A very good ref 2008 RNC demonstrations can be found here
Notice the use of social networking charts and associative
analysis used to determine nodes and persons of interest.
Also note, the extensive monitoring and exploitation of open-source
web-pages, email lists and affinity group relationships.
This is a very important document for the defense in the trial of the
RNC-8 http://rnc8.org/about/ and should be examined by activist groups
to develop effective counters and defenses.
Social networking analysis is a powerful but flawed technique if used
The creation by a core activist group of multiple "front" or
false affinity groups can be very effective in adding linkages
which do not exist.
The other groups can then be blamed for actions, used as
mis-information platforms, and provide other avenues for maskirovka
Russian for "The Deception") operations.