[Abuza, Z. (2003). Militant Islam in Southeast Asia: Crucible of Terror. Boulder, CO: Lynne Reinner Publishers.10.1515/9781685851200]Search in Google Scholar
[Anonymous (2009). “Deception 2.0: Deceiving in the Netwar Age.” Unpublished Paper. Task Force Iron, Iraq.]Search in Google Scholar
[Arreguin-Toft, I. (2001). “How the Weak Win Wars: A Theory of Asymmetric Conflict.” International Security 26, 1: 93-128.10.1162/016228801753212868]Search in Google Scholar
[Arreguin-Toft, I. (2005). How the Weak Win Wars: A Theory of Asymmetric Conflict. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511521645]Search in Google Scholar
[Asal, V., & Rethemeyer, R. K. (2006). “Researching Terrorist Networks.” Journal of Security Education 1, 4: 65-74.10.1300/J460v01n04_06]Search in Google Scholar
[Asal, V., & Rethemeyer, R. K. (2008). “The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks.” The Journal of Politics 70, 2: 437-449.10.1017/S0022381608080419]Search in Google Scholar
[Azarian, G. R. (2005). The General Sociology of Harrison C. White: Chaos and Order in Networks. New York: Palgrave Macmillan.10.1057/9780230596719]Search in Google Scholar
[Baker, W. E., & Faulkner, R. R. (1993). The Social-Organization of Conspiracy: Illegal Networks in the Heavy Electrical-Equipment Industry. American Sociological Review 58, 6: 837-860.]Search in Google Scholar
[Banlaoi, R. C. (2009). Counter Terrorism Measures in Southeast Asia: How Effective Are They? Manilla, Philippines: Yuchengco Center: De La Salle University.]Search in Google Scholar
[Batagelj, V., & Mrvar, A. (2010). Pajek 1.27. Lubjlijana, Slovenia: University of Ljubljana.]Search in Google Scholar
[Borgatti, S. P. (2006). “Identifying Sets of Key Players in a Social Network.” Computational, Mathematical and Organizational Theory 12: 21-34.]Search in Google Scholar
[Borgatti, S. P., Carley, K. M., & Krackhardt, D. (2006). “On the Robustness of Centrality Measures under Conditions of Imperfect Data.” Social Networks 28: 124-136.]Search in Google Scholar
[Boucek, C. (2008a). “The Sakinah Campaign and Internet Counter-Radicalization in Saudi Arabia.” CTC Sentinel 1, 9: 1-4. Available: http://carnegieendowment.org/files/CTCSentinelVol1Iss9.pdf [January 5, 2011].]Search in Google Scholar
[Boucek, C. (2008b). “Saudi Arabia’s ‘Soft’ Counterterrorism Strategy: Prevention, Rehabilitation, and Aftercare.” Carnegie Papers, No. 97. Available: http://carnegieendowment.org/files/cp97boucek saudi final.pdf[January 5, 2011].]Search in Google Scholar
[Breiger, R. L. (1975). “Dual and Multiple Networks of Social Structures: A Study of Affiliation and Interaction.” Unpublished Doctoral Dissertation, Harvard University, Boston.]Search in Google Scholar
[Brimley, S., & Singh, V. (2008). “Stumbling into the Future? The Indirect Approach and American Strategy.” Orbis 52, 2: 312-331.10.1016/j.orbis.2008.01.009]Search in Google Scholar
[Cooper, H. (2009). “Dreaming of Splitting the Taliban.” The New York Times. Available: http://www.nvtimes.com/2009/03/08/weekinreview/08COOPER.html? r=1 [January 5, 2011].]Search in Google Scholar
[Davis, L. E., & Sisson, M. W. (2009). A Strategic Planning Approach: Defining Alternative Counterterrorism Strategies as an Illustration. Santa Monica, CA: RAND Corporation.]Search in Google Scholar
[de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory Social Network Analysis with Pajek. Cambridge, UK: Cambridge University Press.10.1017/CBO9780511806452]Search in Google Scholar
[Diani, M., & McAdam, D. (Eds.). (2003). Social Movements and Networks: Relational Approaches to Collective Action. Oxford and New York: Oxford University Press.10.1093/0199251789.001.0001]Search in Google Scholar
[Doreian, P., Batagelj, V., & Ferligoj, A. (2005). Generalized Blockmodeling. New York and Cambridge: Cambridge University Press.]Search in Google Scholar
[Ettlinger, N., & Bosco, F. (2004). “Thinking through Networks and their Spatiality: A Critique of the U.S. (Public) War on Terrorism and its Geographic Discourse.” Antipode 36, 2: 249-271.10.1111/j.1467-8330.2004.00405.x]Search in Google Scholar
[Everton, S. F. (Forthcoming). “Network Topography, Key Players and Terrorist Networks.” Connections.]Search in Google Scholar
[Felter, J., & Fishman, B. (2007). “Al-Qa’ida’s Foreign Fighters in Iraq: A First Look at the Sinjar Records.” Available: http://www.ctc.usma.edu/harmony/pdf/CTCForeignFighter.19.Dec07.pdf [January 5, 2011].]Search in Google Scholar
[Fink, N. C., & Hearne, E. B. (2008). “Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism.” Available: http://www.ipacademy.org/media/pdf/publications/beter.pdf [January 5, 2011].]Search in Google Scholar
[Flynn, M. T., Pottinger, M., & Batchelor, P. D. (2010). Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington DC: Center for a New American Security.]Search in Google Scholar
[Fridovich, D. P., & Krawchuk, F. T. (2007). “Special Operations Forces: Indirect Approach.” Joint Forces Quarterly 44, 1: 24-27.]Search in Google Scholar
[Granovetter, M. (1973). “The Strength of Weak Ties.” American Journal of Sociology 73, 6: 13601380.]Search in Google Scholar
[Horgan, J. (2009). Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. New York: Routledge.10.4324/9780203874738]Search in Google Scholar
[International Crisis Group (2006). Terrorism in Indonesia: Noordin’s Networks (No. Asia Report #114). Brussels, Belgium: International Crisis Group.]Search in Google Scholar
[International Crisis Group (2008). Indonesia: Jemaah Islamiyah’s Publishing Industry. Brussels, Belgium: International Crisis Group.]Search in Google Scholar
[Jones, S. G., & Libicki, M. C. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Santa Monica, CA: RAND Corporation.]Search in Google Scholar
[Jordan, J., Mañas, F. M., & Horsburgh, N. (2008). “Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings.” Studies in Conflict & Terrorism 31: 17-21.]Search in Google Scholar
[Keefe, P. (2006). “Can Network Theory Thwart Terrorists?” The New York Times. Available: http://www.nvtimes.com/2006/0.3/12/magazine/.312wwlnessay.html [January 5, 2011].]Search in Google Scholar
[Krawchuk, F. T. (ND). “Winning the Global War on Terrorism in the Pacific Region: Special Operations Forces’ Indirect Approach to Success.” Available: http://igcc.ucsd.edu/research/security/DACOR/presentations/krawchuk.pdf [January 5, 2011].]Search in Google Scholar
[Krebs, V. (2001). “Mapping Networks of Terrorist Cells.” Connections 24, 3: 43-52.]Search in Google Scholar
[Lempert, R. J., Trujillo, H. R., Aaron, D., Dewar, J. A., Berry, S. H., & Popper, S. W. (2008). “Comparing Alternative U.S. Counterterrorism Strategies: Can Assumption-Based Planning Help Elevate the Debate?” Available: http://www.rand.org/pubs/documented briefings/2008/RAND DB548.pdf [January 5, 2011; large document].]Search in Google Scholar
[Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Campbell Systematic Reviews 2006, 2: 51. Available: http://www.rutgerscps.org/publications/Lum Terrorism Review.pdf [January 5, 2011].]Search in Google Scholar
[Lum, T., & Niksch, L. A. (2006; updated 2009). “The Republic of the Philippines: Background and U.S. Relations: Congressional Research Service Report to Congress.” Available: http://www.fas.org/sgp/crs/row/RL33233.pdf [January 5, 2011].]Search in Google Scholar
[Magouirk, J., Atran, S., & Sageman, M. (2008). “Connecting Terrorist Networks.” Studies in Conflict & Terrorism 31: 1-16.]Search in Google Scholar
[Marks, S., Meer, T., & Nilson, M. (2005). “Manhunting: A Methodology for Finding Persons of National Interest.” Unpublished Master of Science, Naval Postgraduate School, Monterey, CA.]Search in Google Scholar
[McAdam, D. (1982). Political Process and the Development of Black Insurgency, 1930-1970. Chicago: University of Chicago Press.]Search in Google Scholar
[McAdam, D. (1999). Political Process and the Development of Black Insurgency, 1930-1970 (2nd ed.). Chicago: University of Chicago Press.10.7208/chicago/9780226555553.001.0001]Search in Google Scholar
[McCarthy, J. D., & Zald, M. N. (1977). “Resource Mobilization and Social Movements: A Partial Theory.” American Journal of Sociology 82, 6: 1212-1241.10.1086/226464]Search in Google Scholar
[Moody, J. (2005). Fighting a Hydra: A Note on the Network Embeddedness of the War on Terror. Structure and Dynamics 1, 2. Available: http://escholarship.org/uc/item/7x.3881bs [January 5, 2011].]Search in Google Scholar
[Moon, I.-C. (2008). “Destabilization of Adversarial Organizations with Strategic Interventions.” Unpublished Doctoral Thesis, Carnegie Mellon University, Pittsburgh, PA. Available: http://www.casos.cs.cmu.edu/publications/papers/CMU-ISR-08-124.pdf [January 5, 2011].]Search in Google Scholar
[Mortenson, G., & Bryan, M. (2009). Stones into Schools: Promoting Peace with Books, Not Bombs, in Afghanistan and Pakistan. New York: Viking.]Search in Google Scholar
[Mortenson, G., & Relin, D. O. (2006). Three Cups of Tea: One Man’s Mission to Fight Terrorism and Build Nations... One School at a Time. New York: Viking.]Search in Google Scholar
[Pedahzur, A., & Perliger, A. (2006). “The Changing Nature of Suicide Attacks: A Social Network Perspective.” Social Forces 84, 4: 1987-2008.10.1353/sof.2006.0104]Search in Google Scholar
[Peter, T. A. (2008). “U.S. Begins Hunting Iraq’s Bombmakers, Not Just Bombs.” The Christian Science Monitor. Available: http://www.csmonitor.com/2008/0908/p04s01-wome.html [January 5, 2011].]Search in Google Scholar
[Popielarz, P. A., & McPherson, J. M. (1995). “On the Edge or in Between: Niche Position, Niche Overlap, and the Duration of Voluntary Association Memberships.” American Journal of Sociology 101, 3: 698-720.10.1086/230757]Search in Google Scholar
[Raab, J., & Milward, H. B. (2003). “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13, 4: 413-439.10.1093/jopart/mug029]Search in Google Scholar
[Rabasa, A. (2005). “Islamic Education in Southeast Asia.” In H. Fradkin, H. Haqqani & E. Brown (Eds.), Current Trends in Islamist Ideology (pp. 97-108). Washington, D.C.: Hudson Institute.]Search in Google Scholar
[Ramakrishna, K. (2005). “Delegitimizing Global Jihadi Ideology in Southeast Asia.” Contemporary Southeast Asia 27, 3: 343-369.10.1355/CS27-3A]Search in Google Scholar
[Rodriguez, J. A. (2005). The March 11th Terrorist Network: In Its Weakness Lies Its Strength.]Search in Google Scholar
[Barcelona, Spain: Departament de Sociologia i Anàlisi de les Organitzacions: Universitat de Barcelona.]Search in Google Scholar
[Sageman, M. (2004). Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.10.9783/9780812206791]Search in Google Scholar
[Schmitt, E., & Perlez, J. (2009). “Strikes Worsen Qaeda Threat, Pakistan Says.” The New York Times. Available: http://www.rņytiffiθŞ.com/2009/02/25/woŗld/aşia/25dŗoņeş.html?şç2=1&şq=Şçhmitt%20aņd%20Pe rlez.%202009&st=cse [January 5, 2011].]Search in Google Scholar
[Simmel, G. ([1908, 1922] 1955). Conflict & The Web of Group-Affiliations (K. H. Wolff & R. Bendix, Trans.). New York: The Free Press.]Search in Google Scholar
[Smith, C. S. (1991). The Emergence of Liberation Theology: Radical Religion and Social Movement Theory. Chicago: University of Chicago Press.]Search in Google Scholar
[Smith, C. S. (1996). Resisting Reagan: The U.S. Central America Peace Movement. Chicago: The University of Chicago Press.10.7208/chicago/9780226763330.001.0001]Search in Google Scholar
[Sparrow, M. K. (1991). “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects.” Social Networks 13: 251-274.]Search in Google Scholar
[Stark, R., & Bainbridge, W. S. (1980). “Networks of Faith: Interpersonal Bonds and Recruitment to Cults and Sects.” American Journal of Sociology 85, 6: 1376-1395.10.1086/227169]Search in Google Scholar
[Tsvetovat, M., & Carley, K. M. (2005). “Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence.” Journal of Social Structure 6, 2. Available: http://www.cmu.edu/joss/content/articles/volume6/TsvetovatCariey/index.html [January 5, 2011].]Search in Google Scholar
[U.S. Army (2007). U.S. Army/Marine Counterinsurgency Field Manual (FM 3-24). Old Saybrook, CT: Konecky & Konecky.]Search in Google Scholar
[U.S. Director of Operations (2006). Information Operations: Joint Publication 3-13. Available: http://www.fas.org/irp/doddir/dod/jp3 13.pdf [January 5, 2011].]Search in Google Scholar
[U.S. Special Operations Command (2003). Doctrine for Joint Psychological Operations: Joint Publication 3-53. Available: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/02 psyop-jp-3-53.pdf [January 5, 2011].]Search in Google Scholar
[van Meter, K. M. (2001). “Terrorists/Liberators: Researching and Dealing with Adversary Social Networks.” Connections 3: 66-78.]Search in Google Scholar
[White, H. C. (2008). Identity and Control: How Social Formations Emerge (2nd ed.). Princeton, NJ: Princeton University Press.]Search in Google Scholar
[Wikipedia (2010). “Noordin Mohammed Top.” Available: http://en.wikipedia.org/wiki/Noordin Mohammad Top [January 5, 2011].]Search in Google Scholar
[Wiktorowicz, Q. (2004). “Introduction: Islamic Activism and Social Movement Theory.” In Q.]Search in Google Scholar
[Wiktorowicz (Ed.), Islamic Activism: A Social Movement Theory Approach (pp. 1-33). Bloomington: Indiana University Press.]Search in Google Scholar
[Wilson, G. (2006). “Anatomy of a Successful COIN Operation: OEF-Philippines and the Indirect Approach.” Military Review (November-December): 2-12. Available: http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview 2008CRII0831 art 009.pdf [January 5, 2011].]Search in Google Scholar