Mathematical Methods in Counterterrorism

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern – sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive “weapon”, just as quiet – mathematics – can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Author(s): David L. Hicks, Nasrullah Memon, Jonathan D. Farley, Torben Rosenørn (auth.), Nasrullah Memon Ph.D, Jonathan David Farley D.Phil. (Oxon.), David L. Hicks Ph.D, Torben Rosenorn (eds.)
Edition: 1
Publisher: Springer-Verlag Wien
Year: 2009

Language: English
Pages: 389
Tags: Probability and Statistics in Computer Science; Political Science; Criminology & Criminal Justice; Math Applications in Computer Science; Order, Lattices, Ordered Algebraic Structures; Symbolic and Algebraic Manipulation

Front Matter....Pages I-XIII
Front Matter....Pages 1-1
Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge....Pages 1-5
Front Matter....Pages 7-7
Modeling Criminal Activity in Urban Landscapes....Pages 9-31
Extracting Knowledge from Graph Data in Adversarial Settings....Pages 33-54
Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes....Pages 55-67
Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics....Pages 69-90
Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell....Pages 91-103
Front Matter....Pages 105-105
Understanding Terrorist Organizations with a Dynamic Model....Pages 107-125
Inference Approaches to Constructing Covert Social Network Topologies....Pages 127-140
A Mathematical Analysis of Short-term Responses to Threats of Terrorism....Pages 141-160
Network Detection Theory....Pages 161-181
Front Matter....Pages 183-183
Security of Underground Resistance Movements....Pages 185-204
Intelligence Constraints on Terrorist Network Plots....Pages 205-214
On Heterogeneous Covert Networks....Pages 215-228
Two Models for Semi-Supervised Terrorist Group Detection....Pages 229-249
Front Matter....Pages 251-251
CAPE: Automatically Predicting Changes in Group Behavior....Pages 253-269
Interrogation Methods and Terror Networks....Pages 271-290
Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing....Pages 291-308
Simulating Terrorist Cells: Experiments and Mathematical Theory....Pages 309-316
Front Matter....Pages 317-317
A Brinkmanship Game Theory Model of Terrorism....Pages 319-332
Strategic Analysis of Terrorism....Pages 333-348
Front Matter....Pages 317-317
Underfunding in Terrorist Organizations....Pages 349-382
Front Matter....Pages 383-383
Personal Reflections on Beauty and Terror....Pages 385-389