久久久无码人妻精品无码_6080YYY午夜理论片中无码_性无码专区_无码人妻品一区二区三区精99

  Home>News Center>World
         
 

Mathematicians offer help in terror fight
(Agencies)
Updated: 2004-10-11 08:08

A small group of thinking men and women convened at Rutgers University last month to consider how order theory — a branch of abstract mathematics that deals with hierarchical relationships — could be applied to the war on terror.


A Filipino soldier practices as U.S. soldiers look on during training for close quarter battle dry fire at Fort Magsaysay army camp, Nueva Ecija province, northern Philippines, in this Feb. 24, 2004 file photo. Despite some successes in hunting down terrorist, high-profile targets remain free by sticking to familiar terrain where they can quickly blend in or slip away with support from sympathizers. [AP]
It almost seems ridiculous for people who inhabit a world of concept lattices and partially ordered sets to think they can affect a war that is being fought on the streets of Baghdad and in the remote mountains of northern Pakistan. But the war on terror is also fought in cyberspace, and in the minds of people from Lahore to Los Angeles. Mathematicians are right at home in such abstract realms.

"It's not just theoretical," said Fred Roberts, director of the Center for Discrete Mathematics and Theoretical Computer Science, the Rutgers research institute where the conference was held.

Terrorism takes brains. You don't need political influence, military might or economic resources to plant bombs or take hostages; but without brains, terrorism is nothing more than random violence.

Consider al-Qaida's attack on New York City and Washington, D.C., three years ago. It required a force of only 20 men armed with box cutters, yet it was so brilliantly conceived, meticulously planned and keenly attuned to global politics that it changed the world.

"Terrorism is a thinking man's game," said terror expert Gordon Woo.

Mathematician Jonathan Farley of the Massachusetts Institute of Technology said he was inspired to organize the meeting by the movie "A Beautiful Mind." The film tells the story of mathematician John Forbes Nash, whose work in game theory found application in Cold War military strategy, international trade and the auctioning of broadcast frequencies by the Federal Communications Commission.

"I'm a pure mathematician, so I'm completely useless for the most part," Farley said. "But it would be nice to take some of what we do and make it useful for some people — maybe even lifesaving."

The new Homeland Security Institute has a mandate from Congress to do just that, said Gary G. Nelson. A senior researcher at the quasi-governmental institute, he attended the conference in hopes of finding research projects for the institute to support.

Some ideas sounded promising, Nelson said. The most intriguing were those that could help intelligence agencies boil down the vast amounts of data they contend with.

Other proposals were "a pretty long logical distance" from the real world. And not everything was easy to understand, he said, even for a systems engineer.

Theoretically, Farley said, abstract math could help intelligence officers figure out the most efficient way to disable a terrorist network.

Say it's cheaper or more practical to go after a terrorist cell's "middle management" rather than its leadership. How many of those lieutenants would you have to remove in order to disrupt communication between the top dogs and the field operatives? Are there one or two key individuals whose capture would completely cut off the chain of command?

Order theory is all about such questions.

"This helps them decide where to spend the money," Farley said.

Of course, many times the organizational structures of terrorist groups are unknown. Mathematical techniques could also be applied to that problem, by using computer programs that comb through giant databases looking for connections between individuals, locations or events. For example, a program might discover that everybody involved in a given attack attended the same London mosque. Or it might find large numbers of e-mail messages between members of one terrorist cell in Germany and another in the United States, suggesting that they may be working together.

Such data mining techniques are nothing new. But the explosion in computing power over the past few years has spurred innovation in the field.

Jafar Adibi, a computer scientist at the University of Southern California, is developing ways to find hidden links between known terrorists and their as-yet-unknown confederates.

"You're trying to detect major groups of these bad guys," Adibi said.

The technique relies on having an initial group of known terrorists. Then it analyzes things those known terrorists have in common with other people in the database, such as phone calls, places of worship, political affiliations or blood relation.

The program concludes that anybody who has enough connections of the right kind with a known terrorist probably is one also.

Adibi has tested his program using a database built from newspaper accounts and other publicly available information. He labels 20 percent of a terrorist group's members as "known" and challenges the program to find the rest. Right now, the system misses 20 percent of the remaining members, and three of the 10 people it does identify as "bad guys" aren't actually terrorists.

Adibi said he hopes to improve those numbers a bit. But even so, programs like his could help focus anti-terror efforts on the most likely suspects. Mass detentions by law enforcement authorities have often snared too many innocent people, Woo said. Britain has arrested more than 600 people on suspicion of terrorism since the Sept. 11 attacks, and convicted only 15 of them. By some counts, the United States has detained more than 5,000 foreign nationals under the provisions of the Patriot Act, alienating them and their families.

"Part of the war on terrorism is winning hearts and minds," said Woo, an analyst in the London office of Risk Management Solutions. The Newark, Calif.-based consulting firm assesses catastrophe risks for the banking and insurance industries.

Minds are the specialty of Vladimir Lefebvre, a cognitive scientist at the University of California in Irvine. The Russian-born researcher has spent his career developing ways of reducing human decision-making to mathematical equations. The work stems from a top-secret Soviet research project that Lefebvre worked on during the 1970s.

"I can compute feelings," he said with a grin.

Lefebvre's ideas are so obvious that you wonder if he might be kidding. Every person, he argues, has a view of the self that he or she uses as a tool for making decisions. That view can be influenced by the outside environment.

So in principle, there ought to be things we can do to make terrorists feel less sure about themselves or less ardent in their beliefs. The right strategy might even make them think of themselves as something other than terrorists.

Lefebvre believes human decision-making is so straightforward that simple equations can describe how an individual's behavior arises from his or her self-image as it is shaped by other people and the environment.

Stefan Schmidt, a New Mexico State University researcher who has worked with Lefebvre, offered a hypothetical example. Suppose, he said, terrorists were considering three points of entry into the United States — one in the Pacific Northwest, one in the Southwest and one in the Northeast. Looking at the level of security on the various borders, and considering other factors such as remoteness, terrorists might decide on the Southwest as the best place to cross.

Assume that border agents, on the other hand, are heavily guarding the Northeast border. They would benefit by making the Southwest seem more heavily patrolled than it really is, and the Northeast appear relatively unprotected. If they did a credible job, the terrorists would incorrectly choose the most secure border as their best bet and run a much higher chance of being caught.

Conceptually, this kind of reasoning is no different from military strategy. If you can plant an inaccurate idea in your opponent's head, you will have an advantage on the battlefield.

But actually doing that — at least for the time being — requires a combination of brilliance, instinct and luck that few people possess. Lefebvre would reduce the process of outwitting your opponent to a computer program.

In some ways, researchers at Carnegie Mellon University have done just that. Computer scientist Kathleen M. Carley heads a lab that tries to simulate all kinds of social groups, including terrorist organizations.

The lab has built simulations of Hamas and al-Qaida by dumping newspaper articles and other publicly available information about the organizations into a computer database. A program then takes that information and looks for patterns and relationships between individuals. It finds weak and strong figures, power brokers, hidden relationships and people with crucial skills.

Then another program can predict what would happen if a specific individual were removed from the organization. After Israel's assassination of Hamas founder Sheikh Ahmed Yassin in March, the program correctly predicted he would be succeeded by hard-liner Abdel Azziz Rantisi.

Three weeks later Israel assassinated Rantisi as well. Carley's lab predicted that Hamas political director Khaled Mashaal would succeed him, and posted its pick on the Internet.

This time, Hamas declined to reveal who had taken power for fear he too would be assassinated. But eventually it became known that Mashaal was indeed the one.

At that point, Carley said, "we were told to quit putting such predictions on the Web" by federal officials.



 
  Today's Top News     Top World News
 

Chirac supports one-China policy, lifting arms embargo

 

   
 

Chen Shui-bian's call for talks discredited

 

   
 

Economy to grow 9.4% this year and 8.9% next

 

   
 

China, Australia to hold joint naval exercises

 

   
 

Airbus to expand procurement from China

 

   
 

Exhibition ushers in Year of France

 

   
  Rumsfeld: US faces test of wills in Iraq
   
  Bomb at Pakistan Shiite mosque kills four
   
  Tape of Bigley decapitation posted on web
   
  Blast kills up to 17 near Baghdad police academy
   
  Rumsfeld arrives at desert marine base in Iraq
   
  Israeli missile kills Palestinian in Gaza Strip
   
 
  Go to Another Section  
 
 
  Story Tools  
   
  News Talk  
  Are the Republicans exploiting the memory of 9/11?  
Advertisement
         
久久久无码人妻精品无码_6080YYY午夜理论片中无码_性无码专区_无码人妻品一区二区三区精99

    www.污网站| 成年女人18级毛片毛片免费| 热久久最新地址| 四虎成人在线播放| 国产成人在线综合| 91aaa精品| 男人的天堂狠狠干| 国产精品秘入口18禁麻豆免会员 | 成年人网站av| 欧美日韩黄色一级片| 欧美日韩第二页| 精品视频无码一区二区三区| 日韩精品视频网址| 可以免费在线看黄的网站| 日本中文字幕二区| 色偷偷中文字幕| 无码少妇一区二区三区芒果| 中文字幕免费高清在线| 免费高清在线观看免费| 91网址在线播放| 精品视频在线观看一区| 丰满女人性猛交| 青青草视频在线视频| 91国视频在线| 日本精品久久久久久久久久| 女性隐私黄www网站视频| 国产91视频一区| 手机成人av在线| 国产精品视频网站在线观看| 中文字幕亚洲影院| 人人干人人干人人| 经典三级在线视频| 一二三级黄色片| 日韩精品视频一二三| 成人一级片网站| 久久久久久免费看| 久无码久无码av无码| wwwjizzjizzcom| 国产精品一二三在线观看| 好吊妞无缓冲视频观看| www.好吊操| 精品人妻大屁股白浆无码| 久久精品在线免费视频| 熟女视频一区二区三区| 免费不卡av网站| 中国一级黄色录像| 中文字幕超清在线免费观看| 午夜在线视频免费观看| 污免费在线观看| 裸体裸乳免费看| 日韩精品福利片午夜免费观看| 桥本有菜av在线| 日本美女爱爱视频| 免费网站永久免费观看| 成人免费毛片在线观看| 日本a在线免费观看| 精品无码一区二区三区爱欲| 成品人视频ww入口| 免费看国产曰批40分钟| 欧美 丝袜 自拍 制服 另类| aa在线观看视频| 亚洲人成无码www久久久| 亚洲精品一二三四五区| 色戒在线免费观看| 欧美成人乱码一二三四区免费| 福利片一区二区三区| 亚洲av毛片在线观看| 欧美日韩一区二区三区电影| 成年在线观看视频| 中文字幕无码精品亚洲资源网久久| 国产午夜大地久久| 毛葺葺老太做受视频| 色婷婷一区二区三区av免费看| 奇米777在线视频| 国产freexxxx性播放麻豆| 播放灌醉水嫩大学生国内精品| 国产视频一区二区视频| 午夜xxxxx| 国产aaa免费视频| 激情网站五月天| 91福利免费观看| 成人一级生活片| 黄色三级视频片| 影音先锋男人的网站| 欧美日韩精品在线一区二区| 爱情岛论坛成人| 男女h黄动漫啪啪无遮挡软件| 日韩欧美不卡在线| 性欧美videossex精品| av免费中文字幕| 992kp免费看片| 福利视频一二区| xxww在线观看| 老子影院午夜伦不卡大全| 日本熟妇人妻中出| 大桥未久一区二区三区| 丝袜老师办公室里做好紧好爽| 99日在线视频| 无码专区aaaaaa免费视频| 在线观看免费的av| av日韩一区二区三区| 在线观看日本一区二区| 日本a在线免费观看| 老司机久久精品| 日本福利视频在线| 欧美又黄又嫩大片a级| 奇米精品一区二区三区| 久久久一二三四| 欧美牲交a欧美牲交aⅴ免费真 | 欧美黄网站在线观看| 国产精品久久久久久9999| 青青艹视频在线| 国产九九九视频| 国产精品无码一本二本三本色| 国产精品免费看久久久无码| caoporn超碰97| 国产在线播放观看| 欧美爱爱视频网站| 啊啊啊国产视频| 国产手机免费视频| 久久久国产精华液999999 | 九一精品久久久| 国产成人黄色片| 免费cad大片在线观看| 亚洲欧美国产中文| 国产xxxxx在线观看| 成人短视频在线观看免费| 乱子伦视频在线看| 国产一线二线三线女| japanese在线视频| 黄色国产小视频| 久久久亚洲精品无码| 超碰人人爱人人| 桥本有菜av在线| 日本高清一区二区视频| 看欧美ab黄色大片视频免费| 女人天堂av手机在线| 亚洲色欲久久久综合网东京热| 国产又爽又黄ai换脸| 波多野结衣国产精品| mm1313亚洲国产精品无码试看| 国产黄页在线观看| 妺妺窝人体色www看人体| 色噜噜狠狠一区二区三区狼国成人| 国产偷人视频免费| jizz大全欧美jizzcom| 99精品视频在线看| av免费看网址| 日韩视频在线视频| 国产精品久久久久久久久电影网| 亚欧美一区二区三区| gai在线观看免费高清| 色综合手机在线| 国产又大又黄又粗的视频| 日韩免费高清在线| 久久九九国产视频| 黑鬼大战白妞高潮喷白浆| 国产免费毛卡片| 欧美精品色婷婷五月综合| 日日碰狠狠添天天爽超碰97| 国产精品久久久久7777| 国产日韩亚洲欧美在线| 毛片av在线播放| 亚洲啊啊啊啊啊| a天堂资源在线观看| 男女日批视频在线观看| 国产美女网站在线观看| 免费拍拍拍网站| 北条麻妃在线视频观看| 免费高清在线观看免费| 黑人粗进入欧美aaaaa| 国产又猛又黄的视频| 成人亚洲视频在线观看| 色综合色综合色综合色综合| 尤物国产在线观看| 天天综合中文字幕| 成年人深夜视频| 男人操女人逼免费视频| 91视频免费版污| 在线免费观看av网| 日本一二三区视频在线| 国产美女主播在线播放| 三级4级全黄60分钟| 亚洲一级片网站| 久久99国产精品一区| 日韩 欧美 视频| 色综合av综合无码综合网站| 青青青在线视频免费观看| 亚洲一区二区图片| 日本熟妇人妻xxxx| 男人日女人bb视频| 欧美成年人视频在线观看| 色婷婷综合在线观看| 国产中文字幕乱人伦在线观看| 男人操女人免费| 日本精品一区在线| 和岳每晚弄的高潮嗷嗷叫视频| 黄色一级一级片| 99热一区二区三区| 国产精品宾馆在线精品酒店|