Predicting the Structure of Covert Networks using Genetic Programming, Cognitive Work Analysis and Social Network Analysis

A significant challenge in intelligence analysis involves knowing when a social network description is ‘complete’, i.e., when sufficient connections have been found to render the network complete. In this paper, a combination of methods is used to predict covert network structures for specific missions. The intention is to support hypothesis-generation in the Social Network Analysis of covert organisations. The project employs a four phase approach to modelling social networks, working from task descriptions rather than from contacts between individual: phase one involves the collation of intelligence covering types of mission, in terms of actors and goals; phase two involves the building of task models, based on Cognitive Work Analysis, to provide both a process model of the operation and an indication of the constraints under which the operation will be performed; phase three involves the generation of alternative networks using Genetic Programming; phase four involves the analysis of the resulting networks using social network analysis. Subsequent analysis explores the resilience of the networks, in terms of their resistance to losses of agents or tasks. The project demonstrates that it is possible to define a set of structures that can be tackled using different intervention strategies, demonstrates how patterns of social network structures can be predicted on the basis of task knowledge, and how these structures can be used to guide the gathering of intelligence and to define plausible Covert Networks

[1]  Linda J. Sorensen,et al.  Cognitive Work Analysis: Coping with Complexity , 2010 .

[2]  B. Erickson Secret Societies and Social Structure , 1981 .

[3]  Robert G. Eggleston,et al.  Work-Centered Approach to Insurgency Campaign Analysis , 2007 .

[4]  William M. Hix,et al.  Assumption-Based Planning: A Planning Tool for Very Uncertain Times , 1995 .

[5]  Constructing social networks on the basis of task and knowledge networks using WESTT , 2007 .

[6]  Steve Jones,et al.  Middle market drug distribution , 2001 .

[7]  Alan A. Block,et al.  East Side-West Side: Organizing Crime in New York, 1930-1950. , 1984 .

[8]  Steven B. Andrews,et al.  Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.

[9]  M. Natarajan Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .

[10]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[11]  Vidroha Debroy,et al.  Genetic Programming , 1998, Lecture Notes in Computer Science.

[12]  Alan A. Block East Side-West Side: Organizing Crime in New York, 1930-50 , 1983 .

[13]  Guy H. Walker,et al.  WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control , 2008, Cognition, Technology & Work.

[14]  D. Cressey,et al.  Theft of the Nation: The Structure and Operations of Organized Crime in America. , 1969 .

[15]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[16]  M. Levi,et al.  Literature Review on Upper Level Drug Trafficking , 2005 .