+ All Categories
Home > Documents > Modeling the Insurgent Activities with a Geographic ...

Modeling the Insurgent Activities with a Geographic ...

Date post: 30-Dec-2021
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
8
Modeling the Insurgent Activities with a Geographic Information System: A Case Study from Iraq MANOJ K. JHA 1 , BHEEM KATTEL 2 , AND MARCUS CARWELL 3 Morgan State University 1700 East Cold Spring Lane Baltimore, MD 21251, USA 1 [email protected] , 2 [email protected] , 3 [email protected] Abstract: - This paper investigates the root causes of insurgency and exploits a Geographic Information System (GIS) to model the effects of terrain and urban infrastructure on insurgent behavior. It develops a mathematical model that can predict the likelihood of an individual turning into an insurgent based on various contributory factors. Insurgency in Iraq and Afghanistan has been on the rise, primarily to fight the United States (U.S.)-led coalition forces. Insurgents often seek complex terrain and urban infrastructure to ambush U.S.-led coalition forces which are carrying out military missions in Iraq and Afghanistan. Using examples from Iraq we model spatial and temporal trends in insurgent activities with a GIS, which may help understand the overall insurgency and behavior of insurgents who carry out attacks against U.S-led coalition forces. Key words: - terrain and urban infrastructure, insurgency, GIS. 1. Introduction Insurgency is not a new phenomenon. It has existed for over 100 years in many parts of the world, such as many African countries, Thailand, Somalia, Nepal, Kashmir, Iraq, and Afghanistan, to name a few. In this paper we explore the literature to understand the root causes of insurgency. We develop a mathematical model that may predict the likelihood of an individual turning into an insurgent due to various contributory factors. Finally, we exploit the Geographic Information System (GIS) to model insurgency trends over space and time in Iraq, which may help understand the influence of terrain and urban infrastructure on insurgent behavior. In the next section we discuss the root causes of insurgency. 1.1 Root Causes of Insurgency No human being is born corrupt or insurgent. It is the upbringing, the environment, social and economic factors that help in molding an individual’s behavior in a positive or negative direction [1-2, 16, 21-22]. According to the Central Intelligence Agency (CIA), insurgency is defined as, “a protracted political-military activity directed toward completely or partially controlling the resources of a country through the use of irregular military forces and illegal political organizations.” Since the definition includes military forces and political organizations, we can relate that to be a product of human behavior and certain human motives. Jim Ruvalcaba [20] has categorized insurgency into anarchists, egalitarians, traditionalists, pluralists, secessionists, reformists, and preservationists. Anarchists wish to eliminate the institutionalized political arrangement while the egalitarians seek to impose a new system based on ultimate value of distributional equality. Similarly, traditionalists seek to displace political system based on sacred values rooted in ancestral ties and religion and pluralists seek to establish a system in which values of individual freedom, liberty, and compromise are emphasized. Secessionists renounce the existing political system and seek to constitute a new and independent political community, reformists seek more political, social, and economic benefits but do not reject the political community or system of authority, and preservationists seek to maintain the status quo because of the political, social, and economic privileges they receive from it. Thomas O’Connor [18] categorizes the motives behind insurgent behavior into political, religious, sociological, psychological, psychiatric, and biological. He also classifies the contributory factors causing terrorist behavior into ( 1 a …., 12 a ): a. Precipitating factor ( 1 a ) b. Biological: recognizes the influence of hormonal changes ( 2 a ) RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS ISSN: 1790-5117 213 ISBN: 978-960-474-152-6
Transcript

Modeling the Insurgent Activities with a Geographic Information System: A Case Study from Iraq

MANOJ K. JHA1, BHEEM KATTEL

2, AND MARCUS CARWELL

3

Morgan State University

1700 East Cold Spring Lane

Baltimore, MD 21251, USA [email protected],

[email protected],

[email protected]

Abstract: - This paper investigates the root causes of insurgency and exploits a Geographic Information System

(GIS) to model the effects of terrain and urban infrastructure on insurgent behavior. It develops a mathematical

model that can predict the likelihood of an individual turning into an insurgent based on various contributory

factors. Insurgency in Iraq and Afghanistan has been on the rise, primarily to fight the United States (U.S.)-led

coalition forces. Insurgents often seek complex terrain and urban infrastructure to ambush U.S.-led coalition forces

which are carrying out military missions in Iraq and Afghanistan. Using examples from Iraq we model spatial and

temporal trends in insurgent activities with a GIS, which may help understand the overall insurgency and behavior

of insurgents who carry out attacks against U.S-led coalition forces.

Key words: - terrain and urban infrastructure, insurgency, GIS.

1. Introduction

Insurgency is not a new phenomenon. It has existed

for over 100 years in many parts of the world, such

as many African countries, Thailand, Somalia, Nepal,

Kashmir, Iraq, and Afghanistan, to name a few. In

this paper we explore the literature to understand the

root causes of insurgency. We develop a

mathematical model that may predict the likelihood

of an individual turning into an insurgent due to

various contributory factors. Finally, we exploit the

Geographic Information System (GIS) to model

insurgency trends over space and time in Iraq, which

may help understand the influence of terrain and

urban infrastructure on insurgent behavior. In the

next section we discuss the root causes of insurgency.

1.1 Root Causes of Insurgency

No human being is born corrupt or insurgent. It is

the upbringing, the environment, social and

economic factors that help in molding an individual’s

behavior in a positive or negative direction [1-2, 16,

21-22]. According to the Central Intelligence

Agency (CIA), insurgency is defined as, “a

protracted political-military activity directed toward

completely or partially controlling the resources of a

country through the use of irregular military forces

and illegal political organizations.” Since the

definition includes military forces and political

organizations, we can relate that to be a product of

human behavior and certain human motives.

Jim Ruvalcaba [20] has categorized insurgency

into anarchists, egalitarians, traditionalists, pluralists,

secessionists, reformists, and preservationists.

Anarchists wish to eliminate the institutionalized

political arrangement while the egalitarians seek to

impose a new system based on ultimate value of

distributional equality. Similarly, traditionalists seek

to displace political system based on sacred values

rooted in ancestral ties and religion and pluralists

seek to establish a system in which values of

individual freedom, liberty, and compromise are

emphasized. Secessionists renounce the existing

political system and seek to constitute a new and

independent political community, reformists seek

more political, social, and economic benefits but do

not reject the political community or system of

authority, and preservationists seek to maintain the

status quo because of the political, social, and

economic privileges they receive from it.

Thomas O’Connor [18] categorizes the motives

behind insurgent behavior into political, religious,

sociological, psychological, psychiatric, and

biological. He also classifies the contributory factors

causing terrorist behavior into ( 1a …., 12a ):

a. Precipitating factor ( 1a )

b. Biological: recognizes the influence of

hormonal changes ( 2a )

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 213 ISBN: 978-960-474-152-6

c. Psychological: recognizes the influences of

rational choice and psychological drives

( 3a )

d. Psychological inclinations: relates terrorists

as psychopaths (Cooper, 1977), alienated,

depressive and a suicidal fanatic (Taylor,

1988; Laquer, 1999; and Stern, 2003) ( 4a )

e. Facilitating factor ( 5a )

f. Religious/philosophy: about half of all the

terrorist groups have a religious factor as

cover (Hoffman, 1993) ( 6a )

g. Sociological: Hypotheses such as frustration-

aggression, relative-depravation, negative-

identity, narcissistic-rage, and moral-

disengagement, have been attributed as

facilitating factor for insurgency behavior

( 7a )

h. Philosophical beliefs ( 8a )

i. Triggering factors ( 9a )

j. Opportunity ( 10a )

k. Means ( 11a )

l. Suitability of target ( 12a )

1.2 Mathematical Representation of the Likelihood

of an Individual turning into an Insurgent

Based on above classification, mathematically, the

likelihood of an individual turning into an Insurgent

(I) can be expressed as the following equation:

12122211 ..... aaaI ααα +++= (1)

where, 121......αα are the coefficients of the 12

contributing factors whose values represent the

relative strengths of the 12 factors contributing to

turning an individual into an insurgent. If enough

data were available then one could easily calculate I

which may help predict the likelihood of an

individual turning into insurgent. In order to

numerically represent the values of the 12

contributory factors, qualitative information may be

first collected and later represented on a scale of 1-10

where 1 being very weak and 10 being very strong.

For example, an insurgent can be interviewed and

asked to provide answers to the above 12

contributory factors on a scale of 1-10, which aided

in turning him into an insurgent. If sufficient number

of (say, 100 or more) such captured insurgents from

courtiers such as Iraq and Afghanistan were

interviewed, a reliable mathematical relationship as

noted in Eq. (1) can easily be established to predict

the likelihood of an individual turning into an

insurgent. Moreover, if sufficient insurgency data

were available, the relative sensitivities of the 12

contributory factors could also be analyzed. We will

perform this analysis in future works after collecting

data on insurgency from news media and worldwide

web.

2. Iraqi Insurgency

Based on the contributory factors mentioned above,

Iraqi insurgency can also be linked to human

behavior. The strategies followed by the insurgents

there, can be protracted war and urban warfare in

which the insurgents attempt to prolong the fight

because they know that ruling authority has force

advantage and the insurgents employ terrorism as a

key factor in destabilizing the society and its

government. Among the various tactics used by

insurgents in general [17], the Iraqi insurgents seem

to have utilized psychological, strategy of chaos, and

expressive terrorism, in which they try to take a swift

deceptive move aimed at getting the enemy off-

balance, or create an atmosphere of chaos to

demonstrate the government’s inability to impose

law and order, or to express dissatisfaction about

something (in this case, the occupation by the US

Military) without the intention of seizing power.

Economy being one of the main factors for rising

insurgency, the current widespread unemployment in

Iraq and Afghanistan can have major impact in the

recruitment of people for insurgent activities and

hence the increase in insurgency.

Sociological factors can also be aiding in the

rising number of insurgency and can be facilitating it.

Relative depravation hypothesis assumes that people

get frustrated when the privileges enjoyed by them

are taken away or similar others are getting favored

advantages. This frustration can help in changing an

individual into an insurgent.

Similarly, death or disability caused to a family

member by the government forces (justifiably or

otherwise) can create a feeling of hatred and

vengeance. This might ultimately be a reason for the

insurgent behavior.

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 214 ISBN: 978-960-474-152-6

2.1 Iraqi Insurgency Following U.S.-Led Invasion

of Iraq

Since the US-led invasion of Iraq in March 2003

numerous insurgent attacks have led to the deaths of

many US-led coalition forces [3-15]. The insurgency

has proven to be a challenge for the US in the war

against Iraq. The insurgents implement attacks using

Improvised Explosive Device (IED). The primary

types of IED encountered by troops in Iraq are

command-wire, remote and vehicle born IEDs, or

VBIEDs (Michael J. Carden, March 2005), [3-15].

The command-wire IEDs use a detonation switch

such as a car alarm, at one end of the wire and the

explosives at the other end. Remote detonated IEDs

are ignited by a transmitter similar to a cordless

phone. The VBIEDs are vehicles turned bomb and

they may have an extra wire and can be detonated by

command wire or remote device. The use of IEDs

enables the insurgents to attack unexpectedly and

from long distances. When an attack is implemented

they are able to fade into the population undetected.

Because of these war tactics, being familiar with the

geography, terrain, and infrastructure and population

density can help locate insurgents and decrease

deaths from IEDs.

2.2 Geographic Profiling

Human spatial behavior in many forms can be

analyzed and profiled, including where victims were

picked up or dropped off, where phone calls were

made, credit card and automatic teller machine

(ATM) use, where graffiti or posters appear, and

where supplies were purchased. Geographic profiling

uses these and other factors to formulate a "hunting

ground" as well as the most likely locations of a

criminal within the hunting ground (Henry Kucera

2005), [3-15]. Geographic profiling has been

effective even when criminals are aware of the

technique and attempt to behave randomly. For these

and other reasons, geographic profiling has

significant potential as a tool for counter-insurgency.

The U.S. National Technology Alliance (NTA)

completed an evaluation of whether these types of

analysis tools would be useful to aid in the hunt for

insurgents, weapons caches and sources of bomb

materials, thereby reducing civilian and military

casualties (Henry Kucera, 2005), [3-15]. The basis

for geographic profiling is an algorithm that

calculates a pattern of events such as transportation

routes, topography and local geography. Being

familiar with the geography of the area helps

establish human spatial behavior.

2.3 History of Iraqi Regime

The Iraqi Empire formally known as the Ottoman

Empire (1299-1922) was invaded by the British

during World War I. In 1920 Iraq was mandated by

the UK and obtained its independence as a country in

1932 and the Republic of Iraq was declared in 1958.

Over the years a number of dictators ruled Iraq but

none more influential than Saddam Hussein. During

his rule Saddam Hussein waged a territorial war

against Iran from 1980 to 1988 and conquered

Kuwait in 1990. Iraq was driven out of Kuwait

during the Gulf War from January to February of

1991 by U.S.-led and UN coalition forces. During

the freeing of Kuwait the UN Security Council

(UNSC) called for Iraq to discard the complete

arsenal of weapons of mass destruction, long range

missiles and allow the UN council to confirm with an

inspection. Iraq refused UNSC inspections over a

period of 12 years and a U.S.-led invasion of Iraq

occurred in March 2003 with the defeat of Saddam

Hussein’s regime. The U.Ss and UN coalition forces

remained in Iraq to help rebuild the infrastructure and

implement a democracy while dealing with the

persistent attacks by insurgents. Iraq was given

sovereignty by the Coalition Provisional Authority in

June 2004. Iraqis voted on January 2005 to have a

Transitional National Assembly with 275 members to

outline a new constitution to begin elections at the

end of 2005.

2.4 Geography of Iraq

The Republic of Iraq is located 33 00 N, 44 00 E,

south east of Saudi Arabia bordering the Persian Gulf

and Kuwait (see, Fig. 1). Iraq sits in the Middle East

with Turkey to the Northwest, Jordan and Syria to

the west and Saudi Arabia to the South West with

Iran to the east and Kuwait to the South East. Iraq

covers an area 136,235 sq mi which is three times the

size of Ohio at 48,828 sq miles. Residing in the

Sunni Triangle (Fig. 2), Iraq is densely populated

consisting of Tikrit, Baqubah, Ramadi, Samarra and

Fallujah. This area consists of Sunni Muslims and the

Sunni Triangle (Fig. 2) which represented an area of

power for the Dictator Saddam Hussein, who was a

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 215 ISBN: 978-960-474-152-6

Sunni Muslim. The Sunni Triangle borders the

Persian Gulf with the Tigris and Euphrates rivers

providing a source of environmental enrichment.

Figure 1. The Republic of Iraq and its

Surroundings

Figure 2 shows the extent of the Sunni Triangle,

which is roughly a triangular area with its three

corners at Baghdad (east side of the triangle), Ramadi

(west side), and Tikrit (north side). Iraq has four

geographical regions, the desert to the west, and the

mountains to the north between Upper Tigris and

Euphrates rivers near Iran. Tigris and Euphrates

rivers flow through the alluvial plane. The Tigris and

the Euphrates rivers’ wealth of natural resources have

caused wars throughout the centuries. The wars

have transformed different religions and cultures

based on the ruler at the time and the beginning

transformation of the Muslim nation we now call Iraq

today.

During the periods of 1453-1683, there was a

growth of territorial, economic, and cultural

development adding to the growth of Iraq. During

the period 1747-1831 Ottoman Empire was ruled by

Mamluk Officers of Georgiana. During this era the

population of Ottoman increased fewer than 5 million

by the 20th century and the population consisted of

Sunni and Shiites. The Shia Islam grew because of

the conversion of Sunni Islam to Shia Islam. The

Ottoman era is important because it contains the

history of Sunni Islam and Shia Islam. Both groups

are insurgents in the war against U.S.-led coalition

forces in Iraq. An understanding of the existence and

history of the Sunni and Shia Islam helps understand

the behavior and the motive behind insurgent attacks

in Iraq.

Figure 2. Iraq’s “Sunni Triangle”

(Source:

http://en.wikipedia.org/wiki/Sunni_Triangle)

3. Effect of Urban Infrastructure on Insurgency

The urban infrastructure helps predict attacks

because often insurgent attacks are focused on

government, political symbols, crowded marketplace,

and complex urban streets and buildings. In the case

of Iraqi insurgents Saddam Hussein’s palace sits in

the Sunni Triangle and its name so because majority

of the population are Sunni. So, when Iraq was

conquered the U.S.-led coalition forces took over the

palace and majority of the Sunni Triangle. Because

of the urban infrastructure that the U.S.-led coalition

forces have now taken over insurgent attacks can be

expected to undermine the U.S.-led coalition to keep

control over the area.

As the strategic environment has become less

stable, more uncertain, and more dangerous, Army

forces must be trained and ready to address persistent

and evolving urban threats. These threats range from

regional conventional military forces, paramilitary

forces, guerrillas, and insurgents to terrorists,

criminal groups, and angry crowds. These threats can

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 216 ISBN: 978-960-474-152-6

hide in plain sight and become indistinguishable from

the noncombatant urban population that may help

shield, protect, and sustain them. Although uncertain

about events, Army forces can be clear about trends.

Increasingly, the Army will face threats that severely

differ in doctrine, organization, and equipment, are

skilled at developing and adapting techniques to

counter Army tactics, techniques, and procedures

(TTP), and can fully interact with the three other

components of the urban battlefield—terrain, society,

and infrastructure. In urban operations, commanders

must broaden their concept of the threat to include

natural disasters, hunger and starvation, and rampant

disease. Further, commanders must plan to contend

with many passive urban threats, such as

psychological illnesses and toxic industrial materials

(TIM). These threats may be found in isolation, but

most likely commanders will encounter them in

various combinations. Moreover, each new threat

will pose a different combination and likely have

new capabilities that previous opponents lacked

(Quadrennial Defense Review Report, 30 September

2001), [19].

4. GIS-based Modeling of Iraqi Insurgency

Recent insurgency in Iraq has shown that insurgents

constantly change tactic to be successful and cause

maximum damage, in carrying out their missions.

Therefore, spatial and temporal tracking of

insurgency activities assume particular significance.

Geographic Information System (GIS) technology

can be exploited for spatial and temporal tracking of

insurgent activities. We have developed an

insurgency model using information on insurgency

trends through newspaper articles, worldwide web,

and other sources. The following steps are

undertaken to create the model:

Step 1: Using insurgency trends create an insurgency

database

Step 2: Obtain GIS compatible spatial maps of Iraq

and the City of Baghdad

Step 3: Map the insurgency database onto the Iraqi

(including city of Baghdad) spatial map

Step 4: Develop a GIS-based algorithm to investigate

the insurgency trend over time and space, to allow

spatial and temporal tracking of insurgency activities

The model (Fig. 3) may help answer the

following question: does geography and terrain play

any role in the decisions insurgents make? Further,

based on the historical trend of insurgent activities

vulnerable and safe locations can be identified using

a user-specified threshold criteria (see, Figure 4).

Figure 3. GIS-based Insurgency Modeling

Framework

Figure 4. Steps in Identifying Vulnerable and Safe

Locations

5. Application of the Insurgency Model in Iraq

The above insurgency model (Fig. 3) is applied to

assist the U.S. Army in developing counter-terrorism

activities in Iraq. As an example, on a GIS

compatible spatial city map of Baghdad (Fig. 5) we

show locations of insurgency incidents between Nov.

1, 2006-April 30, 2007. At a minimum, we include

the following information in a GIS database (Fig. 6)

pertaining to the incidents:

• No_Killed

• Date

• Iraqi_Killed

Insurgency activities obtained from the Database

Attack 1

Attack 2…

Attack … n

Categorization By GIS Model

o Responsible Parties o Attack Severity o Type of attack

Vulnerable and Safe Locations

Data

Management

Database

Map files

Map Display

Modeling

Controls

Coverage

Management

Modeling

Output

Point

Management

Spatial

Referencing Data Ouput

Controls

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 217 ISBN: 978-960-474-152-6

• US_Troop_Killed

• Type_of_Attack

• Responsible_parties

We use alphanumeric key-codes to represent certain

information. For example, Possible Type of Attacks

range from 1-10; Possible Responsible Parties range

from A-D. The key-codes and kept in a separate

document.

Using the above model we show the following:

• A bar graph of No_Killed in different type of

attacks over a sample specified time period (Fig.

7).

• A bar graph of No_Killed by different

responsible parties over the specified time period

(Fig. 8).

• The monthly variation of No_Killed over the

specified time period (Fig. 9).

• Approximate area of the most vulnerable and

safest neighborhoods. For this, we use a

threshold No_Killed value and draw a buffer

around points where No_Killed exceeded the

threshold value to represent most vulnerable

areas. A similar procedure is followed to show

safest neighborhoods (see, Figs. 10-12).

Figure 5. Spatial GIS Map of Baghdad

Figure 6. GIS Database of Insurgent Attacks

Figure 7. Bar graph showing temporal variation of

No_Killed in different types of attacks

Figure 8. Bar graph showing temporal variation of

No_Killed by different responsible parties

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 218 ISBN: 978-960-474-152-6

Figure 9. Bar graph showing monthly variation of

No_Killed

Figure 10. Snapshot of the GIS Algorithm

Figure 11. GIS Program Output

Figure 12. Sample GIS Program Code showing

buffered Regions of Safest and Vulnerable Places

6. Conclusions and Recommendations

In this paper we studied the causes of insurgency,

developed a mathematical model to predict the

likelihood of an individual turning into an insurgent,

and developed a GIS-based model to investigate the

insurgency trend over space and time in Iraq. A fast

and efficient model that can show the insurgency

trend over space and time can assist the decision-

makers in the Armed forces to appropriately allocate

resources and contingencies as part of counter-

insurgency activities. The conceptual GIS and

mathematical models developed herein can further be

expanded and tested after developing a

comprehensive insurgency database. Data on

insurgent activities can be obtained from news media

and worldwide web and will have to be entered into

the GIS database. The reliability of the model results

will largely depend on the accuracy of the datasets.

7. Future Works

Future works will include populating the GIS

database with trends in insurgency activity obtained

from various sources, such as news media and

worldwide web. It will also include adding a 3-

dimensional modeling capability and bringing up the

GIS capability in an online environment.

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 219 ISBN: 978-960-474-152-6

8. Acknowledgements

This project was partially funded by the Knowledge

Integration and Management Center for Excellence

(KIMCOE)-Morgan State University. The authors

are thankful to undergraduate students Marlon

Browne, Jamere James, and Victor Jennings for

undertaking some of the earlier works in connection

with the GIS compatible insurgency database

development. The authors are also thankful to Dr.

LeeRoy Bronner for leading the KIMCOE research

team dealing with insurgency modeling and

providing appropriate software tools and resources

for carrying out the research.

References:

[1] Cooper, H. (1977). “What is a Terrorist? A

Psychological Perspective.” Legal Medical

Quarterly 1: 8-18

[2] Hoffman, B. (1993). Holly Terror. Santa

Monica: RAND.

[3] http://en.wikipedia.org/wiki/Geography_of_Iraq [4] http://en.wikipedia.org/wiki/Iraq [5] http://geography.about.com/library/cia/blciraq.ht

m

[6] http://glimpseofiraq.blogspot.com/2005/02/sunni

-shiite-iraq.html

[7] http://glimpseofiraq.blogspot.com/2005/02/sunni

-shiite-iraq.html

[8] http://news.yahoo.com/s/afp/20091010/wl_midea

st_afp/lifestyleiraqreligionalcohol

[9] http://www.arab.de/arabinfo/iraq.htm

[10] http://www.defensetech.org/archives/002057.html#

[11] http://www.fastcompany.com/blog/chris-

dannen/techwatch/predicting-attacks-

iraq?nav=inform-rl

[12] http://www.globalsecurity.org/military/world/ira

q/images/terrain.gif

[13] http://www.globalsecurity.org/military/world/ira

q/terrain.htm

[14] http://www.infoplease.com/ce6/history/A086017

6.html

[15] http://www.washingtonpost.com/wp-

srv/world/countries/iraq.html?nav=el

[16] Laquer, W. (1999). The New Terrorism.

Oxford University Press, NY.

[17] Merari, A. (1993). Terrorism and Political

Violence, Vol. 5, No. 4, pp 213-251)

[18] O’Connor, R.T. North Carolina Wesleyan

College. Slide Presentation on “The Psychology

of Terrorism.”

[19] Quadrennial Defense Review Report, (30

September 2001)

[20] Ruvalcaba, J. (2004). Understanding Iraq’s Insurgency. The Fletcher School Online Journal

for issues related to Southwest Asia and Islamic

Civilization, Spring 2004, Article 7

[21] Stern, J. (2003). Terror in the Name of God.

Harper Collins, NY.

[22] Taylor, M. & Ryan, H. (1988). “Fanaticism,

Political Suicide and Terrorism.” Terrorism

11(2): 91-111

RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS

ISSN: 1790-5117 220 ISBN: 978-960-474-152-6


Recommended