Counterinsurgency Through Civil Infrastructure Networks

We investigate opportunities and risks to counterinsurgency (sometimes referred to as COIN) that are inherent in the civil networks surrounding infrastructure projects. It is argued here that a) successful counter-insurgency largely comprises the ‘engineering’ of robust and trusted civil networks that are capable of re-channelling insurgent designs; and b) introduction of externalized-exclusive control networks poses a significant risk to such network development. In this conceptual paper, we propose a number of network models, each hypothesizing a risk and / or opportunity. These models will be tested and refined using a case study methodology that draws on documentary evidence and interviews with subject matter experts. We propose two fundamental relationships: Coordination by rule and control (CRC), and; Collaboration by social influence (CSI). CRC is based on mechanical (rule and time based) structures, while CSI is based on organic (informal, trusted and shared aware) social networks. We posit that COIN is primarily a CSI interaction / exchange that can be supported (but also obstructed) by CRC. We therefore propose that the design of successful COIN operations must adhere to the hybrid notion providing an interface between CRC and CSI.

[1]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[2]  Bruce Hoffman,et al.  Insurgency and Counterinsurgency in Iraq , 2006 .

[3]  Steve Leonard,et al.  The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One , 2009 .

[4]  David Kilcullen,et al.  Counter-insurgency Redux , 2006 .

[5]  P. Lazarsfeld,et al.  Friendship as Social process: a substantive and methodological analysis , 1964 .

[6]  F. Heider ATTITUDES AND COGNITIVE ORGANIZATION , 1977 .

[7]  Kon Shing Kenneth Chung,et al.  Actor centrality correlates to project based coordination , 2006, CSCW '06.

[8]  Simon R. Atkinson,et al.  Information Capture and Knowledge Exchange: The Gathering, Testing and Assessment of Information and Knowledge Through Exploration and Exploitation , 2009 .

[9]  Rolf T. Wigand,et al.  ICT Enabled Virtual Collaboration through Trust , 2006, J. Comput. Mediat. Commun..

[10]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[11]  Michael T. Flynn,et al.  Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan , 2010 .

[12]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[13]  W. Marsden I and J , 2012 .

[14]  Renée C. van der Hulst Terrorist Networks: The Threat of Connectivity , 2014 .

[15]  J. Coleman,et al.  Social Capital in the Creation of Human Capital , 1988, American Journal of Sociology.

[16]  David Galula,et al.  Counterinsurgency Warfare: Theory and Practice , 1964 .

[17]  Steven B. Andrews,et al.  Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.

[18]  R. Johnston,et al.  The SAGE Handbook of Social Network Analysis , 2011 .