scholarly journals Entropy and Network Centralities as Intelligent Tools for the Investigation of Terrorist Organizations

Entropy ◽  
2021 ◽  
Vol 23 (10) ◽  
pp. 1334
Author(s):  
Alexandros Z. Spyropoulos ◽  
Charalampos Bratsas ◽  
Georgios C. Makris ◽  
Evangelos Ioannidis ◽  
Vassilis Tsiantos ◽  
...  

In recent years, law enforcement authorities have increasingly used mathematical tools to support criminal investigations, such as those related to terrorism. In this work, two relevant questions are discussed: “How can the different roles of members of a terrorist organization be recognized?” and “are there early signs of impending terrorist acts?” These questions are addressed using the tools of entropy and network theory, more specifically centralities (degree, betweenness, clustering) and their entropies. These tools were applied to data (physical contacts) of four real terrorist networks from different countries. The different roles of the members are clearly recognized from the values of the selected centralities. An early sign of impending terrorist acts is the evolutionary pattern of the values of the entropies of the selected centralities. These results have been confirmed in all four terrorist networks. The conclusion is expected to be useful to law enforcement authorities to identify the roles of the members of terrorist organizations as the members with high centrality and to anticipate when a terrorist attack is imminent, by observing the evolution of the entropies of the centralities.

2021 ◽  
Vol 9 ◽  
Author(s):  
Jun Hu ◽  
Chengbin Chu ◽  
Ling Xu ◽  
Peng Wu ◽  
Hui-jia Lia

The past years have witnessed increasingly widespread terrorism, violently destroying world peace and regional prosperity. Therefore, uncovering terrorist plots has become the most crucial step for eliminating terrorist attacks. However, with the terrorist scheme being disguised under the huge amount of data flow on the internet, identifying terrorist organizations still remains challenging. Since many terrorist organizations are prone to launch terrorist attacks together, here, we model their relationships as a Terrorist Organization Alliance (TOA) network and propose a novel method to identify the key terrorist organizations in the TOA network. The TOA network utilizes existing key nodes in order to extract useful information, and, with the help of the entropy weight method, the new solution to the TOA network is effective and precise. The experiments are performed on the dataset from the Global Terrorism Database, and the results are statistically validated through t-tests and convergence analysis. Compared with the traditional methods, our method is proven to be superior in terms of measure the harm of terrorist attack organizations and find the key terrorist organizations.


2019 ◽  
Vol 11 (5) ◽  
pp. 1487 ◽  
Author(s):  
Xueli Hu ◽  
Fujun Lai ◽  
Gufan Chen ◽  
Rongcheng Zou ◽  
Qingxiang Feng

Terrorist attacks are events which hinder the development of a region. Before the terrorist attacks, we need to conduct a graded evaluation of the terrorist attacks. After getting the level of terrorist attacks, we can fight terrorist organizations more effectively. This paper builds rating models for terrorist attacks, hidden or emerging terrorist organization classification discovery models, terrorist organization alliance network models and more, through quantitative research of the Global Terrorism Database, which solved the event classification. Through studying relevant literature and the variables of the Global Terrorism Database, this paper sorted out 25 observation variables related to the impact level (level of harm) of terrorist attacks. By establishing a mathematical model of factor analysis, 11 factors related to the impact level (level of harm) of terrorist attacks were constructed, and the variance of the contribution of each factor was used as the weight to calculate the comprehensive rate of the impact level of each terrorist attack. Finally, K-means clustering method is used to cluster and analyze the comprehensive rate of impact level, and the top 10 terrorist attacks with the highest impact level in the past two decades were obtained.


2016 ◽  
Vol 26 (4) ◽  
pp. 316-336
Author(s):  
Marie Ouellet ◽  
Martin Bouchard

Criminal and terrorist organizations often depend on repeat offenders to maintain the group’s longevity, especially after repeated law enforcement interventions. Yet, little is known about the offenders who perpetrate multiple incidents on behalf of a group. Relying on data for 118 terrorist offenders involved across eight attacks from 2000 to 2005, this study examines the correlates of repeat offending within a terrorist organization. Our main predictor, criminal social capital, is measured by the number and structure of co-offending ties. Poisson regression results demonstrate that offenders with a higher number of connections are more likely to be involved in multiple attacks; while offenders positioned as brokers—bridging otherwise unconnected others—are less likely to reoffend. In addition, being a leader and graduate education was associated with repeat offending. These findings suggest that selection is based on more than an offender’s skill set but also on their embeddedness within the group.


Author(s):  
Farhan Zahid

Pakistan remains a country of vital importance for Al-Qaeda. It is primarily because of Al-Qaeda’s advent, rise and shelter and not to mention the support the terrorist organization found at the landscape of Pakistan during the last two decades. The emergence of in Pakistan can be traced back to the Afghan War (1979-89), with a brief sabbatical in Sudan the Islamist terrorist group rose to gain prominence after shifting back to Afghanistan. It then became a global ‘Islamist’ terrorist entity while based in neighboring Afghanistan and found safe havens in the erstwhile tribal areas of Pakistan in the aftermath of the US invasion of Afghanistan in 2001. Prior to its formation in 1988 in Peshawar (Pakistan), it had worked as Maktab al-Khidmat (Services Bureau) during the Afghan War.2 It had its roots in Pakistan, which had become a transit point of extremists en route to Afghanistan during the War. All high profile Al-Qaeda leaders, later becoming high-value targets, and members of its central Shura had lived in Pakistan at one point in their lives. That is the very reason the Al-Qaeda in Pakistan is termed as Al-Qaeda Core or Central among law enforcement practitioners and intelligence communities. Without going into details of Al-Qaeda’s past in Pakistan the aim of this article is to focus on its current state of affairs and what future lies ahead of it in Pakistan.


2020 ◽  
Vol 23 (4) ◽  
pp. 745-750
Author(s):  
Spyridon Repousis

Purpose The purpose of this paper is to research for possible interconnection of the Greek terrorist organization “November 17” with the international terrorist Ilich Ramirez Sanchez or “Carlos the Jackal.” Design/methodology/approach In this research are discussed documents, visits by Carlos and his team to Greece, operational support through training and supply of weapons to “ELA” and “November 17,” attacks on foreign service targets in Greek territory, reports of close people working with Greek terrorist organizations, terrorist proclamations and interrogation of Carlos. Findings Available data indicate their cooperation and their terrorist murderous activity in Greece, which of course needs deeper investigation. “Carlos the Jackal” acted and cooperated in Greece with the two major terrorist organizations, “ELA” and “November 17,” causing material damages and murders. Practical implications The research is useful for government authorities, law authorities and offices and the democratic society as a whole. Originality/value To the best of the author’s knowledge, this is the first study examining the specific topic.


Author(s):  
Tetiana Veretenko ◽  
Anton Trebe ◽  
Olena Bieloliptseva

The attention is drawn to the possibility of terrorist attacks in Ukraine. The essence of safe behaviour during a terrorist attack is revealed in the article. The purpose of the article is to determine the rules of behaviour for high school students in the case of a terrorist attack, the action algorithm of high school students on receiving information about a terrorist threat; rules of safe behaviour in social networks, which are actively used by terrorists, who attack high school students to participate in their groups and terrorist acts; to present a formation program of high school students’safe behaviour while terrorist attacks and show its effectiveness.The results of the experimental implementation of the program for formation of high school students’safe behaviour during terrorist attacks and emergencies are analyzed after asurvey carried out. According to the results summarised a conclusion is made to activate social and pedagogical work in the field of forming students’safe behaviour while terrorist attacks and emergencies.


2006 ◽  
Vol 30 (3) ◽  
pp. 87-123 ◽  
Author(s):  
Robert F. Trager ◽  
Dessislava P. Zagorcheva

Many scholars and policymakers argue that deterrence strategies have no significant role to play in counterterrorism. The case against deterrence rests on three pillars: terrorists are irrational; they value their political ends far above anything deterring states could hold at risk; and they are impossible tofind. Each pillar is either incorrect or its implications for deterrence have been misunderstood. Under certain conditions, deterrence is preferable to the use of force. Analysis of the structure of terrorist networks and the processes that produce attacks, as well as the multiple objectives of terrorist organizations, suggests that some deterrence strategies are more effective than those of the past. In particular, many terrorist groups and elements of terrorist support networks can likely be deterred from cooperating with the most threatening terrorist groups, such as al-Qaida. Although the use of force against multiple groups creates common interests among them, an appropriate deterrence strategy could fracture global terrorist networks. The current policy of the U.S. and Philippine governments toward the Moro Islamic Liberation Front (MILF) and the Abu Sayyaf Group illustrates the potential of this approach and the risks of using force. Not only can groups such as the MILF be deterred from cooperating with al-Qaida, they may even be coerced into providing local intelligence on operatives linked to it.


10.12737/6587 ◽  
2014 ◽  
Vol 2 (12) ◽  
pp. 0-0 ◽  
Author(s):  
Самвел Кочои ◽  
Samvyel Kochoi

The first time in Russian legal science discusses the crimes committed by the terrorist organization “Islamic State / Islamic State of Iraq and the Levant” (IS/ISIL), against minority communities — Yazidis in Iraq. Based on the analysis of available information (reports of the UN and other international organizations, publications in Russian and foreign mass media) is substantiated conclusion about the presence of elements of the genocide in the acts of the members of the IS/ISIL. It is emphasized that the international community faced genocide, which was committed organization recognized as a terrorist. Invited to take coordinated by the international community measures to deprivation of members of the IS/ISIL freedom of movement between States and to prevent they commit terrorist acts on his return to the States, natives or citizens whom they represent.


Author(s):  
Владислав Красинский ◽  
Vladislav Krasinskiy ◽  
Владислав Машко ◽  
Vladislav Mashko

The directory contains information on the international terrorist organizations al-Qaida, the Islamic state, Jabhat al-Nusra, the Islamic movement of Uzbekistan, the Taliban, Hizb ut-Tahrir al-Islami, the Union of Islamic Jihad, the Jund al-sham, the Muslim Brotherhood and the international religious extremist organization Tablighi Jamaat, which are banned in the territory of the Russian Federation. The authors considered the most famous and capable terrorist organization, revealed their operational capacity, the doctrines of, the organization and tactics of the activity, their role and place in the conglomeration of international terrorist organizations. The book is intended for law enforcement officers, analysts of research funds, political scientists and media representatives, as well as for a wide range of readers and experts interested in topical issues of countering international terrorism.


2020 ◽  
Vol 40 (2) ◽  
pp. 243-247
Author(s):  
Wadie E. Said

Abstract With Islamophobia rife and the government list of foreign terrorist organizations (FTOs) telling us who is a threat, marginalized populations are being targeted and can expect a hostile and negative prosecutorial outcome. The large majority of terrorism prosecutions center on material support charges, which by their very structure concentrate on FTOs that are largely Islamist in ideology. Attaching a terrorist taint to a population based on its religious affiliation generates a kind of self-perpetuating law enforcement bias and prosecutorial outcome. Such police state tactics and assumptions only assure the adverse results of insisting that an exceptional status applies to those accused of terrorist activity or support for it. That, in the government's eyes, those individuals stem from one of the major monotheistic faiths in large part, seems to be a foregone conclusion that continues to affect the law's development in largely negative ways.


Sign in / Sign up

Export Citation Format

Share Document