Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2492517.2500241acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

PREVE: a policy recommendation engine based on vector equilibria applied to reducing LeT's attacks

Published: 25 August 2013 Publication History

Abstract

We consider the problem of dealing with the terrorist group Lashkar-e-Taiba (LeT), responsible for the 2008 Mumbai attacks, as a five-player game. However, as different experts vary in their assessment of players' payoffs in this game (and other games), we identify multi-payoff equilibria through a novel combination of vector payoffs and well-supported -approximate equilibria. We develop a grid search algorithm for computing such equilibria, and provide experimental validation using three payoff matrices filled in by experts in India-Pakistan relations. The resulting system, called PREVE, allows us to analyze the equilibria thus generated and suggest policies to reduce attacks by LeT. We briefly discuss the suggested policies and identify their strengths and weaknesses.

References

[1]
A. Mannes, "Qualitative analysis & computational techniques for the counter-terror analyst," Handbook of Computational Approaches to Counterterrorism, pp. 83--98, 2013.
[2]
V. Subrahmanian, A. Mannes, A. Sliva, J. Shakarian, and J. P. Dickerson, Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. Springer New York, 2012.
[3]
T. Schelling, The Strategy of Conflict. Harvard University Press, 1960.
[4]
L. Shapley and F. Rigby, "Equilibrium points in games with vector payoffs," Naval Research Logistics Quarterly, vol. 6, no. 1, pp. 57--61, 1959.
[5]
C. Daskalakis, P. W. Goldberg, and C. H. Papadimitriou, "The complexity of computing a nash equilibrium," in STOC, 2006.
[6]
R. Myerson, Game Theory: Analysis of Conflict. Harvard University Press, 1997.
[7]
J. P. Dickerson, A. Mannes, and V. Subrahmanian, "Dealing with Lashkar-e-Taiba: A multi-player game-theoretic perspective," in Open Source Intelligence and Web Mining (OSINT), Athens, Greece, 2011.
[8]
S. Tankel, Lashkar-e-Taiba: Past Operations and Future Prospects. New America Foundation, 2011.
[9]
X. Chen and X. Deng, "Settling the complexity of two-player Nash equilibrium," in FOCS, 2006.
[10]
R. Lipton, E. Markakis, and A. Mehta, "Playing large games using simple strategies," in EC'03. ACM, 2003, pp. 36--41.
[11]
B. B. de Mesquita, The Predictioneer's Game: Using the Logic of Brazen Self-Interest to See and Shape the Future. Random House, 2010.
[12]
F. Ozgul, J. Bondy, and H. Aksoy, "Mining for offender group detection and story of a police operation," in Proceedings of the Sixth Australasian Conference on Data Mining and Analytics. Australian Computer Society, 2007.
[13]
R. Lindelauf, P. Borm, and H. Hamers, "The influence of secrecy on the communication structure of covert networks," Social Networks, vol. 31, no. 2, pp. 126--137, 2009.
[14]
M. Ovelgönne, C. Kang, A. Sawant, and V. S. Subrahmanian, "Covertness centrality in networks," in ASONAM, 2012, pp. 863--870.
[15]
T. Sandler and W. Enders, "An economic perspective on transnational terrorism," European Journal of Political Economy, vol. 20, no. 2, pp. 301--316, 2004.
[16]
W. Enders and T. Sandler, "Terrorism: Theory and applications," Handbook of defense economics, vol. 1, pp. 213--249, 1995.
[17]
J. A. Major, "Advanced techniques for modeling terrorism risk," Journal of Risk Finance, The, vol. 4, no. 1, pp. 15--24, 2002.
[18]
R. Clarke, Lashkar-i-Taiba: The Fallacy of Subservient Proxies and the Future of Islamist Terrorism in India. Strategic Studies Institute, US Army War College, 2010.
[19]
S. Tankel, Storming the World Stage: The Story of Lashkar-e-Taiba. Columbia University Press, 2011.
[20]
W. John, Caliphate's Soldiers: The Lashkar-e-Tayyeba's Long War. Amaryllis Press and the Observer Research Foundation, 2011.
[21]
B. O. Riedel, Deadly embrace: Pakistan, America, and the future of the global Jihad. Brookings Institution Press, 2012.
[22]
L. Shapley and F. Rigby, "Equilibrium points in games with vector payoffs," Naval Research Logistics Quarterly, vol. 6, no. 1, pp. 57--61, 1959.

Cited By

View all
  • (2020)PIE: A Data-Driven Payoff Inference Engine for Strategic Security ApplicationsIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29571787:1(42-57)Online publication date: Feb-2020
  • (2015)Automated Generation of Counterterrorism Policies Using Multiexpert InputACM Transactions on Intelligent Systems and Technology10.1145/27163286:4(1-27)Online publication date: 10-Jul-2015
  • (2013)Suggested Counter-Terrorism PoliciesIndian Mujahideen10.1007/978-3-319-02818-7_9(115-132)Online publication date: 9-Nov-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
August 2013
1558 pages
ISBN:9781450322409
DOI:10.1145/2492517
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

ASONAM '13
Sponsor:
ASONAM '13: Advances in Social Networks Analysis and Mining 2013
August 25 - 28, 2013
Ontario, Niagara, Canada

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)PIE: A Data-Driven Payoff Inference Engine for Strategic Security ApplicationsIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29571787:1(42-57)Online publication date: Feb-2020
  • (2015)Automated Generation of Counterterrorism Policies Using Multiexpert InputACM Transactions on Intelligent Systems and Technology10.1145/27163286:4(1-27)Online publication date: 10-Jul-2015
  • (2013)Suggested Counter-Terrorism PoliciesIndian Mujahideen10.1007/978-3-319-02818-7_9(115-132)Online publication date: 9-Nov-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media