Terrorist Database: A Bangladesh Study

  • Abu Md. Zafor Alam
  • Sajjad Waheed
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)


The Terrorism today is transnational in scope, reach, and presence, and this is perhaps its greatest source of power. Terrorist acts are planned and perpetrated by collections of loosely organized people operating in shadowy networks that are difficult to define and identify. They move freely throughout the world, hide when necessary, and exploit safe harbors proffered by rogue entities. They find unpunished and oftentimes unidentifiable sponsorship and support, operate in small independent cells, strike infrequently, and utilize weapons of mass effect and the media’s response in an attempt to influence governments.


Trade Fair Safe Harbor Opposition Party Religious Congregation Time Bomb 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Abu Md. Zafor Alam
    • 1
  • Sajjad Waheed
    • 2
  1. 1.Faculty of Computer Science & EngineeringDaffodil International UniversityDhaka
  2. 2.Dept. of ICTMaulana Vhasani UniversityTangail

Personalised recommendations