Manhunting : a methodology for finding persons of national interest

Abstract : The asymmetrical threats that challenge U.S. national policies are not large-standing armies, but rather individuals who seek to usurp and coerce U.S. national interests. The nature of today's threats call for the U.S. military to change from finding, fixing, and destroying the enemy's forces to identifying, locating and capturing rogue individuals to destroy networks. To counter such threats, the U.S. Government will have to quickly and efficiently identify and find these targets globally. Unfortunately, no military doctrine, framework, or process currently exists for finding and apprehending Persons of National Interest (PONIs). Since military planners and intelligence analysts are neither educated nor trained in the methods or procedures necessary to find and capture PONIs, this thesis proposes a methodology to do so. The U.S. Government's ability to prosecute the war on terrorism today, and to find and apprehend PONIs in the future, depends on its ability to develop and institutionalize a comprehensive manhunting strategy now. The primary research question is as follows: How do military planners and intelligence analysts search, locate, and capture fugitives who operate within networks that offer support, cover, and security? The following are subsidiary research questions: (1) What makes it difficult for the U.S. military to capture fugitives?; (2) What differences exist between the hiding characteristics of fugitives who operate in a cellular network and those who don't have any formalized organizational structure?; (3) What processes do other governmental agencies use to find fugitives?; (4) How do social networks, behavior patterns, and environmental factors impact the fugitive's decision making?; (5) How can search game theory be applied to manhunting?; (6) What deception and denial techniques do fugitives use to mask their activities?; and (7) Is there a method to detect active deception by fugitives?

[1]  Paul K. Huth Extended Deterrence and the Prevention of War , 1988 .

[2]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[3]  Yaakov Yavin,et al.  Pursuit-evasion differential games , 1987 .

[4]  Brian C. O'Connor,et al.  Hunting and Gathering on the Information Savanna , 2003 .

[5]  Paul K. Davis,et al.  Deterrence and Influence in Counterterrorism: A Component in the War on Al Qaeda , 2002 .

[6]  W. Shepard What is "Islamic fundamentalism"? , 1988 .

[7]  Amer Latif,et al.  Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden,from the Soviet Invasion to September 10, 2001, , 2005 .

[8]  Robin Moore Hunting Down Saddam: The Inside Story of the Search and Capture , 2004 .

[9]  Scott Gerwehr,et al.  Unweaving the Web: Deception and Adaptation in Future Urban Operations , 2003 .

[10]  Robin Moore,et al.  The Hunt for Bin Laden: Task Force Dagger , 2003 .

[11]  Max Boot,et al.  The Savage Wars Of Peace: Small Wars And The Rise Of American Power , 2002 .

[12]  P. Sztompka Trust: A Sociological Theory , 2000 .

[13]  Scott Gerwehr,et al.  The Art of Darkness: Deception and Urban Operations , 2000 .

[14]  M. Thackrey In the Mind's Eye: Enhancing Human Performance , 1993 .

[15]  Roy Godson,et al.  Strategic denial and deception , 2000 .

[16]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[17]  Albert-László Barabási,et al.  Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .

[18]  Benjamin Disraeli From The Columbia World of Quotations , 1996 .

[19]  Rowan Scarborough Rumsfeld's War: The Untold Story of America's Anti-Terrorist Commander , 2004 .

[20]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[21]  Brian Michael Jenkins,et al.  Countering Al Qaeda , 2002 .