This involves the analysis of networks, including social networks and transportation networks, to identify key nodes and relationships between different nodes. It can be used to identify key players in enemy organizations or to assess the vulnerabilities of transportation infrastructure.