Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Social network analysis
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Security applications === Social network analysis is also used in intelligence, [[counter-intelligence]] and [[law enforcement]] activities. This technique allows the analysts to map covert organizations such as an [[espionage]] ring, an organized crime family or a street gang. The [[National Security Agency]] (NSA) uses its [[computer surveillance|electronic surveillance]] programs to generate the data needed to perform this type of analysis on terrorist cells and other networks deemed relevant to national security. The NSA looks up to three nodes deep during this network analysis.<ref name="nsa_degrees">{{cite news|url=https://www.theguardian.com/world/2013/jul/17/nsa-surveillance-house-hearing|date=17 July 2013|access-date=19 July 2013|title=NSA warned to rein in surveillance as agency reveals even greater scope|newspaper=The Guardian|last1=Ackerman|first1=Spencer}}</ref> After the initial mapping of the social network is complete, analysis is performed to determine the structure of the network and determine, for example, the leaders within the network.<ref name="nsa_how">{{cite web|url=http://www.digitaltonto.com/2013/how-the-nsa-uses-social-network-analysis-to-map-terrorist-networks/|date=12 June 2013|access-date=19 Jul 2013|title=How The NSA Uses Social Network Analysis To Map Terrorist Networks}}</ref> This allows military or law enforcement assets to launch capture-or-kill [[decapitation attack]]s on the [[high-value targets]] in leadership positions to disrupt the functioning of the network. The NSA has been performing social network analysis on [[call detail record]]s (CDRs), also known as [[metadata]], since shortly after the [[September 11 attacks]].<ref name="NSA_SNA">{{cite magazine|url=https://www.wired.com/science/discoveries/news/2006/05/70888|title=NSA Using Social Network Analysis|magazine=Wired|date=12 May 2006|access-date=19 July 2013}}</ref><ref name="nsa_usa">{{cite journal|url=http://www.slate.com/articles/news_and_politics/explainer/2006/05/how_the_nsa_does_social_network_analysis.html|date=11 May 2006|access-date=19 July 2013|title=NSA has massive database of Americans' phone calls |journal=Slate |last1=Dryer |first1=Alexander }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)