{"id":5634,"date":"2014-10-26T19:09:14","date_gmt":"2014-10-26T13:39:14","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=5634"},"modified":"2025-04-01T16:03:24","modified_gmt":"2025-04-01T10:33:24","slug":"how-analytics-can-help-fight-terrorism","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/","title":{"rendered":"How analytics can help fight terrorism"},"content":{"rendered":"<p><strong>The fight against terrorism &#8211; an application area with plenty of scope for\u00a0development<\/strong><\/p>\n<p>Terrorist activities are trending strongly across news channels and investigative operations. In this scenario, surely analytics can help fight terrorism by predicting terror attacks and identifying terrorist financing? Oddly enough, it was a lawyer who first advocated wielding the power of data mining and analytics for fighting terrorism &#8211; and not a technocrat or member of the IT or data mining intelligence community! According to Philip Bobbitt, one way to combat terrorism is to strengthen the \u201cvaluable tool\u201d of data mining and analytics by extracting information from disparate sources, such as \u201cterrorist watch lists, airline reservations, immigration records\u201d and more.\u00a0Stacking up analytics on this data makes it further possible to identify patterns to support the government intelligence framework. Patterns can point out possible terrorists or even predict terrorist activities, facilitating global efforts at keeping citizens and property safe.<\/p>\n<p>Albeit, it is six years since Philip Bobbitt first mooted the idea in his book <a href=\"http:\/\/www.nytimes.com\/2008\/04\/13\/books\/review\/Ferguson-t.html?pagewanted=all\"><em>Terror and Consent<\/em><\/a>, yet the adoption has sadly been lacking in India. This post from IVY is aimed to bring to the forefront yet another avant-garde application of analytics, in the hope we can see students and professionals of analytics venture into this largely unexplored domain.<\/p>\n<p><strong>Leveraging Analytics to identify terrorist financing, patterns and potential hotspots<\/strong><\/p>\n<p>The realm of fraud analytics is a well explored area, with the ability to detect various types of fraudulent transactions, unnatural financial activities, systemic suspicious transactions and money laundering. When extended to analyzing trade-based money laundering across geographies, anomalies and patterns can be detected in global underground financial systems that are the conduits of terrorist financing. Data mining, analysis and visualization tools have the ability to gather, connect, track, analyse and distribute intelligence information and leads about terrorist activities. Moving beyond the prediction capabilities, integrated seamless systems can additionally provide notifications and alerts for preventive action.<\/p>\n<p><strong>Areas of countering terrorism, using analytics<\/strong><\/p>\n<ul>\n<li>Identifying money laundering activities used for terrorist financing<\/li>\n<li>Following the money trail of terrorist organizations \/ suspicious individuals<\/li>\n<li>Identifying hotspots of terrorist activities for effective countermeasures<\/li>\n<li>Correlating terrorist attacks with trends in geo-politics and money trails<\/li>\n<li>Identifying potential uprising and terrorist sponsored activities<\/li>\n<li>Predicting potential terrorist activities based on any \/all of the above<\/li>\n<\/ul>\n<p><strong>Analytical Techniques in play<\/strong><\/p>\n<p><strong>Data mining<\/strong>, <strong>sentiment analysis<\/strong>, <strong>text mining<\/strong>, <strong>machine learning<\/strong> techniques and <strong>predictive analytics<\/strong> are some of the methodologies being leveraged to identify and combat terrorism. The <a href=\"http:\/\/www.darpa.mil\/NewsEvents\/Releases\/2014\/02\/09.aspx\">Memex<\/a> program also produces instant search results for specific domains and tasks, like patterns in state-wide crime or linkages with a car used for terrorist activity, for mission-critical action.<\/p>\n<p><strong>Data utilised<\/strong><\/p>\n<p>Different Government, intelligence, and criminal databases; financial systems, social media and internet, are some of the key data that is mined and analysed. Using advanced data analytics patterns can be identified for policy making and measures, predicting organized terrorist activities and cutting off channels of terrorist financing, or even deflecting proxy terrorism or uprising using social media analytics.<\/p>\n<p><strong>User cases<\/strong><\/p>\n<p># \u00a0A project titled <a href=\"http:\/\/www.umiacs.umd.edu\/research\/LCCD\/let\/index.html\">Computational Analysis of Terrorist Groups<\/a> makes an excellent case of how analytical techniques can be leveraged for combating anti-terrorism.\u00a0 Developed by <a href=\"http:\/\/www.fastcoexist.com\/1680540\/a-computer-program-that-predicts-terrorist-attacks\">researchers at the University of Maryland<\/a>, the model, known as Temporal-Probabilistic Rule System, helps predict terrorist attacks of a particular terror organisation. It used algorithms to parse mined data on 770 variables from 20 years of a terrorist organisation\u2019s activities, updated monthly for computational analysis<strong>. <\/strong>\u00a0This helped establish an understanding of the factors that determined frequency of attacks, types of terror strikes used in different geopolitical situations, trends in proxy terrorist activities and other criteria. Algorithms were also used to determine conditions that could lead to attacks.<\/p>\n<p># \u00a0The Los Angeles Police Department and the London&#8217;s Metropolitan Police Service\u00a0<a href=\"http:\/\/www.computerworld.com\/article\/2561228\/business-intelligence\/lapd-turns-to-data-analysis-to-fight-terrorism.html\">use sophisticated data-analysis systems<\/a>, \u201cdesigned to identify and connect related pieces of intelligence to help officers deter and respond to terrorist attacks\u201d.<\/p>\n<p>Using a hybrid relational and open text-search database paired with an intelligence engine that compresses data, simultaneously search of multiple databases are possible.<\/p>\n<p>Although the above are mere\u00a0examples of how programs can be developed to effectively counter terrorism, there are unlimited ways in which private analytic firms and individuals working within the Government system, can use mining and analytic techniques to support the global fight against terrorism. The market as well as scope for such programs, is unlimited.<\/p>\n<p><strong>Bottomline<\/strong> \u2013The ROI of using analytics for countering terrorism cannot be quantified. Terrorism is today an albatross around the neck of every Government, not to forget the trauma associated with terrorist attacks and deaths. Although GIS systems are being used for countering terrorism, there is plenty of opportunity to leverage the power of analytics for <a href=\"http:\/\/www.memex.com\/\">tactical strategic solutions<\/a>\u00a0to counter terrorism and provide public safety.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The applications of predictive analytics are tremendous. We feature yet another area where data mining and analytics can be leveraged to help fight terrorism, making use of available techniques and various algorithms in real-time to predict and alleviate terrorist activities.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[22,503,294,501,504,140,265,259,502],"class_list":["post-5634","post","type-post","status-publish","format-standard","hentry","category-data-analytics","tag-analytics","tag-anlytical-techniques","tag-data-mining","tag-fight-terrrism","tag-machine-learning","tag-predictive-analytics","tag-sentiment-analysis","tag-text-mining","tag-user-cases"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Using Analytics to Combat Terrorism: Predictive Tools and Techniques.<\/title>\n<meta name=\"description\" content=\"Explore how analytics can be leveraged to fight terrorism, from identifying terrorist financing to predicting attacks using data mining, sentiment analysis, and predictive techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Analytics to Combat Terrorism: Predictive Tools and Techniques.\" \/>\n<meta property=\"og:description\" content=\"Explore how analytics can be leveraged to fight terrorism, from identifying terrorist financing to predicting attacks using data mining, sentiment analysis, and predictive techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/ivyproschool\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-26T13:39:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T10:33:24+00:00\" \/>\n<meta name=\"author\" content=\"Ivy Professional School\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ivyproschool\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ivy Professional School\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/\"},\"author\":{\"name\":\"Ivy Professional School\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/31fdab8559dd3db99173764bfb60215d\"},\"headline\":\"How analytics can help fight terrorism\",\"datePublished\":\"2014-10-26T13:39:14+00:00\",\"dateModified\":\"2025-04-01T10:33:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/\"},\"wordCount\":793,\"commentCount\":0,\"keywords\":[\"Analytics\",\"anlytical techniques\",\"data mining\",\"fight terrrism\",\"machine learning\",\"predictive analytics\",\"sentiment analysis\",\"text mining\",\"user cases\"],\"articleSection\":[\"Data Analytics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/\",\"name\":\"Using Analytics to Combat Terrorism: Predictive Tools and Techniques.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2014-10-26T13:39:14+00:00\",\"dateModified\":\"2025-04-01T10:33:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/31fdab8559dd3db99173764bfb60215d\"},\"description\":\"Explore how analytics can be leveraged to fight terrorism, from identifying terrorist financing to predicting attacks using data mining, sentiment analysis, and predictive techniques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-analytics-can-help-fight-terrorism\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How analytics can help fight terrorism\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/31fdab8559dd3db99173764bfb60215d\",\"name\":\"Ivy Professional School\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/866b09293f13d461b399bb9a40607e85623ede13d844f763bf665689cb0d1452?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/866b09293f13d461b399bb9a40607e85623ede13d844f763bf665689cb0d1452?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/866b09293f13d461b399bb9a40607e85623ede13d844f763bf665689cb0d1452?s=96&d=mm&r=g\",\"caption\":\"Ivy Professional School\"},\"sameAs\":[\"http:\\\/\\\/www.ivyproschool.com\",\"https:\\\/\\\/facebook.com\\\/ivyproschool\",\"https:\\\/\\\/instagram.com\\\/ivyproschool\",\"https:\\\/\\\/x.com\\\/ivyproschool\",\"https:\\\/\\\/youtube.com\\\/ivyproschool\"],\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/prateek\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using Analytics to Combat Terrorism: Predictive Tools and Techniques.","description":"Explore how analytics can be leveraged to fight terrorism, from identifying terrorist financing to predicting attacks using data mining, sentiment analysis, and predictive techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/","og_locale":"en_US","og_type":"article","og_title":"Using Analytics to Combat Terrorism: Predictive Tools and Techniques.","og_description":"Explore how analytics can be leveraged to fight terrorism, from identifying terrorist financing to predicting attacks using data mining, sentiment analysis, and predictive techniques.","og_url":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_author":"https:\/\/facebook.com\/ivyproschool","article_published_time":"2014-10-26T13:39:14+00:00","article_modified_time":"2025-04-01T10:33:24+00:00","author":"Ivy Professional School","twitter_card":"summary_large_image","twitter_creator":"@ivyproschool","twitter_misc":{"Written by":"Ivy Professional School","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/"},"author":{"name":"Ivy Professional School","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/31fdab8559dd3db99173764bfb60215d"},"headline":"How analytics can help fight terrorism","datePublished":"2014-10-26T13:39:14+00:00","dateModified":"2025-04-01T10:33:24+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/"},"wordCount":793,"commentCount":0,"keywords":["Analytics","anlytical techniques","data mining","fight terrrism","machine learning","predictive analytics","sentiment analysis","text mining","user cases"],"articleSection":["Data Analytics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/","url":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/","name":"Using Analytics to Combat Terrorism: Predictive Tools and Techniques.","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2014-10-26T13:39:14+00:00","dateModified":"2025-04-01T10:33:24+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/31fdab8559dd3db99173764bfb60215d"},"description":"Explore how analytics can be leveraged to fight terrorism, from identifying terrorist financing to predicting attacks using data mining, sentiment analysis, and predictive techniques.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/how-analytics-can-help-fight-terrorism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How analytics can help fight terrorism"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/31fdab8559dd3db99173764bfb60215d","name":"Ivy Professional School","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/866b09293f13d461b399bb9a40607e85623ede13d844f763bf665689cb0d1452?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/866b09293f13d461b399bb9a40607e85623ede13d844f763bf665689cb0d1452?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/866b09293f13d461b399bb9a40607e85623ede13d844f763bf665689cb0d1452?s=96&d=mm&r=g","caption":"Ivy Professional School"},"sameAs":["http:\/\/www.ivyproschool.com","https:\/\/facebook.com\/ivyproschool","https:\/\/instagram.com\/ivyproschool","https:\/\/x.com\/ivyproschool","https:\/\/youtube.com\/ivyproschool"],"url":"https:\/\/ivyproschool.com\/blog\/author\/prateek\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/5634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=5634"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/5634\/revisions"}],"predecessor-version":[{"id":12795,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/5634\/revisions\/12795"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=5634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=5634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=5634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}