations. Network Science, 2(2), 213–53.Google Scholar
Gerdes, L. M., & Carley, K. M. (2009). “Estimating the accuracy of media sources on terrorism.” Paper presented to the 29th International Sunbelt Social Network Conference of the International Network for Social Network Analysis, San Diego, CA.Google Scholar
Gerdes, L. M., Ringler, K., & Autin, B. (2014). Assessing the Abu Sayyaf Group’s strategic and learning capacities. Studies in Conflict and Terrorism, 37(3), 267–93.Google Scholar
Giles, J. (2012). Computational social science: Making the links from e-mails to social networks. Nature, 488, 448–50.Google Scholar
Githens-Mazer, J. (2010). Understanding violent radicalisation. International Affairs, 86(4), 998–9.Google Scholar
Githens-Mazer, J. (2012). The rhetoric and reality: Radicalization and political discourse. International Political Science Review, 33(5), 556–67.Google Scholar
Goertz, G. (2006). Social science concepts: A user’s guide, Princeton, NJ: Princeton University Press.Google Scholar
Goertz, G., & Mahoney, J. (2005). Two-level theories and fuzzy-set analysis. Sociological Methods Research, 33, 497538.Google Scholar
Goertz, G., (2012). A tale of two cultures: Qualitative and quantitative research in the social sciences. Princeton, NJ: Princeton University Press.Google Scholar
Goodchild, M. F. (2007). Citizens as sensors: The world of volunteered geography. GeoJournal, 69(4), 211–21.Google Scholar
Goode, E. (2012, April 30). With green beret tactics, combating gang warfare. New York Times. Retrieved from: http://www.nytimes.com/2012/05/01/us/springfield-mass-fights-crime-using-green-beret-tactics.html?pagewanted=all&_r=0.Google Scholar
Goodman, L. A. (1961). Snowball sampling. Annals of Mathematical Statistics, 32(1), 148–70.Google Scholar
Graham, J. M., Carley, K. M., & Cukor, D. (2008, January). Intelligence database creation & analysis: Network-based text analysis versus human cognition: Proceedings of the 41st Hawaii International Conference on System Sciences. Waikoloa, HI.Google Scholar
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–80.Google Scholar
Granovetter, M. S. (1978). Threshold models of collective behavior. The American Journal of Sociology, 83(6), 1420–43.Google Scholar
Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching (Vol. 14): ACM.Google Scholar
Guttman, L. (1950). The basis for scalogram analysis. Measurement and Prediction, 4, 6090.Google Scholar
Hampson, N. (2012). Hacktivism: A new breed of protests in a networked world. Boston College International & Comparative Law Review, 35(2), 511–42.Google Scholar
Hannigan, J., Hernandez, G., Medina, R. M., Roos, P., & Shakarian, P. (2013). “Mining for spatially-near communities in geo-located social networks.” Paper presented to the AAAI Fall Symposium. Arlington, VA.Google Scholar
Hansen, D., Shneiderman, B., & Smith, M. A. (2010). Analyzing social media networks with NodeXL: Insights from a connected world. San Francisco, CA: Morgan Kaufmann.Google Scholar
Hardy, W., & Richard, W. (2006). Operationally significant patterns of associations: Proceedings of IEE Aerospace Conference 2006. Arlington, VA.Google Scholar
Hariharan, R. (2001). “Modeling intersections of geospatial lifelines” (Master thesis). Retrieved from http://www.library.umaine.edu/theses/pdf/hariharanr2001.pdf.Google Scholar
Harris-Hogan, S. (2012). Australian neo-jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35, 298314.Google Scholar
Hayden, N. K. (2009). Terrifying landscapes: Understanding motivations of non-state actors to acquire and/or use weapons of mass destruction. In Ranstorp, M. & Normark, M. (Eds.), Unconventional weapons and international terrorism: Challenges and new approaches (pp. 163–94).New York: Routledge.Google Scholar
Helfstein, S. (2012). Edges of radicalization: Individuals, networks and ideas in violent extremism. Retrieved from the Combating Terrorism Center at West Point: https://www.ctc.usma.edu/v2/wp-content/uploads/2012/06/CTC_EdgesofRadicalization.pdf.Google Scholar
Helfstein, S., (2014, May 16). Risky business: The global threat network and the politics of contraband. Retrieved from the Combating Terrorism Center at West Point Web site: https://www.ctc.usma.edu/posts/risky-business-the-global-threat-network-and-the-politics-of-contraband.Google Scholar
Helfstein, S., (2011). Covert or convenient? Evolution of terror attack networks. Journal of Conflict Resolution, 55(5), 785813.Google Scholar
Hoen, A. G., Hladish, T. J., Eggo, R. M., Lenczner, M., Galvanig, A. P., Brownstein, J. S., & Meyers, L. A. (In press). Epidemic wave dynamics attributable to urban community structure. Journal of Medical Internet Research.Google Scholar
Holland, P. W., & Leinhardt, S. (1971). Transitivity of structural models of small groups. Comparative Group Studies, 2, 107–24.Google Scholar
Homans, G. C. (1961). Social behavior: Its elementary forms. New York: Harcourt Brace Jovanovich.Google Scholar
Horgan, J. (2009). Walking away from terrorism. London: Routledge.Google Scholar
Hornsby, K., & Egenhofer, M. J. (2002). Modeling moving objects over multiple granularities. Annals of Mathematics and Artificial Intelligence, 36(1–2), 177–94.Google Scholar
Hu, D., Kaza, S., & Chen, H. (2009). Identifying significant facilitators of dark network evolution. Journal of the American Society for Information Science and Technology, 60, 655–65.Google Scholar
Hung, B., Kolitz, S., & Ozdaglar, A. (2011). Optimization-based influencing of village social networks in a counterinsurgency:Proceedings of the 4th international conference on social computing, behavioral-cultural modeling and prediction(SBP’11). College Park, MD.Google Scholar
Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). ERGM: A package to, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 2.Google Scholar
Husain, E. (2007). The Islamist: Why I became an Islamic fundamentalist, what I saw inside, and why I left. New York: Penguin Books.Google Scholar
Hutchins, C. E., & Benham-Hutchins, M. (2010). Hiding in plain sight: Criminal network analysis. Computational & Mathematical Organization Theory, 16, 89111.Google Scholar
International Crisis Group. (2002). Indonesia backgrounder: How the Jemaah Islamiyah terrorist network operates. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2006). Terrorism in Indonesia: Noordin’s networks. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2007). Jihadism in Indonesia: Poso on the edge. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2009a). The hotel bombings. Brussels, Belgium: International Crisis Group.Google Scholar
International Crisis Group. (2009b). Indonesia: Noordin Top’s support base. Brussels, Belgium: International Crisis Group.Google Scholar
Itai, A., & Rodeh, M. (1978). Finding a minimum circuit in a graph. SIAM Journal on Computing, 7(4), 413–23.Google Scholar
Iwanski, N., & Frank, R. (2014). The evolution of a drug co-arrest network, in Morselli, C. (Ed.), Crime and networks (pp. 5280). New York: Routledge.Google Scholar
Janzen, D. S., & Saiedian, H. (2005). Test-driven development: Concepts, taxonomy, and future direction. Computer Science and Software Engineering, 33(9), 4350.Google Scholar
Johnson, D. (1975). Finding all the elementary circuits of a directed graph. SIAM Journal on Computing, 4(1), 7784.Google Scholar
Johnson, S. (2001). Emergence: The connected lives of ants, brains, cities, and software. New York: Scribner.Google Scholar
Jones, D. (2009). Understanding the form, function, and logic of clandestine cellular networks: The first step in effective counternetwork operations. Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College.Google Scholar
Jones, D. (2012). Understanding the form, function, and logic of clandestine insurgent and terrorist networks. Tampa, FL: Joint Special Operations University.Google Scholar
Jones, S. (2009). Noordin’s dangerous liaisons, tempo. Jakarta, Indonesia: International Crisis Group.Google Scholar
Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). Strengths and weaknesses of grassroots jihadist networks: The Madrid bombings. Studies in Conflict & Terrorism, 31, 1721.Google Scholar
Joseph, K., Carley, K. M., Filonuk, D., Morgan, G. P., & Pfeffer, J. (2014). Arab Spring: From news data to forecasting. Social Networks and Mining, 4(1). Vienna: Springer.Google Scholar
Kamel, I., & Faloutsos, C. (1993). Hilbert R-tree: An improved R-tree using fractals: Proceedings of the Twentieth International Conference on Very Large Data Bases. Santiago de Chile, Chile. Retrieved from: http://www.informatik.uni-trier.de/~ley/db/conf/vldb/vldb94-500.html.Google Scholar
Kang, C., Pugliese, A., Grant, J., & Subrahmanian, V. (2012). “STUN: Spatio-temporal uncertain (social) networks.” Paper presented at the International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM. Istanbul, Turkey.Google Scholar
Kas, M., Carley, K. M., & Carley, L. R. (2013, August). Incremental closeness centrality for dynamically changing social networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.Google Scholar
Kas, M., Wachs, W., Carley, K. M., & Carley, L. R. (2013, August). Incremental computation of betweenness centrality for dynamically growing networks: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Niagara Falls, ON.Google Scholar
Kean, T. H., Hamilton, L., & Rhodes, B. (2006). Without precedent: The inside story of the 9/11 Commission. New York: Alfred A. Knopf.Google Scholar
Keegan, B., Ahmed, M. A., Williams, D., Srivastava, J., & Contractor, N. (2010). “Dark gold: Statistical properties of clandestine networks in massively multiplayer online games.” Paper presented at the Social Computing, Second International Conference on IEEE.Google Scholar
Kempe, D. K. (2003). “Maximizing the spread of influence through a social network.” Paper presented at the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). Washington, DC.Google Scholar
Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park: Pennsylvania State University Press.Google Scholar
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M. W., Bloom, M., & Braddock, K. (2013). Organisational adaptation in an activist network: Social networks, leadership, and change in al-Muhajiroun. Applied Ergonomics, 44(5), 739–47.Google Scholar
Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K. M., Bigrigg, M., Bloom, M., & Braddock, K. (2015). Competitive adaptation in terrorist networks: Preliminary findings from an Islamist case study. In Stedmon, A., Lawson, G., & Saikayasit, R. (Eds.), Hostile intent & counter-terrorism: Human factors theory and application (pp. 177–93). London: Ashgate.Google Scholar
Kerry, J. (1997). The new war: The web of crime that threatens America’s security. New York: Simon & Schuster.Google Scholar
Kilcullen, D. (2009). The accidental guerrilla: Fighting small wars in the midst of a big one. Oxford: Oxford University Press.Google Scholar
Kilcullen, D. (2010). Counterinsurgency. Oxford: Oxford University Press.Google Scholar
Kim, L. (2011). Media framing for stem cell research: A cross-national analysis of political representation of science between the UK and South Korea. Journal of Science Communication, 10(3), 117.Google Scholar
Ki-moon, B. (2013, May 20). Report of the secretary-general on the activities of the United Nations Regional Office for Central Africa and on the Lord’s Resistance Army-affected areas. Retrieved from: http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2013/297.Google Scholar
Ki-moon, B. (2014, September 23). Remarks at the Climate Summit press conference (including comments on Syria). UN News Centre. Retrieved from: http://www.un.org/apps/news/infocus/sgspeeches/statments_full.asp?statID=2356#.VCMTXmNtrKk.Google Scholar
Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E., & Makse, H. A. (2010). Identification of influential spreaders in complex networks. Nature Physics, 6, 888–93.Google Scholar
Kivela, M., Arenas, A., Barthelemy, M., Gleeson, J., Moreno, Y., & Porter, M. (2014). Multilayer networks. Journal of Complex Networks, 2(3), 203–71.Google Scholar
Klerks, P. (2001). The network paradigm applied to criminal organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections, 24, 5365.Google Scholar
Knuth, D. E. (1984). Literate programming. The Computer Journal, 27(2), 97111.Google Scholar
Koka, B. R., & Prescott, J. E. (2002). Strategic alliances as social capital: A multidimensional view. Strategic Management Journal, 23(9), 795816.Google Scholar
Koliba, C., Meek, J. W., & Zia, A. (2011). Governance networks in public administration and public policy. Boca Raton, FL: Taylor & Francis/CRC Press.Google Scholar
Koopman, J. S., Singh, P., & Ionides, E. L. (2014). Transmission modeling to enhance surveillance system function. Transforming Public Health Surveillance. Elsevier.Google Scholar
Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict & Terrorism, 29, 559–75.Google Scholar
Kossinets, G. (2006). Effects of missing data in social networks. Social Networks, 28, 247–68.Google Scholar
Kossinets, G., & Watts, D. J. (2006). Empirical analysis of an evolving social network. Science, 311, 8890.Google Scholar
Krackhardt, D. (1987). QAP partialling as a test of spuriousness. Social Networks, 9(2), 171–86.Google Scholar
Krackhardt, D., & Kilduff, M. (2002). Structure, culture, and Simmelian ties in entrepreneurial firms. Social Networks, 24(3), 279–90.Google Scholar
Krebs, V. E. (2002a). Mapping networks of terrorist cells. Connections, 24(3), 4352.Google Scholar
Krebs, V. E. (2002b). Uncloaking terrorist networks. First Monday, 7(4). Retrieved from: http://firstmonday.org/ojs/index.php/fm/article/view/941/863.Google Scholar
Krempel, L., & Plümper, T. (2003). Exploring the dynamics of international trade by combining the comparative advantages of multivariate statistics and network visualizations. Journal of Social Structure, 4(1) (electronic).Google Scholar
Kumar, S., Barbier, G., Abbasi, M. A., & Liu, H. (2011). Relief, TweetTracker: An analysis tool for humanitarian and disaster relief: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, ICWSM. Barcelona, Spain.Google Scholar
Kumar, S., Morstatter, F., & Liu, H. (2013). Twitter data analytics. New York: Springer.Google Scholar
Lambiotte, R., Blondel, V. D., de Kerchove, C., Huens, E., Prieur, C., Smoreda, Z., & Van Dooren, P. (2008). Geographical dispersal of mobile communication networks. Physica A: Statistical Mechanics and Its Applications, 387(21), 5317–25.Google Scholar
Lanham, M., Morgan, G., & Carley, K. M. (2011). Social network modeling and simulation of integrated resilient command and control (C2) in contested cyber environments. In Levis, A., Carley, K. M., & Karsai, G. (Eds.), Resilient architectures for integrated command and control in a contested cyber environment (pp. 6394). Fairfax, VA: The Volgenau School of Engineering Department of Electrical and Computer Engineering System Architectures Laboratory, George Mason University.Google Scholar
Lake, E. (2011, March 10). China deemed biggest threat to U.S. Washington Times. Retrieved from: http://www.washingtontimes.com/news/2011/mar/10/china-deemed-biggest-threat-to-us/?page=all.Google Scholar
Lawler, E. J. (2001). An affect theory of social exchange. American Journal of Sociology, 107(2), 321–52.Google Scholar
Leavitt, H. (1951). Some effects of certain communication patterns on group performance. The Journal of Abnormal and Social Psychology, 46(1), 3850.Google Scholar
Leenders, R. T. A. J. (1996). Evolution of friendship and best friendship choices. Journal of Mathematical Sociology, 21, 133–48.Google Scholar
Leinhardt, S. (Ed.) (1977). Social networks: A developing paradigm. New York: Academic Press.Google Scholar
Lindenberg, S. (1992). The method of decreasing abstraction. In Coleman, J. S. & Fararo, T. J. (Eds.), Rational choice theory: Advocacy and critique (pp. 320). London: Sage.Google Scholar
Liu, J., Chen, J., & Ye, J. (2009). Large-scale sparse logistic regression: Proceedings of ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), 547–56.Google Scholar
Lusseau, D., Schneider, K., Boisseau, O., Haase, P., Slooten, E., & Dawson, S. (2003). The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology, 54, 396405.Google Scholar
Mackenzie, K. D. (1966). Structural centrality in communications networks. Psychometrika, 31(1), 1725.Google Scholar
Magouirk, J., Atran, S., & Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict & Terrorism, 31, 116.Google Scholar
Malensek, M., Lee Pallickara, S., & Pallickara, S. (2013). Exploiting geospatial and chronological characteristics in data streams to enable efficient storage and retrievals. Future Generation Computer Systems, 29(4), 1049–61.Google Scholar
Mancuso, M. (2014). Not all madams have a central role: Analysis of a Nigerian sex trafficking network. Trends in Organized Crime, 17, 6688.Google Scholar
Markovsky, B., Willer, D., & Patton, T. (1988). Power relations in exchange networks. American Journal of Sociology, 53, 220–36.Google Scholar
Markovsky, B., Willer, D., (1990). Reply to Yamagishi and Cook: Theory, evidence, and intuition. American Sociological Review, 5, 300–4.Google Scholar
Mauss, M. (1950). The gift: The form and reason for exchange in archaic societies. New York: Norton.Google Scholar
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415–33.Google Scholar
McCulloh, I., Armstrong, H., & Johnson, A. (2013). Social network analysis with applications. Hoboken, NJ: Wiley.Google Scholar
McCulloh, I., & Carley, K. M. (2011). Detecting change in longitudinal social networks. Journal of Social Structure, 12(3). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//McCullohCarley.pdf.Google Scholar
McDonald, J. H. (2009). Spearman rank correlation. In McDonald, J. H., Handbook of biological statistics (2nd ed.). Baltimore, MD: Sparky House Publishing. Retrieved from: http://udel.edu/~mcdonald/statspearman.html.Google Scholar
McPherson, J. M., & Rangermoore, J. R. (1991). Evolution on a dancing landscape: Organizations and networks in dynamic blau space. Social Forces, 70, 1942.Google Scholar
Melamed, D., Breiger, R. L., & Schoon, E. (2013). The duality of clusters and statistical interactions. Sociological Methods & Research, 42(1), 4159.Google Scholar
Melamed, D., Schoon, E., Breiger, R. L., Asal, V. H., & Rethemeyer, R. K. (2012). Using organizational similarity to identify statistical interactions for improving situational awareness of CBRN activities. Social Computing, Behavioral-Cultural Modeling, and Prediction Lecture Notes in Computer Science, 7227, 61–8.Google Scholar
Merton, R. K. (1968). The Matthew effect in science. Science, 159, 5663.Google Scholar
Milgram, S. (1967). The small world problem. Psychology Today, 1(1), 61–7.Google Scholar
Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 8197.Google Scholar
Miller, H. J. (1991). Modeling accessibility using space-time prism concepts within geographical information systems. International Journal of Geographical Information System, 5(3), 287301.Google Scholar
Milward, H. B., & Raab, J. (2006). Dark networks as organizational problems: Elements of a theory. International Public Management Journal, 9, 333–60.Google Scholar
Molm, L. D., Collett, J. L., & Schaefer, D. R. (2007). Building solidarity through generalized exchange: A theory of Reciprocity 1. American Journal of Sociology, 113(1), 205–42.Google Scholar
Molm, L., Schaefer, D., & Collett, J. (2009). Fragile and resilient trust: Risk and uncertainty in negotiated and reciprocal Exchange. Sociological Theory, 27, 132.Google Scholar
Moody, J. (2005). Fighting a hydra: A note on the network embeddedness of the war on terror. Structure and Dynamics, 1(2). Retrieved from: http://escholarship.org/uc/item/7x3881bs.Google Scholar
Morgan, J. D., & Steinberg, P. E. (2013). Testing the usability of time-geographic maps for crime mapping. In Leitner, M. (Ed.), Crime modeling and mapping using geospatial technologies (pp. 339–66). New York: Springer.Google Scholar
Morselli, C. (2009). Inside criminal networks. New York: Springer.Google Scholar
Morselli, C. (2010). Assessing vulnerable and strategic positions in a criminal network. Journal of Contemporary Criminal Justice, 26, 382–92.Google Scholar
Morselli, C., Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–53.Google Scholar
Morselli, C., & Petit, K. (2007). Law-enforcement disruption of a drug importation network. Global Crime, 8(2), 109–30.Google Scholar
Morton, G. M. (1966). A computer oriented geodetic data base and a new technique in file sequencing: Ottawa, ON: International Business Machines Company.Google Scholar
Nagl, J. A. (2005). Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam. Chicago, IL: University of Chicago Press.Google Scholar
Nasiri, O. (2006). Inside the jihad: My life with al Qaeda, a spy’s story. New York: Basic Books.Google Scholar
National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: United States Government Printing Office.Google Scholar
National Research Council. (2003). Dynamic social network modeling and analysis: Workshop summary and papers. Washington, DC: The National Academies Press.Google Scholar
Newman, M. E. J. (2001). Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Physical Review E, 64, 016132.Google Scholar
Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review E, 69(2), 026113.Google Scholar
Nieminen, J. (1974). On the centrality in a graph. Scandinavian Journal of Psychology, 15(1), 332–6.Google Scholar
Obama, B. H. (2014, May 28). Remarks by the president at the United States Military Academy commencement ceremony. Retrieved from the White House Web page: http://www.whitehouse.gov/the-press-office/2014/05/28/remarks-president-united-states-military-academy-commencement-ceremony.Google Scholar
Odersky, M., Altherr, P., Cremet, V., Emir, B., Manth, S., Micheloud, S., … Zenger, M. (2006). An overview of the Scala programming language (2nd Ed.). Technical report LAMP-REPORT-2006-001. Retrieved from: http:///www.scala-lang.org/docu/files/ScalaOverview.pdf.Google Scholar
Oliver, K., Crossley, N., Edwards, G., Koskinen, J., & Everett, M. (2014, June 25). “Covert networks: Structures, processes and types.” Mitchell Centre Working Paper. Retrieved from: http://www.socialsciences.manchester.ac.uk/medialibrary/research/mitchell/covertnetworks/wp/working_paper1.pdf.Google Scholar
One boy’s journey to jihad. (2010, January 3). Sunday Times (London).Google Scholar
Openshaw, S. (1983). The modifiable areal unit problem. Norwich, UK: Geo Books.Google Scholar
Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32, 245–51.Google Scholar
Ostrom, E. (2005). Understanding institutional diversity. Princeton, NJ: Princeton University Press.Google Scholar
Padrón, B., Nogales, M., & Traveset, A. (2011). Alternative approaches of transforming bimodal into unimodal mutualistic networks: The usefulness of preserving weighted information. Basic and Applied Ecology, 12, 713–21.Google Scholar
Patton, T., & Willer, D. (1990). Connection and power in centralized exchange networks. Journal of Mathematical Sociology, 16, 3149.Google Scholar
Paulo, D., Fischl, B., Markow, T., Martin, M., & Shakarian, P. (2013). “Social network intelligence analysis to combat street gang violence.” Paper presented at the International Symposium on Foundations of Open Source Intelligence and Security Informatics. Niagara Falls, ON.Google Scholar
Pawitan, Y. (2001). In all likelihood: Statistical modelling and inference using likelihood. Oxford: Oxford University Press.Google Scholar
Pedahzur, A., & Perliger, A. (2006). The changing nature of suicide attacks: A social network perspective. Social Forces, 84, 19872008.Google Scholar
Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. Social Forces, 84, 19872008.Google Scholar
Petersen, R., Rhodes, C., & Wiil, U. (2011). Node removal in criminal networks: Proceedings of the European Intelligence and Security Informatics Conference (EISIC). Athens, Greece.Google Scholar
Pfeffer, J., & Carley, K. M. (2012a). Social networks, social media, social change. In Schmorrow, D. D. & Nicholson, D. M. (Eds.), Advances in design for cross-cultural activities, Part II (pp. 273–82).Boca Raton, FL: CRC Press.Google Scholar
Pfeffer, J., (2012b). Rapid modeling and analyzing networks extracted from pre-structured news articles. Computational and Mathematical Organizational Theory, 18(3), 280–99.Google Scholar
Pfeffer, J., (2012c). k-Centralities: Local approximations of global measures based on shortest paths: Proceedings of the WWW Conference 2012, 1st International Workshop on Large Scale Network Analysis (LSNA 2012). Lyon, France.Google Scholar
Philby, P. (2013, June 10). The Tor system: Welcome to the dark Internet where you can search in secret. Independent. Retrieved from: http://www.independent.co.uk/news/media/online/the-tor-system-welcome-to-the-dark-internet-where-you-can-search-in-secret-8651364.html.Google Scholar
Phithakkitnukoon, S., Husna, H., & Dantu, R. (2008). Behavioral entropy of a cellular phone user. In Liu, H., Salerno, J., & Young, M. J. (Eds.), Social computing, behavioral modeling, and prediction (pp. 160–7). New York: Springer.Google Scholar
Ponieman, N. B., Salles, A., & Sarraute, C. (2013). Human mobility and predictability enriched by social phenomena information: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara Falls, NY.Google Scholar
Powell, W. W. (1985). Hybrid organizational arrangements: New form or transitional development?California Management Review, 30, 6787.Google Scholar
Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. In Staw, B. M. & Cummings, L. L. (Eds.), Research in organizational behavior: An annual series of analytical essays and critical reviews (pp. 295336). Greenwich, CT: JAI Press.Google Scholar
Pregibon, D. (1981). Logistic regression diagnostics. The Annals of Statistics, 9(4), 705–24.Google Scholar
Press, W. H. (2007). Numerical recipes: The art of scientific computing (3rd. ed.). New York: Cambridge University Press.Google Scholar
Raab, J., & Milward, H. B. (2003). Dark networks as problems. Journal of Public Administration Research and Theory, 13(4), 413–39.Google Scholar
Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.Google Scholar
Ratcliffe, J. H. (2006). A temporal constraint theory to explain opportunity-based spatial offending patterns. Journal of Research in Crime and Delinquency, 43(3), 261–91.Google Scholar
Raymond, C. Z. (2010). Al Muhajiroun and Islam4UK: The group behind the ban. Retrieved from the International Centre for the Study of Radicalisation and Political Violence at King’s College Web site: http://icsr.info/2010/05/al-muhajiroun-and-islam4uk-the-group-behind-the-ban/.Google Scholar
Reed, B. (2007). A social network approach to understanding an insurgency. Parameters, 38, 1930. Retrieved from: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA486072.Google Scholar
Ressa, M. (2003). Seeds of terror: An eyewitness account of al-Qaeda’s newest center of operations in southeast Asia. New York: Free Press.Google Scholar
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2(2). Retrieved from: http://www.hsaj.org/?article=2.2.8.Google Scholar
Rew, R., & Davis, G. (1990). NetCDF: An interface for scientific data access. Computer Graphics and Applications, IEEE, 10(4), 7682.Google Scholar
Ripley, R. M., Snijders, T. A. B., & Preciado, P. (2012). Manual for SIENA, Retrieved from University of Oxford Web site: http://www.stats.ox.ac.uk/~snijders/siena/SIENA_Manual.pdf.Google Scholar
Roberts, N. (2011). Beyond smokestacks and silos: Open-source, web-enabled coordination in organizations and networks. Public Administration Review, 71(5), 677–93.Google Scholar
Roberts, N., & Everton, S. F. (2011). Strategies for combating dark networks. Journal of Social Structure, 12(2). Retrieved from: http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf.Google Scholar
Robins, G. (2009). Understanding individual behaviors within covert networks: The interplay of individual qualities, psychological predispositions, and network effects. Trends in Organized Crime, 12(2), 166–87.Google Scholar
Rodriguez, J. A. (2005). “The March 11th terrorist network: In its weakness lies its strength.” EPP-LEA Working Papers, Department de Sociologica i Analisi de les Organitzacions: Universitat de Barcelona, Barcelona, Spain.Google Scholar
Ronfeldt, D., & Arquilla, J. (2001a). Networks, netwars, and the fight for the future. First Monday, 6(10). Retrieved from: http://www.firstmonday.dkJissues/issue6_10lindex.html.Google Scholar
Ronfeldt, D., (2001b). What next for networks and netwars? In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and netwars (pp. 311–61). Santa Monica, CA.Google Scholar
Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4), 581603.Google Scholar
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.Google Scholar
Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: University of Pennsylvania Press.Google Scholar
Salganik, M. J., & Heckathorn, D. D. (2004). Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology, 34(1), 193240.Google Scholar
Sawyer, J., & Ackerman, G. (2012). “Promethean journeys: Examining the mechanisms by which terrorists acquire new technologies of lethality.” Paper presented at the Annual Meeting of the International Studies Association. San Diego, CA.Google Scholar
Schmitt, E., & Perlez, J. (2009, February 24). Strikes worsen Qaeda threat, Pakistan says. New York Times. Retrieved from: http://www.nytimes.com/2009/02/25/world/asia/25drones.html?pagewanted=all&_r=0.Google Scholar
Schroeder, J., Xu, J., & Chen, H. (2003). Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., & Madhusudan, T. (Eds.), Intelligence and security informatics (pp. 168–80). Berlin, Germany: Springer.Google Scholar
Schwartz, D. M., & Rouselle, D. A. (2009). Using social network analysis to target criminal networks. Trends in Organised Crime, 12, 188207.Google Scholar
Seber, G. A. F., & Lee, A. J. (2003). Linear regression analysis. Hoboken, NJ: Wiley Interscience.Google Scholar
Seidman, S. B. (1983). Network structure and minimum degree. Social Networks, 5(3), 267–87.Google Scholar
Senate condemns crimes of Joseph Kony and Lord’s Resistance Army. News release of U.S. Senator Christopher Coons of Delaware. Retrieved from: http://www.coons.senate.gov/newsroom/releases/release/senate-condemns-crimes-of-joseph-kony-and-lords-resistance-army.Google Scholar
Shakarian, P., & Paulo, D. (2012). “Large social networks can be targeted for viral marketing with small seed sets.” Paper presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM-2012). Istanbul, Turkey.Google Scholar
Shakarian, P., Salmento, J., Pulleyblank, W., & Bertetto, J. (2014). “Reducing gang violence through network influence based targeting of social programs.” Paper presented at the 20th ACM SIGKDD Conference on Knowledge, Discovery, and Data Mining (KDD). New York, NY.Google Scholar
Shakarian, P., Simari, G., & Schroeder, R. (2013). “MANCaLog: A logic for multi-attribute network cascades.” Paper presented at the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-13). St. Paul, MN.Google Scholar
Shalev, M. (2007). Limits and alternatives to multiple regression in comparative research. In Mjøset, L. & Clausen, T. H. (Eds.), Comparative social research (symposium on methodology in comparative research) (pp. 261308).Elsevier.Google Scholar
Sheppard, Z. (2010, September 19). 5,000,000,000. [Blog post]. Retrieved from http://blog.flickr.net/en/2010/09/19/5000000000/.Google Scholar
Silver, N. (2012). The signal and the noise: The art and science of prediction. New York: Penguin Books.Google Scholar
Simcox, R., Stuart, H., & Ahmed, H. (2010). Islamist terrorism: The British connections. Retrieved from the Henry Jackson Society Web page: http://henryjacksonsociety.org/2011/07/07/islamist-terrorism-the-british-connections/.Google Scholar
Simmel, G. (1906). The sociology of secrecy and of secret societies. American Journal of Sociology, 11, 441–98.Google Scholar
Simmel, G. (1950). The secret society. In Wolf, K. H. (Ed.), The sociology of Georg Simmel (pp. 345–76). New York: The Free Press.Google Scholar
Simmel, G. (2008). Sociological theory, New York: McGraw–Hill.Google Scholar
Singer, P. W. (2012, November). The cyber terror bogeyman. Retrieved from the Brookings Institute Web page: http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer.Google Scholar
Skillicorn, D. B. (2006). Social network analysis via matrix decompositions. In Popp, R. L. & Yen, J. (Eds.), Emergent information technologies and enabling policies for counter-terrorism (pp. 367–91). Hoboken, NJ: Wiley Interscience.Google Scholar
Skvoretz, J., & Willer, D. (1993). Exclusion and power: A test of four theories of power in exchange networks. American Sociological Review, 58, 801–18.Google Scholar
Snijders, T. A. B. (2001). The statistical evaluation of social network dynamics. Sociological Methodology, 31, 361–95.Google Scholar
Snijders, T. A. B., Van de Bunt, G. G., & Steglich, C. E. G. (2010). Introduction to stochastic actor-based models for network dynamics. Social Networks, 32(1), 4460.Google Scholar
Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251–74.Google Scholar
Spearman, C. (1904). The proof and measurement of association between two things. American Journal of Psychology, 15, 72101.Google Scholar
Sprinzak, E. (2000). Rational fanatics. Foreign Policy, 122. Retrieved from: http://www.foreignpolicy.com/articles/2000/09/01/rational_fanatics.Google Scholar
Stefik, M., & Bobrow, D. G. (1985). Object-oriented programming: Themes and variations. AI Magazine, 6(4), 40.Google Scholar
Steglich, C., Snijders, T. A. B., & Pearson, M. (2010). Dynamic networks and behavior: Separating selection from influence. Sociological Methodology, 40(1), 329–93.Google Scholar
Stevenson, R., & Crossley, N. (2014). Change in covert social movement networks: The “inner circle” of the Provisional Irish Republic Army. Social Movement Studies, 13, 7091.Google Scholar
Strogatz, S. H. (2001). Exploring complex networks. Nature, 410, 268–76.Google Scholar
Suskind, R. (2006). The one percent doctrine: Deep inside America’s pursuit of its enemies since 9/11. New York: Simon & Schuster.Google Scholar
Thomas, T., Kiser, S., & Casebeer, W. (2005). Warlords rising: Confronting violent non-state actors. Lanham, MD: Lexington Books.Google Scholar
Thomas, T. L. (2003). Al-Qaida and the Internet: The danger of “cyberplanning.” DTIC, ADA485810.Google Scholar
Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society Series B, 58(1), 267–88.Google Scholar
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., & Amin, A. (2011). A system for ranking organizations using social scale analysis. European Intelligence and Security Informatics Conference (EISIC), 308–13.Google Scholar
Tikves, S., Banerjee, S., Temkit, H., Gokalp, S., Davulcu, H., Sen, A., Corman, S., Woodward, M., Rohmaniyah, I., & Amin, A. (2013). A system for ranking organizations using social scale analysis. Social Network Analysis and Mining Journal, 3(3), 313–28.Google Scholar
Tikves, S., Gokalp, S., Temkit, M., Banerjee, S., Ye, J., & Davulcu, H. (2012). Perspective analysis for online debates. Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 898–905.Google Scholar
Tilly, C. (2004a). Social movements, Boulder, CO: Paradigm Publishers.Google Scholar
Tilly, C. (2004b). Trust and rule. Theory and Society, 33, 130.Google Scholar
Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press.Google Scholar
Tong, H., Sakurai, Y., Eliassi-Rad, T., & Faloutsos, C. (2008). Fast mining of complex time-stamped events: Proceedings of the 17th ACM Conference on Information and Knowledge Management. Napa Valley, CA.Google Scholar
Travers, J., & Milgram, S. (1969). An experimental study of the small world problem. Sociometry, 32(4), 425–43.Google Scholar
Tsvetovat, M., & Carley, K. M. (2003). “Bouncing back: Recovery mechanisms of covert networks.” Paper presented at the NAACSOS Conference proceedings, Pittsburgh, PA.Google Scholar
Tsvetovat, M., (2005). Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. Journal of Social Structure, 6. Retrieved from: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCarley/.Google Scholar
Typesafe. (2014). Akka. Retrieved from: http://akka.io/.Google Scholar
Ungerer, C. (2011). Jihadists in jail: Radicalisation and the Indonesian prison experience. Barton, Australia: Australian Strategic Policy Institute (ASPI).Google Scholar
United Nations Office on Drugs and Crime (UNODC). (2011). Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. (Research report). Retrieved from: http://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf.Google Scholar
Ugarte, E. F., & Turner, M.M. (2011). What is the “Abu Sayyaf”? How labels shape reality. Pacific Review, 24(4), 397420.Google Scholar
Usher, A. (2010). Temporal algorithms for processing and analyzing large datasets. Sterling Data LLC Report.Google Scholar
Valente, T. W. (2010). Social networks and health: Models, methods, and applications. New York: Oxford University Press.Google Scholar
Van de Bunt, G. G., Van Duijin, M. A. J., & Snijders, T. A. B. (1999). Friendship networks through time: An actor-oriented statistical network model. Computational and Mathematical Organization Theory, 5, 167–92.Google Scholar
Van de Geer, J. P. (1971). Introduction to multivariate analysis for the social sciences. San Francisco, CA: W. H. Freeman and Co.Google Scholar
Van Holt, T., Johnson, J. C., Brinkley, J., Carley, K. M., & Caspersen, J. (2012). Structure of ethnic violence in Sudan: An automated content, meta-network, and geospatial analytical approach. Computational and Mathematical Organizational Theory, 18, 340–55.Google Scholar
Van Meter, K. M. (2001). Terrorists/liberators: Researching and dealing with adversary social networks. Connections, 24(3), 6678.Google Scholar
Walker, H. A., Thye, S. R., Simpson, B., Lovaglia, M. J., Willer, D., & Markovsky, B. (2000). Network exchange theory: Recent developments and new directions. Social Psychology Quarterly, 63(4), 324–37.Google Scholar
Wallace, A. (1956). Revitalization movements. American Anthropologist, 58, 264–81.Google Scholar
Waltz, K. (1959). Man, the state, and war: A theoretical analysis. New York: Columbia University Press.Google Scholar
Wang, D. J., Shi, X., McFarland, D. A., & Leskovec, J. (2012). Measurement error in network data: a re-classification. Social Networks, 34(4), 396409.Google Scholar
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge: Cambridge University Press.Google Scholar
Watts, D. (2004). Six degrees: The science of a connected age. New York: WW Norton.Google Scholar
Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of “small-world” networks. Nature, 393, 440–2.Google Scholar
Weiss, G. M. (2005). Data mining in telecommunications. In Maimon, O. & Rokach, L. (Eds.), Data mining and knowledge discovery handbook: A complete guide for practitioners and researchers (pp. 11891201). Norwell, MA: Kluwer Academic Publishers.Google Scholar
West, B. J., & Grigolini, P. (2011). Complex webs: Anticipating the improbable. Cambridge: Cambridge University Press.Google Scholar
Wiemann, G. (2004). Www.terror.net: How modern terrorism uses the Internet. Retrieved from the United States Institute of Peace Web site: http://www.usip.org/sites/default/files/sr116.pdf.Google Scholar
Wigner, E. P. (1960). The unreasonable effectiveness of mathematics in the natural sciences. Richard Courant lecture in mathematical sciences delivered at New York University, May 11, 1959. Communications on Pure and Applied Mathematics, 13(1), 114.Google Scholar
Wiktorowicz, Q. (2005). Radical Islam rising: Muslim extremism in the west. Lanham, MD: Rowman & Littlefield.Google Scholar
Willer, D., Van Assen, M., & Emanuelson, P. (2012). Analyzing large scale exchange networks. Social Networks, 34(2), 171–80.Google Scholar
Williams, C. (2003). The question of “links” between al Qaeda and southeast Asia. in Ramakrishna, K. and Tan, S. S. (Eds.), After Bali: The threat of terrorism in southeast Asia (pp. 8396).Singapore: World Scientific and the Institute of Defense and Strategic Studies.Google Scholar
Williams, P. (2001). Transnational criminal networks. In Arquilla, J. (Ed.), Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.Google Scholar
Xu, J., & Chen, H. (2003). Untangling criminal networks: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 2665, 232–48.Google Scholar
Xu, J., & Chen, H. (2008, October). The topology of dark networks. Communications of the ACM, 51(10), 5865.Google Scholar
Xu, J., Hu, D., & Chen, H. (2009). The dynamics of terrorist networks: Understanding the survival mechanisms of global Salafi jihad. Journal of Homeland Security and Emergency Management, 6(1).Google Scholar
Xu, J., Marshall, B., Kaza, S., & Chen, H. (2004). Analyzing and visualizing criminal network dynamics: A case study. Intelligence and Security Informatics, Lecture Notes in Computer Science, 3073, 359–77.Google Scholar
Yamagishi, T., & Cook, K. S. (1990). Power relations in exchange networks: A comment on “network exchange theory.”American Sociological Review, 55, 297300.Google Scholar
Yasin, N. A. (2010, December 17). Counter ideology: Battle for hearts and minds in Indonesia. RSIS Commentaries, 173. Retrieved from: http://www.rsis.edu.sg/rsis-publication/rsis/1463-counter-ideology-battle-for-h/#.VCCOtmNtrKl.Google Scholar
Zhang, H., Korayem, M., You, E., & Crandall, D. J. (2012). Beyond co-occurrence: Discovering and visualizing tag relationships from geo-spatial and temporal similarities: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining. Seattle, WA.Google Scholar
Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance. Ann Arbor: University of Michigan Press.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Edited by Luke M. Gerdes, United States Military Academy
  • Book: Illuminating Dark Networks
  • Online publication: 05 August 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316212639.016
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Edited by Luke M. Gerdes, United States Military Academy
  • Book: Illuminating Dark Networks
  • Online publication: 05 August 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316212639.016
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Edited by Luke M. Gerdes, United States Military Academy
  • Book: Illuminating Dark Networks
  • Online publication: 05 August 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316212639.016
Available formats
×