Skip to main content

Abstract

This chapter contains a brief introduction to Lashkar-e-Taiba. It describes their geographic locations and also summarizes statistics about violent terror acts carried out by LeT, briefly describes the behavioral rules about LeT derived in this book, and summarizes suggested policy options generated automatically from the LeT data set.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This report was released by the Government of India to the Government of Pakistan. Page 2 of the report de-scribes the retrieval of GPS instruments and a Thuraya satellite phone. Page 12 of the same report describes the use of VoIP technology by the terrorists.

  2. 2.

    It has also been asserted that the name Lashkar-e-Taiba should be read as “Army of Madinah” (John 2011).

  3. 3.

    In all casualty figures quoted in this book, the number of terrorists killed is not included. Thus, when the number of casualties for the November 26, 2008 Mumbai attack is listed as 166, it does not include the terrorists who were killed during the attack.

  4. 4.

    The other major suspect in the attack was Indian Mujahideen (Gupta 2011), an Indian Muslim terrorist group that receives support from LeT (this relationship is discussed below). Because of the frequent ambiguity in identifying the perpetrator of a terrorist attack, this book will use the term LeT-backed attacks to include attacks that are believed to have been carried out either directly by LeT or by its proxies and close allies.

  5. 5.

    The precise date on which LeT was founded is not 100 % clear (Tankel 2011b, p. 3) traces the roots of LeT back to 1984 when Zaki-ur-Rehman Lakhvi, one of the principal suspected masterminds behind the 2008 Mumbai attacks, founded an Ahl-e-Hadith group in Afghanistan to fight the Soviets. Tankel goes on to report that Hafez Saeed (the current LeT chief) and Zafar Iqbal, created Jamaat-ud-Dawa (JuD), an Ahl Hadith missionary group in 1985. Tankel describes the subsequent creation of Markaz-ud-Dawa al Irshad (MDI) in 1986 by 17 founders including those above. The new organization folded in Zaki-ur-Rehman’s group and Saeed’s organization. LeT itself was officially launched in 1990, though there appear to be conflicting reports about the exact date (John 2011, p. 1) states that LeT was created precisely on February 22, 1990.

  6. 6.

    Throughout this book, the term Jammu & Kashmir is used to refer to Indian administered Kashmir. This expression is used for convenience, the issue of Kashmir’s ultimate legal status is a complex one and is not the topic addressed in this book.

  7. 7.

    Some of these variables such as Pakistani military support for LeT, LeT’s communications campaigns, and charitable activities are effectively constant conditions. In this study, these conditions were coded when a major media source mentioned them as occurring. The fact that major media cites this activity could indicate a trend that this activity was occurring at a greater level (or at a more noticeable level) than at other times.

  8. 8.

    Attacks on holidays are not handled directly by the policies generated automatically for technical reasons discussed in Chaps. 10 and 11. However, Chap. 11 shows that the policies recommended also have a strong effect in reducing attacks on holidays.

  9. 9.

    This complex option (and others) are discussed in greater detail in Chap. 11.

References

  • Abbas, H. (2005). Pakistan’s drift into extremism: Allah, the Army, and America’s war on terror. London: M.E Sharpe.

    Google Scholar 

  • Baral, C., Kraus, S., Minker, J., & Subrahmanian, V. S. (1992). Combining knowledge bases consisting of first order theories. Computational Intelligence, 8(1), 45–71.

    Article  Google Scholar 

  • BBC News. (2012). US Puts $10M bounty on Lashkar-e-Taiba’s Hafiz Saeed. April 3, 2012, http://www.bbc.co.uk/news/world-asia-india-17594018

  • Bell, C., Nerode, A., Ng, R., & Subrahmanian, V. S. (1994a). Implementing deductive databases by mixed integer programming. ACM Transactions on Database Systems, 21(2), 238–269..

    Article  Google Scholar 

  • Bell, C., Nerode, A., Ng, R., & Subrahmanian, V. S. (1994b). Mixed Integer methods for computing non-monotonic deductive databases. Journal of the ACM, 41(6), 1178–1215.

    Article  MathSciNet  MATH  Google Scholar 

  • Brenner, J. (2011). America the vulnerable. New York: The Penguin Press.

    Google Scholar 

  • Craig, G., & George, A. (1990). Force and statecraft: Diplomatic problems of our time (2nd ed.). New York: Oxford University Press.

    Google Scholar 

  • Dickerson, J., Mannes, A., & Subrahmanian, V. S. (2011). Dealing with Lashkar-e-Taiba: A multi-player game-theoretic perspective. Proceedings of the IEEE International Symposium on Open-Source Intelligence and Web Mining, Athens, Greece, September 2011.

    Google Scholar 

  • Fair, C. C. (2009). Antecedents and implications of the November 2008 Lashkar-e-Taiba (LeT) attack upon several targets in the Indian mega-city of Mumbai. Santa Monica: Rand Corporation. March 11, 2009 http://www.rand.org/pubs/testimonies/CT320/

  • Government of India (2008) Mumbai terrorist attacks: Dossier of evidence. The Hindu: Online Edition of India’s National Newspaper. http://www.hindu.com/nic/dossier.htm

  • Gupta, S. (2011). The Indian Mujahideen: Tracking the enemy within. India: Hachette.

    Google Scholar 

  • John, W. (2011). Caliphate’s soldiers: The Lashkar-e-Tayyeba’s long war. New Delhi: Amaryllis and the Observer Research Foundation.

    Google Scholar 

  • Krepon, M. (2010). The Perils of proliferation in South Asia. Arms Control Today, April 2010 http://www.armscontrol.org/act/2010_04/BookReview

  • Minker, J. (1982). On indefinite databases and the closed-world assumption. Proceedings of the 6th International Conference on Automated Deduction, Lecture Notes in Computer Science, Vol. 138, pp. 292–308.

    Google Scholar 

  • Rana, M. A. (2006). A to Z of Jihadi Organizations in Pakistan (Saba Ansan, Trans.). Pakistan: Mashal Books. http://www.desistore.com/jehadiorg.html

  • Rotella, S. (2011). Pakistan’s terror connections: Chicago terrorism trial what we learned and what we didn’t, about Pakistan’s terror connections. ProPublica. http://www.propublica.org/topic/mumbai-terror-attacks/

  • Rubin, A. (2010). Militant group expands attacks in Afghanistan. The New York Times, June 15, 2010. http://www.nytimes.com/2010/06/16/world/asia/16lashkar.html?pagewanted=all

  • Schelling, T. C. (1980). The strategy of conflict. Cambridge: Harvard University of Press.

    Google Scholar 

  • Subrahmanian, V. S. (2007). Cultural reasoning in real-time. Science, 317(5844), 1509–1510.

    Article  Google Scholar 

  • Subrahmanian, V. S., Albanese, M., Martinez, V. M., Reforgiato, D., Simari, G., Sliva, A., et al. (2007). CARA: A cultural adversarial reasoning architecture. IEEE Intelligent Systems, 22(2), 12–16.

    Article  Google Scholar 

  • Tankel, S. (2011). The threat to the U.S. Homeland Emanating from Pakistan. Washington, DC: Carnegie Endowment for International Peace, May 3, 2011, http://carnegieendowment.org/files/0503_testimony_tankel.pdf

  • Tankel, S. (2011b). Storming the world stage: The story of Lashkar-e-Taiba. London: C. Hurst & Co.

    Google Scholar 

  • Tellis, A. (2010). Testimony by Ashley J. Tellis. Bad Campany-Lashkar-e-Tayyiba and the Growing Ambition of Islamist Militancy in Pakistan. Washington: United States House of Representatives, Committee on Foreign Affairs, Subcommittee on Middle East and South Asia, March 11, 2010, http://carnegieendowment.org/files/0311_testimony_tellis.pdf

  • The Age. (2006). Lodhi ‘Deserves’ 20 Years. August 23, 2006 www.theage.com.au

  • United States Government, National Counterterrorism Center, Worldwide Incidents Tracking System. (2011). Criteria, http://www.nctc.gov/witsbanner/wits_subpage_criteria.htm.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Subrahmanian .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Subrahmanian, V.S., Mannes, A., Sliva, A., Shakarian, J., Dickerson, J.P. (2013). Introduction. In: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4769-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4769-6_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4768-9

  • Online ISBN: 978-1-4614-4769-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics