Accession Number : AD1030779


Title :   Saving Coalition Lives and Limbs: Disrupting the Improvised Explosive Device Network in Iraq with Center of Gravity Analysis and Social Network Viral Targeting


Descriptive Note : Technical Report


Corporate Author : Air University, Air Command And Staff College Maxwell Air Force Base United States


Personal Author(s) : Campbell,Kofi


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/1030779.pdf


Report Date : 21 Dec 2008


Pagination or Media Count : 52


Abstract : Improvised explosive devices (IED) continue to inflict coalition casualties in Iraq, indicating the United States has not found an effective means of disrupting the IED network in that country. This thesis presents center of gravity (COG) analysis and social network viral targeting as a means of disrupting the IED network in Iraq. A COG is a physical or moral entity that is the primary component of physical and moral strength, power and resistance that allows victory in battles, operations, and wars. COG analysis identifies these COGs and their critical vulnerabilities that are susceptible to neutralization, degradation, or defeat. Social network viral targeting disrupts the human elements of networks by sowing social viruses such as animosity, disinformation, distrust, and humiliation. Disruptive, viral information is first planted into carriers, or people associated in some way with those targeted. These carriers then spread the viral information via various vectors, resulting in the dissemination of disruptive information throughout the targeted persons social network. This research paper uses a problem/solution framework to answer the question: how can the United States most effectively further disrupt the IED network in Iraq? It describes how COG analysis can help to identify critical vulnerabilities associated with the IED networks key people, facilities, and aspects of its support network. It then shows how viral targeting can disrupt the IED network by disrupting the human element around these critical vulnerabilities. Viral targeting can include planting derogatory information about specific bomb makers and their affiliations into carriers such as friends, acquaintances, associates, or rivals of those bomb makers. These carriers would then spread the viral information via word of mouth or via vectors such as phone text messages and computer e-mails.


Descriptors :   social networks , explosively formed penetrators , iraqiwar , psychological operations , armored vehicles , explosive charges , mobile phones , task forces , nato , department of defense , asymmetric warfare , command and control , improvised explosive devices


Subject Categories : Military Operations, Strategy and Tactics


Distribution Statement : APPROVED FOR PUBLIC RELEASE