DA Department Faculty Publications
Books & Chapters
by Daniel Cunningham, Sean Everton and Philip Murphy
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (Sna) method. Written in an accessible manner, it provides an introduction to Sna, presenting tools and concepts, and showing how Sna can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks
by Leo J. Blanken
Imperialism remains a perennial issue in international relations today, and nowhere is this more evident than in the intensifying competition for global resources. Leo J. Blanken explains imperialism through an analysis of the institutions of both the expanding state and its targets of conquest.
by Heather Gregg
In the wake of 9/11, many have tried to make sense of the rise of militant Islam. The general perception is that Islam is more violence prone than other religions. Here, however, Heather S. Gregg draws comparisons across religious traditions to investigate common causes of religious violence. The author sets side by side examples of current and historic Islamic violence with similar acts by Christian, Jewish, Buddhist, and Hindu adherents.
Based on her findings, Gregg challenges the assumption that religious violence stems from a faith’s scriptures. Instead, Gregg argues that religious violence is the result of interpretations of a religion’s beliefs and scriptures. Interpretations calling for violence in the name of a faith are the product of individuals, but it is important to understand the conditions under which these violent interpretations of a religion occur.
by Sean F. Everton
This is the first book in which counterinsurgency theory and social network analysis are coupled. Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize, and disrupt covert and illegal networks.
by Anna Simons
In The Sovereignty Solution: A Commonsense Approach to Global Security (Naval Institute Press, 2011) Professor Anna Simons and Department of Defense Analysis graduates LTC Joe McGraw, USA, and LTC Duane Lauchengco, USA, propose a foreign policy emphasizing every nation's responsibility--including America's--to control security and the social fabric within its own borders.
Simons and her Special Forces coauthors argue that the U.S. has never articulated the clear position on national defense, "respect our sovereignty and we will respect yours." The Sovereignty Solution is a radical, yet sensible, approach to global security and world order that doesn't require the U.S. to engage in global policing or nation building.
The book's goal is to provoke heightened awareness of the gaps and disconnects between what the U.S. says and what it does, how it wants to be perceived and how it is perceived. Without leaning left or right, the authors hope to initiate a serious debate and to force Washington to rethink what it sends servicemen and women abroad to do.
Ten officers in the DA department participated in the study and were instrumental in pulling the overall argument together.
Employment handbook for fighting counterinsurgencies: A toolkit for how to build rapport, create jobs, and work towards a viable state
by Heather Gregg
This manual offers lists of employment menus that Brigade Combat Teams, Civil Affairs Teams, Special Forces Teams, and Provincial Reconstruction Teams can consult to generate employment in their area of operation with the aim of engaging young men in productive work, (offering an alternative to insurgent activity), putting currency in the economy, developing positive rapport and trust with the local population, and working towards the long term viability of the state, which is the goal in counterinsurgency (COIN). This manual is designed to bridge the short and long term objectives of COIN. The three menus are graduated to offer different employment programs that eventually build from short-term, foreign funded projects, to long-term self-sustaining employment based on the resources and needs of the local population. The menus are also designed to bridge the rotation of forces in an area of operation, allowing for new troops to build on programs established by previous forces and to begin transitioning early projects to the civilian sector.
by Michael Freeman and Hy Rothstein
In a discussion at the Naval Postgraduate School in Monterey, California, it became apparent that there were many similarities between insurgent behavior and gang behavior -- similarities that would make a more rigorous analysis worthwhile. With this theme in mind, the faculty of the Defense Analysis Department at the Naval Postgraduate School, experts in counterinsurgency and counterterrorism operations, were enlisted to address these similarities and to share their theories, models, and ideas from their own disciplines of political science, sociology, anthropology, international relations, and more. This collection of short papers is the result.
by Arthur Davis and Keenan Yoho
This report was prepared for NATO Special Operations Headquarters to assist with the organizational design, resourcing and selection of air assets to enable the creation of an Air Warfare Center (AWC). This report represents a collaborative effort between the Defense Analysis Department and the Graduate School for Business and Public Policy conducted with the support of both NATO and the US Special Operations Command. Areas of research emphasis include the justification for an organic special operations air capability within NATO, proposed organizational structure for the AWC, procurement and sustainment of excess defense articles and possible near and long term solutions for rotary and fixed wing aviation assets.
by Emily O. Goldman and John Arquilla
This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief is that learning is most effective when concepts under consideration can be aligned with already-existing understanding or knowledge. Cyber issues are inherently tough to explain in layman's terms. The future is always open and undetermined, and the numbers of actors and the complexity of their relations are too great to give definitive guidance about future developments. In this respect, historical analogies, carefully developed and properly applied, help indicate a direction for action by reducing complexity and making the future at least cognately manageable.