Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Computational analysis of terrorist groups : Lashkar-e-Taiba
Subrahmanian V., Mannes A., Sliva A., Shakarian J., Dickerson J., Springer Publishing Company, Incorporated, New York, NY, 2012. 245 pp. Type: Book (978-1-461447-68-9)
Date Reviewed: Feb 5 2013

In this book, the authors provide a comprehensive computational analysis of how the terrorist group Lashkar-e-Taiba operates. It was the first long-term study ever published on the behavior of the terrorist group Lashkar-e-Taiba, which mainly, but not exclusively, operates in the area of India and Pakistan. The researchers used modern computing technology, advanced mathematics, and other methods for big data analysis to gather knowledge on the operational and infrastructural network of Lashkar-e-Taiba. On the one hand, they used these methods to describe the environment in which the terrorist group operates and the actions they have undertaken over the past 20 years. On the other hand, they created a behavioral model to predict actions and develop policies to avoid future attacks.

At the beginning of their research, the authors systematically gathered data from various open literature sources such as newspapers, books, papers, reports, and selected web sites. They identified more than 770 aspects to describe the terrorist group, which cover a broad range of economic, social, cultural, and organizational factors. The data was then stored in a relational database table. In the next step, they used complex data mining algorithms to develop behavioral models based on the stochastic opponent modeling agents rule-learning algorithms. After these behavior models were learned, they made forecasts regarding future actions of Lashkar-e-Taiba. Some of those forecasts were later proven true. The authors claim that their forecasts must fulfill a set of conditions, such as consistency, accuracy, and reliability. In the last step, possible policies are designed to mitigate the risk of future attacks. The researchers fed their relational database into a fast analytic system. The system interprets the data, attempts to maximize a goal entered by the analyst, and allows the analyst to specify constraints.

The book contains 11 chapters. After an introductory chapter, the authors provide an entire chapter on the history of Lashkar-e-Taiba and its actions. In chapter 3, the authors formalize the behavior rules used throughout the book. They also introduce an algorithm to derive the rules automatically from the data they have gathered. In chapters 4 through 7, the authors discuss various types of terrorist attacks and operations on civilians, public sites, professional security forces, and security installations and infrastructure. Attacks are discussed in terms of the behavioral rules derived from the respective data. Chapter 8 completes the disquisition by discussing other types of attacks. In chapter 9, the authors describe armed clashes between Lashkar-e-Taiba and security forces, and discuss the corresponding derived behavioral rules. In chapter 10, the authors present the methodology and the mathematical definitions and algorithms used to derive the policy options for reducing the occurrence of terrorist attacks by Lashkar-e-Taiba. The last chapter of the book provides a comprehensive description of the policies and concludes the work.

Reviewers:  Edgar R. WeipplKatharina Krombholz Review #: CR140910 (1305-0365)
Bookmark and Share
  Featured Reviewer  
 
Military (J.1 ... )
 
 
Government (J.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Security and Protection (K.6.5 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Military": Date
The special problems of military systems
Kershaw J. Microprocessors & Microsystems 17(1): 25-30, 1993. Type: Article
May 1 1994
Strategic appraisal
Khalilzad Z., White J., RAND, Santa Monica, CA, 1999. Type: Book (9780833026637)
Aug 1 1999
Making intelligence smarter
Zorpette G. IEEE Spectrum 39(1): 38-43, 2002. Type: Article
Jan 23 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy