久久久无码人妻精品无码_6080YYY午夜理论片中无码_性无码专区_无码人妻品一区二区三区精99

  Home>News Center>World
         
 

Mathematicians offer help in terror fight
(Agencies)
Updated: 2004-10-11 08:08

A small group of thinking men and women convened at Rutgers University last month to consider how order theory — a branch of abstract mathematics that deals with hierarchical relationships — could be applied to the war on terror.


A Filipino soldier practices as U.S. soldiers look on during training for close quarter battle dry fire at Fort Magsaysay army camp, Nueva Ecija province, northern Philippines, in this Feb. 24, 2004 file photo. Despite some successes in hunting down terrorist, high-profile targets remain free by sticking to familiar terrain where they can quickly blend in or slip away with support from sympathizers. [AP]
It almost seems ridiculous for people who inhabit a world of concept lattices and partially ordered sets to think they can affect a war that is being fought on the streets of Baghdad and in the remote mountains of northern Pakistan. But the war on terror is also fought in cyberspace, and in the minds of people from Lahore to Los Angeles. Mathematicians are right at home in such abstract realms.

"It's not just theoretical," said Fred Roberts, director of the Center for Discrete Mathematics and Theoretical Computer Science, the Rutgers research institute where the conference was held.

Terrorism takes brains. You don't need political influence, military might or economic resources to plant bombs or take hostages; but without brains, terrorism is nothing more than random violence.

Consider al-Qaida's attack on New York City and Washington, D.C., three years ago. It required a force of only 20 men armed with box cutters, yet it was so brilliantly conceived, meticulously planned and keenly attuned to global politics that it changed the world.

"Terrorism is a thinking man's game," said terror expert Gordon Woo.

Mathematician Jonathan Farley of the Massachusetts Institute of Technology said he was inspired to organize the meeting by the movie "A Beautiful Mind." The film tells the story of mathematician John Forbes Nash, whose work in game theory found application in Cold War military strategy, international trade and the auctioning of broadcast frequencies by the Federal Communications Commission.

"I'm a pure mathematician, so I'm completely useless for the most part," Farley said. "But it would be nice to take some of what we do and make it useful for some people — maybe even lifesaving."

The new Homeland Security Institute has a mandate from Congress to do just that, said Gary G. Nelson. A senior researcher at the quasi-governmental institute, he attended the conference in hopes of finding research projects for the institute to support.

Some ideas sounded promising, Nelson said. The most intriguing were those that could help intelligence agencies boil down the vast amounts of data they contend with.

Other proposals were "a pretty long logical distance" from the real world. And not everything was easy to understand, he said, even for a systems engineer.

Theoretically, Farley said, abstract math could help intelligence officers figure out the most efficient way to disable a terrorist network.

Say it's cheaper or more practical to go after a terrorist cell's "middle management" rather than its leadership. How many of those lieutenants would you have to remove in order to disrupt communication between the top dogs and the field operatives? Are there one or two key individuals whose capture would completely cut off the chain of command?

Order theory is all about such questions.

"This helps them decide where to spend the money," Farley said.

Of course, many times the organizational structures of terrorist groups are unknown. Mathematical techniques could also be applied to that problem, by using computer programs that comb through giant databases looking for connections between individuals, locations or events. For example, a program might discover that everybody involved in a given attack attended the same London mosque. Or it might find large numbers of e-mail messages between members of one terrorist cell in Germany and another in the United States, suggesting that they may be working together.

Such data mining techniques are nothing new. But the explosion in computing power over the past few years has spurred innovation in the field.

Jafar Adibi, a computer scientist at the University of Southern California, is developing ways to find hidden links between known terrorists and their as-yet-unknown confederates.

"You're trying to detect major groups of these bad guys," Adibi said.

The technique relies on having an initial group of known terrorists. Then it analyzes things those known terrorists have in common with other people in the database, such as phone calls, places of worship, political affiliations or blood relation.

The program concludes that anybody who has enough connections of the right kind with a known terrorist probably is one also.

Adibi has tested his program using a database built from newspaper accounts and other publicly available information. He labels 20 percent of a terrorist group's members as "known" and challenges the program to find the rest. Right now, the system misses 20 percent of the remaining members, and three of the 10 people it does identify as "bad guys" aren't actually terrorists.

Adibi said he hopes to improve those numbers a bit. But even so, programs like his could help focus anti-terror efforts on the most likely suspects. Mass detentions by law enforcement authorities have often snared too many innocent people, Woo said. Britain has arrested more than 600 people on suspicion of terrorism since the Sept. 11 attacks, and convicted only 15 of them. By some counts, the United States has detained more than 5,000 foreign nationals under the provisions of the Patriot Act, alienating them and their families.

"Part of the war on terrorism is winning hearts and minds," said Woo, an analyst in the London office of Risk Management Solutions. The Newark, Calif.-based consulting firm assesses catastrophe risks for the banking and insurance industries.

Minds are the specialty of Vladimir Lefebvre, a cognitive scientist at the University of California in Irvine. The Russian-born researcher has spent his career developing ways of reducing human decision-making to mathematical equations. The work stems from a top-secret Soviet research project that Lefebvre worked on during the 1970s.

"I can compute feelings," he said with a grin.

Lefebvre's ideas are so obvious that you wonder if he might be kidding. Every person, he argues, has a view of the self that he or she uses as a tool for making decisions. That view can be influenced by the outside environment.

So in principle, there ought to be things we can do to make terrorists feel less sure about themselves or less ardent in their beliefs. The right strategy might even make them think of themselves as something other than terrorists.

Lefebvre believes human decision-making is so straightforward that simple equations can describe how an individual's behavior arises from his or her self-image as it is shaped by other people and the environment.

Stefan Schmidt, a New Mexico State University researcher who has worked with Lefebvre, offered a hypothetical example. Suppose, he said, terrorists were considering three points of entry into the United States — one in the Pacific Northwest, one in the Southwest and one in the Northeast. Looking at the level of security on the various borders, and considering other factors such as remoteness, terrorists might decide on the Southwest as the best place to cross.

Assume that border agents, on the other hand, are heavily guarding the Northeast border. They would benefit by making the Southwest seem more heavily patrolled than it really is, and the Northeast appear relatively unprotected. If they did a credible job, the terrorists would incorrectly choose the most secure border as their best bet and run a much higher chance of being caught.

Conceptually, this kind of reasoning is no different from military strategy. If you can plant an inaccurate idea in your opponent's head, you will have an advantage on the battlefield.

But actually doing that — at least for the time being — requires a combination of brilliance, instinct and luck that few people possess. Lefebvre would reduce the process of outwitting your opponent to a computer program.

In some ways, researchers at Carnegie Mellon University have done just that. Computer scientist Kathleen M. Carley heads a lab that tries to simulate all kinds of social groups, including terrorist organizations.

The lab has built simulations of Hamas and al-Qaida by dumping newspaper articles and other publicly available information about the organizations into a computer database. A program then takes that information and looks for patterns and relationships between individuals. It finds weak and strong figures, power brokers, hidden relationships and people with crucial skills.

Then another program can predict what would happen if a specific individual were removed from the organization. After Israel's assassination of Hamas founder Sheikh Ahmed Yassin in March, the program correctly predicted he would be succeeded by hard-liner Abdel Azziz Rantisi.

Three weeks later Israel assassinated Rantisi as well. Carley's lab predicted that Hamas political director Khaled Mashaal would succeed him, and posted its pick on the Internet.

This time, Hamas declined to reveal who had taken power for fear he too would be assassinated. But eventually it became known that Mashaal was indeed the one.

At that point, Carley said, "we were told to quit putting such predictions on the Web" by federal officials.



 
  Today's Top News     Top World News
 

Chirac supports one-China policy, lifting arms embargo

 

   
 

Chen Shui-bian's call for talks discredited

 

   
 

Economy to grow 9.4% this year and 8.9% next

 

   
 

China, Australia to hold joint naval exercises

 

   
 

Airbus to expand procurement from China

 

   
 

Exhibition ushers in Year of France

 

   
  Rumsfeld: US faces test of wills in Iraq
   
  Bomb at Pakistan Shiite mosque kills four
   
  Tape of Bigley decapitation posted on web
   
  Blast kills up to 17 near Baghdad police academy
   
  Rumsfeld arrives at desert marine base in Iraq
   
  Israeli missile kills Palestinian in Gaza Strip
   
 
  Go to Another Section  
 
 
  Story Tools  
   
  News Talk  
  Are the Republicans exploiting the memory of 9/11?  
Advertisement
         
久久久无码人妻精品无码_6080YYY午夜理论片中无码_性无码专区_无码人妻品一区二区三区精99

    国产精品久久中文字幕| av动漫免费看| 国产精品沙发午睡系列| 天堂中文av在线| 鲁一鲁一鲁一鲁一色| www.99r| 国产成人在线小视频| 午夜剧场在线免费观看| 久久综合九色综合88i| 手机av在线网站| 亚洲人成色77777| 福利视频免费在线观看| 极品粉嫩美女露脸啪啪| 久久久久久久激情| 青青青在线观看视频| 亚洲高清免费在线观看| 国产91在线免费| 黄色录像特级片| 亚洲网中文字幕| 蜜臀久久99精品久久久酒店新书| 精品91一区二区三区| 天天爽夜夜爽一区二区三区| 成年人看的毛片| 伊人网在线免费| 中文字幕22页| 日本成人中文字幕在线| 精品少妇一区二区三区在线| 99久久99久久精品| 中文字幕在线视频一区二区| 丝袜制服一区二区三区| 亚洲色成人一区二区三区小说| 91国在线高清视频| 五月天六月丁香| 天天操狠狠操夜夜操| 国产精品无码专区av在线播放 | 热这里只有精品| 日本中文字幕影院| 一道本视频在线观看| 国产一区亚洲二区三区| 国产最新免费视频| 欧美日韩在线一| 波多野结衣综合网| 久久国产精品网| 欧美日韩中文字幕在线播放| 亚洲国产精品影视| 手机在线视频一区| 在线观看中文av| 国产传媒免费观看| 亚洲视频一二三四| 国产又黄又猛的视频| 亚洲一区二区在线视频观看| 国产无遮挡猛进猛出免费软件| 在线视频日韩一区| 99热这里只有精品在线播放| 精品久久久久久中文字幕2017| 日本老熟妇毛茸茸| 精品999在线| 999这里有精品| 一级黄色高清视频| 亚洲免费视频播放| 久久综合亚洲精品| 久艹视频在线免费观看| 黄色av网址在线播放| 能在线观看的av网站| 丰满少妇在线观看| 亚洲欧美天堂在线| 国内外成人激情免费视频| 91免费国产精品| 欧美 国产 综合| 99久久激情视频| 午夜久久久精品| 日本一本在线视频| 精品一区二区三区无码视频| 少妇无码av无码专区在线观看| 不卡影院一区二区| 色91精品久久久久久久久| 免费在线精品视频| 色综合久久久久无码专区| 中文字幕国产传媒| 在线无限看免费粉色视频| 亚洲精品天堂成人片av在线播放| 欧美激情视频免费看| 青青青国产在线视频| www,av在线| 成人精品视频在线播放| 日本爱爱免费视频| 免费看啪啪网站| 缅甸午夜性猛交xxxx| 亚洲成人福利在线观看| ijzzijzzij亚洲大全| 尤物av无码色av无码| 一个色综合久久| 男人添女人下部视频免费| 国语对白做受xxxxx在线中国| 污视频网址在线观看| 黄色一级片国产| 久久久精品三级| 亚洲天堂第一区| 欧美精品第三页| 日本xxxxx18| 少妇人妻互换不带套| 久久天天东北熟女毛茸茸| 免费av网址在线| 精品日韩在线播放| 欧美 日韩 国产 激情| 黄色一级视频播放| 国模杨依粉嫩蝴蝶150p| 超级碰在线观看| 久久久久久久久久久久91| 日韩精品一区二区免费| 在线观看高清免费视频| 国产手机免费视频| √天堂资源在线| av免费中文字幕| 日本福利视频网站| 九九精品久久久| 18禁男女爽爽爽午夜网站免费| 日韩av福利在线观看| 激情综合网婷婷| www.九色.com| www.桃色.com| 99视频精品免费| 午夜免费福利小电影| 一级黄色高清视频| 欧美亚洲日本在线观看| 水蜜桃色314在线观看| 色呦呦网站入口| 日本人视频jizz页码69| 黑人糟蹋人妻hd中文字幕| 精品人妻人人做人人爽| 红桃视频一区二区三区免费| 不卡av免费在线| 久久美女福利视频| 丰满的少妇愉情hd高清果冻传媒| 日日夜夜精品视频免费观看| 91极品视频在线观看| 日本女优爱爱视频| 久久精品国产精品亚洲色婷婷| 国产爆乳无码一区二区麻豆| 成人短视频在线看| 亚洲一级片av| 日本黄大片一区二区三区| 狠狠操精品视频| 国产男女无遮挡| 日本日本19xxxⅹhd乱影响| 免费人成在线观看视频播放| 看全色黄大色大片| 国产美女视频免费| 亚洲av毛片在线观看| 在线免费黄色网| 91亚洲免费视频| 性生活免费在线观看| 亚洲色图久久久| 国产天堂在线播放| 国产无套内射久久久国产| 精品国产免费av| 国产h视频在线播放| 久久久久久久中文| 国产精品网站免费| 久久成人免费观看| 内射国产内射夫妻免费频道| 蜜臀av色欲a片无码精品一区| 国产乱子伦精品无码专区| 激情成人开心网| 日韩精品视频在线观看视频| 久久综合久久久久| 青青草精品视频在线| 人妻熟妇乱又伦精品视频| 无码人妻h动漫| 精品久久久久久久免费人妻| 欧美日韩在线成人| 激情五月俺来也| 黄色aaaaaa| 九一免费在线观看| 亚洲精品蜜桃久久久久久| 免费看黄在线看| 成熟老妇女视频| 午夜免费看毛片| 日本三级福利片| 欧美午夜小视频| 超碰97人人射妻| 天天干天天操天天做| 日韩人妻精品一区二区三区| 免费视频爱爱太爽了| 欧美黄色免费影院| 在线观看av日韩| 欧美性视频在线播放| 六月婷婷激情综合| 狠狠爱免费视频| 天堂av在线8| 成年在线观看视频| 国产黄色一级网站| 九色porny自拍| 日韩欧美一级在线| 中文字幕无码精品亚洲35| 国产一区二区在线免费播放| 最近免费观看高清韩国日本大全| 少妇高潮喷水在线观看| 伊人国产在线视频| 97超碰在线视|