Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

The Purpose of Network Intervention

The ultimate utility of SNA lies not in mere topological observation, but in deliberate, strategic intervention. Network theory provides an evidence-based framework for identifying exactly where and how to apply pressure, distribute resources, and engineer structural change.


Intervention Categories

Multilevel Framework (Robins et al.)

Category Purpose Examples
Identification Find key actors for targeted support Identify bridge organizations
Diffusion Spread behaviors/tactics through existing structures Train trusted messengers
Structural Change Modify the network architecture itself Create new connections

Identifying Intervention Points

Diagnostic Questions

Question If Yes Intervention
Does one organization control all information flow? Bottleneck Create alternative pathways
Are geographic regions disconnected? Structural hole Build regional bridges
Is the coalition dependent on single funder? Resource vulnerability Diversify funding sources
Are grassroots and legal sectors isolated? Sector gap Create joint working groups

Vulnerability Analysis

Map network vulnerabilities systematically:

1. Calculate node removal impact
   - What happens if each central node is removed?
   - Which removals fragment the network?

2. Identify bottlenecks
   - Which nodes are on all shortest paths?
   - Where does information get stuck?

3. Find isolation risks
   - Which nodes have only 1-2 connections?
   - Which communities depend on single sources?

Intervention Prioritization

Vulnerability Type Urgency Intervention Complexity
Single point of failure High Medium (build redundancy)
Isolated community High Medium (create bridges)
Information bottleneck Medium Low (add pathways)
Funding concentration Medium High (diversify sources)
Weak ties deficit Low Medium (foster connections)

Bridge-Building Strategies

Types of Bridges

Bridge Type Connects Implementation
Sector bridge Legal ↔ Grassroots Joint trainings, shared cases
Geographic bridge Region A ↔ Region B Regional coordinator role
Language bridge Community A ↔ Community B Multilingual staff/volunteers
Scale bridge National ↔ Local Affiliate relationships
Issue bridge Immigration ↔ Labor Coalition on shared interests

Performative Intervention

Presenting network maps directly to coalition members catalyzes change:

Step Action Effect
1 Generate accurate network map Objective visualization
2 Present to coalition members Shared understanding
3 Highlight gaps and polarization Undeniable visibility
4 Facilitate discussion Collective diagnosis
5 Plan direct partnerships Bypass historic brokers

ALPES Case Study: When French and Italian border organizations saw their network polarization visualized, they immediately began forging direct cross-border partnerships, reducing over-reliance on central brokers.

Bridge-Building Activities

Activity Network Effect
Joint campaigns Create collaborative edges
Shared training programs Build trust through learning
Cross-sector working groups Regular interaction builds ties
Resource pooling Financial interdependence
Staff exchanges Personal relationships across orgs
Co-located office space Daily informal interaction

Network Cultivation

Balancing Tensions

Cultivating networks requires balancing competing organizational goals:

Tension Coalition Interest Individual Org Interest
Funding Shared applications Competitive grants
Credit Coalition wins Organization visibility
Strategy Unified approach Tactical autonomy
Resources Shared infrastructure Organizational capacity

Successful Cultivation Practices

Detention Watch Network model:

Practice Network Effect
Regular physical convenings Transforms weak ties to strong
Shared digital intelligence platforms Continuous information flow
Standardized training programs Common language and tactics
Joint campaign coordination Collaborative experience
Resource distribution Reduces competition

From Weak to Strong Ties

Tie Strength Characteristics Cultivation Strategy
Very weak Aware of each other Convening invitation
Weak Occasional contact Include in working groups
Moderate Regular information exchange Joint project collaboration
Strong Frequent high-trust interaction Formal partnership (MOU)
Very strong Deep collaboration Shared staff/resources

Targeting Enforcement Networks

Strategic Targeting Approach

SNA is highly effective for targeting the corporate and financial infrastructure of the enforcement ecosystem.

Target Type Network Position Vulnerability
Commercial banks Provide capital to detention corps Reputational risk
Pension funds Hold detention company stock Fiduciary concerns
Tech workers Build surveillance systems Values conflict
Universities Research partnerships with contractors Ethical standards
Airlines Transport deportees Public visibility

Divestment Campaign Strategy

  1. Map financial dependencies

    • Who finances detention companies?
    • What are the loan covenants?
    • Which pension funds hold stock?
  2. Identify vulnerable edges

    • Which relationships have reputational risk?
    • Where is public pressure most effective?
    • What decision-makers are persuadable?
  3. Execute precision campaigns

    • Target specific financial relationships
    • Apply public pressure
    • Demand severance of relationship

Successful Targeting Examples

Target Campaign Outcome
JPMorgan Chase Public pressure Stopped financing private prisons
Bank of America Shareholder resolutions Reduced detention financing
California pensions Legislative action Divested from GEO/CoreCivic
University contracts Student organizing Palantir partnership cancellations

Tech Vendor Pressure

Targeting data infrastructure for mass deportations:

Target Vulnerability Campaign Tactic
Palantir Tech talent recruitment Worker organizing, campus protests
LexisNexis State privacy laws Legislative advocacy
Clearview AI Legal challenges Litigation support
Amazon (AWS) Corporate ethics policies Shareholder activism

Strengthening Coalition Networks

Redundancy Engineering

Deliberately build backup pathways:

Current State Intervention Target State
One anchor org Develop secondary hub Two anchor orgs
Single info pathway Add alternative channels Multiple pathways
Geographic isolation Regional bridges Connected regions
Sector silos Cross-sector working groups Integrated sectors

Capacity Distribution

Reduce over-reliance on central nodes:

Strategy Implementation
Train multiple organizations Distribute specialized knowledge
Fund peripheral orgs Build capacity at edges
Create redundant roles Multiple people can perform functions
Document processes Knowledge not dependent on individuals

Monitoring Network Health

Track metrics over time:

Metric Healthy Trend Warning Sign
Density Stable or increasing Sharp decrease
Central node count Increasing Decreasing
Peripheral connections Increasing Stagnant
Cross-sector ties Increasing Decreasing
Fragmentation score Low Increasing

Implementation Process

Phase 1: Assessment

Step Activity Output
1 Collect network data Edge list, node attributes
2 Calculate metrics Centrality, density, components
3 Visualize network Map for analysis
4 Identify vulnerabilities Prioritized intervention list

Phase 2: Planning

Step Activity Output
1 Select intervention type Bridge-building, cultivation, targeting
2 Identify specific actions Concrete activities
3 Assign responsibilities Who does what
4 Set timeline When activities occur
5 Define success metrics How to measure impact

Phase 3: Execution

Step Activity Output
1 Implement activities Joint trainings, convenings, etc.
2 Monitor progress Track new connections
3 Adjust as needed Respond to emerging patterns
4 Document outcomes Record network changes

Phase 4: Evaluation

Step Activity Output
1 Re-collect network data Updated edge list
2 Compare to baseline Metric changes
3 Assess goal achievement Did intervention work?
4 Identify next priorities Plan subsequent interventions

Intervention Checklist

For Coalition Strengthening

  • [ ] Network map created and shared with members
  • [ ] Vulnerabilities identified and prioritized
  • [ ] Bridge-building activities planned
  • [ ] Redundancy targets established
  • [ ] Regular convenings scheduled
  • [ ] Cross-sector working groups formed
  • [ ] Success metrics defined
  • [ ] Timeline established

For Enforcement Targeting

  • [ ] Corporate dependencies mapped
  • [ ] Financial relationships documented
  • [ ] Vulnerable edges identified
  • [ ] Campaign targets prioritized
  • [ ] Tactics selected for each target
  • [ ] Coalition coordination established
  • [ ] Public pressure mechanisms ready
  • [ ] Success metrics defined

Next Steps

  1. Select analysis tools for implementation
  2. Review ethical framework before collecting data
  3. Follow implementation guide for getting started
  4. Connect with coalition infrastructure for integration
Legal Disclaimer

This website does not provide legal advice. The information provided on this site is for general informational and educational purposes only. It does not create an attorney-client relationship.

Information on this website may not be current or accurate. Immigration law is complex and varies by jurisdiction and individual circumstances. Always consult with a qualified immigration attorney for advice specific to your situation.

Neither ICE Encounter, its developers, partners, nor any contributors shall be liable for any actions taken or not taken based on information from this site. Use of this site is subject to our Terms of Use and Privacy Policy.