Muutke küpsiste eelistusi

Indian Mujahideen: Computational Analysis and Public Policy 2013 ed. [Kõva köide]

  • Formaat: Hardback, 173 pages, kõrgus x laius: 235x155 mm, kaal: 4144 g, 22 Illustrations, black and white; XVIII, 173 p. 22 illus., 1 Hardback
  • Sari: Terrorism, Security, and Computation
  • Ilmumisaeg: 21-Nov-2013
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319028170
  • ISBN-13: 9783319028170
  • Kõva köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 173 pages, kõrgus x laius: 235x155 mm, kaal: 4144 g, 22 Illustrations, black and white; XVIII, 173 p. 22 illus., 1 Hardback
  • Sari: Terrorism, Security, and Computation
  • Ilmumisaeg: 21-Nov-2013
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319028170
  • ISBN-13: 9783319028170

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers.” Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) “An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward.” Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). “An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India’s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the “Indian Mujahideen” poses and realistically dwelt on the ways in which these challenges could be faced and overcome.” G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan’s intelligence service.

Foreword by The Hon. Louis J. Freeh.

1 Introduction
1(18)
1.1 Organization of the Book
4(1)
1.2 How to Read this Book
5(1)
1.3 IM's Lethality: A Summary
5(4)
1.4 IM's Principal Areas of Operation
9(1)
1.5 Summary of IM Behavioral Model
10(3)
1.6 Policies Against the Indian Mujahideen
13(3)
1.6.1 Increased Vigilance When India-Pakistan Diplomatic Relations Warm
13(1)
1.6.2 Monitor Conferences Organized by the Indian Mujahideen
14(1)
1.6.3 Monitor IM Rhetoric About Their Terror Campaign and Claims of Responsibility by IM
14(2)
1.6.4 Monitor Internal Conflict Inside India
16(1)
1.6.5 Increased Vigilance After Arrests of IM Personnel
16(1)
1.7 Conclusion
16(3)
References
17(2)
2 Indian Mujahideen
19(30)
2.1 Emergence and History of Indian Mujahideen
20(4)
2.1.1 Jamaat-e-Islami, the Parent Organization
20(2)
2.1.2 JeI After the Partition
22(2)
2.2 The Student Islamic Movememt of India (SIMI)
24(5)
2.2.1 The Establishment and Early Years of SIMI
24(2)
2.2.2 Rise in Communal Tensions
26(2)
2.2.3 SIMI Radicalizes
28(1)
2.2.4 SIMI Banned
29(1)
2.3 Growth of Islamist Militias in India
29(4)
2.3.1 Al-Umma
30(1)
2.3.2 Gujarat Muslim Revenge Force
31(1)
2.3.3 Asif Reza Commando Force
31(1)
2.3.4 The Hyderabad Connection
32(1)
2.4 Indian Mujahideen: A Jihadi Hybrid
33(4)
2.4.1 The Gujarat Riots and Establishment of Indian Mujahideen
33(2)
2.4.2 Public Emergence of Indian Mujahideen
35(1)
2.4.3 Crackdown and Continuing Operations
36(1)
2.5 Organizational Overview
37(3)
2.5.1 Structure and Finance
37(2)
2.5.2 Areas of Operation
39(1)
2.5.3 Membership
39(1)
2.5.4 Tactics and Training
39(1)
2.6 IM's Links to Other Organizations
40(2)
2.6.1 IM and SIMI
40(1)
2.6.2 IM and Pakistan
41(1)
2.7 Conclusion
42(7)
References
43(6)
3 Temporal Probabilistic Behavior Rules
49(12)
3.1 Database Schema
51(1)
3.2 TP-Rule Syntax
52(2)
3.3 SOMA-Rules
54(1)
3.4 Extracting SOMA-Rules Automatically
55(3)
3.5 Automatically Extracting TP-Rules
58(1)
3.6 Conclusion
59(2)
References
59(2)
4 Targeting Public Sites
61(14)
4.1 Attacks Against Public Sites and Arrests of Indian Mujahideen Personnel
65(1)
4.2 Attacks Against Public Sites and Communications About Their Campaign
65(1)
4.3 Attacks Against Public Sites and Claims of Responsibility
66(2)
4.4 Attacks on Public Sites and Conferences Held by Indian Mujahideen
68(1)
4.5 Attacks on Public Sites and Membership in Other Non-State Armed Groups
68(1)
4.6 Attacks on Public Sites and the Entertainment of Diplomatic Relations Between India and Pakistan
69(2)
4.7 Operational Hypothesis
71(1)
4.8 Conclusions and Policy Options
72(3)
References
73(2)
5 Bombings
75(14)
5.1 Bombings and Arrests of Indian Mujahideen Personnel
77(1)
5.2 Bombings and Indian Mujahideen Communications About Their Terror Campaign
78(2)
5.3 Bombings and Conferences Held by Indian Mujahideen
80(1)
5.4 Bombings and Claims of Responsibility for Past Attacks
81(1)
5.5 Bombings and Membership in Other NSAGs
82(1)
5.6 Bombings and Warming of Diplomatic Relations Between India and Pakistan
83(1)
5.7 Bombings and Internal Conflict Within India
84(1)
5.8 Policy Options and Conclusions
85(4)
References
86(3)
6 Simultaneous and Timed Attacks
89(8)
6.1 Simultaneous and Timed Attacks and Conferences
91(2)
6.2 Simultaneous and Timed Attacks by IM and Arrests of IM Personnel
93(1)
6.3 Simultaneous and Timed Attacks and Membership in Other Armed Groups
94(1)
6.4 Conclusions and Policy Options
94(3)
References
96(1)
7 Total Deaths in Indian Mujahideen Attacks
97(10)
7.1 Number Killed and Conferences
99(1)
7.2 Numbers Killed and Communications About its Terror Campaign
99(1)
7.3 Number Killed and Arrests of Indian Mujahideen Personnel
100(1)
7.4 Numbers Killed and Improving Diplomatic Relations
101(1)
7.5 Numbers Killed and Relationship with Other NSAGs
101(1)
7.6 Numbers Killed and Claims of Responsibility
102(1)
7.7 Numbers Killed and Internal Conflict Within India
103(4)
References
105(2)
8 Computing Policy Options
107(8)
8.1 Policy Analysis Methodology
108(1)
8.2 Computing Policies
108(1)
8.3 Computing Policies to Potentially Eliminate (Most) Violent Acts by IM
109(2)
8.4 Note on Alternate Policy Computation Methodologies
111(1)
8.5 Conclusion
112(3)
References
113(2)
9 Suggested Counter-Terrorism Policies
115(18)
9.1 Arrests of IM Personnel
119(2)
9.2 IM Communication About Terror Campaign
121(1)
9.3 IM Conferences
122(1)
9.4 IM Claims of Responsibility
123(1)
9.5 Warming of India--Pakistan Diplomatic Relations
124(1)
9.6 Monitoring Internal Religious Conflict Within India
125(2)
9.7 Disrupting IM's Relationship with Other NSAGs
127(1)
9.8 Conclusions
128(5)
References
130(3)
10 Building a National Counter-Terrorism Center
133(8)
10.1 The U.S. Experience
134(1)
10.2 The Indian Experience
135
10.3 NCTC-India Since
137(1)
10.4 The Future of NCTC-India
138(3)
References
139(2)
Appendix A Data Methodology 141(10)
Appendix B List of All Terrorist Attacks Carried Out by IM 151(6)
Appendix C List of All Temporal Probabilistic Rules Presented in this Book 157(4)
Appendix D Instances of Improved Diplomatic Relations Between India and Pakistan 161(2)
Appendix E Instances of Indian Mujahideens Conferences 163(2)
Appendix F Indian Mujahideen Claims of Responsibility for Attacks 165(2)
Appendix G Instances of Indian Mujahideen Communications About Its Terror Campaign 167(2)
Index 169