SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
from the c recommon operational research environment
quarterly newsletter
INSIDETHE ISSUE
page 2:
COREnet:The fusion of SNA with Docrine
page 3:
Research in Action: SSE/MOVES Update
page 4:
Publications Focus: Social Media Exploitation
page 5:
Publications: 2013, 2014, 2015
page 5:
Retired Assistant Police Chief Joins the CORE
LabTeam
page 6:
Programs Education and Outreach: Peru
Partnership
page 7:
Greg Freeman Farewell
page 7:
Welcome to LTC(P) Pat Duggan
PROVIDING
WARFIGHTERS
WITH A UNIQUE
VIEW OFTHE
BATTLEFIELD
continued on page 6 
CORE STAFF
CO-DIRECTOR
LTC Glenn Johnson
CO-DIRECTOR AND
ASSISTANT PROFESSOR
Dr. Sean Everton
PROFESSOR
Dr. Nancy Roberts
SENIOR LECTURER
KristenTsolis
PROGRAM MANAGER
Karen Flaherty
FACULTY ASSOCIATE FOR
INSTRUCTION
Dan Cunningham
FACULTY ASSOCIATE FOR
RESEARCH
Michael Stevens
FACULTY ASSOCIATE FOR
RESEARCH
Rob Shcroeder
FACULTY ASSOCIATE FOR
RESEARCH
Dan LeRoy
IT SUPPORT
Malcolm Mejia
RESEARCH ANALYST
Michael Aspland
TheCOREProgramisaCenterwithintheDefenseAnalysisdepartmentatNPS.
GoalsofCOREareto:
• Expose a generation of military
officers to cutting-edge visual analytical methodolgies —produce Intellectual
Capital
• Leader in education and research designed to operationalize advanced analytical
methods —leverage emerging information technologies and analytical software
packages to enable field operatives
• Advance DOD’s Network Analysis capabilities — Illuminating Blue, Grey and Red
Networks — Beyond Link Analysis
•Maintaincurrencywiththeleadinginnovationsinvisualanalyticmethods,research
andrelatedtechnologies — 
OSDandSOCOM’sfutureslookatadvancedanalyticalmethods
• Benefit theWarfighter —reduce the risk of uncertainty in decision making
SPRING 2015/ISSUE 5
A Strategic Interagency
Partnership to Enhance Border
Security
Mr. Steven T. Franzoni, Managment Program Director, U.S.B.P. Special
Opertions Group
The Customs and Border Protection (CBP)
U.S. Border Patrol (USBP) Special Operations
Group (SOG) was selected by the Office of
Border Patrol (OBP) to manage the Cross-
Agency Distributed Edge Network Analysis
(CADENA) Pilot. The Pilot was funded and
facilitated by the Advanced Analytics Division
of the Technical Support Working Group
(TSWG) of the Combatting Terrorism 
Technical Support Office (CTTSO).
The pilot commenced in August 2013 with the
following goals:
•	 Deliver Advanced Analytic Capabilities
across Government Agencies
•	 Integrate advance Network/Link
Analysis methodology training with
technology
•	 Improve information integration and
change detection
•	 Increase intelligence collection and
reporting from field elements
•	 Rapid information processing and
improved collaboration
NPS/CORE Lab Contributions to
the CADENA Pilot
The NPS/CORE Lab was sponsored by
CTTSO to assist SOG by providing training
that would maximize the capabilities of
CADENA. The CORE Lab was instrumental
in providing Social Network Analysis (SNA)
training which was the analytical foundation
for the pilot. A total of eighty interagency and
DOD students were taught over four courses
at three different locations; El Paso, TX (2)
(USBP El Paso [EPT] Sector), Tucson, AZ
(USBP Tucson [TCA] Sector), and McAllen,
TX (USBP Rio Grande Valley [RGV] Sector).
PAGE 2
COREnet:  The Fusion of SNA with Doctrine
MAJ William Orkins  MAJ Carla Kiernan
Conducting target audience analysis (TAA) is a time consuming
endeavor that requires sifting through numerous unclassified
and classified information sources, conducting face-to-face
(F2F) interviews, and reviewing survey data, just to name a
few. Understanding target audiences and the social, political,
economic, and cultural influences on their collective behaviors
is increasingly critical to mission success. Military doctrine pro-
vides a guideline for the systematic analysis of human behavior,
yet it is incomplete regarding a specific situation with complex
interactions among socio-cultural factors. To fill this gap, the
military needs analytical methods that enable quick, effective,
and reliable analysis about human behavior to comprehend the
complexities of the mission.
Enhancing existing doctrine to incorporate advanced ana-
lytical methodologies was the purpose of this capstone. To
do so required a two-fold approach: 1) Create a method to
apply social network
analysis (SNA), social
movement theory (SMT),
and influence theory to
existing Military Infor-
mation Support Opera-
tions (MISO) doctrine,
and 2) Develop a scalable
web-based application that
assists with visualizing
and analyzing open source
data to draw meaningful
conclusions and assist
decision making on a given
operational problem set. First, a review of MISO doctrine and
methods was conducted, and described how to infuse SNA
into the TAA process using the SNA methods and measures
to inform the analysis. The second phase involved the devel-
opment of COREnet, which is a web-based user interface that
assists analysts with visualizing the relational intricacies of
human networks, and informs the TAA process.
Defining the appropriate target audience for influence is
arguably the most important function of TAA. To minimize
errors and biases, SNA is used to help identify the appropriate
TA in conjunction with the stated military objectives. Through
this process, a refined target audience is identified and visu-
alized via a sociogram that provides the analysts with an initial
understanding of where individual actors reside throughout
the network. The visualization is a template for understanding
current individual and network behaviors and serves as the
foundation for determining if the target audience can perform
the desired behavior in accordance with the objectives.
Although sociograms provide an approach to visually under-
stand network behavior, it is important for analysts to identify
which certain actors are central, detect significant subgroups,
and know what enables some actors to broker information
between groups. This leads to an examination of exploitable
vulnerabilities and susceptibilities that exist throughout the
target audience. One useful measure is the Key Player algo-
rithm, which calculates who are the best actors to disseminate
information throughout the entire network, and which actors
whose removal would best fragment the group. Identifying
subgroups, using the key player algorithm, and calculating the
various centrality measures can help inform the TAA process
that extends beyond a strictly qualitative analysis to include
quantitative underpinnings.
Using SNA to enhance TAA is a lengthy process and re-
quires complex software to calculate the variation of actors
throughout the network. To simplify the process, COREnet
was developed as a high fidelity prototype to minimize the
complexities found in
existing software programs
and fuse SNA with TAA
doctrine.
Web interface design prin-
ciples were used to develop
COREnet to ensure the
application nomenclature
matches what a trained
analyst will understand.
Given the complexities of
SNA, SMT, and influence
theory, it was is important
to minimize new terminology that can cause an analyst to
spend unnecessary time and effort learning a new lexicon. The
minimalist design removes functions that are rarely or ever
used to ensure that the entire application consists of only those
requirements that are needed for analysts to complete their
tasks. If a more detailed analysis of the data is needed, they can
export the data to dedicated social network packages such as
ORA and UCINET.
COREnet, and the underlying research methodologies, show
how SNA, SMT, and influence theory can be used to improve
TAA. Additionally, open source technologies provide a venue
to apply SNA to the TAA in a manner that enhances existing
doctrine. Moreover, the methods described are intended to
augment, not replace, the necessary research needed for under-
standing the human domain within TAA process. The combi-
nation of the three theories enriches the analyst’s ability to not
only create a powerful method to visualize, measure, and under-
stand the TA, but to assist in crafting effective strategies.  
PAGE 3
CORELAB
Research in Action:  SSE/MOVES Update
In December 2013, the first U.S. Special Forces Non-Commis-
sioned Officer, SFC Chris Linnel graduated with a Masters of
Science from the Defense Analysis department. Upon ar-
rival to NPS, Sergeant Linnel identified the desire to conduct
research on sensitive site exploitation procedures, otherwise
known as SSE, currently conducted during combat operations.
Sergeant Linnel’s experiences as both an SSE team member and
Special Forces intelligence sergeant, solidified his beliefs that
current SSE procedures were both outdated and inefficient. To
address these concerns, Sergeant Linnel proposed a capstone
project that, in conjunction with the CORE Lab, would involve
the technical development of a mobile device digital appli-
cation and associated information database that would both
miniaturize the specific hardware required to conduct SSE and
help bridge the gap between the operations and the intelligence
processes.
Following Sergeant Linnel’s graduation from NPS in 2013,
MAJ Josh Enke assumed responsibility of the future technical
development of the CORE SSE digital application with the
ultimate goal of transitioning the project from concept to
a capability that can be fielded to special operations forces,
law enforcement agencies, and partner nations. MAJ Enke
furthered the digital SSE vision through a capstone focused on
improving the visualization of the context on tactical objec-
tives, maintaining the integrity of collected data from sensor to
analyst, and continuing to miniaturize the hardware required
for collection of SSE, further bridging the divide between SOF
operations and intelligence procedures.
MAJ Enke identified a group of talented Faculty Associate
Researchers from the Modeling, Virtual Environments and
Simulation (MOVES) Institute at the Naval Postgraduate
School. Led by Mr. Erik Johnson, the MOVES team is working
to put into code improvements to the applications interface
expand the available data object list.
MAJ Enke has recently graduated from the Defense Analysis
department and will be transitioning leadership of the project
to MAJ Tim Burton. MAJ Burton has already identified areas
of improvement and begun working with the MOVES devel-
opers for implementation. During the next 12 months, MAJ
Burton seeks to improve the SSE web repository, generate au-
tomated SSE reports, pier-to-pier data sharing, biometric col-
lection capability, make recommendations for an interagency
and joint-service SSE lexicon, and collect user-generated
feedback through the participation of SOF field exercises.  
Faculty Associates for Research Ryan Lee (left), Michael Guerrero (center), and Erik Johnson (right) assisted MAJ’s Josh Enke and Tim Burton on their
Sensitive Site Exploitation capstone project.
PAGE 4
Publication Focus
Social Media Exploitation:  An Assessment
Two CORE Lab faculty associates for research, Greg Freeman
and Rob Schroeder, authored a report entitled Social Media
Exploitation: An Assessment as part of research for the Rapid
Reaction Technology Office in the Office of the Secretary of
Defense. This report was widely distributed and received praise
from GEN Votel, head of SOCOM, who said that the report
provides an, “excellent assessment of social media exploitation
. . . [that] really informed my understanding of how we address
this evolving new area.”
Social media has evolved quickly over the last decade, pro-
viding analysts new sources of information. These new sources
are user-generated content that can in-
clude text, pictures, videos, connections
to other users, and links to other web-
sites. Social media data offers a source
of information that can supplement
and enhance the understanding of the
human domain from a grassroots level.
Social media can be a strong indicator
that provides information and trends
that can inform operational decisions.
The report serves three functions to
support Department of Defense social
media analysts: 1) To review social
media analysis software that are either
commercial or government owned; 2)
to provide a case study on how ISIS
and other opposition groups involved in the Syrian conflict
are using social media and what insights can be gleaned
from social media; 3) to provide a guidebook that provides
a framework and several methodologies for analyzing social
media.
The review details social media sites, methods for data col-
lection, demonstrated software capabilities, graphing fea-
tures for data visualization, data export capabilities, and
best use-case scenarios. Each software package offers unique
capabilities, but no single package is able to do everything.
The questions users are trying to answer should align with the
methods the software package leverages to analyze data as ef-
ficiently as possible. Software tools for social media analysis are
constantly evolving due to changes in the way these sites share
information, the release of next generation social media sites
and improved ways for software tools to analyze data.
The Syria case study applies social media software tools to an-
alyze the conflict in Syria. Syrian opposition groups have used
social media for recruiting, fundraising, sharing information,
and garnering support. By analyzing their social media use, the
research team was able to map social media communication
networks and identify potentially influential social media
user accounts. Social media continues to be a place where
users frame events that are happening related to the conflict.
Information gleaned from social media in Syria may provide
information and trends that can inform operational decisions
and support the warfighter.
Social media remains a source of information, but dark
networks continue to adapt their online presence. This report
finds that even when ISIS user accounts are shut down by
social media platforms, such as Twitter, new accounts are
quickly created and regain many of their former followers.
These user accounts also post pictures,
videos, and links to controversial
content to make automatic searching
more difficult. Thus, these user ac-
counts have adapted and proved to be
resilient against disruption.
The guidebook provides a roadmap
for analysts who use social media for
information and intelligence to inform
operational decisions as “actionable in-
telligence.” It includes a framework and
multiple methodologies for analyzing
social media. The framework begins
with a research question or purpose.
Baseline data are collected to provide
contextual understanding of the issue.
Additional datasets are then fused with the baseline data. Fi-
nally, social media data can be collected or “discovered,” either
through automated or manual techniques. Analysis should be
conducted throughout the process. The guidebook outlines
methodologies for analyzing social media using geospatial,
relational, temporal, and sentiment analysis. Each method-
ology has its own constraints, but can be useful when analyzing
social media when carefully applied.
Overall, social media provides a unique and useful source of
data. It allows the researcher or analyst to access populations
and opinions in a way that is otherwise unavailable. With the
growing population of social media users, more demographics
are being represented on the web. The data from social media
can be immense, but by carefully filtering and aggregating
content, meaningful answers to questions or information gaps
can be obtained. 
PAGE 5
CORELAB
Publications
2013
Cunningham, Daniel, Sean F. Everton, Greg Wilson, Carlos
Padilla, and Doug Zimmerman. “Brokers and Key Players in
the Internationalization of the FARC.” Pp. 477-502 in Studies in
Conflict and Terrorism.
Dudas, Patrick M. “Cooperative, Dynamic Twitter Parsing and
Visualization for Dark Network Analysis.” iConference 2013.
Fort Worth, TX.
Dudas, Patrick M. “Dynamic Twitter Network Analysis for
Dark Network Analysis.” 2nd International Network Science
Workshop. West Point, New York.
Everton, Sean F. and Daniel Cunningham. “Terrorist Network
Adaptation to a Changing Environment.” Pp. 287-308 in Crime
and Networks, ed. by Carlo Morselli. London: Routledge.
Fox, William P. and Sean F. Everton. “Mathematical Modeling
in Social Network Analysis: Using TOPSIS to Find Node Influ-
ences in a Social Network. Journal of Mathematics and Systems
Science 3:531-541.
Roberts, Nancy C. and Longley, Carrick. Against All Odds:
Bottom-Up Entrepreneurship and Innovation in the De-
partment of Defense. Pp 176-192 in S. P. Osborne  L. Brown
(eds.) Handbook of Innovation in Public Sector Services. Ehel-
tenham, UK: Edward Elgar.
2014
Fox, William P. and Sean F. Everton. “Using Mathematical
Models in Decision Making Methodologies to Find Key Nodes
in the Noordin Dark Network.” American Journal of Operations
Research 4:255-267.
2014 (Cont’d)
Fox, William P. and Sean F. Everton. “Using Data Envelopment
Analysis and Analytical Hierarchy Process to Find Node Influ-
ences in a Social Network.” Journal of Defense Modeling and
Simulation 1:1-9.
Lee, Doowan and Glenn Johnson. “Revisiting the Social
Movement Approach to Unconventional Warfare.” Small Wars
Journal. December 1, 2014.
Schroeder, Robert, Sean F. Everton, and Russell Shepherd.
“The Strength of Tweet Ties: How Twitter Helped Frame the
Egyptian Protests.” Pp. 179-196 in Online Collective Action:
Dynamics of the Crowd in Social Media, ed. by Nitin Agarwal,
Rolf T. Wigand, and Merlyna Lim. New York: Springer.
2015
Cunningham, Daniel, Sean F. Everton, and Philip Murphy.
“Tie Formation in Dark Networks: Evidence from Noordin
Mohammed Top.” Forthcoming in Illuminating Dark Networks:
Methodological Advancements in the Study of Clandestine
Groups, Organizations, and Networks, ed. by Luke Gerdes.
Cambridge and New York: Cambridge University Press.
Cunningham, Daniel, Sean F. Everton, and Philip Murphy.
Understanding Dark Networks: A Strategic Framework for the
Use of Social Network Analysis. Forthcoming from Rowman
and Littlefield.
Everton, Sean F. and Daniel Cunningham. “Dark Network Re-
silience in a Hostile Environment: Optimizing Centralization
and Density.” Forthcoming in Journal of Criminology, Criminal
Justice, Law and Society (with Daniel Cunningham).
Retired Assistant Police Chief
Joins the CORE LabTeam
Michael Aspland (a contractor with Digital Consulting Services) joined the CORE Lab
in October following a twenty-six-year career in law enforcement. He started as a police
officer in City of Santa Barbara, California and promoted through the ranks, arriving at
the City of Monterey as the Assistant Police Chief in 2003. He is a graduate of the Center
for Homeland Defense and Security here at NPS in 2009. He will be working with law en-
forcement professionals to educate them on the value of social network analysis to reduce
crime.
PAGE 6
Programs, Education and Outreach
Peru Partnership
Mr. Dan Cunningham, Faculty Associate for Instruction
The CORE Lab is partnering with the Special Operations Liaison
Office (SOLO) in Peru to develop collaborative research and
education projects in FY2015. The SOLO Peru reached out to
the Defense Analysis (DA) Department in order to draw upon
its expertise in Irregular Warfare and the application of ad-
vanced analytics on open source data. Consequently, the SOLO
Peru facilitated the visit of five Peruvian officers to the Naval
Postgraduate School from 23-27 July 2014 to participate in an
Irregular Warfare Seminar. This exchange, which took place
within the DA Department, included samples of DA graduate
level courses focused on intelligence and terrorism related
topics, including the application of social network analysis to
understand terrorist, insurgent and criminal networks.
The Peruvian Delegation and SOLO Peru expressed strong
interest to establish an enduring relationship with DA faculty
and the CORE Lab. This partnership could range from
student-led theses and capstones to faculty-led seminars and
long-term research. Moreover, the Peruvian Intelligence School
and Peruvian SOF would like to establish a CORE Lab-like
capability focused on utilizing advanced analytics to better
understand nefarious networks within Peru.
In terms of a way ahead, the CORE Lab will host a social
network analysis course during Enrichment Week (E-Week)
from 22-28 March 2015. SOLO Peru and several Peruvian ana-
lysts will attend the course as the first step of a subject matter
expert exchange (SMEE) between the lab and its Peruvian
partners. This SMEE will continue into May during which
the lab will conduct a more advanced social network analysis
outreach course in Lima, Peru.  
The CORE Lab followed the SNA training with advanced
training that compelled the SOG Intelligence Unit (SOG/IU) to
develop a Code Book for OBP. The Code Book facilitates con-
sistent, structured and efficient information sharing, tagging and
labeling to ensure accurate intelligence analysis. The Code Book
is now being utilized by several USBP Sectors and the Office of
Intelligence and Investigative
Liaison (OIIL) is evaluating it for imple-
mentation throughout the CBP Intelligence
Enterprise.
The CORE Lab provided Subject Matter
Experts (SMEs) to collaborate with the
SOG/IU to engineer work flows for the
Organizational Risk Analyzer (ORA)
Ontology and its synchronization to the
HUMINT and SIGINT Ontology Mapping
provided by the CADENA Palantir Ana-
lytical software. This provided a compre-
hensive layered approach to analyzing the threat that would
not have been achieved without the ample support of the
CORE Lab.
CADENA Pilot Outcomes
Multi-layer/Single data repository—Both SIGINT and HUMINT
data gathered from RGV was layered to identify entry patterns.
Historical Data—Change detection/pattern of life analysis was
used for TCA/RGV scout locations and apprehension patterns
for efficient resource deployment and illumination of new
networks in RGV AOR.
Rapid Field Intelligence Reporting—The deployment of mobile
Palantir (allows rapid intelligence collection and integration by
utilizing Android smart phones) shortened
the Field Intelligence Reports (FIRs) time
from hours/days to near real-time.
Collaboration—The use of cloud based
Palantir has increased collaboration be-
tween SOG/IU, other Sector IU elements
and the Chicago High Intensity Drug Traf-
ficking Area (HIDTA).
Structured Data Analysis—The devel-
opment of the Code Book has set the stage
for effective intelligence data integration
and rapid target development.
Organizational Risk Analyzer (ORA) Software—ORA created
a geospatial mapping based on the relational distances of
individuals (Social Structure). This mapping helped identify
strategies for disrupting operations, illuminating dark organiza-
tions, identifying vulnerabilities (actors, brokers, gatekeepers,
facilitators) that can serve as valid targets. 
A Strategic Interagency Partnership to Enhance Border Security
cont. from page 1
PAGE 7
CORELAB
Greg Freeman Farewell
Greg Freeman, a former Research Associate and GIS Analyst,
accepted a new position with Avenues: The World School based
out of New York. He will eventually move to China in his new
role as China Marketing Manager. Mr. Freeman joined the lab
as a Research Assistant in 2011 while pursuing a dual Masters
of Business Administration
(MBA) and International Policy
Studies degree at the Monterey
Institute of International Studies
(MIIS). Mr. Freeman served as a
consultant for the GLOBE Center
and spent three years in China,
exporting bamboo flooring to
North America and conducted
research on the world’s largest solar water heater manufacturer,
Himin Solar Company.
After joining the lab as a full-time Research Associate, Mr.
Freeman demonstrated an exceptional grasp of CORE lab
methodologies and supported
students working on Geographical
Information Systems (GIS) and
Social Media data collection and
analysis projects. He contributed
on the project Social Media Ex-
ploitation: An Assessment. This
report gained wide-acceptance
among practitioners. We wish him
the best in his current and future
pursuits. He is first class !
Welcome to LTC(P) Pat Duggan
The CORE Lab welcomes LTC Pat Duggan to NPS and the
Defense Analysis Department as the
new U.S. Army War College Fellow. LTC
Duggan was commissioned into the
Infantry in 1995, from North Georgia
College, and served as a rifle platoon
leader, specialty platoon leader, and
company executive officer in the 2-504th
PIR, 82nd Airborne Division. After
completing Special Forces training, he
was assigned to 5th Special Forces Group
(Airborne) and served as Detachment
Commander during the invasion of
Afghanistan 2001-2002 and as the Bat-
talion Support Company Commander
during the invasion of Iraq 2003. After
Command and General Staff College, he served in Combined
Joint Special Operations Task Force-Arabian Peninsula 2006-
2007, as Advanced Operating Base Com-
mander during the height of the “Iraq
surge” 2007-2008, and as the Battalion S-3
2008-2009.
LTC Duggan served in J8 Classified
Programs Branch, USSOCOM from
2009-20011 and as Deputy Commander
(South) JSOTF-Philippines from 2011-
2012. From 1 March 2012 until 24 June
2014, he served as Battalion Commander
for 3-1SFG (A). LTC Duggan’s Fellowship
interests are in the cyber-SOF arena and
is writing and researching on the Strategic
Development and Application of Special
Warfare in Cyberspace.
589 Dyer Road
Root Hall, Room 107
Monterey, CA 93943
Phone 831.656.2932
Fax 831.656.1120
Email klflaher@nps.edu
common operational
research environment
naval postgraduate school
Visit the CORE Lab Facebook Page
Visit the LIGHTHOUSE Project website: http://lhproject.info
Visit the CORE Lab
Facebook Page
Visit the LIGHTHOUSE Project website
http://lhproject.info
Visit the CORE Lab
Facebook Page
Visit the LIGHTHOUSE Project website
http://lhproject.info
Visit the CORE Lab
Facebook Page
Visit the CORE Lab
Facebook Page
Visit the CORE Lab
Facebook Page
Visit the LIGHTHOUSE Project website
http://lhproject.info
Visit the CORE Lab
Facebook Page
Visit the LIGHTHOUSE Project website
http://lhproject.info
Visit the CORE Lab
Facebook Page
Visit the LIGHTHOUSE Project website
Visit the CORE Lab
Facebook Page
Visit the LIGHTHOUSE Project website
https://my.nps.edu/web/core
JoinourCORELabfamily!

Contenu connexe

Similaire à Common Operational Research Environment Quarterly Newsletter

Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...
Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...
Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...IJDKP
 
NRNB Annual Report 2012
NRNB Annual Report 2012NRNB Annual Report 2012
NRNB Annual Report 2012Alexander Pico
 
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSA HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSIJNSA Journal
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Certain Analysis on Traffic Dataset based on Data Mining Algorithms
Certain Analysis on Traffic Dataset based on Data Mining AlgorithmsCertain Analysis on Traffic Dataset based on Data Mining Algorithms
Certain Analysis on Traffic Dataset based on Data Mining AlgorithmsIRJET Journal
 
Nlp and semantic_web_for_competitive_int
Nlp and semantic_web_for_competitive_intNlp and semantic_web_for_competitive_int
Nlp and semantic_web_for_competitive_intKarenVacca
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
 
Survey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POISurvey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POIIRJET Journal
 
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...cscpconf
 
14Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-214Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-2William Orkins
 
NRNB Annual Report 2013
NRNB Annual Report 2013NRNB Annual Report 2013
NRNB Annual Report 2013Alexander Pico
 
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET Journal
 
NRNB Annual Report 2018
NRNB Annual Report 2018NRNB Annual Report 2018
NRNB Annual Report 2018Alexander Pico
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGIRJET Journal
 
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...Amy Isleb
 
Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...ijnlc
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvanaMarc Smith
 
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...IJEACS
 

Similaire à Common Operational Research Environment Quarterly Newsletter (20)

Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...
Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...
Top Cited Articles in Data Mining - International Journal of Data Mining & Kn...
 
NRNB Annual Report 2012
NRNB Annual Report 2012NRNB Annual Report 2012
NRNB Annual Report 2012
 
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSA HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Certain Analysis on Traffic Dataset based on Data Mining Algorithms
Certain Analysis on Traffic Dataset based on Data Mining AlgorithmsCertain Analysis on Traffic Dataset based on Data Mining Algorithms
Certain Analysis on Traffic Dataset based on Data Mining Algorithms
 
Nlp and semantic_web_for_competitive_int
Nlp and semantic_web_for_competitive_intNlp and semantic_web_for_competitive_int
Nlp and semantic_web_for_competitive_int
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
Survey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POISurvey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POI
 
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
 
14Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-214Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-2
 
NRNB Annual Report 2013
NRNB Annual Report 2013NRNB Annual Report 2013
NRNB Annual Report 2013
 
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
 
top journals
top journalstop journals
top journals
 
NRNB Annual Report 2018
NRNB Annual Report 2018NRNB Annual Report 2018
NRNB Annual Report 2018
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
 
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
 
Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...Event detection and summarization based on social networks and semantic query...
Event detection and summarization based on social networks and semantic query...
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana
 
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
 

Common Operational Research Environment Quarterly Newsletter

  • 1. from the c recommon operational research environment quarterly newsletter INSIDETHE ISSUE page 2: COREnet:The fusion of SNA with Docrine page 3: Research in Action: SSE/MOVES Update page 4: Publications Focus: Social Media Exploitation page 5: Publications: 2013, 2014, 2015 page 5: Retired Assistant Police Chief Joins the CORE LabTeam page 6: Programs Education and Outreach: Peru Partnership page 7: Greg Freeman Farewell page 7: Welcome to LTC(P) Pat Duggan PROVIDING WARFIGHTERS WITH A UNIQUE VIEW OFTHE BATTLEFIELD continued on page 6  CORE STAFF CO-DIRECTOR LTC Glenn Johnson CO-DIRECTOR AND ASSISTANT PROFESSOR Dr. Sean Everton PROFESSOR Dr. Nancy Roberts SENIOR LECTURER KristenTsolis PROGRAM MANAGER Karen Flaherty FACULTY ASSOCIATE FOR INSTRUCTION Dan Cunningham FACULTY ASSOCIATE FOR RESEARCH Michael Stevens FACULTY ASSOCIATE FOR RESEARCH Rob Shcroeder FACULTY ASSOCIATE FOR RESEARCH Dan LeRoy IT SUPPORT Malcolm Mejia RESEARCH ANALYST Michael Aspland TheCOREProgramisaCenterwithintheDefenseAnalysisdepartmentatNPS. GoalsofCOREareto: • Expose a generation of military officers to cutting-edge visual analytical methodolgies —produce Intellectual Capital • Leader in education and research designed to operationalize advanced analytical methods —leverage emerging information technologies and analytical software packages to enable field operatives • Advance DOD’s Network Analysis capabilities — Illuminating Blue, Grey and Red Networks — Beyond Link Analysis •Maintaincurrencywiththeleadinginnovationsinvisualanalyticmethods,research andrelatedtechnologies —  OSDandSOCOM’sfutureslookatadvancedanalyticalmethods • Benefit theWarfighter —reduce the risk of uncertainty in decision making SPRING 2015/ISSUE 5 A Strategic Interagency Partnership to Enhance Border Security Mr. Steven T. Franzoni, Managment Program Director, U.S.B.P. Special Opertions Group The Customs and Border Protection (CBP) U.S. Border Patrol (USBP) Special Operations Group (SOG) was selected by the Office of Border Patrol (OBP) to manage the Cross- Agency Distributed Edge Network Analysis (CADENA) Pilot. The Pilot was funded and facilitated by the Advanced Analytics Division of the Technical Support Working Group (TSWG) of the Combatting Terrorism Technical Support Office (CTTSO). The pilot commenced in August 2013 with the following goals: • Deliver Advanced Analytic Capabilities across Government Agencies • Integrate advance Network/Link Analysis methodology training with technology • Improve information integration and change detection • Increase intelligence collection and reporting from field elements • Rapid information processing and improved collaboration NPS/CORE Lab Contributions to the CADENA Pilot The NPS/CORE Lab was sponsored by CTTSO to assist SOG by providing training that would maximize the capabilities of CADENA. The CORE Lab was instrumental in providing Social Network Analysis (SNA) training which was the analytical foundation for the pilot. A total of eighty interagency and DOD students were taught over four courses at three different locations; El Paso, TX (2) (USBP El Paso [EPT] Sector), Tucson, AZ (USBP Tucson [TCA] Sector), and McAllen, TX (USBP Rio Grande Valley [RGV] Sector).
  • 2. PAGE 2 COREnet:  The Fusion of SNA with Doctrine MAJ William Orkins MAJ Carla Kiernan Conducting target audience analysis (TAA) is a time consuming endeavor that requires sifting through numerous unclassified and classified information sources, conducting face-to-face (F2F) interviews, and reviewing survey data, just to name a few. Understanding target audiences and the social, political, economic, and cultural influences on their collective behaviors is increasingly critical to mission success. Military doctrine pro- vides a guideline for the systematic analysis of human behavior, yet it is incomplete regarding a specific situation with complex interactions among socio-cultural factors. To fill this gap, the military needs analytical methods that enable quick, effective, and reliable analysis about human behavior to comprehend the complexities of the mission. Enhancing existing doctrine to incorporate advanced ana- lytical methodologies was the purpose of this capstone. To do so required a two-fold approach: 1) Create a method to apply social network analysis (SNA), social movement theory (SMT), and influence theory to existing Military Infor- mation Support Opera- tions (MISO) doctrine, and 2) Develop a scalable web-based application that assists with visualizing and analyzing open source data to draw meaningful conclusions and assist decision making on a given operational problem set. First, a review of MISO doctrine and methods was conducted, and described how to infuse SNA into the TAA process using the SNA methods and measures to inform the analysis. The second phase involved the devel- opment of COREnet, which is a web-based user interface that assists analysts with visualizing the relational intricacies of human networks, and informs the TAA process. Defining the appropriate target audience for influence is arguably the most important function of TAA. To minimize errors and biases, SNA is used to help identify the appropriate TA in conjunction with the stated military objectives. Through this process, a refined target audience is identified and visu- alized via a sociogram that provides the analysts with an initial understanding of where individual actors reside throughout the network. The visualization is a template for understanding current individual and network behaviors and serves as the foundation for determining if the target audience can perform the desired behavior in accordance with the objectives. Although sociograms provide an approach to visually under- stand network behavior, it is important for analysts to identify which certain actors are central, detect significant subgroups, and know what enables some actors to broker information between groups. This leads to an examination of exploitable vulnerabilities and susceptibilities that exist throughout the target audience. One useful measure is the Key Player algo- rithm, which calculates who are the best actors to disseminate information throughout the entire network, and which actors whose removal would best fragment the group. Identifying subgroups, using the key player algorithm, and calculating the various centrality measures can help inform the TAA process that extends beyond a strictly qualitative analysis to include quantitative underpinnings. Using SNA to enhance TAA is a lengthy process and re- quires complex software to calculate the variation of actors throughout the network. To simplify the process, COREnet was developed as a high fidelity prototype to minimize the complexities found in existing software programs and fuse SNA with TAA doctrine. Web interface design prin- ciples were used to develop COREnet to ensure the application nomenclature matches what a trained analyst will understand. Given the complexities of SNA, SMT, and influence theory, it was is important to minimize new terminology that can cause an analyst to spend unnecessary time and effort learning a new lexicon. The minimalist design removes functions that are rarely or ever used to ensure that the entire application consists of only those requirements that are needed for analysts to complete their tasks. If a more detailed analysis of the data is needed, they can export the data to dedicated social network packages such as ORA and UCINET. COREnet, and the underlying research methodologies, show how SNA, SMT, and influence theory can be used to improve TAA. Additionally, open source technologies provide a venue to apply SNA to the TAA in a manner that enhances existing doctrine. Moreover, the methods described are intended to augment, not replace, the necessary research needed for under- standing the human domain within TAA process. The combi- nation of the three theories enriches the analyst’s ability to not only create a powerful method to visualize, measure, and under- stand the TA, but to assist in crafting effective strategies.  
  • 3. PAGE 3 CORELAB Research in Action:  SSE/MOVES Update In December 2013, the first U.S. Special Forces Non-Commis- sioned Officer, SFC Chris Linnel graduated with a Masters of Science from the Defense Analysis department. Upon ar- rival to NPS, Sergeant Linnel identified the desire to conduct research on sensitive site exploitation procedures, otherwise known as SSE, currently conducted during combat operations. Sergeant Linnel’s experiences as both an SSE team member and Special Forces intelligence sergeant, solidified his beliefs that current SSE procedures were both outdated and inefficient. To address these concerns, Sergeant Linnel proposed a capstone project that, in conjunction with the CORE Lab, would involve the technical development of a mobile device digital appli- cation and associated information database that would both miniaturize the specific hardware required to conduct SSE and help bridge the gap between the operations and the intelligence processes. Following Sergeant Linnel’s graduation from NPS in 2013, MAJ Josh Enke assumed responsibility of the future technical development of the CORE SSE digital application with the ultimate goal of transitioning the project from concept to a capability that can be fielded to special operations forces, law enforcement agencies, and partner nations. MAJ Enke furthered the digital SSE vision through a capstone focused on improving the visualization of the context on tactical objec- tives, maintaining the integrity of collected data from sensor to analyst, and continuing to miniaturize the hardware required for collection of SSE, further bridging the divide between SOF operations and intelligence procedures. MAJ Enke identified a group of talented Faculty Associate Researchers from the Modeling, Virtual Environments and Simulation (MOVES) Institute at the Naval Postgraduate School. Led by Mr. Erik Johnson, the MOVES team is working to put into code improvements to the applications interface expand the available data object list. MAJ Enke has recently graduated from the Defense Analysis department and will be transitioning leadership of the project to MAJ Tim Burton. MAJ Burton has already identified areas of improvement and begun working with the MOVES devel- opers for implementation. During the next 12 months, MAJ Burton seeks to improve the SSE web repository, generate au- tomated SSE reports, pier-to-pier data sharing, biometric col- lection capability, make recommendations for an interagency and joint-service SSE lexicon, and collect user-generated feedback through the participation of SOF field exercises.   Faculty Associates for Research Ryan Lee (left), Michael Guerrero (center), and Erik Johnson (right) assisted MAJ’s Josh Enke and Tim Burton on their Sensitive Site Exploitation capstone project.
  • 4. PAGE 4 Publication Focus Social Media Exploitation:  An Assessment Two CORE Lab faculty associates for research, Greg Freeman and Rob Schroeder, authored a report entitled Social Media Exploitation: An Assessment as part of research for the Rapid Reaction Technology Office in the Office of the Secretary of Defense. This report was widely distributed and received praise from GEN Votel, head of SOCOM, who said that the report provides an, “excellent assessment of social media exploitation . . . [that] really informed my understanding of how we address this evolving new area.” Social media has evolved quickly over the last decade, pro- viding analysts new sources of information. These new sources are user-generated content that can in- clude text, pictures, videos, connections to other users, and links to other web- sites. Social media data offers a source of information that can supplement and enhance the understanding of the human domain from a grassroots level. Social media can be a strong indicator that provides information and trends that can inform operational decisions. The report serves three functions to support Department of Defense social media analysts: 1) To review social media analysis software that are either commercial or government owned; 2) to provide a case study on how ISIS and other opposition groups involved in the Syrian conflict are using social media and what insights can be gleaned from social media; 3) to provide a guidebook that provides a framework and several methodologies for analyzing social media. The review details social media sites, methods for data col- lection, demonstrated software capabilities, graphing fea- tures for data visualization, data export capabilities, and best use-case scenarios. Each software package offers unique capabilities, but no single package is able to do everything. The questions users are trying to answer should align with the methods the software package leverages to analyze data as ef- ficiently as possible. Software tools for social media analysis are constantly evolving due to changes in the way these sites share information, the release of next generation social media sites and improved ways for software tools to analyze data. The Syria case study applies social media software tools to an- alyze the conflict in Syria. Syrian opposition groups have used social media for recruiting, fundraising, sharing information, and garnering support. By analyzing their social media use, the research team was able to map social media communication networks and identify potentially influential social media user accounts. Social media continues to be a place where users frame events that are happening related to the conflict. Information gleaned from social media in Syria may provide information and trends that can inform operational decisions and support the warfighter. Social media remains a source of information, but dark networks continue to adapt their online presence. This report finds that even when ISIS user accounts are shut down by social media platforms, such as Twitter, new accounts are quickly created and regain many of their former followers. These user accounts also post pictures, videos, and links to controversial content to make automatic searching more difficult. Thus, these user ac- counts have adapted and proved to be resilient against disruption. The guidebook provides a roadmap for analysts who use social media for information and intelligence to inform operational decisions as “actionable in- telligence.” It includes a framework and multiple methodologies for analyzing social media. The framework begins with a research question or purpose. Baseline data are collected to provide contextual understanding of the issue. Additional datasets are then fused with the baseline data. Fi- nally, social media data can be collected or “discovered,” either through automated or manual techniques. Analysis should be conducted throughout the process. The guidebook outlines methodologies for analyzing social media using geospatial, relational, temporal, and sentiment analysis. Each method- ology has its own constraints, but can be useful when analyzing social media when carefully applied. Overall, social media provides a unique and useful source of data. It allows the researcher or analyst to access populations and opinions in a way that is otherwise unavailable. With the growing population of social media users, more demographics are being represented on the web. The data from social media can be immense, but by carefully filtering and aggregating content, meaningful answers to questions or information gaps can be obtained. 
  • 5. PAGE 5 CORELAB Publications 2013 Cunningham, Daniel, Sean F. Everton, Greg Wilson, Carlos Padilla, and Doug Zimmerman. “Brokers and Key Players in the Internationalization of the FARC.” Pp. 477-502 in Studies in Conflict and Terrorism. Dudas, Patrick M. “Cooperative, Dynamic Twitter Parsing and Visualization for Dark Network Analysis.” iConference 2013. Fort Worth, TX. Dudas, Patrick M. “Dynamic Twitter Network Analysis for Dark Network Analysis.” 2nd International Network Science Workshop. West Point, New York. Everton, Sean F. and Daniel Cunningham. “Terrorist Network Adaptation to a Changing Environment.” Pp. 287-308 in Crime and Networks, ed. by Carlo Morselli. London: Routledge. Fox, William P. and Sean F. Everton. “Mathematical Modeling in Social Network Analysis: Using TOPSIS to Find Node Influ- ences in a Social Network. Journal of Mathematics and Systems Science 3:531-541. Roberts, Nancy C. and Longley, Carrick. Against All Odds: Bottom-Up Entrepreneurship and Innovation in the De- partment of Defense. Pp 176-192 in S. P. Osborne L. Brown (eds.) Handbook of Innovation in Public Sector Services. Ehel- tenham, UK: Edward Elgar. 2014 Fox, William P. and Sean F. Everton. “Using Mathematical Models in Decision Making Methodologies to Find Key Nodes in the Noordin Dark Network.” American Journal of Operations Research 4:255-267. 2014 (Cont’d) Fox, William P. and Sean F. Everton. “Using Data Envelopment Analysis and Analytical Hierarchy Process to Find Node Influ- ences in a Social Network.” Journal of Defense Modeling and Simulation 1:1-9. Lee, Doowan and Glenn Johnson. “Revisiting the Social Movement Approach to Unconventional Warfare.” Small Wars Journal. December 1, 2014. Schroeder, Robert, Sean F. Everton, and Russell Shepherd. “The Strength of Tweet Ties: How Twitter Helped Frame the Egyptian Protests.” Pp. 179-196 in Online Collective Action: Dynamics of the Crowd in Social Media, ed. by Nitin Agarwal, Rolf T. Wigand, and Merlyna Lim. New York: Springer. 2015 Cunningham, Daniel, Sean F. Everton, and Philip Murphy. “Tie Formation in Dark Networks: Evidence from Noordin Mohammed Top.” Forthcoming in Illuminating Dark Networks: Methodological Advancements in the Study of Clandestine Groups, Organizations, and Networks, ed. by Luke Gerdes. Cambridge and New York: Cambridge University Press. Cunningham, Daniel, Sean F. Everton, and Philip Murphy. Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Forthcoming from Rowman and Littlefield. Everton, Sean F. and Daniel Cunningham. “Dark Network Re- silience in a Hostile Environment: Optimizing Centralization and Density.” Forthcoming in Journal of Criminology, Criminal Justice, Law and Society (with Daniel Cunningham). Retired Assistant Police Chief Joins the CORE LabTeam Michael Aspland (a contractor with Digital Consulting Services) joined the CORE Lab in October following a twenty-six-year career in law enforcement. He started as a police officer in City of Santa Barbara, California and promoted through the ranks, arriving at the City of Monterey as the Assistant Police Chief in 2003. He is a graduate of the Center for Homeland Defense and Security here at NPS in 2009. He will be working with law en- forcement professionals to educate them on the value of social network analysis to reduce crime.
  • 6. PAGE 6 Programs, Education and Outreach Peru Partnership Mr. Dan Cunningham, Faculty Associate for Instruction The CORE Lab is partnering with the Special Operations Liaison Office (SOLO) in Peru to develop collaborative research and education projects in FY2015. The SOLO Peru reached out to the Defense Analysis (DA) Department in order to draw upon its expertise in Irregular Warfare and the application of ad- vanced analytics on open source data. Consequently, the SOLO Peru facilitated the visit of five Peruvian officers to the Naval Postgraduate School from 23-27 July 2014 to participate in an Irregular Warfare Seminar. This exchange, which took place within the DA Department, included samples of DA graduate level courses focused on intelligence and terrorism related topics, including the application of social network analysis to understand terrorist, insurgent and criminal networks. The Peruvian Delegation and SOLO Peru expressed strong interest to establish an enduring relationship with DA faculty and the CORE Lab. This partnership could range from student-led theses and capstones to faculty-led seminars and long-term research. Moreover, the Peruvian Intelligence School and Peruvian SOF would like to establish a CORE Lab-like capability focused on utilizing advanced analytics to better understand nefarious networks within Peru. In terms of a way ahead, the CORE Lab will host a social network analysis course during Enrichment Week (E-Week) from 22-28 March 2015. SOLO Peru and several Peruvian ana- lysts will attend the course as the first step of a subject matter expert exchange (SMEE) between the lab and its Peruvian partners. This SMEE will continue into May during which the lab will conduct a more advanced social network analysis outreach course in Lima, Peru.   The CORE Lab followed the SNA training with advanced training that compelled the SOG Intelligence Unit (SOG/IU) to develop a Code Book for OBP. The Code Book facilitates con- sistent, structured and efficient information sharing, tagging and labeling to ensure accurate intelligence analysis. The Code Book is now being utilized by several USBP Sectors and the Office of Intelligence and Investigative Liaison (OIIL) is evaluating it for imple- mentation throughout the CBP Intelligence Enterprise. The CORE Lab provided Subject Matter Experts (SMEs) to collaborate with the SOG/IU to engineer work flows for the Organizational Risk Analyzer (ORA) Ontology and its synchronization to the HUMINT and SIGINT Ontology Mapping provided by the CADENA Palantir Ana- lytical software. This provided a compre- hensive layered approach to analyzing the threat that would not have been achieved without the ample support of the CORE Lab. CADENA Pilot Outcomes Multi-layer/Single data repository—Both SIGINT and HUMINT data gathered from RGV was layered to identify entry patterns. Historical Data—Change detection/pattern of life analysis was used for TCA/RGV scout locations and apprehension patterns for efficient resource deployment and illumination of new networks in RGV AOR. Rapid Field Intelligence Reporting—The deployment of mobile Palantir (allows rapid intelligence collection and integration by utilizing Android smart phones) shortened the Field Intelligence Reports (FIRs) time from hours/days to near real-time. Collaboration—The use of cloud based Palantir has increased collaboration be- tween SOG/IU, other Sector IU elements and the Chicago High Intensity Drug Traf- ficking Area (HIDTA). Structured Data Analysis—The devel- opment of the Code Book has set the stage for effective intelligence data integration and rapid target development. Organizational Risk Analyzer (ORA) Software—ORA created a geospatial mapping based on the relational distances of individuals (Social Structure). This mapping helped identify strategies for disrupting operations, illuminating dark organiza- tions, identifying vulnerabilities (actors, brokers, gatekeepers, facilitators) that can serve as valid targets.  A Strategic Interagency Partnership to Enhance Border Security cont. from page 1
  • 7. PAGE 7 CORELAB Greg Freeman Farewell Greg Freeman, a former Research Associate and GIS Analyst, accepted a new position with Avenues: The World School based out of New York. He will eventually move to China in his new role as China Marketing Manager. Mr. Freeman joined the lab as a Research Assistant in 2011 while pursuing a dual Masters of Business Administration (MBA) and International Policy Studies degree at the Monterey Institute of International Studies (MIIS). Mr. Freeman served as a consultant for the GLOBE Center and spent three years in China, exporting bamboo flooring to North America and conducted research on the world’s largest solar water heater manufacturer, Himin Solar Company. After joining the lab as a full-time Research Associate, Mr. Freeman demonstrated an exceptional grasp of CORE lab methodologies and supported students working on Geographical Information Systems (GIS) and Social Media data collection and analysis projects. He contributed on the project Social Media Ex- ploitation: An Assessment. This report gained wide-acceptance among practitioners. We wish him the best in his current and future pursuits. He is first class ! Welcome to LTC(P) Pat Duggan The CORE Lab welcomes LTC Pat Duggan to NPS and the Defense Analysis Department as the new U.S. Army War College Fellow. LTC Duggan was commissioned into the Infantry in 1995, from North Georgia College, and served as a rifle platoon leader, specialty platoon leader, and company executive officer in the 2-504th PIR, 82nd Airborne Division. After completing Special Forces training, he was assigned to 5th Special Forces Group (Airborne) and served as Detachment Commander during the invasion of Afghanistan 2001-2002 and as the Bat- talion Support Company Commander during the invasion of Iraq 2003. After Command and General Staff College, he served in Combined Joint Special Operations Task Force-Arabian Peninsula 2006- 2007, as Advanced Operating Base Com- mander during the height of the “Iraq surge” 2007-2008, and as the Battalion S-3 2008-2009. LTC Duggan served in J8 Classified Programs Branch, USSOCOM from 2009-20011 and as Deputy Commander (South) JSOTF-Philippines from 2011- 2012. From 1 March 2012 until 24 June 2014, he served as Battalion Commander for 3-1SFG (A). LTC Duggan’s Fellowship interests are in the cyber-SOF arena and is writing and researching on the Strategic Development and Application of Special Warfare in Cyberspace. 589 Dyer Road Root Hall, Room 107 Monterey, CA 93943 Phone 831.656.2932 Fax 831.656.1120 Email klflaher@nps.edu common operational research environment naval postgraduate school Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website: http://lhproject.info Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website http://lhproject.info Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website http://lhproject.info Visit the CORE Lab Facebook Page Visit the CORE Lab Facebook Page Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website http://lhproject.info Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website http://lhproject.info Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website Visit the CORE Lab Facebook Page Visit the LIGHTHOUSE Project website https://my.nps.edu/web/core