Multi-modal Networks Reveal Patterns of Operational Similarity of
Terrorist Organizations
- URL: http://arxiv.org/abs/2112.07998v1
- Date: Wed, 15 Dec 2021 09:50:11 GMT
- Title: Multi-modal Networks Reveal Patterns of Operational Similarity of
Terrorist Organizations
- Authors: Gian Maria Campedelli, Iain J. Cruickshank, Kathleen M. Carley
- Abstract summary: We propose a novel computational framework for detecting clusters of terrorist groups sharing similar behaviors.
We show that over the years global terrorism has been characterized by increasing operational cohesiveness.
Third, we demonstrate that operational similarity between two organizations is driven by three factors.
- Score: 8.813290741555994
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Capturing dynamics of operational similarity among terrorist groups is
critical to provide actionable insights for counter-terrorism and intelligence
monitoring. Yet, in spite of its theoretical and practical relevance, research
addressing this problem is currently lacking. We tackle this problem proposing
a novel computational framework for detecting clusters of terrorist groups
sharing similar behaviors, focusing on groups' yearly repertoire of deployed
tactics, attacked targets, and utilized weapons. Specifically considering those
organizations that have plotted at least 50 attacks from 1997 to 2018,
accounting for a total of 105 groups responsible for more than 42,000 events
worldwide, we offer three sets of results. First, we show that over the years
global terrorism has been characterized by increasing operational cohesiveness.
Second, we highlight that year-to-year stability in co-clustering among groups
has been particularly high from 2009 to 2018, indicating temporal consistency
of similarity patterns in the last decade. Third, we demonstrate that
operational similarity between two organizations is driven by three factors:
(a) their overall activity; (b) the difference in the diversity of their
operational repertoires; (c) the difference in a combined measure of diversity
and activity. Groups' operational preferences, geographical homophily and
ideological affinity have no consistent role in determining operational
similarity.
Related papers
- Investigating Human-Identifiable Features Hidden in Adversarial
Perturbations [54.39726653562144]
Our study explores up to five attack algorithms across three datasets.
We identify human-identifiable features in adversarial perturbations.
Using pixel-level annotations, we extract such features and demonstrate their ability to compromise target models.
arXiv Detail & Related papers (2023-09-28T22:31:29Z) - Decentralized Adversarial Training over Graphs [55.28669771020857]
The vulnerability of machine learning models to adversarial attacks has been attracting considerable attention in recent years.
This work studies adversarial training over graphs, where individual agents are subjected to varied strength perturbation space.
arXiv Detail & Related papers (2023-03-23T15:05:16Z) - Assaying Out-Of-Distribution Generalization in Transfer Learning [103.57862972967273]
We take a unified view of previous work, highlighting message discrepancies that we address empirically.
We fine-tune over 31k networks, from nine different architectures in the many- and few-shot setting.
arXiv Detail & Related papers (2022-07-19T12:52:33Z) - Predicting Terrorist Attacks in the United States using Localized News
Data [13.164412455321907]
Terrorism is a major problem worldwide, causing thousands of fatalities and billions of dollars in damage every year.
We present a set of machine learning models that learn from localized news data in order to predict whether a terrorist attack will occur on a given calendar date and in a given state.
The best model--a Random Forest that learns from a novel variable-length moving average representation of the feature space--scores $>.667$ on four of the five states that were impacted most by terrorism between 2015 and 2018.
arXiv Detail & Related papers (2022-01-12T03:56:15Z) - Identification of Attack-Specific Signatures in Adversarial Examples [62.17639067715379]
We show that different attack algorithms produce adversarial examples which are distinct not only in their effectiveness but also in how they qualitatively affect their victims.
Our findings suggest that prospective adversarial attacks should be compared not only via their success rates at fooling models but also via deeper downstream effects they have on victims.
arXiv Detail & Related papers (2021-10-13T15:40:48Z) - Learning future terrorist targets through temporal meta-graphs [8.813290741555994]
We propose the use of temporal meta-graphs and deep learning to forecast future terrorist targets.
We derive 2-day-based time series that measure the centrality of each feature within each dimension over time.
Formulating the problem in the context of the strategic behavior of terrorist actors, these multivariate temporal sequences are then utilized to learn what target types are at the highest risk of being chosen.
arXiv Detail & Related papers (2021-04-21T08:09:57Z) - A Bayesian decision support system for counteracting activities of
terrorist groups [0.0]
Terrorist groups present a serious threat to the security and well-being of the general public.
Such observable behaviour and communications data can be utilised by the authorities to estimate the threat posed by a terrorist group.
Here we develop a Bayesian integrating decision support system that can bring together information relating to each of the members of a terrorist group as well as the combined activities of the group.
arXiv Detail & Related papers (2020-07-08T20:23:25Z) - Towards Robust Fine-grained Recognition by Maximal Separation of
Discriminative Features [72.72840552588134]
We identify the proximity of the latent representations of different classes in fine-grained recognition networks as a key factor to the success of adversarial attacks.
We introduce an attention-based regularization mechanism that maximally separates the discriminative latent features of different classes.
arXiv Detail & Related papers (2020-06-10T18:34:45Z) - Randomized Entity-wise Factorization for Multi-Agent Reinforcement
Learning [59.62721526353915]
Multi-agent settings in the real world often involve tasks with varying types and quantities of agents and non-agent entities.
Our method aims to leverage these commonalities by asking the question: What is the expected utility of each agent when only considering a randomly selected sub-group of its observed entities?''
arXiv Detail & Related papers (2020-06-07T18:28:41Z) - A Complex Networks Approach to Find Latent Clusters of Terrorist Groups [5.746505534720595]
We build a multi-partite network that includes terrorist groups and related information on tactics, weapons, targets, active regions.
We show that groups belonging to opposite ideologies can share very common behaviors and that Islamist/jihadist groups hold behavioral characteristics with respect to the others.
arXiv Detail & Related papers (2020-01-10T10:08:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.