Computational Analysis of Terrorist Groups: Lashkar-e-Taiba: Lashkar-e-Taiba
β Scribed by V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 2013
- Tongue
- English
- Leaves
- 232
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda.
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for βbig dataβ analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authorsβ web sites.
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.
β¦ Table of Contents
Front Matter....Pages i-xiv
Introduction....Pages 1-21
A Brief History of LeT....Pages 23-68
Temporal Probabilistic Behavior Rules....Pages 69-79
Targeting Civilians....Pages 81-94
Attacks Against Public Sites, Tourist Sites and Transportation Facilities....Pages 95-103
Attacks Against Professional Security Forces....Pages 105-115
Attacks Against Security Installations and Infrastructure....Pages 117-126
Other Types of Attacks....Pages 127-135
Armed Clashes....Pages 137-148
Computing Policy Options....Pages 149-156
Policy Options Against LeT....Pages 157-176
Back Matter....Pages 177-231
β¦ Subjects
Information Systems and Communication Service; Artificial Intelligence (incl. Robotics); Data Mining and Knowledge Discovery; Computer Appl. in Social and Behavioral Sciences; Mathematical Logic and Formal Languages
π SIMILAR VOLUMES
This book provides a detailed account of the emergence and metamorphoses of Lashkar-e-Taiba (LeT) and its political arm, Jamat ud Dawah, since the early 1990s. Linking the group's narratives to the process of Islamization in Pakistan and divergent views on the country's Islamic identity, it is the f
This path-breaking volume reveals a little-known aspect of how Lashkar-e-Tayyaba, a jihadist terrorist group, functions in Pakistan and beyond by translating and commenting upon a range of publications produced and disseminated by Dar-ul-Andlus, the publishing wing of LeT.<br />Only a fraction of Le
This path-breaking volume reveals a little-known aspect of how Lashkar-e-Tayyaba, a jihadist terrorist group, functions in Pakistan and beyond by translating and commenting upon a range of publications produced and disseminated by Dar-ul-Andlus, the publishing wing of LeT.<br />Only a fraction of Le