New Analytic Methods for the Exploitation of Open-Sourced Structured

Databases on the Pursuit of WMD Terrorism

(HDTRA1-10-1-0017)


Project Publications and Presentations

 
 

PUBLIC BRIEFS


START Background Report, April 18, 2013: Ricin Letters Mailed to President and Senator.  Read it onlineRead pdf.



PUBLICationS


Gary A. Ackerman and Lauren E. Pinson. "An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells." Terrorism and Political Violence 26 (2014):226-245. -- read it online.


Gary A. Ackerman, Mila Johns, Markus K. Binder, Jeffrey M. Bale, Victor Asal, R. Karl Rethemeyer, Amanda Murdie, Anatomizing Chemical and Biological Non-State Adversaries: Identifying the Adversary. May 2014. START Center, University of Maryland. -- read the research brief.


Victor H. Asal, Gary A. Ackerman, and R. Karl Rethemeyer. "Connections can be Toxic: Terrorist Organizational Factors and the Pursuit of CBRN Weapons.” Studies in Conflict & Terrorism 35 (2012): 229-254. -- read the full text


Victor H. Asal, H. Brinton Milward, and Eric Schoon. “When Terrorists Go Bad: Terrorist Organizations’ Involvement in Drug Smuggling.” International Studies Quarterly 58(1): in press (2014).


R.L. Breiger, G.A. Ackerman, V. Asal, D. Melamed, H.B. Milward, R.K. Rethemeyer, E. Schoon, “Application of a Profile Similarity Methodology for Identifying Terrorist Groups that Use or Pursue CBRN Weapons.” Pp. 26-33 in J. Salerno, S.J. Yang, D. Nau, S.-K. Chai (eds.), Social Computing, Behavioral-Cultural Modeling, and Prediction. Springer (Lecture Notes in Computer Science 6589), 2011. -- read the full text


Ronald L. Breiger and David Melamed, “The Duality of Organizations and their Attributes: Turning Regression Modeling ‘Inside Out.’” Research in the Sociology of Organizations 40 (2014): 261-274. (Volume on Contemporary Perspectives on Organizational Social Network Analysis edited by Stephen P. Borgatti, Daniel J. Brass, Daniel S. Halgin, Giuseppe (Joe) Labianca, and Ajay Mehra.)  -- Table of Contents.  -- read the full text


Ronald L. Breiger, Eric Schoon, David Melamed, Victor Asal, and R. Karl Rethemeyer. “Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade.” Social Networks 36 (2014): 23-39.  -- read the full text online.


Alexandra Pocek Joosse and H. Brinton Milward. “Organizational versus Individual Attribution: A Case Study of Jemaah Islamiyah and the Anthrax Plot.” Studies in Conflict and Terrorism 37(3): 237-257.(2014). -- Read the full text online.


David Melamed, Ronald L. Breiger, and Eric Schoon, “The Duality of Clusters and Statistical Interactions.” Sociological Methods & Research 42 (2013): 41-59. -- read the full text online -- download software to run algorithms described in this paper


David Melamed, R.L. Breiger, and A. Joseph West, “Community structure in multi-mode networks: Applying an eigenspectrum approach.” Connections: 33(2013): 18-23. -- read the full text online.


D. Melamed, E. Schoon, R. Breiger, V. Asal, and R.K. Rethemeyer, “Using Organizational Similarity to Identify Statistical Interactions for Improving Situational Awareness of CBRN Activities.” Pp. 61-68 in S.J. Yang, A.M. Greenberg, and M. Endsley (eds.), Social Computing, Behavioral-Cultural Modeling, and Prediction. Springer (Lecture Notes in Computer Science 7227), 2012. -- read the full text -- download software to run algorithms described in this paper.



PRESENTATIONS