A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu & Kashmir

A. Mannes*, J. Shakarian, A. Sliva, V. S. Subrahmanian

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

Lashkar-e-Taiba (LeT for short) is one of the deadliest terrorist groups in the world.With over 100 attacks worldwide since 2004, LeT has become a political force within Pakistan, a proxy militia for the Pakistani Army, and a terror group that can carry out complex, coordinated attacks such as the 2008 Mumbai attacks. We have collected 25 years of data about LeT starting in 1985 and ending in 2010. The data is recorded on a monthly basis and includes the values of approximately 770 variables for each month. The variables fall into two categories-action variables describing actions taken by LeT during a given month and environmental variables describing the state of the environment in which LeT was functioning. Based on this data, we have used our Stochastic Opponent Modelling Agent (SOMA) platform to automatically learn models of LeT's behavior. These models describe conditions under which LeT took various actions- more importantly, the conditions act as predictors of when they will take similar actions in the future. In this paper, we focus on attacks by LeT in Jammu& Kashmir1. We describe some conditions under which LeT ramps up offensive activities in Jammu& Kashmir. We conclude with some policy options that may reduce the use of violence by LeT as indicated by the rules presented here.

Original languageEnglish (US)
Title of host publicationProceedings - 2011 European Intelligence and Security Informatics Conference, EISIC 2011
Pages224-229
Number of pages6
DOIs
StatePublished - 2011
Event2011 1st European Intelligence and Security Informatics Conference, EISIC 2011 - Athens, Greece
Duration: Sep 12 2011Sep 14 2011

Publication series

NameProceedings - 2011 European Intelligence and Security Informatics Conference, EISIC 2011

Conference

Conference2011 1st European Intelligence and Security Informatics Conference, EISIC 2011
Country/TerritoryGreece
CityAthens
Period9/12/119/14/11

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu & Kashmir'. Together they form a unique fingerprint.

Cite this