PAST EVENTS

2024

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006



When and how an attack is going to happen?

The PANEL OF EXPERTS will provide insights into vital tools for counter-terrorism, in order to further understand the patterns of terrorist attacks as well as when and how an attack is going to happen, using mathematical models, big data analytics, open source intelligence, including the Hawkes process.

The Panel of Experts including.....

Dr Varanyu Suchivoraphanpong, Chief Executive Officer, Demeter ICT Company Limited, Thailand


World

Terrorism Risk Index,
Big Data Analytics,
Balanced Scorecard Framework
& Changing Approach
to Identify & Disrupt
all Terrorist Plots

Conference 2017

  1. Overview
  2. Programme
  3. Gallery
  4. Delegates
  5. Exhibitors
  6. Exhibition Opportunities
PROGRAMME
DAY ONE (16 May 2017 )
08:30 Registration
09:00 Introduction
09:15 Can science predict where terrorists will strike?
10:00 Morning Refreshments
10:15 Harnessing the power of big data analytics to determine the key factors most closely associated with terrorism
11:00 Building the operational imperative to deal with terrorism
11:45 Balanced scorecard method for predicting the probability of a terrorist attack
12:30 Lunch
14:00 Demonstrating the possibility in calculating a quantitative value of risk for terrorist attack
14:45 Examine factors pivotal to understanding public reaction to a terrorist strike, including predicting and modeling public response to a variety of different contingencies involving terrorism: methodological challenges
15:30 Afternoon Refreshments
15:45 Will it ever be possible to profile the terrorist?
16:30 Panel Discussion
17:00 End of Day 1
DAY TWO (17 May 2017 )
09:00 Introduction
09:15 Exploring how terrorism as a methodology has spread over the years and regions
10:00 Morning Refreshments
10:15 Analyzing the terrorist social networks with visualization tools to demonstrate the possibility in calculating a quantitative value of risk for terrorist attack
(Analyzing of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations, including a time-lapse map of global terrorist hotspots and victim breakdowns per attack. Such knowledge is important to understand how terrorism has changed over time and for developing effective combating strategies against terrorism).
11:00 A quantitative assessment on 26/11 Mumbai attack using social network analysis (SNA) to look for pattern in numerous data stream that may help prevent the next terrorist attack
(This session analyses the terror attacks in Mumbai on 26 November 2008, popularly known as 26/11 terror attacks. The SNA technique is used to analyze the behavior of the ten attackers and their telephone communications with their handlers in Pakistan even as the attacks were in progress, is based on the open source information, including to identify key members, sub-groups and the interaction among the various members of the group. Therefore, the analysis gives useful insights into the modus operandi of the terrorists, in order to demonstrate the possibility in calculating a quantitative value of risk for terrorist attack and to look for patterns in numerous data stream that may help prevent the next terrorist attack).
11:45 What does radicalization look like and lessons to be taken into account when detecting and countering radicalization towards violent extremism
12:30 Lunch
14:00 Modeling the terrorist's process of valuation in order to curb online extremism, terrorist propaganda and radicalization campaign
14:45 Modeling the terrorist’s perceptions by reviewing the balancing act to claim responsibility after an attack and the strategic decision to uplift the survival as an organization
(The need for terrorist groups to claim responsibility after an attack in order to accelerate terrorist's objective to induce fear, gain attention and highlight their motto and why at times, terrorists do not claim responsibility for a devastating attack. It is all about the strategic decision to enhance the survival as an organization more than the need for publicity, and the likely outcome provides critical information to model the terrorist's perceptions and value systems based on current expected political fallout with regards to the need to uplift the survival of an organization).
15:30 Afternoon Refreshments
15:45 Parameters to gauge the terrorism risk index and determining the key factors most closely associated with terrorism
16:30 Concluding Panel Discussion
17:00 End of Conference

Current technologies do not address the needs for handling massive, diverse and ever-changing volumes of information, furthermore, current tools are insufficient to support for complex tasks of analysis and discovery process, that is necessary to enhance situational awareness that will shift focus from reactive approach of security challenges and terrorism to proactive approach aimed at nipping the act in the bud, as such, this conference will address how it is now possible to predict the final probability of attack of specific targets and target systems, while question remains….. Will it ever be possible to profile the Terrorist?


The spate of terrorist attacks has been on the increase in the last few years. The recent successes recorded by terrorist elements have been attributed to lack of actionable intelligence that would enable preventive action against terrorists. Identifying members of terrorist organizations and preventing them from carrying out successful attacks is a core component of any anti-terrorism effort. If terrorist profiling is possible, it would be an irresistibly attractive method for countering terrorist attacks as it would maximize the efficiency of prophylactic resource allocation and increasing the likelihood of the interception of a terrorist attack. Nevertheless, it is possible to model the terrorist's process of valuation if we understand the terrorist's perceptions, value systems, scenario requirements, spatial relationships and likely outcomes. Therefore, to successfully defeat terrorism, there is a need for actionable intelligence gathering in order to enhance effective repositioning of the country’s security system. Technologies are needed that will support the application of human judgment to make the best possible use of this information and share it with others as appropriate to prevent, deter and respond to threats.
Current technologies do not address the needs for handling these massive, diverse and ever-changing volumes of information. Furthermore, current tools provide very little in the way of support for the complex tasks of the analysis and discovery process. Against this development, World Terrorism Risk Index, Big Data Analytics, Balanced Scorecard Framework & Changing Approach to Identify & Disrupt all Terrorist Plots Conference 2017, explores how Terrorism Risk Index, big data analytics and balanced scorecard framework can be used to generate investigative lead and electronically gather intelligence for combating terrorism, through analysis of the dark web portal, including to predict the probability of a terrorist attack, as well as to enhance the possibility in calculating a quantitative value of risk for terrorist attack in order to enhance operational imperative and to build the capacity to deal with terrorism. In addition, delegates will be armed with new strategy to search out information that might prevent the next terrorist attack, looking for patterns in numerous data streams that may help predict an attack as well as to piece together information buried in disparate data to spot an emerging attack before it can be executed, including to improve situational awareness by transcending from reactive approach of security challenges and terrorism to proactive approach aimed at nipping the act in the bud.