Computational Analysis of Terrorist Groups: Lashkar-e-Taiba : Lashkar-e-Taiba / by V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: SpringerLink BücherVerlag: New York, NY : Springer, 2013Beschreibung: Online-Ressource (XIV, 231 p. 23 illus, digital)ISBN:- 9781461447696
- 9781283624466
- 005.7
- QA75.5-76.95
- HV 6433.P18
Inhalte:
Zusammenfassung: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference bookZusammenfassung: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors web sites.Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.PPN: PPN: 1651856605Package identifier: Produktsigel: ZDB-2-SCS
Computational Analysis of Terrorist Groups:Lashkar-e-Taiba; Foreword; Preface; Contents; Acronyms; 1 Introduction; Abstract; 1.1…How to Read this Book; 1.2…LeT's Camp Locations; 1.3…Summary Statistics About LeT's Violent Activities; 1.4…Summary of Significant TP-Rules; 1.5…Summary of Policy Recommendations; 1.6…Conclusion; References; 2 A Brief History of LeT; Abstract; 2.1…Origins and Overview; 2.1.1 What's in a Name?; 2.1.2 Historical Context; 2.1.3 Abdullah Azzam, the Islamist Internationale, and the Founding of LeT; 2.1.4 LeT's Top Leaders; 2.1.5 LeT's Ideology and Worldview
3.4…Extracting SOMA-Rules Automatically3.5…Automatically Extracting TP-Rules; 3.6…Conclusion; References; 4 Targeting Civilians; Abstract; 4.1…Attacks Against Civilians and Deaths of LeT Commanders; 4.2…Attacks Against Hindus and Government Action Against LeT; 4.3…Attacks Against Civilians and Hindus and a Defactionalized LeT; 4.4…Attacks Against Hindus and Desertion by LeT Members; 4.5…Conclusion and Policy Options; References; 5 Attacks Against Public Sites, Tourist Sites and Transportation Facilities; Abstract; 5.1…Attacks on Public, Symbolic and Tourist Sites
5.2…Attacks on Transportation Facilities5.3…Conclusion and Policy Options; References; 6 Attacks Against Professional Security Forces; Abstract; 6.1…Attacks on Professional Security Forces and Relationship with Pakistani Military; 6.2…Attacks on Professional Security Forces and Use of Communications Media and Government Action Against LeT; Sec14; 6.3…Attacks on Professional Security Forces and Situations When LeT's Leadership is Functionally Differentiated; Sec18; 6.4…Attacks on Professional Security Forces and Desertions by LeT Members
8.2…Attempted Attacks by LeT
2.2…Pakistan: The Homebase2.2.1 LeT's Finances; 2.2.2 Recruitment and Training; 2.2.3 LeT and the State; 2.3…Kashmir: The First Front; 2.3.1 Kashmir in Time and Space; 2.3.2 Initial Involvement and Massacres; 2.3.3 Fedayeen; 2.3.4 After 9/11; 2.4…LeT in India; 2.4.1 Local Allies: TIM, SIMI, IM and D-Company; 2.4.2 LeT Strikes India; 2.4.3 Targeting Mumbai; 2.4.4 LeT in Afghanistan; 2.5…LeT International; 2.5.1 LeT and the Islamist Internationale; 2.6…Conclusions; References; 3 Temporal Probabilistic Behavior Rules; Abstract; 3.1…Database Schema; 3.2…TP-Rule Syntax; 3.3…SOMA Rules
6.5…Attacks on Professional Security Forces and Issuance of Arrest Warrants for LeT MembersSec26; 6.6…Conclusion and Policy Options; References; 7 Attacks Against Security Installations and Infrastructure; Abstract; 7.1…Attacks Against Security Infrastructure and Publicity Campaigns by LeT; 7.2…Attacks on Security Infrastructure, Publicity Campaigns by LeT, and Lack of Action by the Government Against LeT; 7.3…Attacks on Security Infrastructure and Political Support from Pakistan; 7.4…Conclusion and Policy Options; References; 8 Other Types of Attacks; Abstract; 8.1…Attacks on Holidays by LeT
Dieser Titel hat keine Exemplare