John Bohannon Presenter: Mustafa Kilavuz.  Shyam Sankar proposes looking at the geospatial distribution of significant acts on the map of Baghdad. 

Slides:



Advertisements
Similar presentations
Iraq Conflict Iraq Conflict )($)( Delverrick Dickey )($)( )($)( Wade Wilson )($)(
Advertisements

How to Win the War in Al Anbar by CPT Trav This is an American Soldier. We'll call him Joe. Joe wants to win in Al Anbar But sometimes it seems like other.
The War in Afghanistan. By the mid 1990’s the extremist Taliban controlled most of Afghanistan, they allowed al Qaeda to live there.
Chapter 7 Hebrews and Judaism. Early Hebrews  Between 2000 and 1)1500BC  They appeared in 2)Southwest Asia  Known as 3)Hebrews  They were 4)sheep.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
By: Brandon Hill Mrs. Pugh’s English 12. Causalities  There have been many, many deaths in the Iraq war that could have been avoided.
Modern Conflict in the Mid East and North Africa Iraq War, Afghan War.
Detecting Changes in Social Networks Using Statistical Process Control Cadet Matthew R. Webb Advisor: Major Ian McCulloh, D/Math USMA 20 May 2007 NetSci.
U.S. Involvement in Afghanistan and Iraq today A Brief History.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
U.S. Army Corrosion Prevention and Control Program
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School - Wu Laboratory
How September 11, 2001, Changed America Lesson 33-3 The Main Idea A horrific attack on September 11, 2001, awakened the nation to the threat of terrorism.
9/1 1. WHO IS OSAMA BIN LADEN AND WHAT GROUP IS HE FROM? Osama Bin Laden is the leader of the terrorist group, al-Qaeda. He was born March His.
The Fight Against Terrorism
By: Salimah McCullough.  The event that took place during this time was when the world trade center and pentagon got attacked, also know as 9/11  The.
FORT DRUM NEW YORK 26 July 2010 Fort Drum – The Army’s Best Kept Secret Joseph F. iWATCH Program 
Security By: Brad Martin and Nick Mcdowell. History After September 11 th the united states took extreme measures to make sure an event like that would.
Text Analysis Using Automated Language Translators CDT John Stanford MAJ Ian McCulloh.
Block 3 History of the World Since We Were Born. List of Events Profiled The 9/11 terror attacks of 2001 President George W. Bush, his responsibility.
Middle East Wars SS7H2 The student will analyze continuity and change in Southwest Asia (Middle East) leading to the 21st century.. c. Describe how land.
US CONFLICTS IN THE MIDDLE EAST (1991- Present)
POLITICAL CHANGES  In 2000, Federal law introduced banning smoking on all flights by US airlines.  On March 12, 2002, the Homeland Security.
What I KNOW : What I WANT to know: What I LEARNED : The Events of September 11, 2001.
Presented By:. War in Afghanistan The war against Afghanistan was launched after Al Qaeda launched an attack on United States The United States attacked.
10 th American History Unit III- U.S. Foreign Policy World War II - Today Nixon-Bush #9 George Bush’s Foreign Policy.
OSAMA BIN LADEN ANDREW EDEN-4 TH 4/19/12. OSAMA BIN LADEN'S BACKGROUND Born 1957 for Syrian mother, Osama bin Laden was the seventh son among fifty brothers.
Development of Counter Improvised Explosive Device (C-IED) Metrics Simon Crabtree Counter-IED Effects Team ISMOR 2011.
By Karra Gardin. The true affect of the terrorist attacks on September 11 was not the physical impact it had on the country, rather the psychological.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Recent FBI Statistics on Terrorism The History of Terrorism as a Strategy of Political Insurgency March 2011.
By: Lorena Estrada, Sonovia Clark, Rocio Zavala In war, there are no unwounded soldiers…
George W. Bush Foreign Policy War on Terror. 9/11 September 11, al-Qaeda terrorists. Four passenger airliners. Two succesful suicide attacks.
The U.S. Invasion By: Hayden McDonnell. Why are our U.S. soldiers in Afghanistan The main reason our soldiers of the United States are in Afghanistan.
Terrorists strike America EQ: What events have occurred as a result of 9/11 (War on Terrorism)?
DNA, crime and law enforcement Personal Genetics Education Project (pgEd) Harvard Medical School
In Persian Gulf, Afghanistan, & Iraq. Standards SS7H2 The student will analyze continuity and change in Southwest Asia (Middle East) leading to the 21st.
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
TERR0RiSM [ TERR0RiSM ] Kevin Putnam Period 3. Terrorism Terrorism -- the unlawful use or threatened use of force or violence by a person or an organized.
Soviets take the lead  Oct The Soviets are the first to put a satellite into outer space  Called Sputnik  Sputnik was no larger than a beach.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by M. Brooke Rogers, Julia M. Pearce Chapter 6 - Risk Communication, Risk Perception and Behaviour as Foundations.
Terror Attacks © 2015 albert-learning.com Terror Attacks.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
By Karra Gardin. The true affect of the terrorist attacks on September 11 was not the physical impact it had on the country, rather the psychological.
September 11, 2001 By Wadnel Joly. 9/11 On September 11, planes were hijacked by terrorist and used as weapons against American people On September.
How Did ISIS Start? ISIS as a terrorist group started long before any of the talk of liberating the Islamic people and the events today transpired. They.
Chapter 17: Foreign Policy and National Defense Section 2.
Essential Questions 1) What were political issues addressed under George W. Bush? 2) Why are the Afghanistan and Iraq Wars such a hot topic issue? Explain.
MARCH 19, 2003: Bush launches invasion of Iraq. The Fighting Began with an Aerial Bombardment.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
September 11, Events leading up to 9/11- 1 st WTC bombing in ‘93.
Isabel Gutierrez Period Intro Paragraph I choose Terrorism to show how the world reenacts with other people. The part of terrorism I choose.
Today we will identify and describe the events of September 11 th, By discussing what happened that day and how it impacted our nation. To understand.
An Assassination Attempt on a U.S. President. Dev- Sol (Revolutionary Left)  Established by Dursun Karatas in 1978  Between They killed 35.
9/11 Terrorist Attacks and US Response. 9/11 Terrorist Attacks As you watch the video, you will need to create.
Global Acts of Terror. Terrorism Defined Terrorism is the use of violence and threats to intimidate and coerce (force action) for political reasons. Terrorism.
Writing Historical Fiction from an Interview
Bellwork Think about this…. Historical Event
of the War in Afghanistan
Can’t Touch This Brittaney Fabiano.
Why are we so involved in the Middle East?
REVIEW: (You don’t have to write this)
Through University Faculty
Warm-Up: Spiral Review-
Networks Are Everywhere
Southwest Asia Wars 1st Period.
9/11.
Warm-Up: Spiral Review-
Presentation transcript:

John Bohannon Presenter: Mustafa Kilavuz

 Shyam Sankar proposes looking at the geospatial distribution of significant acts on the map of Baghdad.  They investigate the bars on the map indicating the daily acts in April and May 2008 such as:  Suicide bombings  Mortar attacks  Improvised explosive device (IED) detonations

 As they go through the timeline they find dense events in Sadr City District.  The attacks seem to be correlated over time and space with the construction of this security wall, forming a line.  This information is important to predict the insurgents’ next moves.

 Sinensky works on a social network with the Naval Postgraduate School that shows the people connected to Noordin Mohammed Top who is Southeast Asia’s most wanted terrorist.  The graph represents the suspects’ known communications and relationships, as well as their known involvement with terrorist plots.

 Sinensky applies betweenness, centrality, and eigenvector centrality and they see Noordin is the first in the list.  How about the second and the third names?  After September 11 attacks social networks were used more in the warfare analysis.  Some in the U.S. military worries about they put too much faith in it.  One former U.S. official claims that they led to unethical practices.

 It emerged that the 9/11 attacks were not work of a government but a team of international terrorists: 19 hijackers and dozens of supporters (funding, logistic).  The intelligence community was desperate for any help they could get to prevent another attack.  Valdis Krebs made a social network from the information on the news: meetings, residences, and financial transections.

 Mohammed Atta scored highest on  Degrees: Intensity of his activity  Closeness: Ability to access others  Betweenness: Control over the flow in the network  He was the ringleader and a member of Al- Qaeda

 By 2003, U.S. defense officials expanded the network by including insurgents in Afghanistan and Iraq.  The results disappointed Krebs. It didn’t really work to catch the bad guys.

 They were good at modeling a static network but this network was highly dynamic. When someone dies or caught, someone else replaced him with own relations.  Noise increased as the graph grew.  Mathematical analysis was not enough by itself. Social analysis were needed.  Pizza delivery guy problem

 After bombing in London on July 7, 2005, a report is issued called “Could 7/7 Have Been Prevented?”  Using network analysis, the researchers traced the relations between plotters.  The result: “A hairball”

 Ian McCulloh, a U.S. Army major, proposed a technique called “dynamic metanetwork analysis” which can adapt the change over time.  Instead of having a “who” network, different layers storing information about when, what, where and why are needed.  Carley, McCulloh’s advisor from the university, developed a computer program (ORA) that finds people who are a threat by using both mathematical and social metrics.

 McCulloh and Carley investigated 1500 videos made by insurgents in Iraq.  As of March 2006, 3 of 4 U.S. soldier deaths were on tapes.  They extracted a big network out of these tapes which is kept as secret.  The actions taken according to this network reduced the sniper activities 70% and also reduced the IED deaths.

 Marc Sageman, a forensic psychiatrist, doesn’t believe that the network works. According to him, there could be many reasons that the numbers drop.  Carley just counters that Sageman doesn’t get the methods.  The army established a network science center in Aberdeen, Maryland 2 years ago.  This year U.S. Army Research Lab is committing $162 million to research on “network-centric warfare”.  Carley is one of the academics applying for funding.