Skip to main content

2013 | Buch

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba

Lashkar-e-Taiba

verfasst von: V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson

Verlag: Springer New York

insite
SUCHEN

Über dieses Buch

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for “big data” analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors’ web sites.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
This chapter contains a brief introduction to Lashkar-e-Taiba. It describes their geographic locations and also summarizes statistics about violent terror acts carried out by LeT, briefly describes the behavioral rules about LeT derived in this book, and summarizes suggested policy options generated automatically from the LeT data set.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 2. A Brief History of LeT
Abstract
This chapter provides an overview of LeT from their creation to the end of 2011. It describes the goals of the group, other groups in their ecosystem, the types of attacks they have carried out, the internal dynamics of the group, and the relations they have with the Pakistani military and civilian government. It also includes brief profiles of selected LeT leaders.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 3. Temporal Probabilistic Behavior Rules
Abstract
This chapter describes the syntax and semantics of Temporal Probabilistic (or TP) behavioral rules used throughout the book to describe the behavior of Lashkar-e-Taiba. The chapter describes the intuition behind TP-rules, their formal syntax and meaning, and describes an algorithm used to derive the TP-rules automatically from data about LeT.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 4. Targeting Civilians
Abstract
LeT has carried out numerous operations in which civilians were both the real and intended targets. This chapter focuses on the conditions under which LeT carried out attacks against civilians in general, or civilians on the basis of their religious identity (primarily Hindus, but also taken broadly to include Christians and Jews). The chapter discusses several TP-rules derived automatically from the LeT data set used in this book.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 5. Attacks Against Public Sites, Tourist Sites and Transportation Facilities
Abstract
This chapter describes the conditions under which LeT carries out terrorist attacks against three types of targets: public sites, tourist sites, and transportation facilities such as railway stations and airports. The chapter discusses several TP-rules about these types of terror attacks that were derived automatically from the LeT data set used in this book.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 6. Attacks Against Professional Security Forces
Abstract
LeT has carried out numerous attacks against professional security forces—primarily the Indian Army and police. This chapter describes the conditions under which LeT carries out terrorist attacks against professional security forces. The chapter discusses several TP-rules about these types of terror attacks that were derived automatically from the LeT data set used in this book.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 7. Attacks Against Security Installations and Infrastructure
Abstract
This chapter describes the conditions under which LeT carries out terrorist attacks against security installations such as military bases, police stations, and checkpoints. The chapter discusses several TP-rules about these types of terror attacks that were derived automatically from the LeT data set used in this book.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 8. Other Types of Attacks
Abstract
This chapter describes the conditions under which LeT carries out terrorist attacks on holidays as well as attempted (but unsuccessful) attacks. The chapter discusses several TP-rules about these types of terror attacks that were derived automatically from the LeT data set used in this book.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 9. Armed Clashes
Abstract
This chapter describes the conditions under which LeT engages in armed clashes, usually with Indian local or national security forces. The chapter discusses several TP-rules about armed clashes involving LeT that were derived automatically from the LeT data set used in this book.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 10. Computing Policy Options
Abstract
This chapter describes the methodology and the algorithm used to automatically compute policy options. It provides a mathematical definition of a policy against LeT and then proves the LeT Violence Non-Eliminability Theorem that shows there is no policy that will stop all of LeT’s terrorist actions. The reason for this is that attacks on holidays are carried out in situations that are inconsistent with situations when LeT carries out other types of attacks. The chapter presents an algorithm to compute all policies (in accordance with the mathematical definition of policy) that have good potential to significantly reduce all types of attacks carried out by LeT (except for attacks on holidays). Readers who do not wish to wade through the technical details can skip directly to Sect. 10.5 which summarizes the results of this chapter.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Chapter 11. Policy Options Against LeT
Abstract
The Policy Computation Algorithm described in Chap. 10 was used to generate a total of 8 policies that have a reasonable chance of reducing most types of LeT backed attacks. This chapter describes 4 of these policies in detail (the other 4 are very similar). It shows that these policies are complex, involving many different actions to be taken—yet they overlap extensively in terms of what should be done (and what should not be done) in combating LeT terror acts. The chapter also includes some tactics that policy makers may consider in implementing these policies.
V. S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Backmatter
Metadaten
Titel
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
verfasst von
V.S. Subrahmanian
Aaron Mannes
Amy Sliva
Jana Shakarian
John P. Dickerson
Copyright-Jahr
2013
Verlag
Springer New York
Electronic ISBN
978-1-4614-4769-6
Print ISBN
978-1-4614-4768-9
DOI
https://doi.org/10.1007/978-1-4614-4769-6