This document summarizes and compares different approaches to analyzing covert networks through social network analysis and criminal network analysis. It categorizes approaches into areas like link analysis, node discovery, dynamic network analysis, key player identification, and applying these techniques to homeland security issues. It provides examples of studies that use techniques like link analysis to identify criminal associations, node discovery to find covert nodes, and dynamic network analysis tools to model network changes over time. The goal is to identify methodologies for discovering covert nodes and relationships within terrorist and criminal networks.