Skip to main content

Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst

  • Chapter
  • First Online:
Handbook of Computational Approaches to Counterterrorism

Abstract

The combination of traditional qualitative analysis techniques with new developments in computer science has created important new options for counter-terror analysts. Written from this perspective of a counter-terror analyst, this chapter provides an overview of a number of useful modes of analysis for understanding terrorist organization behavior and developing strategies and policies that can counter terrorist group activities. The chapter discusses the strategic perspective on terrorist group decision-making, the application of organizational theory to terrorist organizations, as well as studies about who joins, and who leaves, terrorist organizations. In each of these areas of study, computational analysis can play an important role augmenting the human analyst’s ability to use data and generate effective counter-terror policies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Crenshaw M (1987) Theories of terrorism: instrumental and organizational approaches. J Strateg Stud 10(4):13–31

    Article  Google Scholar 

  2. Kilcullen D (2010) Counterinsurgency. Oxford University Press, Oxford

    Google Scholar 

  3. Shadish W, Cook T, Campbell D (2002) Experimental and quasi-experimental designs for generalized causal inference. Houghton Mifflin, Boston

    Google Scholar 

  4. King G, Keohane R, Verba S (1994) Designing social inquiry: scientific inference in qualitative research. Princeton University Press, Princeton

    Google Scholar 

  5. Miller R, Brewer J (2003) The A-Z of social research. SAGE Publications, London

    Google Scholar 

  6. Jones S, Libacki M (2008) How terrorist groups end: lessons for countering al Qa’ida. RAND Corporation, Arlington

    Google Scholar 

  7. George A, McKeown T (1985) Case studies and theories of organizational decision making. In Coulam R, Smith R (ed) Advances in information processing in organizations: a research annual, vol 2. JAI Press, Greenwich

    Google Scholar 

  8. Skinner K (2011) Qualitative analysis for the intelligence community. In Fischhoff B, Chauvin C (eds) Intelligence analysis: behavioral and social scientific foundations. The National Academies Press, Washington

    Google Scholar 

  9. Neumann P (2005) The bullet and the ballot box: the case of the IRA. J Strateg Stud 28(6): 941–975

    Article  Google Scholar 

  10. Asal V, Pate A, Wilkenfeld J (2008). Minorities at risk organizational behavior data and codebook version. http://www.cidcm.umd.edu/mar/data.asp. Accessed 3 April 2012

  11. Mannes A, Michael M, Pate A, Sliva A, Subrahmanian VS, Wilkenfeld J (2008) Stochastic opponent modeling agents: a case study with Hezbollah. First International Workshop on Social Computing, Behavioral Modeling, and Prediction. Arizona State University

    Google Scholar 

  12. Mannes A, Subrahmanian VS (2009) Calculated terror. Foreignpolicy.com. http://www.foreignpolicy.com/articles/2009/12/15/calculated_terror. Accessed 2 April 2012

  13. Mannes A, Sliva A, Subrahmanian VS, Wilkenfeld J (2008) Stochastic opponent modeling agents: a case study with Hamas. Proceedings of the Second International Conference on Computational Cultural Dynamics. University of Maryland College Park

    Google Scholar 

  14. Mannes A, Shakarian J, Sliva A, Subrahmanian VS (2011) A computationally-enabled analysis of Lashkar-e-Taiba Attacks in Jammu & Kashmir. Proceedings of the European Intelligence and Security Informatics Conference, Athens

    Google Scholar 

  15. Shapiro J (2007) The terrorist’s challenge: security, efficiency, control. Center for International Security and Cooperation, Stanford University. http://igcc3.ucsd.edu/pdf/Shapiro.pdf. Accessed 27 March 2012

  16. Felter J, Bramlett J, Perkins B, Brachman J, Fishman B, Forest J, Kennedy L, Shapiro JN, Stocking T (2006) Harmony and disharmony: exploiting al-Qa’ida’s organizational vulnerabilities. United States Military Academy, West Point. http://www.ctc.usma.edu/posts/harmony-and-disharmony-exploiting-al-qaidas-organizational-vulnerabilities. Accessed 25 March 2012

  17. Ignatius D (2012) The bin Laden plot to kill President Obama. The Washington Post. http://www.washingtonpost.com/opinions/the-bin-laden-plot-to-kill-president-obama/2012/03/16/gIQAwN5RGS_story.html. Accessed 27 March 2012

  18. Ortiz R (2002) Insurgent strategies in the post-cold war: the case of the revolutionary armed forces of Colombia.Stud Confl Terror 25(2):127–143

    Google Scholar 

  19. Muse T (2008) Colombia rebel urges others to surrender. USA Today. http://www.usatoday.com/news/topstories/2008-05-19-1423133023_x.htm. Accessed 2 April 2012

  20. Romero S, Cave D (2008) Carefully planned Colombia rescue exploited FARC weaknesses. The New York Times. http://www.nytimes.com/2008/07/04/world/americas/04iht-colombia.4.14247941.html?_r = 1&pagewanted = all. Accessed 2 April 2012

  21. Brodzinsky S (2010) Colombia troops kill top FARC rebel leader ‘Mono Jojoy.’ The christian science monitor http://www.csmonitor.com/World/Americas/2010/0923/Colombia-troops-kill-top-FARC-rebel-leader-Mono-Jojoy. Accessed 2 April 2012

  22. Forero J (2011) Alfonso Cano, leader of Colombia’s FARC rebels, killed in raid. The Washington Post. http://www.washingtonpost.com/world/americas/alfonso-cano-leader-of-colombias-farc-rebels-killed-in-raid/2011/11/05/gIQAgVxcoM_story.html. Accessed 2 April 2012

  23. Mapstone N (2012) Farc frees last government hostages. Financial Times http://www.ft.com/cms/s/0/408eee84-7ce0-11e1-9d8f-00144feab49a.html#axzz1rBLTifrl. Accessed 2 April 2012

  24. Weimann G, Von Knop K (2008) Applying the notion of noise to countering online terrorism. Studies in Stud Confl Terror 31(10):883–902

    Google Scholar 

  25. Albanese M, Subrahmanian VS (2007) T-Rex: a system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics, College Park

    Google Scholar 

  26. Cesarano C, Picariello A, Reforgiato D, Subrahmanian VS (2007) OASYS 2: An opinion analysis system. Proceedings of the 2007 International Conference on the Web and Social Media, Boulder

    Google Scholar 

  27. Shakarian P, Subrahmanian VS, Sapino M (2010) Using generalized annotated programs to solve social network optimization problems. Technical Communications of the International Conference on Logic Programming

    Google Scholar 

  28. Abou Zahab M (2007) ‘I shall be waiting for you at the door of paradise’: the pakistani martyrs of the lashkar-e-taiba (army of the true). In: Rao A, Bollig M, Bock M (eds) The practice of war: production, reproduction and communication of armed violence. Berghahn Books, New York

    Google Scholar 

  29. Asal V, Fair CC, Shellman S (2008) Consenting to a child’s decision to join a Jihad: insights from a survey of militant families in Pakistan. Stud Confl Terror 31(11):973–994

    Google Scholar 

  30. Afzal M (2012) Are the better educated less likely to support militancy and terrorism? women are. Evidence from Public Opinion Polls in Pakistan. Working paper, University of Maryland School of Public Policy

    Google Scholar 

  31. Hegghammer T (2010/11) The rise of Muslim Foreign Fighters: Islam and the globalization of Jihad. Int Secur 35(3):53–94

    Google Scholar 

  32. Jacobson M (2010) Terrorist dropouts: learning from those who have left. The Washington Institute for Near East Policy. http://www.washingtoninstitute.org/pubPDFs/PolicyFocus101.pdf. Last accessed March 21, 2012

  33. Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aaron Mannes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Mannes, A. (2013). Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics