Social Network Analysis for National Security Michael Last Department of Defense.

Slides:



Advertisements
Similar presentations
Sesión 3. Análisis de redes sociales
Advertisements

Social Network Analysis (in 10 minutes) Nick Crossley.
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Community Detection and Graph-based Clustering
Λ14 Διαδικτυακά Κοινωνικά Δίκτυα και Μέσα Positive and Negative Relationships Chapter 5, from D. Easley and J. Kleinberg book.
Analysis and Modeling of Social Networks Foudalis Ilias.
Comparison of Social Networks by Likhitha Ravi. Outline What is a social network? Elements of social network Previous studies What is missing in previous.
2 The NodeXL Project Team About Me Introductions Marc A. Smith Chief Social Scientist Connected Action Consulting Group
Relationship Mining Network Analysis Week 5 Video 5.
 Copyright 2011 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute Enabling Networked Knowledge.
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Principles of Patrolling Applying Ranger School Lessons to Information Security Patrick Tatro.
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
User Interactions in OSNs Evangelia Skiani. Do you have a Facebook account? Why? How likely to know ALL your friends? Why confirm requests? Why not remove.
Models of Influence in Online Social Networks
1 Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction Zequian shen, Kwan-Liu Ma, Tina Eliassi-Rad Department.
The United States air transportation network analysis Dorothy Cheung.
Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.
Social Networks Corina Ciubuc.
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Research Meeting Seungseok Kang Center for E-Business Technology Seoul National University Seoul, Korea.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
US Army Combined Arms Center Approach to the IW Environment.
An Introduction to Software Architecture
1 Computing with Social Networks on the Web (2008 slide deck) Jennifer Golbeck University of Maryland, College Park Jim Hendler Rensselaer Polytechnic.
Social Network Analysis: A Non- Technical Introduction José Luis Molina Universitat Autònoma de Barcelona
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
Automated Social Hierarchy Detection through Network Analysis (SNAKDD07) Ryan Rowe, Germ´an Creamer, Shlomo Hershkop, Salvatore J Stolfo 1 Advisor:
Science: Graph theory and networks Dr Andy Evans.
Advanced Methods and Analysis for the Learning and Social Sciences PSY505 Spring term, 2012 April 25, 2012.
Structural Properties of Networks: Introduction Networked Life NETS 112 Fall 2015 Prof. Michael Kearns.
Special Topics in Educational Data Mining HUDK5199 Spring 2013 March 25, 2012.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Mining Social Networks for Personalized Prioritization Shinjae Yoo, Yiming Yang, Frank Lin, II-Chul Moon [KDD ’09] 1 Advisor: Dr. Koh Jia-Ling Reporter:
Union-find Algorithm Presented by Michael Cassarino.
A project from the Social Media Research Foundation: Finding direction in a sea of connection:
Social Networks. 2 A social network is a social structure made up of individuals or organizations (called "nodes“), which are tied (connected) by one.
Yongqin Gao, Greg Madey Computer Science & Engineering Department University of Notre Dame © Copyright 2002~2003 by Serendip Gao, all rights reserved.
Complex Network Theory – An Introduction Niloy Ganguly.
Most of contents are provided by the website Graph Essentials TJTSD66: Advanced Topics in Social Media.
The Structure of the Web. Getting to knowing the Web How big is the web and how do you measure it? How many people use the web? How many use search engines?
Social Network Analysis. Outline l Background of social networks –Definition, examples and properties l Data in social networks –Data creation, flow and.
Complex Network Theory – An Introduction Niloy Ganguly.
Measuring Behavioral Trust in Social Networks
+ Big Data, Network Analysis Week How is date being used Predict Presidential Election - Nate Silver –
Its a specific set of linkages among a defined set of persons with the additional property that the characteristics of these linkages as a whole may be.
An Optimal Certificate Dispersal Algorithm for Mobile Ad Hoc Networks Nagoya Institute of Technology Hua Zheng Shingo Omura Jiro Uchida Koichi Wada.
HCC class lecture 21: Intro to Social Networks John Canny 4/11/05.
Informatics tools in network science
Importance Measures on Nodes Lecture 2 Srinivasan Parthasarathy 1.
Topical Analysis and Visualization of (Network) Data Using Sci2 Ted Polley Research & Editorial Assistant Cyberinfrastructure for Network Science Center.
1 Intelligent Information System Lab., Department of Computer and Information Science, Korea University Semantic Social Network Analysis Kyunglag Kwon.
Bennington’s Community Health Network. Study Objective Objective Describe the network of organizations that has emerged in each Blueprint HSA to support.
Mapping Your Digital Audiences Nicole Fernandez, Georgetown Erin Gamble, Charrosé King,
Classroom network analysis
Social Networks Analysis
Structural Properties of Networks: Introduction
E-Commerce Theories & Practices
Community detection in graphs
Structural Properties of Networks: Introduction
Using Friendship Ties and Family Circles for Link Prediction
Network Science: A Short Introduction i3 Workshop
The Watts-Strogatz model
On the effect of randomness on planted 3-coloring models
Bikalp Chamola (VAF) Shyam Singh (IRMA)
Mining Social Networks. Contents  What are Social Networks  Why Analyse Them?  Analysis Techniques.
Social Network Analysis
(Social) Networks Analysis II
Jana Diesner, PhD Associate Professor, UIUC
Presentation transcript:

Social Network Analysis for National Security Michael Last Department of Defense

SNA for COIN “COIN operations require assessing the political and social architecture of the operational environment, from both friendly and enemy perspectives. SNA can help commanders understand how an insurgent organization operates. Insurgent networks often do not behave like normal social networks. However, SNA can help commanders determine what kind of social network an insurgent organization is. That knowledge helps commanders understand what the network looks like, how it is connected, and how to best defeat it.”

Outline Introduction to Social Network Analysis Social Networks in the US Army/Marine Counterinsurgency Field Manual Requests for research

Social Network Definition Graph, defined by nodes and edges –Nodes are actors People, nations, organizations… NOT Elephants –Edges indicate a relationship Bidirectional: A knows B, A communicates with B Directed: A gives orders to B, A knows of B Which is “A is a friend of B?”

Measures (not exhaustive) Density –Proportion of possible edges that exist Betweenness centrality –Number of shortest paths containing an edge Centrality, in-degree/out-degree –Number of neighbors, or connections going in/out Other graph measures –# components, diameter, average distance,…

Types of Connections

Time-Varying Social Network Dense networks are dangerous networks Dense networks are vulnerable network

Capture of Hussein “The intelligence analysts and commanders of the 4 th Infantry Division spent the summer of 2003 building link diagrams showing everyone related to Hussein by blood or tribe. Those family diagrams led to the lowest level, but nonetheless highly trusted, relatives and clan members harboring Hussein and helping him move around the countryside…”

Capture of Hussein “…Late in the year, a series of operations produced an abundance of new intelligence about the insurgency and Hussein’s whereabouts. Commanders then designed a series of raids to capture key individuals and leaders of the former regime who could lead counterinsurgents to him. Each mission gained additional information, which shaped the next raid…eventually leading coalition forces into Hussein’s most trusted inner circle and finally to Hussein’s capture.

Saddam’s Network (simplified)

Requirements Scalable –Full Hussein network much larger Automated Easy to understand –Most users not in the math community –Be sure measures are well-named! –Methods with good lay explanations will be used

Wish List Models for dynamic social networks –SAMSI has looked at this Networks with different types of ties –Layered networks? –Links inform each other – ho do we leverage this information? –Similarity measures?

Wish List Birth/death of links –Kinship permanent –Marriage rarely changes –“Buys from” transitory Characterize different life cycles Differences between types of links –An instance of an order different from “gives orders to”

Wish List Principled framework for data-driven inference –Sparsely occurring links vs. death of links –How many orders -> Gives orders to? Do I give orders to waiters? I “task” my coworkers. Do I give them orders? Related fields – can we automate link detection from other data sources?

Graphs as Statistics vs. Statistics on Graphs Current paradigm: –Graph is given –Statistics are functions of graph –Draw inference from graph My thought: –Graph summarizes data – it is a statistics, inferred from data. –Functions of graph project to lower dimensions, analogous to PCA