Geoprofiling Terrorism

Author(s):  
Kim Rossmo

A number of recent research projects have explored applications of geographic profiling to counterterrorism and counterinsurgency. These efforts analyzed geospatial patterns of terrorist cells (e.g., the spatial relationship between safe houses and weapon storage sites), tested the ability of these techniques to locate terrorist bases from minor crimes and seditious graffiti, and examined the utility of geoprofiling for locating preparation sites used by insurgents for improvised explosive devices and rocket attacks. In appropriate cases, geoprofiling models have utility for prioritizing geo-intelligence and identifying logistic bases of terrorist operations. This chapter first discusses environmental criminology and the geography of crime. It then covers the basics of geographic profiling, its various applications, and the role of geospatial intelligence and crime pattern theory in counterterrorism. Finally, it examines the geospatial and temporal patterns of terrorism to show how geoprofiling can be used to analyze seditious graffiti, insurgency attacks, cyberterrorism, and bioterrorism.

Author(s):  
Hisham Kamel

Abstract This review paper covers the subject of vehicle design for protection against the blast of improvised explosive devices. It summarizes the most recent techniques in the design of vehicle structures for blast protection. This review pinpoints the challenges in designing a vehicle for blast protection and maintaining acceptable mobility at the same time. In addition, this paper reveals and summarizes key design principles based on the critical assessment of the published literature. This review covers the state of the art design methods for each individual part of vehicle structure. It also identifies the role of human protective gear and its effectiveness in mitigating blast related injuries. This review suggests future trends in developing innovative protective structures that are inspired by nature or manufactured. The aim of this review is to guide and advance the research of vehicle design for blast protection.


2020 ◽  
pp. 136-173
Author(s):  
David Barno ◽  
Nora Bensahel

This chapter explores the role of technological adaptability during the wars in Afghanistan and Iraq. At the tactical level, it examines how soldiers in Iraq developed “hillbilly armor” to try to protect their vulnerable vehicles from roadside bombs, and how Apache helicopters were successfully adapted to conduct close air support missions in Afghanistan. It also argues, however, that technological adaptability at the institutional level involved disastrous failures. In Iraq, virtually all senior Pentagon officials repeatedly resisted providing adequate numbers of life-saving vehicles called MRAPs to deployed soldiers facing grave threats from improvised explosive devices. And in Afghanistan, the army stubbornly supported its poorly performing intelligence analysis system, called DCGS-A, for more than a decade, despite overwhelming evidence that commercially available software from Palantir would work better and save the lives of more soldiers.


2016 ◽  
Vol 27 (3) ◽  
pp. 422-450 ◽  
Author(s):  
MOHAMMAD A. TAYEBI ◽  
UWE GLÄSSER ◽  
MARTIN ESTER ◽  
PATRICIA L. BRANTINGHAM

Crime reduction and prevention strategies are vital for policymakers and law enforcement to face inevitable increases in urban crime rates as a side effect of the projected growth of urban population by the year 2030. Studies conclude that crime does not occur uniformly across urban landscapes but concentrates in certain areas. This phenomenon has drawn attention to spatial crime analysis, primarily focusing on crime hotspots, areas with disproportionally higher crime density. In this paper, we present CrimeTracer1, a personalized random walk-based approach to spatial crime analysis and crime location prediction outside of hotspots. We propose a probabilistic model of spatial behaviour of known offenders within their activity spaces. Crime Pattern Theory concludes that offenders, rather than venture into unknown territory, frequently select targets in or near places they are most familiar with as part of their activity space. Our experiments on a large real-world crime dataset show that CrimeTracer outperforms all other methods used for location recommendation we evaluate here.


2018 ◽  
Vol 166 (3) ◽  
pp. 156-160 ◽  
Author(s):  
Dawei Zhang ◽  
Z Li ◽  
X Cao ◽  
B Li

IntroductionThe Chinese Role 2 Hospital (CHN-Role 2H) Medical Treatment Facility (MTF) was founded in July 2013 as part of the Chinese commitment to Multidimensional Integrated Stabilization Mission in Mali (MINUSMA). It provides medical care for approximately 5200 personnel of the whole Sector East of MINUSMA including UN military personnel, UN police and UN civilian staff. The aim of this study was to determine the orthopaedic surgical activity over a 4-year period to facilitate the training of future Chinese military surgical teams.Materials and methodsSurgical records of all patients operated on at the CHN-Role 2H between 28 March 2014 to 28 March 2018 were identified, and all orthopaedic activity were analysed.ResultsDuring this period, 1190 patients underwent 2024 surgical procedures. Orthopaedic procedures represented 961/2024 (47.5%) of all the procedures. Battle injury (BI) represented 43% of patients. Improvised explosive devices (IEDs) were responsible for 15.8 % casualties. Fractures (49%) and soft tissue injures (43%) were the most common injuries, with 61% of the fractures being open. Damage control surgery including debridement (23.52%) and external fixation (17.90%) were the most frequently performed interventions.ConclusionOrthopaedic surgery is the most frequently performed surgery in the CHN-Role 2H in Mali. The complexity and severity of injuries demonstrate the urgent need for tailored training and extended skill sets for deploying military orthopaedic surgeons.


2017 ◽  
Vol 182 (3) ◽  
pp. e1697-e1703 ◽  
Author(s):  
Robert J. Ursano ◽  
Ronald C. Kessler ◽  
James A. Naifeh ◽  
Holly Herberman Mash ◽  
Carol S. Fullerton ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document