Access the full text.
Sign up today, get DeepDyve free for 14 days.
References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.
Social network analysis has been adopted by a number of governments in their counterinsurgency campaigns. By using network analysis, security agencies claim they can render militant groups impotent by targeting ‘nodal points’ or key links in insurgent networks. The article makes three arguments on the potentially counterproductive nature of social network analysis-assisted counterinsurgency campaigns. Firstly, social network analysis may be ‘too successful’ in stripping militant movements of a cadre who could negotiate a peace accord. Secondly, social network analysis-assisted campaigns fail to address the root causes of violent conflict. Thirdly, by denuding communities of social capital and social entrepreneurs, social network analysis – as a counterinsurgency tool – may condemn communities to underdevelopment and failed post-war reconstruction. In short, the ‘magic weapon’ of social network analysis might actually prolong the conflict it is supposed to help quell. The article employs the government of Sri Lanka's social network analysis-assisted counterinsurgency campaign as a case study, though it also has application to other cases. It concludes by considering if social network analysis can be put to more constructive uses, specifically in the rebuilding of communities after violent conflict.
Critical Studies on Terrorism – Taylor & Francis
Published: Aug 13, 2010
Keywords: social network analysis (SNA); counterinsurgency; peace-building; post-war reconstruction; Sri Lanka
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.