Abstract
The combination of traditional qualitative analysis techniques with new developments in computer science has created important new options for counter-terror analysts. Written from this perspective of a counter-terror analyst, this chapter provides an overview of a number of useful modes of analysis for understanding terrorist organization behavior and developing strategies and policies that can counter terrorist group activities. The chapter discusses the strategic perspective on terrorist group decision-making, the application of organizational theory to terrorist organizations, as well as studies about who joins, and who leaves, terrorist organizations. In each of these areas of study, computational analysis can play an important role augmenting the human analyst’s ability to use data and generate effective counter-terror policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Crenshaw M (1987) Theories of terrorism: instrumental and organizational approaches. J Strateg Stud 10(4):13–31
Kilcullen D (2010) Counterinsurgency. Oxford University Press, Oxford
Shadish W, Cook T, Campbell D (2002) Experimental and quasi-experimental designs for generalized causal inference. Houghton Mifflin, Boston
King G, Keohane R, Verba S (1994) Designing social inquiry: scientific inference in qualitative research. Princeton University Press, Princeton
Miller R, Brewer J (2003) The A-Z of social research. SAGE Publications, London
Jones S, Libacki M (2008) How terrorist groups end: lessons for countering al Qa’ida. RAND Corporation, Arlington
George A, McKeown T (1985) Case studies and theories of organizational decision making. In Coulam R, Smith R (ed) Advances in information processing in organizations: a research annual, vol 2. JAI Press, Greenwich
Skinner K (2011) Qualitative analysis for the intelligence community. In Fischhoff B, Chauvin C (eds) Intelligence analysis: behavioral and social scientific foundations. The National Academies Press, Washington
Neumann P (2005) The bullet and the ballot box: the case of the IRA. J Strateg Stud 28(6): 941–975
Asal V, Pate A, Wilkenfeld J (2008). Minorities at risk organizational behavior data and codebook version. http://www.cidcm.umd.edu/mar/data.asp. Accessed 3 April 2012
Mannes A, Michael M, Pate A, Sliva A, Subrahmanian VS, Wilkenfeld J (2008) Stochastic opponent modeling agents: a case study with Hezbollah. First International Workshop on Social Computing, Behavioral Modeling, and Prediction. Arizona State University
Mannes A, Subrahmanian VS (2009) Calculated terror. Foreignpolicy.com. http://www.foreignpolicy.com/articles/2009/12/15/calculated_terror. Accessed 2 April 2012
Mannes A, Sliva A, Subrahmanian VS, Wilkenfeld J (2008) Stochastic opponent modeling agents: a case study with Hamas. Proceedings of the Second International Conference on Computational Cultural Dynamics. University of Maryland College Park
Mannes A, Shakarian J, Sliva A, Subrahmanian VS (2011) A computationally-enabled analysis of Lashkar-e-Taiba Attacks in Jammu & Kashmir. Proceedings of the European Intelligence and Security Informatics Conference, Athens
Shapiro J (2007) The terrorist’s challenge: security, efficiency, control. Center for International Security and Cooperation, Stanford University. http://igcc3.ucsd.edu/pdf/Shapiro.pdf. Accessed 27 March 2012
Felter J, Bramlett J, Perkins B, Brachman J, Fishman B, Forest J, Kennedy L, Shapiro JN, Stocking T (2006) Harmony and disharmony: exploiting al-Qa’ida’s organizational vulnerabilities. United States Military Academy, West Point. http://www.ctc.usma.edu/posts/harmony-and-disharmony-exploiting-al-qaidas-organizational-vulnerabilities. Accessed 25 March 2012
Ignatius D (2012) The bin Laden plot to kill President Obama. The Washington Post. http://www.washingtonpost.com/opinions/the-bin-laden-plot-to-kill-president-obama/2012/03/16/gIQAwN5RGS_story.html. Accessed 27 March 2012
Ortiz R (2002) Insurgent strategies in the post-cold war: the case of the revolutionary armed forces of Colombia.Stud Confl Terror 25(2):127–143
Muse T (2008) Colombia rebel urges others to surrender. USA Today. http://www.usatoday.com/news/topstories/2008-05-19-1423133023_x.htm. Accessed 2 April 2012
Romero S, Cave D (2008) Carefully planned Colombia rescue exploited FARC weaknesses. The New York Times. http://www.nytimes.com/2008/07/04/world/americas/04iht-colombia.4.14247941.html?_r = 1&pagewanted = all. Accessed 2 April 2012
Brodzinsky S (2010) Colombia troops kill top FARC rebel leader ‘Mono Jojoy.’ The christian science monitor http://www.csmonitor.com/World/Americas/2010/0923/Colombia-troops-kill-top-FARC-rebel-leader-Mono-Jojoy. Accessed 2 April 2012
Forero J (2011) Alfonso Cano, leader of Colombia’s FARC rebels, killed in raid. The Washington Post. http://www.washingtonpost.com/world/americas/alfonso-cano-leader-of-colombias-farc-rebels-killed-in-raid/2011/11/05/gIQAgVxcoM_story.html. Accessed 2 April 2012
Mapstone N (2012) Farc frees last government hostages. Financial Times http://www.ft.com/cms/s/0/408eee84-7ce0-11e1-9d8f-00144feab49a.html#axzz1rBLTifrl. Accessed 2 April 2012
Weimann G, Von Knop K (2008) Applying the notion of noise to countering online terrorism. Studies in Stud Confl Terror 31(10):883–902
Albanese M, Subrahmanian VS (2007) T-Rex: a system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics, College Park
Cesarano C, Picariello A, Reforgiato D, Subrahmanian VS (2007) OASYS 2: An opinion analysis system. Proceedings of the 2007 International Conference on the Web and Social Media, Boulder
Shakarian P, Subrahmanian VS, Sapino M (2010) Using generalized annotated programs to solve social network optimization problems. Technical Communications of the International Conference on Logic Programming
Abou Zahab M (2007) ‘I shall be waiting for you at the door of paradise’: the pakistani martyrs of the lashkar-e-taiba (army of the true). In: Rao A, Bollig M, Bock M (eds) The practice of war: production, reproduction and communication of armed violence. Berghahn Books, New York
Asal V, Fair CC, Shellman S (2008) Consenting to a child’s decision to join a Jihad: insights from a survey of militant families in Pakistan. Stud Confl Terror 31(11):973–994
Afzal M (2012) Are the better educated less likely to support militancy and terrorism? women are. Evidence from Public Opinion Polls in Pakistan. Working paper, University of Maryland School of Public Policy
Hegghammer T (2010/11) The rise of Muslim Foreign Fighters: Islam and the globalization of Jihad. Int Secur 35(3):53–94
Jacobson M (2010) Terrorist dropouts: learning from those who have left. The Washington Institute for Near East Policy. http://www.washingtoninstitute.org/pubPDFs/PolicyFocus101.pdf. Last accessed March 21, 2012
Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Mannes, A. (2013). Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5311-6_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5310-9
Online ISBN: 978-1-4614-5311-6
eBook Packages: Computer ScienceComputer Science (R0)