摘要 :
With the support of technology in the new era, the terrorism activities present many new characteristics. An increasing number of terrorist organizations use new media to promote extreme ideas, release terrorism information, recru...
展开
With the support of technology in the new era, the terrorism activities present many new characteristics. An increasing number of terrorist organizations use new media to promote extreme ideas, release terrorism information, recruit group participants and plot terrorist activities. Besides the hard power, we should also use soft power to disorganize the terrorism's foundation in terms of thoughts and public opinions. Therefore, introducing the communication has great significance to counter-terrorism. We can establish the national counter-terrorism strategic communication mechanism and fuse the work with politics, diploma, national-defense, religion and so on. Therefore, the information resource and other resource can be deeply reorganized and the counter-terrorism efficiency can be enhanced.
收起
摘要 :
In the international counter-terrorism strike, different countries have different country interests due to the influences of many factors. It leads to some bifurcation. The purpose of this paper is to study efficient measures appl...
展开
In the international counter-terrorism strike, different countries have different country interests due to the influences of many factors. It leads to some bifurcation. The purpose of this paper is to study efficient measures applications of game theory to combat terror. The thesis has analyzed the international joint counter-terrorism strike restricted by different factors by applying the game theory. Our study show that country having terrorism shall actively join in counter-terrorism strike to cope with the terrorism in any case. Only take the joint counter-terrorism strike any country facing to the terrorism can provide the safeguard for the safety and development
收起
摘要 :
In the international counter-terrorism strike, different countries have different country interests due to the influences of many factors. It leads to some bifurcation. The purpose of this paper is to study efficient measures appl...
展开
In the international counter-terrorism strike, different countries have different country interests due to the influences of many factors. It leads to some bifurcation. The purpose of this paper is to study efficient measures applications of game theory to combat terror. The thesis has analyzed the international joint counter-terrorism strike restricted by different factors by applying the game theory. Our study show that country having terrorism shall actively join in counter-terrorism strike to cope with the terrorism in any case. Only take the joint counter-terrorism strike any country facing to the terrorism can provide the safeguard for the safety and development
收起
摘要 :
The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to f...
展开
The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to find better approaches to intelligence data gathering and analysis. Generally, a major activity in counter-terrorism is the ability to process high-volumes of data using various Artificial Intelligence (AI) techniques to identify potential threats. Recently, there has been a huge increase in the amount of intelligence-surveillance data literature. However, it so difficult to gain access to relevant data when the data are scattered in different departments and exist in many forms such as phone tap scripts, internet usage logs, emails, seized hard-drive, CCTV video, images, etc. In this paper, a survey is presented on the technical challenges in extracting terrorism data and sets forth several significant approaches to these technical challenges. The performance by each reviewed approaches in counter terrorism and other domains is evaluated. The potential of using Link Grammar (LG) in information processing is also explored.
收起
摘要 :
The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to f...
展开
The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to find better approaches to intelligence data gathering and analysis. Generally, a major activity in counter-terrorism is the ability to process high-volumes of data using various Artificial Intelligence (AI) techniques to identify potential threats. Recently, there has been a huge increase in the amount of intelligence-surveillance data literature. However, it so difficult to gain access to relevant data when the data are scattered in different departments and exist in many forms such as phone tap scripts, internet usage logs, emails, seized hard-drive, CCTV video, images, etc. In this paper, a survey is presented on the technical challenges in extracting terrorism data and sets forth several significant approaches to these technical challenges. The performance by each reviewed approaches in counter terrorism and other domains is evaluated. The potential of using Link Grammar (LG) in information processing is also explored.
收起
摘要 :
Because of the space complexity of the multi-layer underground transportation hub terrorist activities, the space limitation results in the single escape route, difficulty for vertical rescue, long distance and short time to relie...
展开
Because of the space complexity of the multi-layer underground transportation hub terrorist activities, the space limitation results in the single escape route, difficulty for vertical rescue, long distance and short time to relief and other features. For these problems, counter-terrorism emergency response system is build; develop contingency plans are developed; the counter-terrorism mechanisms that are commanded uniformly and linked with each other are established; the counter-terrorism mechanisms which are of rigorous prevention, efficient emergency response and reasonable rehabilitation are established; the design of counter-terrorism response of the hub and tunnel and hub integration of comprehensive monitoring warning system are proposed , anti-riot and rescue as well as emergency evacuation and other technical measures to prevent terrorism are raised.
收起
摘要 :
The results of the study showed that there was a high level of intolerance and potential for radicalism in West Java. The current field studies in six regencies and cities (Sukabumi Regency, Sukabumi City, Cianjur Regency, Kuninga...
展开
The results of the study showed that there was a high level of intolerance and potential for radicalism in West Java. The current field studies in six regencies and cities (Sukabumi Regency, Sukabumi City, Cianjur Regency, Kuningan Regency, Indramayu Regency and Cirebon City) in West Java showed that there was no specific policy focused on the terrorism counter sector. In fact, it is only a form of integration into the program of "Defending the State and Nationality Insights". Similarly, in Tasikmalaya Regency, there was no specific policy focused on preventing and countering terrorists. Therefore, those aforementioned cases were the reasons for the researchers to analyse the implementation of radical terrorist counter policies in Tasikmalaya Regency. In addition, it was also important to study the contents of the radical terrorism counter policies in Tasikmalaya Regency. The purpose of the study is to analyse the implementation of government policies in eradicating radical terrorism in Tasikmalaya Regency. This study employed a qualitative approach with descriptive methods. In this study, the data collection techniques were carried out through document studies, interviews, and questionnaires. The qualitative data analysis was carried out through data orientation, data exploration, and member check. Then, the research subjects were the Regional Government of Tasikmalaya Regency for of counter and control of the radical terrorism movement program, FKUB, Community Leaders, and the community. The results of the study showed that: 1) the development of the notion of radicalism in Tasikmalaya Regency had emerged and spread in several regions. One of the cases was found in Cibatu Village, Karangnunggal District. However, by the time goes by, due to the pressure from the community and all existing components, this seed of radicalism can be taken control; 2) In terms of policies regarding the radical countermeasures of terrorism, in Tasikmalaya Regency, there was no specific policy in relation to the radical movement counter. However, fortunately, the counter and control program for the radical terrorism movement has been executed by the FKUB institution in collaboration with the local government of Tasikmalaya Regency.
收起
摘要 :
Counter-terrorism policies are classified into three kinds based on the terrorism decision whether to commit terrorist acts. The policy effectiveness is probed quantitatively. We find: The early effectiveness of proactive policies...
展开
Counter-terrorism policies are classified into three kinds based on the terrorism decision whether to commit terrorist acts. The policy effectiveness is probed quantitatively. We find: The early effectiveness of proactive policies is positive, while the effectiveness ceaselessly becomes weaker on the whole. Passive policies have long term effectiveness though overall effectiveness is small. The initial effectiveness of policies dealing with root causes is little. However, the significance gradually increases. Among proactive policies, the military attack functions better in the early Stage compared with the politics attack, while its effectiveness becomes weaker in the later stage. Among passive policies, reinforcing the law and system is more significant than improving the embassy guard in both the short and long term.
收起
摘要 :
Simulation can be a powerful tool for the analysis of complex processes and systems, and has been used as a method of research in many fields such as social phenomena, economic processes and human behaviour. However, using simulat...
展开
Simulation can be a powerful tool for the analysis of complex processes and systems, and has been used as a method of research in many fields such as social phenomena, economic processes and human behaviour. However, using simulation presents some difficulties, mainly relating to the ability to validate the output from any model of simulation. The validation of counter-terrorism simulations creates particular problems. It can be difficult to model the likely consequences of a terrorist incident; there are considerable technical challenges in simulating fragmentation and blast from Improvised Explosive Devices or dispersion models for biochemical hazards. It is also extremely difficult to anticipate potential future threats; terrorists and insurgents continually innovate in their modes of attack. In this paper several possible approaches to counter-terrorism simulation validation are discussed. It is argued that unless we can validate the many different models that are being developed by security agencies around the globe, then there is little prospect that these systems will make a significant contribution to public safety.
收起
摘要 :
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within an optimal control model, where the key state is the (relative) number of te...
展开
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within an optimal control model, where the key state is the (relative) number of terrorists and the key controls are two types of counter-terror tactics, one ("water") that does not and one ("fire") that does provoke recruitment of new terrorists. The model is nonlinear and does not admit analytical solutions, but an efficient numerical implementation of Pontryagin's minimum principle allows for solution with base case parameters and considerable sensitivity analysis. Generally, this model yields two different steady states, one where the terror organization is nearly eradicated and one with a high number of terrorists. Whereas water strategies are used at almost any time, it can be optimal not to use fire strategies if the number of terrorists is below a certain threshold.
收起