How to Use BigData In Predicting Terrorist Attacks

Image result for abuja bomb blast


Research has shown that one way to combat these attacks is to identify trends in the attacker’s methods then use those trends to predict their future actions Some trends from these attacks show important day-to-day correlations.
If we can draw inferences from those correlations, then we may be able to save lives by heightening awareness of possible events or changing the allocation of our security assets to provide more protection.
There is no doubt that this sort of research, Needs data, models that work
This means we can attach the significance of real-world data into a GIS data model and use the data to predict which potential smuggling routes a criminal group may use as opposed to another route.  
Common GIS research might entail collecting data about attacks that have occurred and simply mapping and reporting where they occurred.  When we apply GIS to analyze why the groups attacked these particular targets, we can better predict where future terrorist attacks might take place.  GIS analysis attempts to identify the following about a target to help determine why they were attacked:
·         The target’s vulnerability,
·         The target’s location,
·         And the target’s value to a terrorist organization based on their ideological motivations.
Knowing these factors, policy makers and emergency response personnel can better plan and prepare a response to these incidents, or perhaps even prevent the attack from occurring in the first place.
Collecting Expert Predictions about Terrorist Attacks
Regular surveys should be carried out by different media houses on the likely hood of terrorist attacks, and these results should be used by the security agents as an excuse to create more tightening security in those areas.
A number of contracts should be given out by the FGN with the Quixotic goal of predicting human behavior. With relation to Predicting Terrorist Attacks A modeling potential for predicting terrorist events should be designed.
We can start by using the following three -step process for the research:
1) Create a database of past attacks
2) Identify trends in the attacks;
3) Determine the correlation between attacks and use analysis to calculate the probabilities of future attacks and their location.
4) Use the information on ground to try to build predictive models that are workable
The goal should be to try to predict exactly when and what type of attack was going to happen next, band which target types, areas were more likely to be attacked next


No comments:

Post a Comment