Analyzing Terrorist Activities through Operational ... - ISVG [PDF]

Beyond inclusion criteria, terrorism databases are often judged by the variables that operationalize the details of terr

0 downloads 4 Views 1MB Size

Recommend Stories


[PDF] Analyzing American Democracy
Don't count the days, make the days count. Muhammad Ali

[PDF] Analyzing English Grammar
Don't ruin a good today by thinking about a bad yesterday. Let it go. Anonymous

Analyzing Network Dynamics through Graph Partitioning
Before you speak, let your words pass through three gates: Is it true? Is it necessary? Is it kind?

extending concepts through language activities
Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will

Carbon Fixation through Forestation Activities
What we think, what we become. Buddha

Unprecedented Operational Productivity Through Superior Financial Technology
You miss 100% of the shots you don’t take. Wayne Gretzky

Influence of terrorist activities on tourism business strategies in Kenya
How wonderful it is that nobody need wait a single moment before starting to improve the world. Anne

Analyzing DC Operational Amplifier Circuits with LTspice IV
If you want to go quickly, go alone. If you want to go far, go together. African proverb

Possible Activities -(PDF
If your life's work can be accomplished in your lifetime, you're not thinking big enough. Wes Jacks

Operational
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

Idea Transcript


Analyzing Terrorist Activities through Operational & Associational Coding of Events: Introducing the Institute for the Study of Violent Groups’ Relational Database.

Daniel J. Mabrey [email protected] Institute for the Study of Violent Groups University of New Haven 300 Boston Post Road West Haven, CT 06516 Tel: 203-936-7150 1 July 2010

*Mabrey is Executive Director of the Institute for the Study of Violent Groups and Assistant Professor of Criminal Justice. He would like to thank Dr. Richard Ward, Dr. Vesna Markovic, Mr. Dathan Bennett, Mr. Joshua Hill, and Mr. John Hitzeman for their comments and contributions to this draft.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Abstract The Institute for the Study of Violent Groups has developed an event coding scheme for terrorist, extremist, and criminal activities that focuses on operational minutiae to support modeling tactical and operational activities. The coding methodology includes more than 1,500 variables at multiple levels of analysis and is used extensively to support counterterrorism research, modeling, and analysis at more than 22 organizations through sponsorship from the US Department of Defense. This coding scheme has been in place since 2002 and the database contains more than 190,000 events from 2002-present describing more than 3,000 groups and 35,000 individuals. The paper will provide a detailed examination of this coding scheme –highlighting the major differences with WITS, GTD, and ITERATE – while providing examples of analyses that such a coding scheme can support.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Empirical analysis of terrorism usually requires structured data for quantitative analysis. The most common type of quantitative analysis in terrorism studies is modeling the counts of terrorist events and the attributes of those events. There are three primary event datasets1 available for such analyses: • • •

Vinyard Software’s ITERATE The START Center’s GTD NCTC’s WITS

Other datasets/databases of terrorist groups and individual terrorist actors exist such as Asal & Rethemeyer’s BAAD dataset and Marc Sageman’s Global Salafi Jihad dataset (which was merged and updated with Scott Atran’s dataset on Southeast Asian actors). All of these datasets use events and relationships to organize information on terrorist activity to uncover patterns and discern trends; however, these datasets are usually niche in their scope or one-dimensional in their analytical domain (e.g. focused solely on violent events). Purpose In creating the Institute for the Study of Violent Groups’ Relational Database (RDB), we sought to create a single database that organizes information on terrorism at the greatest level of detail across the domains of terrorism, extremism, and criminality. We sought to combine the event, group, and individual units of analysis and created a relational schema that allows for analysis across these units. Finally, we sought to make the data accessible to external users in common formats, through industry standard integration protocols, and natively in analytic tools and platforms. This paper provides a detailed overview of the theoretical model underlying the RDB, the RDB data model, a discussion of the variables and coding scheme, examples of analyses that the RDB supports, and a discussion of external integration using the RDB. Theoretical Model The RDB was designed to organize and structure open source information to better understand and visualize sub-state networks such as terrorist and criminal organizations. These types of networks are often amorphous and generally not standardized in their structure or operations, so abstracting a model for analyzing these organizations can be challenging. Further, there are significant data issues in studying these types of organizations and their activities, not the least of which is that these networks are by their nature clandestine and therefore not widely accessible for study using open sources or unclassified information. Nonetheless, the amount of information on terrorist and criminal actors and organizations is voluminous and rich in detail at the strategic and operational levels.

This paper assumes the reader has a sophisticated understanding of these three primary event datasets and will not go into great detail about their background and development.

1

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Hierarchical Concepts The RDB structure is based on a theoretical model of sub-state networks with five hierarchical concepts: events, incidents, individuals, organizations, and movements. Each of these concepts has a discrete number of attributes that describe the concept. See Figure 1 below for a visual representation of this theoretical model. Figure 1 - Hierarchical Concepts with Descriptive Attributes

Events are the most basic concept in the theoretical model and represent single actions that occur at a specific time and location, for instance a bomb detonating at a hotel in Mumbai, India. The attributes of the bomb and the hotel would be variables that describe the event. An incident is a collection of events that are related to each other in some way. For example, the numerous attacks by members of Lashkar-e-Tayyiba during the extended terrorist raid on Mumbai were distinct events, but together constitute one incident. The aggregated event attributes would be variables that describe the incident. For instance, while a single terrorist event might only be 10 minutes long, the span of events during the terrorist raid on Mumbai would be the duration of the incident. Specific actors in events (and incidents as well) are represented in the model as individuals. The physical and demographic characteristics of these actors would be variables that describe the individual. Collections of individuals that share some type of association are represented in the model as organizations. Finally, collections of groups that share an ideology or ideologies are represented in the model as movements. The power of this hierarchical approach is that each hierarchical level is an aggregation of its lower levels, allowing for increased analytical flexibility throughout the model. For example, a

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

specific movement represents the aggregation of the events and incidents perpetrated by its constituent individuals and organizations. Therefore, the movement can be meaningfully described as an aggregation of the attributes of these events and incidents, or as the aggregation of the attributes of its constituent individuals, or as the aggregation of its constituent organizations.

Establishing Networks through Linkages Forming networks within this theoretical model requires formally “linking” concepts together to establish some type of connection. The theoretical model supports two principal types of linkages, operational and associational. An operational linkage occurs when an individual or organization has some type of involvement in an event or incident. Individuals and/or organizations that are involved in a single event or incident can be considered “operationally linked” by that event or incident. Figure 2 presents the three types of operational linkages that are supported in this theoretical model. Figure 2 – Operational Linkages

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

An associational linkage characterizes associations between individuals and organizations that are not tied to specific events or incidents. These linkages are social in nature and describe the relationships that individuals have to each other and to organizations. Figure 3 presents the three types of associational linkages that are supported in this theoretical model. Figure 3 – Associational Linkages

This section described the theoretical model that underlies the ISVG RDB. This theoretical model is instantiated as a machine readable database through a data model. The next section presents the data model of the ISVG RDB. Data Model A data model is an explicit, discrete operationalization of a subject matter domain. A complete data model defines both discrete elements (e.g., entities, properties, relationships) and rules for synthesizing these elements from a corpus of data from the domain. It is common to represent the structural components of a data model schematically using a graph wherein nodes represent entities, properties, or "bags" of model elements, and edges represent relationships between these elements. Using this convention, ISVG’s data model is presented below in Figure 4.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Figure 4 – ISVG RDB Data Model

The ISVG data model defines three basic entity types: events, individuals, and groups and two pseudo-entity types: incidents and movements. Within the data model, events are classified into one of twenty-five distinct subtypes (events), and collection and entry staff synthesize domain information into the data points appropriate for each subtype (e.g., attack variables are only collected for violent events, not for communication events). Related events are logically grouped together to create a fourth pseudo-entity type called an incident, which is used for associating data and metadata with the collection of events as a whole where appropriate. For example, the Mumbai attacks were separated in time and space and with distinct actors, therefore they are separate events. However, all the events are a part of the singular attack by Lashkar-e-Tayyiba. The nuance of this is lost in ITERATE, GTD, and WITS, but the event/incident dichotomy in the RDB allows users to analyze incidents and as well as events. Groups related by the ideology they

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

purport to follow create a fifth pseudo-entity called a movement, which is used for associating data and metadata with the collection of groups as a whole where appropriate. The sixth and final ubiquitous entity within the ISVG data model is the source entity. All data in the ISVG database are collected from open sources. Each source is summarized and a citation is made for reproducing the data externally. The edges shown in Figure 4 represent relationships among entities in the model. Each event is linked to its parent incident (and implicitly to all other events within the incident) and any individuals and groups that participated in the event. Each individual is linked to all events in which he or she participated, other individuals with whom he or she is known to be associated, and all groups with whom he or she is known to be affiliated. Each group is linked to events in which it or its members have participated, individuals who are known to be affiliated with it, and groups with which it is known to be associated. Lastly, all these entities and their relationships (and, in fact, every data point in the model) are linked to the source entity that contains the full text from which the information was drawn. While the schematic in Figure 4 gives an accurate depiction of the gross structure of the data model, it is incomplete. What are not visible in the schematic are the 1,000+ minute data points the ISVG database captures, from weapon types and tactics to communication media and topic to individual aliases and distinguishing physical characteristics. These represent the variables that ISVG has operationalized for the terrorism, extremism, and crime domains. Inclusion Criteria In describing and comparing terrorist databases, the criteria for inclusion are often the most debated issue. One need only examine the recent working paper2 from Todd Sandler assessing the differences between the GTD and ITERATE to understand these sensitivities. A thorough examination of inclusion criteria in terrorist databases is beyond the scope of this paper, but most observers would agree that ITERATE has the most restrictive inclusion criteria, WITS has the most inclusive, and GTD is somewhere in between. A cursory look at the yearly counts for each of these databases for comparable years supports this, with WITS having the most and ITERATE having the least number of records. Inclusion criteria for the RDB are complicated as the criteria go far beyond what is “terrorism” and what is not. Further, because the RDB covers three units of analysis, the RDB needs inclusion criteria for events, groups, and individuals. The inclusion criteria are presented for each in a series of decision rules that guide the ISVG coding efforts. For events, the RDB follows the following decision rules: 1. Is there a source for this event that is unrestricted, unclassified, or otherwise in the public domain? a. If yes, then Rule 2 2

http://www.utdallas.edu/epps/terrorism-and-policyconference/papers/Enders_Sandler_Gaibulloev_Domestic_v_Trans_2.pdf

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

b. If no, then not included. 2. Was the event committed or suspected to have been committed by a sub-state or subnational actor? a. If yes, then Rule 3 b. If no, then not included. 3. Was the event committed in furtherance of or related to a political, religious, or social cause? a. If yes, Rule 4 b. If no, then not included. 4. Was the event a violent act or did it threaten violence or significant property damage? a. If yes, then Priority 1 entry b. If no, then Priority 2 entry. These criteria make the RDB the least restrictive terrorist database as there is no concern for the legitimacy of the target (WITS, GTD, ITERATE), whether the attack was domestic or international (ITERATE), or whether the event can be corroborated by additional sources (GTD). The reason for this is the RDB is interested in documenting group based violence that is ideologically motivated and all the related activities of violent groups and their affiliated organizations and individuals. In doing this, the RDB goes beyond violent incidents and captures an additional 17 event types that characterize non-violent activities and six types of associations that tie together individuals to individuals and individuals to organizations. This last point illustrates the need for specific decision rules related to what organizations and individuals are included in the database so as not to overreach. For groups, the RDB follows the following decision rules: 1. Is there a source that is unrestricted, unclassified, or otherwise in the public domain that provides the basis for documenting information about this organization? a. If yes, then Rule 2 b. If no, then not included. 2. Is this group involved in violence? a. If yes, Priority 1 entry b. If no, then Question 3. 3. Is this group have a directly linked to a violent group? a. If yes, Priority 2 entry b. If no, then not included. For individuals, the RDB follows the following decision rules: 1. Is there a source that is unrestricted, unclassified, or otherwise in the public domain that provides the basis for documenting information about this organization? a. If yes, then Rule 2 b. If no, then not included. 2. Is this individual involved in violence? a. If yes, Priority 1 entry b. If no, then Question 3.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

3. Does this individual have a direct association with an individual who is engaged or suspected to have engaged in violence? a. If yes, Priority 1 entry b. If no, then question 4 4. Is this individual suspected of or alleged to be a member of a violent group? a. If yes, Priority 1 entry b. If no, then Question 5. 5. Is this individual suspected of or alleged to be a member of a group that is directly linked to a violent group? a. If yes, Priority 2 entry b. If no, then not included. These criteria guide the inclusion decisions of the data collectors researching and coding data into the RDB. Due to real-world constraints such as manpower, funding, and physical space, it is not possible to code all data into the RDB that meets the inclusion criteria. Instead, ISVG uses a priority system to focus the efforts of the data collection staff at ISVG facilities and satellite sites. ISVG endeavors to ensure that all Priority 1 information make it into the RDB. Priority 2 information is recorded in a daily chronology and stored electronically for future coding efforts and special projects. Variables Beyond inclusion criteria, terrorism databases are often judged by the variables that operationalize the details of terrorist activities. For this paper, the codebooks of ITERATE and GTD were reviewed along with the available public domain information on WITS to identify and compare the variables of these datasets. The compiled comparison of variables can be found in Appendix A. ITERATE, GTD, and WITS organize the variables into categories that were largely mutually exclusive. All datasets had “generic” variables that applied to all event types, however GTD and ITERATE had special variables that provided greater specificity into certain event types (Fate of the terrorist, Hostage taking, and Skyjacking for ITERATE; only Hostage taking for GTD). In the review of datasets, we termed these variables “Incident-Specific Variables.” All the variables and variable categories in ITERATE, GTD, WITS, and RDB were compared and analyzed to identify the “unique” variables for each dataset/database. The unique categories and variables for each database were color coded in Appendix A. GTD had the least “unique” variables of the four datasets/databases in the comparison whereas RDB had the most followed by ITERATE. WITS was unique in that it focused on facilities and had an “inferred” metric for perpetrators. The principal differences in variables between ISVG RDB and the other databases is in the additional event types and the incident specific variables that describe all the events. There are 25 event types in the ISVG RDB that break down into four principal categories: Violent Events,

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Non-Violent Events, Criminal Events, and Security Operations. The violent events in the ISVG RDB are essentially the same “tactics of terrorism” event types found in ITERATE, WITS, and GTD. These violent events are the only true “counts” in the RDB in that ISVG tries to exhaustively capture and research every violent terrorist event in the world. The other event types are used to build out networks using the operational linking paradigm described above and to document how terrorist groups engage in criminality and interact with criminal organizations. The security operations event types are used to document the counterterrorism measures against a terrorist organization. Each category in the ISVG RDB is presented with its component events below: •



Violent Events o Bombing o Armed Assault o Arson o C,B,R&N o Hijacking o Hostage Taking/Kidnapping Non-Violent Events o Ceasefire o Communication o Financing o Cyber Activities





Criminal Events o Bribery o Counterfeiting o Escape o Extortion o Fraud o Illicit Transactions o Piracy o Robbery/Theft o Trafficking o Vandalism Security Operations o Criminal Court Proceeding o Civil Court Proceeding o Police Operation o Military Operation

Each of these event types has been defined with as much specificity as possible for capturing and recording the minutiae of terrorist, extremist, and criminal activities. The full event schema is more than 1,500 variables and providing a list of each variable and its value is beyond the scope of this paper. Figure 5 provides an example of the variable categories for the Bombing event type. This level of depth is available for each of the 25 event types in the ISVG RDB.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Figure 5 – Bombing Event Variable Tree

Each of the variables for the bombing event depicted in Figure 5 have discrete variables values or support strings of unstructured text for describing the variable with as much detail as possible. The large box at the bottom left of Figure 5 lists other event types. This illustrates that the bombing event is but one event of a larger incident and other related events can and should be linked to the bombing event to provide additional data for analysis. Database Statistics The ISVG RDB has been constantly populated since it was first launched in the summer of 2003, although the collection staff has fluctuated between 7 and 110 depending on the funding levels for the project. The operational range, meaning the data that is the result of focused data collection, of the RDB is 2004-present. This data is supplemented by additional data collections that ISVG has acquired from institutional partners and 3rd party vendors or produced through ISVG staff completing research projects, theses, or dissertations. Summary statistics for the RDB are provided in Figure 6.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Figure 6 – Summary Statistics for RDB

External Integration Unlike GTD and WITS, the ISVG RDB is not a publicly accessible database. Unlike ITERATE, the ISVG RDB is not sold commercially. Instead, the ISVG RDB is made accessible to external users through collaborative and partnering relationships usually facilitated or funded through US Government sponsors. The native format of the RDB is not tabular like GTD and ITERATE, rather it is organized in MS SQL Server 2005 through a relational schema. This format required ISVG to design and support multiple approaches for external integration. The simplest approach is querying the SQL database and running the output through a columnrow flattener script that produces a comma separated values file, which can be integrated nearly universally for quantitative analysis. The rows in the tabular format represent unique instances of the unit of the desired unit of analysis (event, group, or individual) with the columns representing the operationalized variables that describe the unit. ISVG also has industry standard RESTful web services with documented APIs that can be provided to software developers and other technical users for directing integrating the RDB into their systems.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

ISVG also recognizes that many collaborators and potential users have COTS or GOTS software applications, platforms, tools for assisting in the visualization and analysis of structured data. Whenever possible, ISVG seeks to acquire these applications, platforms, and tools so that data from the RDB can be provided to partners and collaborators in the native formats used by these tools. To date, ISVG has deployed and integrated more than 10 tools including: • • • • • • •

Palantir Government i2 Intelligence-led Operations Suite FMS Sentinel nFiDeL Tableau Omniskope uReveal

In each of these tools, the data from the RDB is transformed into the appropriate format for ingest and integration to suit needs of collaborators and partners.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

References Blomberg, S.B., Engel, R.C., & Sawyer, R. (2010). “On the Duration and Sustainability of Transnational Terrorist Organizations.” Journal of Conflict Resolution, 54, 2, p. 303-330. Institute for the Study of Violent Groups. (2006). Extremist Groups: An International

Compilation of Terrorist Organizations, Violent Political Groups, and Issue Oriented Militant Movements. 3rd Edition. Office of International Criminal Justice: Huntsville, TX. LaFree, G., Yang, S.M, and Crenshaw, M. (2009). “Trajectories of terrorism: Attack patterns of foreign groups that have targeted the United States, 1970–2004.” Criminology and Public Policy, 8, 3, p. 445-473. Sandler, T. (2009). “The Past and Future of Terrorism Research.” Revista de Economía Aplicada, Vol. XVII, Núm. 50, 2009, pp. 5-25.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Appendix A – Databases Comparisons The following pages present the variables categories and specific variables for the ITERATE, GTD, WITS, and ISVG-RDB. Each dataset/database is presented in two columns the first column being the general categories of variables in each dataset/database. The second column is the specific variables described in the available documentation. For this paper, we examined all the variable categories and variable names to identify the variables that were unique to each dataset/database. The unique variable categories and variables are highlighted with the color of the database assigned in this paper. No judgments are made about the quality or content of the variables and it is important to stress that these were determined from examining unclassified, undrestricted, and otherwise public domain materials.

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

START-GTD Category Incident Date

Incident Location Incident Information

Attack Information

Target Information

Perpetrator Information

Variable Date Approx Date Extended Incident Geography Categories Summary Criteria Doubt Terrorism Proper Alternative Designation Multi Incident Multi-Party Conflict Success Suicide First Attack Type Second Attack Type Third Attack Type First Target Type Name of First Entity Targeted First Specific Target First Target Nationality Second Target Type Name of Second Entity Targeted Second Specific Target Second Target Nationality Third Target Type Name of Third Entity Targeted Third Specific Target Third Target Nationality First Group Name First Sub-group Name Second Group Name Second Sub-group Name Third Group Name Third Sub-group Name

Vinyard Software - ITERATE Category Incident Characteristics

Terrorist Characteristics

Victim Characteristics

Life and Property Losses

Variable Date Location Categories Scene Evidence of State Sponsorship Type of State Sponsorship Incident Type Total Nationalities Involved Group Secondary Group Number of Groups Involved Number of Terrorists in Attack Number of Female Terrorists in Attack Number of Nationalities in Attack First Attack Nationality Second Attack Nationality Third Attack Nationality Recidivists in Attack Number of Victims Number of Victim Nationalities First Victim Nationality Second Victim Nationality Third Victim Nationality Number of US Victims Type of US Victim Type of Immediate Victim Nature of Victim Entities Total Individuals Wounded Terrorists Wounded Foreign Wounded US Wounded Gov Officials Wounded Total Individuals Killed Terrorists Killed

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

START-GTD Category Perpetrator Information

Perpetrator Statistics Perpetrator Claim of Responsibility

Weapon Information

Casualty Information

Consequences

Vinyard Software - ITERATE

Variable Specific Motive First Perpetrator Group Suspected/Unconfirmed Second Perpetrator Group Suspected/Unconfirmed Third Perpetrator Group Suspected/Unconfirmed Number of Perps Number of Perps Captured First Claim of Responsibility Mode of First Claim First Claim Confirmed Second Claim of Responsibility Mode of Second Claim Second Claim Confirmed Third Claim of Responsibility Mode of Third Claim Third Claim Confirmed Competing Claims First Weapon Type First Weapon Sub-Type Second Weapon Type Second Weapon Sub-Type Third Weapon Type Third Weapon Sub-Type Fourth Weapon Type Fourth Weapon Sub-Type Weapon Details Total Fatalities US Fatalities Perp Fatalities Total Injured US Injured Perp Injured Property Damage Extent of Property Damage

Category Life and Property Losses

Success/Failure

Variable Foreign Killed US Killed Gov Officials Killed Amount of Damage Type of Weapon Used Terrorist Logistical Success

INCIDENT-SPECIFIC VARIABLES FATE - Fate of Terrorists

- Extradition

HOSTAGE - Target of Demands

- Negotiation Behavior

Date First Terrorist Fate Number of Terrorists Receiving Fate Second Fate Number of Terrorists Receiving Second Fate Third Fate Number of Terrorists Receiving Third Fate Fourth Fate Number of Terrorists Receiving Fourth Fate Number of Terrorists Arrested Was Extradition Requested Nation Requesting Extradition Identify of Nation Receiving Extradition Request Extradition Granted Date Number of Hostages Number of Hostages Escape Target of Demands Target of Demands 2 Target of Demands 3 Number of Entities Demanded Demands Against Host Nation Media Announcement Political Change Non-Robin Hood Ransom Robin Hood Ransom

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

START-GTD Category Consequences

Vinyard Software - ITERATE

Variable Value of Prop Damage Prop Damage Comments

Category - Negotiation Behavior

Additional Info Source Info Hostage/ Kidnap Info

INCIDENT-SPECIFIC VARIABLES

Variable Release Prisoners Safe Haven for a Destination Safe Passage Other Demands

Hostage/Kidnapping Total Victims

Terrorist Behavior in Negotiations Allowed Sequential Release Allowed Deadlines to Pass w No Action

US Victims

Number of Deadlines where Threat was Carried Out

Duration Country Kidnappers/Hijackers Diverted To Country of Kidnapping/Hijacking Resolution Ransom Demand? Total Ransom Amount Demanded Total Ransom Amount Demanded from US Sources Total Ransom Amount Paid Ransom Amount from US Sources Ransom Notes Outcome Number Released/Escaped/Rescued

- Results of Negotiations

- Other Nations Inolved

SKYJACK

Terrorist Negotiation Success Type of Target Negotiator Number of Target Negotiators Response of Target Amount of Ransom Paid Source of Ransom Payment Number of Prisoners Released Ultimate Destina of Released Prisoners First Hostage's Fate Second Hostage's Fate Duration of Incident Number of Nations Denying Safe Haven First Nation Deny Second Nation Deny Number of Nations Granting Safe Haven First Nation Grant Second Nation Grant Number of Nations with Ancillary Involvement First Nation Ancillary Second Nation Ancillary

Date Duration of Incident - Airline Info Type of Plane Airline (C) Copyright 2010 - Institute for the Study of Violent GroupsCompany All Rights Reserved

START-GTD Category

Variable

Vinyard Software - ITERATE Category - Incident Location

- # of Individuals Involved

Variable Flight Plan Embarkation Hijacker Embarkation Flight Plan End Point Hijacker Desired End Point Number of Stopovers Number of Crewmembers Number of Individuals Onboard Number of Hijackers Number Wounded Hostages Wounded Hijackers Wounded Crew Wounded Number Killed Hostages Killed Hijakcers Killed Crew Killed Damage to Plane Logistical Success Negotiation Success Type of Weapon

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

ISVG-RDB Category Source Incident Date Major Incident Incident Type Universal Variables

Individuals Involved

Groups Involved

Geography

Casualties

Variable

GTD Transnational Crime Confirmed/Unconfirmed Date Domestic/International Time Assassination Suicide Carried Out/Attempted Claim of Responsibility Event Title Event Summary Name Suspected Perp? Individual volvement Type Details Group Sub-Group Suspected Perp? Group Involvement Type Geography Categories Vicinity Specific Location Type of Place Type of Property Casualties Y/N Num of Gov Killed Num of Civilian Killed Num of Extremist Killed

NCTC-WITS Category Incident

Location Victim

Facility

Perpetrator

Variable Subject Summary Date Multiple Days Event Type Assassination Suicide IED Weapon Geography Categories Victim Type Nationality Defining Characteristics Targeting Characteristics Combatant Child Indicator Number of Dead Number of Wounded Number of Hostages Total Victims Facility Type Nationality of Facility Defining Characteristics Targeting Characteristics Combatant Total Facilities Indicator Damage Perp Characteristic Perp Nationality Perp Inference

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

NCTC-WITS

ISVG-RDB Category Casualties

Variable

Category

Total Killed Num of Gov Injured Num of Civilian Inured Num of Extremist Injured Total Injured Num of Gov Involved Num of Civilian Involved Num of Extremist Involved Total Involved US Killed Male Extremists Killed Female Extremists Killed US Injured Male Extremists Injured Female Extremists Injured US Involved Male Extremists Involved Female Extremists Involved Adults Killed Children Killed Law Enforcement Killed Military Killed Other Public Officials Killed Government Contractors Killed Adults Injured Children Injured Law Enforcement Injured Military Injured Other Public Officials Injured Government Contractors Injured Adults Involved Children Involved Law Enforcement Involved

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

ISVG-RDB Category Casualties

Targets

Victims

Variable

NCTC-WITS Category

Military Involved Other Public Officials Involved Government Contractors Involved Target Type Specific Target Type Target Status Target Details Nationality

Organization

GROUP-LEVEL VARIABLES Name Aliases Organization Type Network Contacts Designations Founded Structure Funding History Incidents Members Leaders Status Motivation Religious Bias Social Bias Political Bias Training Operational Areas

Individual

INDIVIDUAL-LEVEL VARIABLES Name Alias Status

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

NCTC-WITS

ISVG-RDB Category Individual

Assault

Arson

Variable

Category

Associates Association Type Association Subtype Organizational Affiliations Citizenship Operational Area Criminal Affiliations Education Family Incidents Nationality Physical Characteristics Known Locations Camps Attended

INCIDENT-SPECIFIC VARIABLES Attack Type Attack Purpose Tactic Used Weapon Used Missile Used Bombs Used Explosives Used Vehicle Used Assassination Motive Eco-Terrorism Motive Animal Liberation Motive Financial Gain Motive Hate Crime Motive Evidence Destruction Motive Point of Origin Breaking & Entering Involved Ignition Point Ignition Details Accelerant

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

ISVG-RDB Category Arson Bombing

Bribery

CBRN

Ceasefire

Variable

Arson Set Evidence Recovered Number of Bombs Bomb Type Specific Bomb Type Roadside Bomb? IED? Explosives Used Igniter Used Materials Used Detonators Used Delivery Method Vehicle Detail Concealment Method Placement Details Bribery Type Details Amount Non-Monetary Bribes Reason Contrband Currency Target of Bribe Occupation Target of Bribe Nationality Type Agent Delivery Method Amount Details Date Declared Ceasefire Start Ceasefire End Violated? Government Involved

NCTC-WITS Category

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

ISVG-RDB Category Ceasefire Civil Court Proceedings

Variable Type of Government Involvement Plaintiff Court Court Type Charge Status Charge Type Attorney Type Verdict Penalty/Sentence Compensation Communication Strategic Communication Strategic Subtype Operational Communication Operational Subtype Communication Medium Delivery Method Topic Details Counterfeiting Counterfeiting Type Counterfeiting Subtype Duration of Scheme Details Criminal Court Jurisdiction Proceeding Court Court Type Charge Status Charge Type Attorney Type Verdict Penalty/Sentence Compensation Extradition Cyberterrorism Type Method

NCTC-WITS Category

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

ISVG-RDB Category Escape

Extortion

Financing

Hijacking

Hostage Taking/ Kidnapping

Variable

NCTC-WITS Category

Violence Used Escaped From Location Status Number Escaped Number Involved Affiliation Weapons Used Vehicles Used Nationalities Extortion Type Extortion Method Contraband Used Source of Funds for Payment Currency Used Financing Type Financing Subtype Duration Contraband Used Mode of Transporation Hijacking Method Forced Details Covert Details Duration Ransom Demand Ransom Paid Number of Hostages Number of US Hostages Method Name of Targeted Entity Name of Offsite Location Proof of Life Duration Hostage Nationality Hostage Occupation (C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

NCTC-WITS

ISVG-RDB Category Hostage Taking/ Kidnapping

Illicit Transactions

Military Operation

Piracy

Category

Variable Weapons Used Ransom Demand Ransom Paid Non-Ransom Demand Ransom Demanded from US Sources Ransom Demanded from Non-US Sources Transaction Type Transaction Subtype Value of Transactions Duration Contraband Used Provocation? Part of a Named Military Operatoin Operation Name Duration Operation Type Military Org Involved Tactic Used by Military Evidence Recovered Vessel Type Vessel Nationality Attacked Vessel Type Pirate Action Pirate Armament Crew Nationality Number of Crew Passenger Nationality Number of Passengers Attacker Nationality Number of Attackers Ransom Demand Ransom Paid Ransom Amount Ransom Paid by

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

ISVG-RDB Category Piracy

Police Operation

Robbery

Trafficking

Variable

NCTC-WITS Category

Duration Object of Piracy Value Status of Targeted Ship Type Violence Used Fired Upon? Contraband Used Motivation Weapons Used Provocation? Part of a Named Security Operatoin Operation Name Duration Operation Type Security Org Involved Tactic Used by Security Forces Evidence Recovered Robbery Animal Liberation Burglary Deception Used? Weapons Used Items Stolen Trafficking Method Trafficker Nationalities Vehicles Used Type of Arms Trafficked Specific Type of Arms Trafficked Type of Arts/Antiquities Trafficked Method of Acquiring Arts/Antiquities Date Art/Antiquity Recovered Currency Trafficked Amount of Currency Trafficked Commodity Trafficked Quantity of Commodity Trafficked (C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

ISVG-RDB Category Trafficking

Vandalism

NCTC-WITS

Variable Commodity was Counterfeit? Type of Drugs Trafficked Quantity of Drugs Trafficked Value of Drugs Trafficked Type of Human Trafficking Trafficking/Smuggling Primary Nationality Num of Women Trafficked Num of Men Trafficked Num of Children Trafficked Type of Materiel Trafficked Specific Type of Materiel Trafficked Unit of Measurement for Materiel Quantity of Materiel Type of Precious Stone/Metal Trafficked Specific Type of Precious Stone/Metal Trafficked Quantity of Precious Stone/Metal Trafficked Method of Acquiring Precious Stone/Metal Type of Vehicle Trafficked Method of Acquiring Vehicle Trafficked Type of Vandalism Hate Crime-related Eco-Terrorism-related For Financial Gain? For Evidence Destruction? Animal Rights-related Was it a Claim of Responsibility Damages

Category

(C) Copyright 2010 - Institute for the Study of Violent Groups All Rights Reserved

Variable

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.