Title: Social Network Analysis in Intelligence
1Social Network Analysis in Intelligence
- Emily Keefe
- Policy and Capability Studies
2Presentation overview
- Introduction to SNA
- SNA in Government and Dstl
- Intelligence SNA
3Social Network Analysis (SNA)
4The history of SNA
Psychology
Anthropology
Mathematics
5Genres of Social Network Analysis
?(cmax - c(vi))
Complexity
Graph theory
Structures
Tools
6?(cmax - c(vi))
Structures
Tools
7Origins of SNA applications in Dstl
Modelling target dynamics
Modelling the critical national infrastructure
Bayesian inference for link prediction
Social networks of terrorist groups
Proof of concept study
Social Network Analysis Case Study
Cross-Government Case Study
8SNA in Government
X
?(cmax - c(vi))
9Why use SNA?
- Helps people understand the groups they are
interested in. - SNA may identify network characteristics not
apparent by eye - SNA allows group structures and flows of
communications to be explored - Systematic approach to data coding allows for
quick and easy what-if? analysis - Coding data forces people to challenge their
assumptions and allows knowledge to be transferred
10Intelligence SNA
Data management
Present results
Set up
Coding
Analysis
11Intelligence SNA
Data management
Present results
Set up
Coding
Analysis
12Set up
- Getting a tasking
- Identifying the team
- Determining aims questions to be answered
- Deciding on a taxonomy
- Sharing out responsibility
- Selecting and obtaining software
- Creating a suitable database
13Intelligence SNA
Data management
Present results
Set up
Coding
Analysis
14Coding
- Finding people to code
- Holding an initial training session or workshop
- Regular team meetings
- Coder interviews
- Inter-coder reliability exercises
15Why coding and definitions matter
- Is A co-located with B if
- They work in the same building?
- They work on the same site?
- They work for the same company?
- They attend the same meeting?
- They meet and talk on the street?
- They were in jail together?
16Intelligence SNA
Data management
Present results
Set up
Coding
Analysis
17Data management
- Configuration control
- Database merging
- Database refinements
- The human element
- Data tidying
- Information entered into the wrong field
- Locations not entered
- Dates associated with data entered
- Entity disambiguation
18Intelligence SNA
Data management
Present results
Set up
Coding
Analysis
19Questions and Techniques
20Intelligence SNA
Data management
Present results
Set up
Coding
Analysis
21Why use SNA?
- Systematic approach to data coding allows for
quick and easy what-if? analysis - Coding data forces people to challenge their
assumptions and allows knowledge to be
transferred - SNA may identify network characteristics not
apparent by eye - SNA allows group structures and flows of
communications to be explored
22Centrality measures
- Used to explore who is key in the network
Eigenvector Centrality Who does who you know
know?
Degree Centrality Well connected hubs
Betweenness Centrality - Gatekeepers
23What about missing data (1)?
24What about missing data (2)?
25What about deliberately concealed data?
- Is there anything we can do?
- Should we compensate for missing and concealed
data, or simply accept that it exists and try to
minimise the impact it has?
26Reachability and distance
27Affiliations inferring links through shared
attributes
Groups
People
28Reachability and distance
29More trustworthy links
30Reachability and distance
Normal link
Trusted link
31Difficulties encountered
Software packages available
Balance between coding and analysis
Nature of available data
Applicability of SNA measures
Continual process of data tidying
32Demonstration of added value
- Identification of a key individual through
inferred links - Identification of a different inter-group
structure to that which had been assumed - Understanding of the importance of an individual
of interest
33Assumed structure
Group A
Group B
34Structure suggested by SNA
Group A
Group B
35Links of a person of interest
36(No Transcript)
37The history of SNA
Psychology
Anthropology
Mathematics
38Review of Terrorist disruption
Historical CT success factors
Exploitation Group analysis and assessment /
DIS, PJHQ HQ ARRC Operational assessments
AB Analysis
AB Assessment Metrics
SNA Case studies
Influence Analysis / PAM
Media assessment
Media monitoring
Suicide Terrorism
Computer-assisted sentiment analysis
Modelling Info Ops Target Dynamics
Leadership assessment
Coercion / Intent gaming
Prediction of surprise attack
Body movement profiling
LAPA RV Assessment
Exploitation Remote personality assessment
DIS Leadership and Personality Assessment (LAPA)
39Proposed ISNA Activities
Support development of Behavioural, SNA andSNEE
Science Base
Technical / softwaresupport
ISNACapabilityDevelopment
Operational ExploitationDstl
Operational ExploitationMoD, OGAsand OGDs
End 2007
Current
End 2010
40QuestionsComments