terrorist networks
Recently Published Documents


TOTAL DOCUMENTS

157
(FIVE YEARS 25)

H-INDEX

15
(FIVE YEARS 1)

2021 ◽  
Vol 15 (2) ◽  
pp. 73-92
Author(s):  
Muhammad Syafiq

This qualitative study was aimed at exploring  the  experience  of  a former  member of a terrorist organization in Indonesia who  have  left  his terrorist group and abandoned the extremist ideology. A life history method which focuses on the process of self-change and life transition of the former member of the terrorist group was employed A participant whose age is 40 years old and was a former active member of Jamaah Islamiyah (JI), a terrorist group, was recruited. He was captured in 2014 and served a sentence in prison for almost 4 years. He has been involved in counter-terrorism campaign organized by a non-government organization (NGO) since his release from prison until recently. Interviews were conducted to collect data which were then analyzed using a narrative analysis. Some written documents in the forms of articles and a published book produced by the participant as well as online news covering the participant’ stories were also examined. The findings inform how he became involved in the terrorist networks. The need for self-significance and adventurous experience seems to be the main drivers. After his capture, and during his imprisonment, he contemplated his participation in the terrorist networks. His meetings with religious experts and academicians facilitated by prison officers, and his awareness of burden he had inflicted on his family because of his terrorism case had opened his mind. He experienced a turning life moment which made him keeping distance from other terrorist inmates with the risk of receiving negative view from them. After his release, he found passion in writing and eventually reached a NGO and joined it as a credible voice in the campaigns of counter violent extremism through writing and public speaking.


Author(s):  
E.M. Nwanga ◽  
K.C. Okafor ◽  
G.A. Chukwudebe ◽  
I.E. Achumba

Increasing terrorist activities globally have attracted the attention of many researchers, policy makers and security agencies towards counterterrorism. The clandestine nature of terrorist networks have made them difficult for detection. Existing works have failed to explore computational characterization to design an efficient threat-mining surveillance system. In this paper, a computationally-aware surveillance robot that auto-generates threat information, and transmit same to the cloud-analytics engine is developed. The system offers hidden intelligence to security agencies without any form of interception by terrorist elements. A miniaturized surveillance robot with Hidden Markov Model (MSRHMM) for terrorist computational dissection is then derived. Also, the computational framework for MERHMM is discussed while showing the adjacency matrix of terrorist network as a determinant factor for its operation. The model indicates that the terrorist network have a property of symmetric adjacency matrix while the social network have both asymmetric and symmetric adjacency matrix. Similarly, the characteristic determinant of adjacency matrix as an important operator for terrorist network is computed to be -1 while that of a symmetric and an asymmetric in social network is 0 and 1 respectively. In conclusion, it was observed that the unique properties of terrorist networks such as symmetric and idempotent property conferred a special protection for the terrorist network resilience. Computational robotics is shown to have the capability of utilizing the hidden intelligence in attack prediction of terrorist elements. This concept is expected to contribute in national security challenges, defense and military intelligence.


Entropy ◽  
2021 ◽  
Vol 23 (10) ◽  
pp. 1334
Author(s):  
Alexandros Z. Spyropoulos ◽  
Charalampos Bratsas ◽  
Georgios C. Makris ◽  
Evangelos Ioannidis ◽  
Vassilis Tsiantos ◽  
...  

In recent years, law enforcement authorities have increasingly used mathematical tools to support criminal investigations, such as those related to terrorism. In this work, two relevant questions are discussed: “How can the different roles of members of a terrorist organization be recognized?” and “are there early signs of impending terrorist acts?” These questions are addressed using the tools of entropy and network theory, more specifically centralities (degree, betweenness, clustering) and their entropies. These tools were applied to data (physical contacts) of four real terrorist networks from different countries. The different roles of the members are clearly recognized from the values of the selected centralities. An early sign of impending terrorist acts is the evolutionary pattern of the values of the entropies of the selected centralities. These results have been confirmed in all four terrorist networks. The conclusion is expected to be useful to law enforcement authorities to identify the roles of the members of terrorist organizations as the members with high centrality and to anticipate when a terrorist attack is imminent, by observing the evolution of the entropies of the centralities.


2021 ◽  
Author(s):  
Wilhelm Rödder ◽  
Andreas Dellnitz ◽  
Sebastian Litzinger
Keyword(s):  

2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Elie Alhajjar ◽  
◽  
Ryan Fameli ◽  
Shane Warren
Keyword(s):  

Contexts ◽  
2021 ◽  
Vol 20 (1) ◽  
pp. 8-9
Author(s):  
Marco Garrido ◽  
Victoria Reyes

Maria Ressa worked at CNN for nearly twenty years, was the lead investigative reporter in Southeast Asia for terrorist networks, and she helped found the news website Rappler. In June 2020, Ressa was convicted of “cyber libel” and faces up to six years in prison.


Author(s):  
Mary S. Barton

The passage to India of small arms, which often accompanied revolutionary ideas, was central to London’s concerns about the proliferation of arms prior to and after the 1919 Arms Traffic Convention. The British government attempted to combat political violence using tools developed during the Great War. Officials in London identified the province of Bengal in British India as the center of several terrorist networks. British counterterrorism strategy in India relied on three parts: arms controls, passport restrictions, and domestic anti-terrorism legislation. Intelligence memoranda warned of danger from the Communist International’s efforts to move funds, weapons, and foreign fighters into Azerbaijan, Afghanistan, Persia, and Iraq, with an eye toward the penetration of India. Reports shaped the policy recommendations of the newly-established Inter-Departmental Committee on Eastern Unrest (IDCEU). However, as colonial administrators learned following the Rowlatt Act, domestic anti-terrorism legislation would be revoked were Indian and London politicians to find it oppressive.


Sign in / Sign up

Export Citation Format

Share Document