Share this Post
Optimizing Foreign Internal Defense to Counter Dark Networks: Direct and Indirect Approaches for Security and Development Efforts
Bryan Dailey, Ian Davis, and Julius Managuelod
Al-Qa‘ida and its affiliates are not the only non-state threats to United States interests at home and abroad. The U.S. and its global partners are threatened by a multitude of religious and political Violent Extremist Organizations (VEOs), Transitional Criminal Organizations (TCOs), and other malign actors and networks. In the conduct of their activities, these actors and groups exploit the environmental instability inherent in ill-governed spaces to further achieve their purpose. Although their purposes vary, dark networks are inconsistent with the values and laws of the nation-states and serve catalysts for instability. As the world becomes increasingly connected, so do illegal and covert dark networks. In Dark Networks as Problems, Raab and Milward found that dark networks tend to form cooperative relationships with other dark networks and may make and maintain ties to the legal (light) networks striving to destroy them. The relationships between legal and illegal networks make counter-network strategies exceptionally problematic, especially in ill-governed or fragile states. Dark networks gain physical and ideological sanctuary in the absence of good governance and fill the vacuum created by dysfunctional or absent state structures. They conduct illicit activities to achieve their objectives and operate in the shadows to prevent their illumination and interdiction by state security elements and competitors. In many cases, they form cooperative relationships of convenience to optimize their capacity to achieve objectives. Many receive extra-organizational support from state security services as witting or unwitting proxies. Inevitably, this results in further destabilization of fragile states and creates an environment that allows dark networks to thrive.
U.S. strategic security policies, such as the National Security Strategy, National Strategy for Counterterrorism, Strategy to Combat Transnational Organized Crime, Quadrennial Diplomacy and Development Review, and the Development Response to Violent Extremism and Insurgency, suggest the need to take a multi-national, whole-of-nation approach and build capacity to enable a network of global partners to counter traditional and irregular threats to U.S. national interests at home and abroad. Although investing in global partners and for security cooperation has the potential to yield great benefits, resources are limited. Fiscal constraints compel reduced defense, foreign aid, and Security Sector Assistance spending to develop global partners. Therefore, the current resource-constrained environment calls for smart investment in time and resources that maximize the capacity to counter dark networks and minimize associated cost.
In light of vital U.S. national security objectives and mounting fiscal constraints, the United States must prudently invest time and resources to build our global partners’ capacity to counter dark networks abroad before they become a threat to the U.S. homeland. A prudent investment is to optimize Foreign Internal Defense (FID) efforts with global partners to counter dark networks. The optimal framework for conducting FID is holistic in nature. It focuses on building the host nation (HN) capacity to counter dark networks through direct and indirect approaches with security and development efforts. Leveraging a direct and indirect framework of security and development efforts yields four pillars that can drive FID activities and enable global partners to counter dark networks: Attack the Network (Direct-Security); Provide Legitimate Alternatives (Direct-Development); Enforce Rule of Law (Indirect-Security); and Provide Essential Services (Indirect-Development).
The first section of this paper provides background information on FID, current literature on dark networks, and introduces the conceptual framework of FID approaches and efforts. The next four sections are devoted to describing key aspects of the four pillars of FID. The final section summarizes our findings and presents the way ahead.
To counter global threats, the United States and its allies must build a network of global partners. Informed by the National Security Strategy, the 2012 Defense Strategic Guidance states:
Violent extremists will continue to threaten U.S. interests, allies, partners, and the homeland… With the diffusion of destructive technology, these extremists have the potential to pose catastrophic threats that could directly affect our security and prosperity. For the foreseeable future, the United States will continue to take an active approach to countering these threats by monitoring the activities of non-state threats worldwide, working with allies and partners to establish control over ungoverned territories, and directly striking the most dangerous groups and individuals when necessary.
Clearly, networks matter and dark networks pose a credible threat to U.S. national security in the homeland and throughout the world.  As traditional threats to U.S. interests have become increasingly networked and diversified in their activities, the United States and its allies must build a global network and enable capacity to counter these adaptive enemies.
Foreign Internal Defense
Today’s complex global security environment requires a collaborative and unified approach to counter threat networks. It requires nation-states to have a keen understanding of the operational environment and the operational reach to interdict dark networks as they are illuminated. Building strong global partnerships and enabling partners to identify and counter threat networks as part of a HN internal defense and development (IDAD) program is a critical component of U.S. national security. A HN IDAD strategy incorporates security operations, as well as political, social, economic, and development programs to address the drivers of instability. HN national policies, goals, priorities, resources, capacity, capability, and political will drive IDAD programs. The goal of an IDAD program is to achieve five broad end states: a safe and secure environment; support for the rule of law; stable governance; creation and/or maintenance of a sustainable economy; and social well-being.
Joint Publication 3-22, Foreign Internal Defense, defines FID as “the participation by civilian and military agencies of a government in any of the action programs taken by another government or other designated organization to free and protect its society from subversion, lawlessness, insurgency, terrorism, and other threats to their security in support of the of HN IDAD program.” FID is part of a comprehensive diplomacy, defense, and development program of security cooperation and assistance executed by the U.S. Departments of State (DoS), Defense (DoD), Agency for International Development (USAID), and other government agencies (OGAs). The DOD conducts FID activities under the supervision of the DoS. These activities are a part of U.S. foreign assistance and are conducted to enable partner nations to execute their IDAD strategy. Multiple U.S. government (USG) agencies work in conjunction to support the programming, nesting, and synchronizing of the HN IDAD program. USAID takes the lead in coordinating and synchronizing development efforts while DoD and OGAs leverage instruments of national power—diplomatic, informational, military, economic, as well as finance, intelligence, and law enforcement (DIMEFIL)—to execute security efforts in coordination with the HN.
The DoD elements conducting FID must coordinate with all stakeholders within the FID operational framework to achieve unified action, synchronize security and development efforts, and build HN capacity to counter dark networks. Although FID is a core mission of special operations forces (SOF), they are not the only organization that conducts security sector assistance or assists in partner nation capacity building. Conventional forces (CF), OGAs, intergovernmental organizations (IGOs), nongovernmental organizations (NGOs), and private sector organizations are help HNs to achieve benchmarks.
Dark networks are “interdependent entities that use formal and informal ties to conduct licit or illicit activities and employ operational security measures and/or clandestine tradecraft techniques through varying degrees of overt, or more likely covert, activity to avoid interdiction to achieve their purpose.” Although the term might be new, organizations that fall within the definition of what constitute dark networks have existed for quite some time. They sometimes used by military leaders and politicians to leverage clandestine elements of politico-military organizations in an effort to weaken, modify, or replace the governing authority, typically through the use or threat of force. These clandestine elements, also known as undergrounds, have the following similarities: “their goals are illegal under the system within which they exist; their activities may be either legal or illegal, but they use primarily illegal means to achieve their goals; and they attempt to conceal the identity of their members and organization from the governing authority.” These illegal activities include not subversion, sabotage, and assassination, but also robbery, extortion, smuggling, and other forms of illicit finance to generate resources for their networks. Dark networks often conduct various forms netwar. In The Advent of Netwar, Arquilla and Ronfeldt describe netwar as an “emerging mode of conflict and crime at societal levels, involving levels short of war, in which protagonists use network forms of organization, doctrine, strategy, and communication.” Likewise, dark networks conduct netwar to improve resiliency in achieving their purposes and often form mutually supporting cooperative relationships that create a crime-terror-insurgency nexus through the convergence of networks.
Conceptual Framework for FID Optimization
An effective IDAD program connects a state’s people to their government and seeks the elimination of conditions that permit dark networks to thrive. A U.S. interagency presence in a HN helps to synchronize U.S. and HN diplomacy, defense, and development efforts to optimize FID. This enables the HN to blend four interdependent functions to prevent or counter internal threats: balanced development, security, neutralization, and mobilization. Security lines of effort focus on building the necessary human, physical, and virtual infrastructure to provide a safe and secure environment and enable legitimate rule of law. This effort not only increases HN military and law enforcement services’ capacity to counter violent and illicit networks, it also leverages other HN actors with the capacity to deny dark network sanctuary and freedom of movement. Increased environmental hostility can increase organizational inefficiencies and make them vulnerable to interdiction. Development efforts focus on improving a HN’s capacity and capability to influence legal behavior, provide essential services, and address the drivers of instability.
The framework for optimizing FID activities to counter dark networks is informed by U.S. national security policy, current security and development practices, and academic research. Specifically, it expands on the work of Nancy Roberts and Sean Everton in Strategies for Combating Dark Networks. Our framework consists of two dimensions: operational approaches (direct and indirect) and traditional IDAD efforts (security and development). Direct approaches focus on illuminating and interdicting the ideology, infrastructure, communication, activities, and resources of a dark network. They also seek to generate legal alternatives to illicit activity and compel malign actors to reintegrate into society. By contrast, indirect approaches focus on changing the environmental conditions that foster dark network operations. Using both approaches in tandem supports the interdiction of dark networks by lethal and non-lethal means. Together, they alter dark networks’ operational environment so as to make it inhospitable for the survival of the dark network.
Table 1: Framework for Countering Dark Networks
Our framework yields four critical FID activities that should be employed to counter dark networks: Attack the Network (Direct-Security), Provide Legitimate Alternatives (Direct-Development), Enforce Rule of Law (Indirect-Security), and Provide Essential Services (Indirect-Development).
Direct Approach for Security Efforts – Attack the Network
Security efforts are useful for attacking dark networks networks. The FID objective is to build HN capacity and capability to illuminate dark networks, disrupt their resources, and interdict their human, physical, and virtual infrastructure..
Illuminate the Network
By its own definition, a dark network takes active measures to remain concealed and to avoid detection and interdiction. Adam Elkus from the Center for a New American Security wrote:
Today, there is still a rigorous debate over the structure and dynamics of al-Qaeda. That debate is complicated by the fact that al-Qaeda, like most violent non-state actors seeking to survive, exists in a murky realm. Intelligence--closed or open source--shines a light into the cave but cannot illuminate the entire structure. The main problem with the targeted killing program is precisely [sic] uncertainty over who the targets really are and how their deaths lead to strategic effect.
The starting point to build partner capacity and capability to illuminate dark networks is to establish a bottom-up intelligence collection, analysis, and dissemination mechanism. Lessons from the British experience conducting counterinsurgency operations against the Provisional Irish Republican Army (PIRA) found the effectiveness of intelligence operations is dependent on the development of low-grade collection capabilities, the formation of specialized operations and units, and flexible technical means. The intelligence collection capacity of the HN requires can be enhanced by through low-cost human intelligence (HUMINT) networks, signals intelligence (SIGINT), and biometric collection systems to maximize situational awareness at the lowest level. Once information is collected, it must be analyzed in an efficient manner at the lowest level to be rapidly disseminated and exploited. The fields of visual analytics and social network analysis provide low-cost analytical tools for tracking, destabilizing, and disrupting dark networks by understanding how the network is structured. These analytic tools are critical to illuminate a dark network to determine its form, function, and logic. This provides the HN the capability to “find and fix” threats and pass the information to security forces to conduct “finish” operations and subsequent “exploitation, analysis, and dissemination.”
After illuminating the dark network, the HN must have the capacity to disrupt the network by lethal and non-lethal means. In general terms, dark networks consist of human, physical, and virtual infrastructure used by the Directive (Core and Peripheral), Operational (Lethal and Non-lethal), and Supportive (Active and Passive) components to conduct lethal and nonlethal operations to create value (work) and achieve their objectives. By leveraging security cooperation and security assistance authorities, the USG can train, resource, and advise effective HN security forces so they can execute surgical lethal and non-lethal strike operations to interdict dark network infrastructure.
The interdiction of resources and financial assets is a powerful tool to counter dark networks. U.S. Executive Orders 13224, Blocking Property and Prohibiting Transactions with Persons who Commit, Threaten to Commit, or Support Terrorism, and 12947, Prohibiting Transactions with Terrorists Who Threaten to Disrupt the Middle East Peace Process, are part of the U.S. campaign to counter terrorism and illicit financing. These orders assist the U.S. and its global partners to identify known dark networks and counter their ability to generate resources to conduct operations. Interdicting a dark network’s support and logistics systems separates the “fish (troop) from the water (population)” and has a long-term impact on the network.
Direct Approach for Development Efforts – Provide Legitimate Alternatives
Development efforts work to provide legitimate alternatives. The FID objective is to build the proper HN capacity to devalue illicit activity, create programs for reintegration, and break the cycle of violent and illicit behavior.
Decrease Value of Illicit Activity
Decreasing the value of illicit activity with development programs drives a wedge between dark networks and the population. This makes by the participation in legal activities move valuable and less costly than illicit activity. This strategy maximizes the use of information operations (IO) and civil-military operations (CMO) to encourage disengagement at the individual and collective levels from dark networks. This pillar counters the push and pulls connecting supporters to the dark network and incentivizes cooperation with rule of law. Messaging to devalue cooperation with dark networks should exploit: personal trauma, such as combat experience or the loss of a friend or colleague due to violent ideologies or hatreds; disillusionment with the network’s leadership; stress of staying with the network/exhaustion of illicit lifestyle; the value of a normal “civilian” life, such as through marriage, finding a career, or beginning a family; and encourage competing social relationships or pressure by family/friends to avoid illicit activity.  Ultimately, the goal is to influence the population to avoid illicit activity because there is more positive gain in participating in legal than illegal activities.
Another way is to increase the value of cooperating with the HN while decreasing the value of engaging in illicit activity. The HN can provide cash rewards to neutralized members or surrendered extremists hoping the money spent will end the crisis or eliminate the networks through voluntary or involuntary attrition. Cash rewards are not only applicable to former extremists, but also to informants who will identify the real time locations of high value targets (HVT). The success of this strategy is in the Philippine model and ultimately led to the neutralization of Abu Sayyaf (ASG) leaders in the Philippines (Mindanao).
Establish Reintegration Programs
Integration of rebel forces into existing government forces is a method of disarmament, demobilization and reintegration (DDR), and is not unusual in post-conflict settlements. Reintegrating former fighters, rebels, and/or enemies back to society is one of the most challenging tasks inherent to every government. Reintegrated members of dark networks may be vulnerable to recidivism and go back to their old ways, or be targeted by their former comrades if not properly protected and isolated from malign influence. A key task to reintegration is to isolate reintegrees from their former network or organization and ease their transition to a new way of life. The Philippines reintegrated 7,000 out of the 17,000 MNLF fighters in the Philippine Army and National police in 1997. Although 10,000 members were disqualified for service for various reasons, 7,000 rebels became government security forces and most of them became loyal to the Philippine government. MNLF as fighting organization laid down their arms, transformed into a political organization, and now peacefully govern their own territory, named the Autonomous Region of Muslim Mindanao (ARMM).
Reintegration plans should always be part of the strategy of the government’s strategy to counter dark networks to ensure lasting peace. When the MNLF reintegrated into society, most of its leaders ran in local elections and many of them won. The MNLF Chairman Nur Misuari was elected Governor of the newly formed ARMM. Many remained in service with the Philippine Army and fought in the war against the Moro Islamic Liberation Front (MILF) from 2000 to 2001. Many Philippine Army officers found leading former insurgents in combat was a great learning experience and admired the extent of the former insurgents’ bravery and alertness during combat.
Break the Cycle of Violent and Illicit Behavior
Development efforts are instrumental in breaking the cycle of violent and illicit behavior to encourage disengagement from dark networks. Once individuals decide to disengage, effective development efforts mitigate push factors that drive illicit behavior and facilitate “social reinsertion.” A Rapid Evidence Assessment (REA) is a comprehensive, systematic and critical assessment of available evidence within a limited timeframe to inform psychological, social, and physical factors leading to disengagement. To maximize the effectiveness of development programs, HNs should conduct REA during the reintegration process to identify the specific causes that drove individuals to disengage from dark networks and tailor the development efforts to encourage further dissention. Development efforts tailored to address the findings of the REA, along with the establishment of effective formal and informal governance systems responsive to the populous, play a critical role to ameliorating grievances and mitigate push factors to violent extremism.
Positive social ties and family influence are strong pull factors to promote disengagement through education and local development programs. An educated community based on legitimate norms and values can make informed decisions and engage the state to address friction points through nonviolent action. Development indicators for social wellbeing and education are: the HN’s capacity to address specific grievances, create positive community ties, isolate individuals from negative influences, and make extremism and illicit behavior socially unacceptable.
Indirect Approach for Security Efforts –Enforce Rule of Law
Development efforts work to enforce rule of law. The FID objective is to build the proper HN capacity to with legitimate security forces, establish mechanisms for peaceful conflict resolution, and take measures to deny sanctuary and freedom of movement to dark networks.
Build Legitimate Security Forces
Scottish philosopher Adam Smith stated; “… the role of government is to provide for national defense, the administration of justice (rule of law), and the provision of certain public goods (e.g., infrastructure, education, health care).” These actions are preformed to enable stability and economic prosperity. Laws are sets of guidelines societies agree to operate under. Developing and enforcing the rule of law is something quite different requiring a multi-pronged approach to amalgamate resources and form a fair and equitable legal system. Secretary of State Rice said, “The advance of freedom and the success of democracy and the flourishing of human potential all depend on governments that honor and enforce the rule of law.” 
The “means” for enforcing rule of law is a resourced, trained, and professional law enforcement entity perceived to be legitimate by the populous. The U.S. has a host of organizations, which can assist in training foreign law enforcement agencies. This includes elements from the Department of Homeland Security (DHS), Department of Justice (DOJ), DoS Bureau for Rule of Law, Federal Bureau of Investigation (FBI), Drug Enforcement Agency (DEA), and the Secret Service, to name a few. DoD is well suited to train HN military and paramilitary law enforcement response elements to enforce rule of law. Many DoD tasks have dual applicability to war fighting and security operations. They involve special training and specialized equipment, but many are easily adaptable to show-of-force operations, foreign internal defense, and counterterrorism. DoD conventional and unconventional military elements can train the HN on tasks applicable to security assistance, humanitarian, and civic assistance operations. Other nonmilitary tasks will require specified training to equipment applicable to law enforcement, such as restrictive rules of engagement, civilian interaction, interagency cooperation, and the potential for strategic outcomes from tactical decisions during peacekeeping, peace enforcement, support to insurgencies, foreign internal defense, and counterterrorism operations.
One of the most import aspects in the development of a legal system is successful conflict resolution. To function properly, the citizenry must have confidence in the government’s ability to deliver justice and resolve disputes equitably. The goal (ends) of a healthy legal system is to resolve conflict through nonviolent means. For governments to be successful, the governed must see the benefit they derive from the government. “The competence level of the government in office determines collective utilities (e.g., by determining the amount and quality of public goods), and each individual derives additional utility from being part of the government (e.g., rents from holding office).” A successful judiciary is a key pillar of a successful government, then conflict resolution is an imperative ends for a successful judiciary.
Successful conflict resolution is contingent on an effective and efficient court system. Courts require infrastructure in the form of buildings, docking and case tracking systems, and a system of preserving the results for future study and application. An effective court system is responsive to the peoples’ hierarchy of needs and fulfills the social contract between the state and its people, which devalues cooperation with dark networks.
Deny Sanctuary and Freedom of Movement
Fragile states are often enticing to illicit activity and are ripe for the development and proliferation of dark networks. The lack of effective governance in fragile states creates safe havens for dark networks to operate. Fragile states are often resource deprived, have porous borders, and lack the ability to provide essential services. An effective technique to deny dark networks sanctuary and freedom of movement in the Philippines has been the ability for security forces to achieve persistent presence and engagement with the local populous. This allows the security forces to gain and maintain situational awareness and counter dark network integration with the populous.
Indirect Approach for Development Efforts – Provide Essential Services
Development efforts work to provide essential services. The FID objective is to build the proper HN capacity and capability to address the drivers of instability by providing stable governance, critical infrastructure, and economic prosperity.
Stability is “characterized by minimal bureaucracy, efficient public service, and with an eye for financial integrity and better management of public resources can gain confidence from producers and equally enforce governmental rules and regulations with greater strength.” Participation creates a sense of ownership by the populations and counters the necessary environment to allow dark networks operate. Stability is a value provided through good governance.
One of the most important values government provides is critical infrastructure, which provides a means for society to prosper. Human nature is risk adverse and people tend to forgo an anachronistic environment for stability and formal order. With order established, conditions are set for the creation of prosperity. For people to value a government, they must receive value in return. Otherwise, the government is not sustainable. It is often impossible for private enterprise to amass the financial resources necessary to conduct large infrastructure projects to provide benefit broad segments of society. This infrastructure includes transportation nodes for commerce, educational and health institutions, governing bodies, and government facilities. Therefore, government must engage the private sector and form a mutually supporting relationship to build critical infrastructure and set the conditions for economic prosperity.
There is no direct correlation between poverty and creation of dark networks. The lack of prosperity or the inability to government to deliver services does not create terrorists, but it does create an environment ripe for the exploitation by dark networks. Violent extremists are created when there is discontent with the government. “Discontent arises not so much from the system’s inability to deliver goods, services, and adequate standards of living, but from its (governments) inability to keep up with the expectations of, in particular, the educated, upwardly mobile and achievement-oriented elites emerge in the process of modernization and economic development.” The danger occurs when the lack of government creates a feeling of isolation. Isolation leads people to believe the government forsakes them and are powerless to create an environment on their own and can change their lives for the better. This feeling of powerlessness makes them willing to accept the presence of dark networks and even permit them to assume some traditional roles of the state like governance and economic opportunity.
The United States must make prudent investments in its global partners and build their capacity to counter dark networks abroad before they become a threat to the homeland. Optimized FID maximizes the effectiveness of efforts to counter dark networks by taking a holistic approach to build HN capacity based on the specific conditions that permit the dark networks to exist. The conceptual framework for the optimal holistic FID strategy focuses on building the HN capacity to counter dark networks and is based on direct and indirect approaches along security and development efforts. Leveraging a direct and indirect framework of security and development efforts yields four pillars that can drive FID activities and enable global partners to counter dark networks: Attack the Network (Direct-Security); Provide Legitimate Alternatives (Direct-Development); Enforce Rule of Law (Indirect-Security); and Provide Essential Services (Indirect-Development). Table 2 links pillars, objectives, and desired end states of optimized FID to counter dark networks.
Table 2: FID Pillars, Objectives, and End States
Our study revealed that the four pillars of optimized FID require constant collaboration and synchronization to maximize effectiveness of the HN IDAD program. Collaboration begins with the HN government connecting to its people to identify and mitigate the drivers of instability. Information gleaned from these connections informs security and development activities and reduces precipitators of violent and illicit behavior. All of this is contingent on constant synchronization of the FID pillars. In a resource-constrained environment, FID efforts need to be prioritized to maximize effectiveness and minimize expenditure of resources. Based on our research, we offer the following efforts to building HN capacity and capability to execute and effective IDAD program actions to optimize FID to counter dark networks:
The first priority is to build intelligence collection, analysis, and dissemination mechanisms to gain and maintain situational awareness. This allows the HN to correctly identify the current conditions permitting the dark networks to exist. Organic collection and analysis of HUMINT, SIGINT, biometric, and socio-cultural data by units of action decreases reaction time and aids in gathering data to inform the pillars of optimized FID. This allows the HN security elements to take a proactive posture to countering dark networks. Additionally, persistent engagement and cooperative relationship with the populous facilitates gathering information, denying sanctuary and freedom of movement, and “pulling” the populous closer to the HN government. Information sharing and collaboration between security and development organizations is essential. The HN must establish mechanisms to foster greater interoperability between the security and development communities of practice and collaborative information databases to inform direct and indirect approaches to counter dark networks. Once these databases are populated by security and development organizations, analysts are able to export this fused information for further analysis and exploitation at the local, national, regional, and international levels.
Second, security sector assistance efforts must be purposeful and focus on building both surgical and shaping forces based on the nature of the relevant dark networks. The surgical elements must have the capacity and capability to interdict the dark networks through both lethal and non-lethal means. The shaping elements must have the capacity and capability to enforce rule of law, deny sanctuary, and connect the state to the people. Both the surgical and shaping elements must maximize the use of CMO and IO achieves desired effects.
Third, the HN must develop a tailored disarmament, demobilization, and reintegration program to counter push-pull factors that favor dark networks. Integrated intelligence debriefings and REA by security and development elements are critical for tailoring the DDR program to ensure specificity and the optimum commitment of state resources. Information gathered during the demobilization process informs the reintegration program and drives the intelligence cycle for security operations for direct and indirect approaches.
Finally, the HN must counter dark networks in a manner perceived as legitimate by the populous and have specificity relevant to dark networks. Balanced security and development efforts focus on the nature of the threat and the drivers of illicit behavior optimize the expenditure of state resources. Repressive tactics by security forces, corruption, and unwillingness to address grievances push the people away from the state and pull them toward the dark networks. The HN must engage NGOs, IGOs, the private sector, regional partners, and the global community to maximize the effectiveness of its IDAD program and counter dark networks.
The views expressed in this essay are entirely those of the authors and do not necessarily reflect the views, policy, or position of the United States or Philippine Governments.
 Raab, Jorg, and H. Brinton Millward. "Dark Networks as Problems." Journal of Public Administration Research and Theory 13, no. 4 (October 2003): 419.
 Ibid., 415.
 Jurith, Ed. "Acts of Terror, Illicit Drugs and Money Laundering." Journal of Financial Crime 11, no. 2 (October 2003): 158-160.
 The security sector is composed of those institutions - to include partner governments and international organizations - that have the authority to use force to protect both the state and its citizens at home or abroad, to maintain international peace and security, and to enforce the law and provide oversight of those organizations and forces. It includes both military and civilian organizations and personnel operating at the international, regional, national, and sub-national levels. Security sector actors include state security and law enforcement providers, governmental security and justice management and oversight bodies, civil society, institutions responsible for border management, customs and civil emergencies, and non-state justice and security providers. See Fact Sheet: U.S. Security Sector Assistance Policy
 U.S. Department of Defense. Sustaining U.S. Global Leadership: Priorities for 21st Century Defense. Washington, D.C.: Government Printing Office, January 2012, 1.
 For more information on why networks matter, see Castells, Manuel. "Afterward: Why Networks Matter." In Network Logic: Who Governs in an Interconnected World?, edited by Helen McCarthy, Paul Miller, & Paul Skidmore, 221-225. London: Demos, 2004.
 McRaven, William. "Posture Statement of Admiral William H. McRaven, USN, Commander, United States Special Operations Command Before the 113th Congress House Armed Service Committee." The United States House of Representatives. March 6, 2013. http://docs.house.gov/meetings/AS/AS00/20130306/100394/HHRG-113-AS00-Wstate-McRavenUSNA-20130306.pdf(accessed July 6, 2013).
 Illumination as the identification and visualization of a network’s nodes, attributes, and their associates socio-cultural, geospatial, and temporal relationships. See U.S. Joint Forces Command. Commander's Handbook for Attack the Network. Suffolk, VA, May 20, 2011. and Wells, G. Damon. "Conducting Security Force Assistance in a Rural District: Understanding the Operational Environment." Small Wars Journal. December 12, 2012. http://smallwarsjournal.com/jrnl/art/conducting-security-force-assistance-in-a-rural-district-understanding-the-operational-envi(accessed July 28, 2013).
 United States Institute for Peace. Guiding Principals for Stability and Reconstruction. Washington, D.C.: United States Institute for Peace Press, 2009, 2-8.
 U.S. Joint Chiefs of Staff. Foreign Internal Defense. Vols. I, Joint Publication 3-22. Washington, D.C.: Joint Chief of Staff, July 12, 2012, I-1.
 See Joint Special Operations University. Special Operations Forces Reference Manual. Third. MacDill Air Force Base: Joint Special Operations University, 2011, I-6. and Joint Special Operations University. Special Operations Forces Interagency Counterterrorism Reference Manual. Second. MacDill Air Force Base: Joint Special Operations University, 2011,1-1 – 1-32.
 Molnar, Andrew R, William A. Lybrand, Lorna Hahn, James L. Kirkman, and Peter B. Riddleberger. Undergrounds in Insurgent, Revolutionary, and Resistance Warfare. Washington , D.C.: Special Operations Research Office, 1963, 3. Additional information available at U.S. Army Special Operations Command. Assessing Revolutionary and Insurgent Strategies (ARIS) Casebooks. January 25, 2013. http://www.soc.mil/ARIS/ARIS.html (accessed August 4, 2013).
 Molinar et al., 27.
 Ibid., 7
 Arquilla, John, and Ron Ronfeldt. The Advent of Netwar. Santa Monica: RAND Corporation, 1996, 5.
 Horigan, John, and Max Taylor. "Playing the Green Card: Financing the Provisional IRA, Part 1." Terrorism and Political Violence 11, no. 2 (Summer 1999): 1-20., Horigan, Max, and Max Taylor. "Playing the Green Card: Financing the Provisional IRA, Part 2." Terrorism and Political Violence 15, no. 2 (Summer 2003): 1-60., Silke, Andrew. "In Defense of the Realm: Loyalist Terrorism in Ireland Part 1: Extortion and Blackmail." Studies in Conflict and Terrorism, 1998: 331-361., U.S. President. Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security. Washington, D.C.: Government Printing Office, July 2011, 6.
 Joint Publication 3-22, II-1 – II-9.
 Davis, Worth, and Zimmerman, Dark Network Design, 2.
 The U.S. Strategic Campaign Framework for Counterterrorism presents a holistic approach to global threats. The campaign applies a direct enemy focused approach to counter VEOs, while concurrently an indirect approach focuses on building partner capacity to deter VEOs. The indirect approach works to counter radical ideology, and shape the global environment to make it inhospitable to violent extremism. See U.S. Joint Chiefs of Staff. Counterterrorism. Vols. I, Joint Publication 3-26. Washington, D.C.: U.S. Joint Chiefs of Staff, November 13, 2009, III-2 – III-7.
 Strategies for Combating Dark Networks by Roberts and Everton explored a “kinetic” approach with two strategies (targeting and capacity building) and a “non-kinetic” approach with four strategies (institution-building, psychological operations, information operations, and rehabilitation). See Roberts, Nancy, and Sean F. Everton. "Strategies for Combatting Dark Networks." Journal of Social Structure 12, no. 2 (2011).
 This approach limits the dark network’s capacity to buffer hostility and coordinate work. The goal is to make the network no longer “fit” in its environment and leads to illumination and interdiction. See Davis, Worth and Zimmerman 2010, 61-63.
 Elkus, Adam. "Counterterrorism's Center of Gravity Problem." Center for a New American Security. September 11, 2012. http://www.cnas.org/blogs/abumuqawama/2012/09/counterterrorisms-center-gravity-problem.html(accessed July 28, 2013).
 Jackson, Brian A. "Counterinsurgency Intelligence in a "Long War": The British Expericence in Northern Ireland." RAND Corporation. January 1, 2007. http://www.rand.org/pubs/reprints/RP1247.html(accessed August 04, 2013).
 To learn more about commercial technical collection solutions, see http://www.aorja.com/receivers/ , http://www.cellebrite.com/mobile-forensic-products.html, http://www.crossmatch.com/,
 Handbook for Attack the Network, I-6 – I-8.
 Visual Analytic and Social Network Analysis tools are available at: http://lhproject.info/ , http://www.casos.cs.cmu.edu/projects/ora/, http://gephi.org/, http://nodexl.codeplex.com/, and https://sites.google.com/site/ucinetsoftware/home . See Everton, Sean F. Tracking, Destabilizing, and Disrupting Dark Networks Using Social Network Analysis. 1.05. Montery, CA: Naval Postgraduate School, 2009. and MacCalman, Molly, Alexander MacCalman, and Greg Wilson. "Visualizing Social Networks to Inform Tactical Engagement Strategies that will Influence the Human Domain." Small Wars Journal. August 15, 2013. http://smallwarsjournal.com/jrnl/art/visualizing-social-networks-to-inform-tactical-engagement-strategies-that-will-influence-th(accessed August 15, 2013).
 Jones, Derek. "Understanding the Form, Fuction, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetworks Operations." JSOU Report 12-3. MacDill Air Force Base: Joint Special Operations University, April 2012.
 Faint, Charles, and Micheal Harris. "F3EAD: Ops/Intel Fusion “Feeds” The SOF Targeting Process ." Small Wars Journal. January 31, 2012. http://smallwarsjournal.com/jrnl/art/f3ead-opsintel-fusion-“feeds”-the-sof-targeting-process(accessed July 28, 2013).
 Davis, Worth and Zimmerman, Dark Network Design.
 U.S. Department of the Treasury. Terrorism and Illicit Finance Executuve Orders. August 8, 2011. http://www.treasury.gov/resource-center/terrorist-illicit-finance/Pages/protecting-charities_exec-orders.aspx(accessed August 17, 2013).
 Mao, Tse-tung. Chapter 6: The Political Problems Of Guerrilla Warfare. 1937. http://www.marxists.org/reference/archive/mao/works/1937/guerrilla-warfare/ch06.htm(accessed July 30, 2013).
 Fink, Naureen C., and Elli B. Hearne. Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism. New York: International Peace Institute, October 2008.
 Fellman, Zach. "Abu Sayyaf Group." Center for Strategic and International Studies. November 28, 2011. http://csis.org/files/publication/111128_Fellman_ASG_AQAMCaseStudy5.pdf(accessed July 27, 2013).
 Santos, Jr., Soliman M. "Chapter 7, MNLF Integration into the AFP and the PNP: Successful Cootation or Failed Transformation?(Case Study)." In Primed and Purposeful: Armed Groups and Human Security Efforts in the Philippines, edited by Diana Rodriguez, 162-184. Geneva: Small Arms Survey, 2010.
 Author’s field notes from operations conducted 2001.
 Silke, Andrew. "Disengagement or Deradicalization: A Look at Prison Programs for Jailed Terrorists." Combatting Terrorism Center at West Point. January 01, 2011. http://www.ctc.usma.edu/posts/disengagement-or-deradicalization-a-look-at-prison-programs-for-jailed-terrorists.htm(accessed August 10, 2013).
 Disley, Emma, Kristin Weed, Anais Reding, Lindsay Clutterbuck, and Richard Warnes. Individual Disengagement from Al Qa'ida-influencedTerrorist Groups: A Rapid Evidence Assessmentto Inform Policy and Practice in Preventing Terrorism. Santa Monica: RAND Corporation, 2012, 67.
 Jones, Seth G. Reintegrating Afghan Insurgents. Santa Monica: RAND Corporation, 2011.
 Disley, et al. Individual Disengagement.
 Smith, Adam. "An Inquiry into the Nature and Causes of the Wealth of Nations." Library of Economics and Liberty Online. Edited by Edwin Cannan. 1904. http://www.econlib.org/library/Smith/smWN.html (accessed July 16, 2013).
 Rice, Condoleezza. "Remarks of the United States Secretary of State Condoleeza Rice." Berkley Journal of International Law 25, no. 1 (2007): 63-65.
 Taw, Jennifer Morrison. "Stability and Support Operations: History and Debates." Studies in Conflict & Terrorism 33, no. 5 (2010): 387-407.
 Acemoglu, Daron, Georgy Egorov, and Konstantin Sonon. "Political Selection and Persistance of Bad Governments." Quarterly Journal of Economics 125, no. 4 (2010): 1511-1575.
 Carter, Chantel. "Pre-Incident Indicators of Terrorist Attacks: Weak Economies and Fragile Political Infrastructures Bring Rise to Terrorist ORganizations and Global Networks." Global Security Studies 3, no. 4 (Fall 2012): 66-77.
 Gani, Azmat. "Governance and Growth in Developing Countries." Journal of Economic Issues 45, no. 1 (2011): 19-40.
 Lipford, Jody W. "Adam Smith's Roles for Government & Contemporary U.S. Government Roles." Independent Review 11, no. 4 (Spring 2007): 485-501.