study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist...

Upload: rashmi1357

Post on 30-May-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    1/23

    IFIMBUSINESSSCHOOL

    2009

    PROJECT

    ON

    STATISTICSTo study the trend of the terrorist attacks in the time

    period(2003-2008) by various banned/terrorist outfits

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    2/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 2

    STATISTICS PROJECT REPORTSTATISTICS PROJECT REPORTSTATISTICS PROJECT REPORTSTATISTICS PROJECT REPORT

    ON

    A STUDY

    PRESENTED BY

    TAPAS RANJAN OJHA, SOBHANSON DAS, SNEHASHISH

    GOSWAMI, RASHMI NARAYAN SAMANTASINGHAR

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    3/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 3

    CONTENTS

    Acknowledgements...................................................................3

    Objectives & Scopes..................................................................4

    Introduction...............................................................................5

    Statistics in studying the trend in terrorism...............................10

    Appendices...............................................................................19

    -Abbreviations...........................................................................19

    -Definitions................................................................................20

    -References...............................................................................21

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    4/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 4

    ACKNOWLEDGEMENTS

    The most important acknowledgement, by far, is to the officers of the paramilitary

    forces who helped us with invaluable data to bring this project into the current

    shape. We thank Mr.Parminder Singh, from Intelligence Bureau, who put his

    considerable experience and wisdom at our disposal in the early stages of theproject. We are highly indebted to all the personnel working with ADUGODI and

    ANANDNAGAR police division to have helped us with vital data at various stages of

    our project, directly or indirectly. We also extend our heartfelt thanks to the

    Dy.Commandant ,CISF of ISRO division for having provided us with his priceless

    time out of his highly busy schedule which formed a strong base for the foundation of

    the project. Search engine GOOGLE and BING deserves a space for thanks for

    without their miraculous tool the project would not have seen the light of the day.

    Words will not be enough to express our gratitude to Mr.R.Ballasubramanian,

    Mr.C.K.Sandhu, Mr.J.C.Gehlot whose work on understanding the trend of terrorism

    was of immense help. We are again thankful to all the officers for allowing us to get

    access to highly prohibited area to materialise the project.

    Our heartfelt thanks are due to all the people who indirectly directed us to proper

    authorities and the places where they can be approached for the most difficult part

    of the project-data collection. We thank all the people who were directly or

    indirectly associated with the project, as the space is not sufficient to name all of

    them. It would be a huge injustice not to mention all the classmates who boosted our

    morale high whenever we thought of scrapping the sensitive project and starting a

    fresh one.

    Last but not the least, we are highly thankful to our professor Mr.Shivakumar who,

    not only provided us with the vision to undertake the project, But also put in

    herculean endeavours to introduce significant statistical tools to us which helped us

    all throughout the project.

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    5/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 5

    OBJECTIVES & SCOPES

    1. To study the trend of the terrorist attacks in the time period (2003-2008) by

    various banned/terrorist outfits.

    SCOPE: In strategising counter terrorism policies making use of the past data and its

    analysis.

    2. To study the degree of association between

    a) The strength(in numbers) of INFORMERS cum DIRECT FIELD OPERATION

    PERSONNEL of IB & RAW

    and

    b) Number of major terrorist attacks in 2008.

    SCOPE: In making optimum use of the strength and formulating deployment policies

    learning from the mistakes committed.

    3. To find out the chances of property being damaged when casualties are already

    reported and casualties when properties have got damaged already, in course of a

    militant attack.

    SCOPE: In analysing the chances of both loss of life and public property in attacks to

    come and how to equip ourselves to counter that situation

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    6/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 6

    INTRODUCTION

    What is Terrorism?What is Terrorism?What is Terrorism?What is Terrorism?

    Terrorism is not new, and even though it has been used since the beginning of

    recorded history it can be relatively hard to define. Terrorism has been described

    variously as both a tactic and strategy; a crime and a holy duty; a justified reaction to

    oppression and an inexcusable abomination. Obviously, a lot depends on whose

    point of view is being represented. Terrorism has often been an effective tactic for

    the weaker side in a conflict. As an asymmetric form of conflict, it confers coercive

    power with many of the advantages of military force at a fraction of the cost. Due to

    the secretive nature and small size of terrorist

    organizations, they often offer opponents no clear

    organization to defend against or to deter.

    That is why pre-emption is being considered to be so

    important. In some cases, terrorism has been a means to

    carry on a conflict without the adversary realizing the

    nature of the threat, mistaking terrorism for criminal

    activity. Because of these characteristics, terrorism has

    become increasingly common among those pursuing

    extreme goals throughout the world. But despite its

    popularity, terrorism can be a nebulous concept. Even

    within the Indian Government, agencies responsible for

    different functions in the ongoing fight against terrorism use different definitions.

    The Indian Department of Defence defines terrorism as the calculated use of

    unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce

    or to intimidate governments or societies in the pursuit of goals that are generally

    political, religious, or ideological. Within this definition, there are three key

    elementsviolence, fear, and intimidationand each element produce terror in its

    victims. The CBI uses this: "Terrorism is the unlawful use of force and violence

    against persons or property to intimidate or coerce a government, the civilian

    population, or any segment thereof, in furtherance of political or social objectives."The RAW defines "terrorism" to be "premeditated politically-motivated violence

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    7/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 7

    perpetrated against non-combatant targets by sub-national groups or clandestine

    agents, usually intended to influence an audience.

    Outside the Indian Government, there are greater variations in what features of

    terrorism are emphasized in definitions. The United Nations produced this definition

    in 1992; "An anxiety-inspiring method of repeated violent action, employed by (semi-)

    clandestine individual, group or state actors, for idiosyncratic, criminal or political

    reasons, whereby - in contrast to assassination - the direct targets of violence are

    not the main targets." The most commonly accepted academic definition starts with

    the U.N. definition quoted above, and adds two sentences totalling another 77 words

    on the end; containing such verbose concepts as "message generators" and

    'violence based communication processes." Less specific and considerably less

    verbose, the British Government definition of 1974 is"the use of violence for

    political ends, and includes any use of violence for the purpose of putting the public,

    or any section of the public, in fear."

    Terrorism is a criminal act that influences an audience beyond the immediate victim.

    The strategy of terrorists is to commit acts of violence that .draws the attention of

    the local populace, the government, and the world to their cause. The terrorists plan

    their attack to obtain the greatest publicity, choosing targets that symbolize what

    they oppose. The effectiveness of the terrorist act lies not in the act itself, but in the

    publics or governments reaction to the act. For example, in 1972 at the Munich

    Olympics, the Black September Organization killed 11 Israelis. The Israelis were the

    immediate victims. But the true target was the estimated 1 billion people watching

    the televised event.

    The Black September Organization used the high visibility of the Olympics to

    publicize its views on the plight of the Palestinian refugees. Similarly, in October

    1983, Middle Eastern terrorists bombed the Marine Battalion Landing Team

    Headquarters at Beirut International Airport. Their immediate victims were the 241

    U.S. military personnel who were killed and over 100 others who were wounded.

    Their true target was the American people and the U.S. Congress. Their one act of

    violence influenced the United States decision to withdraw the Marines from Beirut

    and was therefore considered a terrorist success.

    There are three perspectives of terrorism: the terrorists, the victims, and thegeneral publics. The phrase one mans terrorist is another mans freedom fighter

    is a view terrorists themselves would accept. Terrorists do not see themselves as

    evil. They believe they are legitimate combatants, fighting for what they believe in,

    by whatever means possible. A victim of a terrorist act sees the terrorist as a

    criminal with no regard for human life. The general publics view is the most

    unstable. The terrorists take great pains to foster a Robin Hood image in hope of

    swaying the general publics point of view toward their cause. This sympathetic view

    of terrorism has become an integral part of their psychological warfare and needs to

    be countered vigorously

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    8/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 8

    Terrorist BehavioTerrorist BehavioTerrorist BehavioTerrorist Behaviouuuurrrr

    There is clearly a wide choice of definitions for terrorism. Despite this, there are

    elements in common among the majority of useful definitions. Common threads of

    the various definitions identify terrorismas:

    Political

    Psychological

    Coercive

    Dynamic

    Deliberate

    PoliticalPoliticalPoliticalPolitical

    A terrorist act is a political act or is committed with the intention to cause a political

    effect. Clausewitz' statement that "war is a continuation of policy by other means" is

    taken as a truism by terrorists. They merely eliminate the intermediate step of

    armies and warfare, and apply violence directly to the political contest.

    PsychologicalPsychologicalPsychologicalPsychological

    The intended results of terrorist acts cause a psychological effect ("terror"). They

    are aimed at a target audience other than the actual victims of the act. The intended

    target audience of the terrorist act may be the population as a whole, some specific

    portion of a society (an ethnic minority, for example), or decision-making elites in the

    society's political, social, or military populace.

    CoerciveCoerciveCoerciveCoercive

    Violence and destruction are used in the commission of the act to produce the

    desired effect. Even if casualties or destruction are not the result of a terrorist

    operation, the threat or potential of violence is what produces the intended effect.

    For example, a successful hostage taking operation may result in all hostages being

    freed unharmed after negotiations and bargaining. Regardless of the outcome, the

    terrorist bargaining chips were nothing less than the raw threat of applying violence

    to maim or kill some or all of the hostages. When the threat of violence is not

    credible, or the terrorists are unable to implement violence effectively, terrorism

    fails.

    DynamicDynamicDynamicDynamic

    Terrorist groups demand change, revolution, or political movement. The radical

    worldview that justifies terrorism mandates drastic action to destroy or alter the

    status quo. Even if the goals of a movement are reactionary in nature, they require

    action to "turn back the clock" or restore some cherished value system that is

    extinct. Nobody commits violent attacks on strangers or innocents to keep things

    "just the way they are."

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    9/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 9

    DeliberateDeliberateDeliberateDeliberate

    Terrorism is an activity planned and intended to achieve particular goals. It is a

    rationally employed, specifically selected tactic, and is not a random act. Since the

    victims of terrorist violence are often of little import, with one being as good for the

    terrorists' purposes as another, victim or target selection can appear random or

    unprovoked. But the target will contain symbolic value or be capable of eliciting

    emotional response according to the terrorists' goals. Remember that the actual

    target of terrorism is not the victim of the violence, but the psychological balance

    Media ExploitationMedia ExploitationMedia ExploitationMedia Exploitation

    Terrorism's effects are not necessarily aimed at the victims of terrorist violence.

    Victims are usually objects to be exploited by the terrorists for their effect on a third

    party. In order to produce this effect, information of the attack must reach the target

    audience. So any terrorist organization plans for exploitation of available media to

    get the message to the right audiences. Victims are simply the first medium that

    transmits the psychological impact to the larger target audience. The next step intransmission will depend on what media is available, but it will be planned, and it will

    frequently be the responsibility of a specific organization within the terrorist group

    to do nothing else but exploitand control the news cycle.Some organizations can rely on friendly or sympathetic news outlets, but this is notnecessary. News media can be manipulated by planning around the demands of the"news cycle", and the advantage that control of the initiative gives the terrorist.Pressures to report quickly, to "scoop" competitors, allow terrorists to presentclaims or make statements that might be refuted or critically commented on if timewere available. Terrorists often provide names and details of individual victims to

    control the news media through its desire to humanize or personalize a story. Forthe victims of a terrorist attack, it is a certainty that the impact on the survivors (ifthere are any) is of minimal importance to the terrorists. What is important is theintended psychological impact that the news of their death or suffering will cause ina wider audience.

    Operations in Permissive SocietiesOperations in Permissive SocietiesOperations in Permissive SocietiesOperations in Permissive SocietiesTerrorists conduct more operations in societies where individual rights and civillegal protections prevail. While terrorists may base themselves in repressiveregimes that are sympathetic to them, they usually avoid repressive governmentswhen conducting operations wherever possible. An exception to this case is arepressive regime that does not have the means to enforce security measures.

    Governments with effective security forces and few guaranteed civil liberties havetypically suffered much less from terrorism than liberal states with excellent security

    forces. Al Qaeda has shown, however, that they will conduct operations anywhere.

    Illegality of MethodsIllegality of MethodsIllegality of MethodsIllegality of MethodsTerrorism is a criminal act. Whether the terrorist chooses to identify himself withmilitary terminology (as discussed under insurgencies below), or with civilianimagery ("brotherhood", "committee", etc.), he is a criminal in both spheres. Theviolations of civil criminal laws are self-evident in activities such as murder, arson,and kidnapping regardless of the legitimacy of the government enforcing the laws.Victimizing the innocent is criminal injustice under a dictatorship or a democracy. Ifthe terrorist claims that he is justified in using such violence as a military combatant,he is a de facto war criminal under international law and the military justice systemsof most nations.

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    10/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 10

    Preparation and SupportPreparation and SupportPreparation and SupportPreparation and SupportIt's important to understand that actual terrorist operations are the result ofextensive preparation and support operations. Media reporting and academic studyhave mainly focused on the terrorists' goals and actions, which is precisely what theterrorist intends. This neglects the vital but less exciting topic of preparation andsupport operations. Significant effort and coordination is required to finance groupoperations, procure or manufacture weapons, conduct target surveillance andanalysis, and deliver trained terrorists to the operational area. While the time andeffort expended by the terrorists may be a drop in the bucket compared to theamounts spent to defend against them, terrorist operations can still involve largeamounts of money and groups of people. The need for dedicated support activitiesand resources on simple operations are significant, and get larger the greater thesophistication of the plan and the complexity of the target.

    Goals and Motivations of TerroristsGoals and Motivations of TerroristsGoals and Motivations of TerroristsGoals and Motivations of Terrorists

    Ideology and motivation will influence the objectives of terrorist operations,

    especially regarding the casualty rate. Groups with secular ideologies and non-

    religious goals will often attempt highly selective and discriminate acts of violence to

    achieve a specific political aim. This often requires them to keep casualties at the

    minimum amount necessary to attain the objective. This is both to avoid a backlash

    that might severely damage the organization, and also maintain the appearance of a

    rational group that has legitimate grievances. By limiting their attacks they reduce

    the risk of undermining external political and economic support. Groups that

    comprise a "wing" of an insurgency, or are affiliated with aboveground, sometimes

    legitimate, political organizations often operate under these constraints. Thetensions caused by balancing these considerations are often a prime factor in the

    development of splinter groups and internal factions within these organizations.

    In contrast, religiously oriented and millenarian groups typically attempt to inflict as

    many casualties as possible. Because of the apocalyptic frame of reference they

    use, loss of life is irrelevant, and more casualties are better. Losses among their co-

    religionists are of little account, because such casualties will reap the benefits of the

    afterlife. Likewise, non-believers, whether they are the intended target or collateral

    damage, deserve death, and killing them may be considered a moral duty. The

    Kenyan bombing against the U.S. Embassy in 1998 inflicted casualties on the localinhabitants in proportion to U.S. personnel of over twenty to one killed, and an even

    greater disparity in the proportion of wounded (over 5000 Kenyans were wounded

    by the blast; 95% of total casualties were non-American ). Fear of backlash rarely

    concerns these groups, as it is often one of their goals to provoke overreaction by

    their enemies, and hopefully widen the conflict.

    The type of target selected will often reflect motivations and ideologies. For groups

    professing secular political or social motivations, their targets are highly symbolic of

    authority; government offices, banks, national airlines, and multinational

    corporations with direct relation to the established order. Likewise, they conduct

    attacks on representative individuals whom they associate with economic

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    11/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 11

    exploitation, social injustice, or political repression. While religious groups also use

    much of this symbolism, there is a trend to connect it to greater physical

    devastation. There also is a tendency to add religiously affiliated individuals, such as

    missionaries, and religious activities, such as worship services, to the targeting

    equation.

    Another common form of symbolism utilized in terrorist targeting is striking onparticular anniversaries or commemorative dates. Nationalist groups may strike tocommemorate battles won or lost during a conventional struggle, whereas religiousgroups may strike to mark particularly appropriate observances. Many groups willattempt to commemorate anniversaries of successful operations, or the executionsor deaths of notable individuals related to their particular conflict. Likewise, strikingon days of particular significance to the enemy can also provide the required impact.Since there are more events than operations, assessment of the likelihood of anattack on a commemorative date is only useful when analyzed against theoperational pattern of a particular group or specific members of a group'sleadership cadre.

    The Intent of Terrorist GroupsThe Intent of Terrorist GroupsThe Intent of Terrorist GroupsThe Intent of Terrorist Groups

    A terrorist group commits acts of violence to-

    Produce widespread fear Obtain worldwide, national, or local recognition for their cause by attracting

    the attention of the media Harass, weaken, or embarrass government security forces so that the the

    government overreacts and appears repressive Steal or extort money and equipment, especially weapons and ammunition

    vital to the operation of their group Destroy facilities or disrupt lines of communication in order to create doubt

    that the government can provide for and protect its citizens Discourage foreign investments, tourism, or assistance programs that can

    affect the target countrys economy and support of the government in power Influence government decisions, legislation, or other critical decisions Free prisoners Satisfy vengeance Turn the tide in a guerrilla war by forcing government security forces to

    concentrate their efforts in urban areas. This allows the terrorist group toestablish itself among the local populace in rural areas

    STATISTICS IN STUDYING THE TREND IN TERRORISM

    Having discussed, what terrorism is about? , The attributes of the terrorists

    mindsets which provoke them to actuate merciless ideas and the goals and

    motivations that are standardized behind this inhuman act of violence,it is high

    time,we introduce certain simple mathematical tools to analyse the trend of

    terrorism in the time frame 2003-2008.

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    12/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 12

    Let us mathematically illustrate the tendencies that this heinous crime against

    mankind has witnessed during 2003-2008.

    For this analysis,we make use of the data pertaining to various banned/terrorist

    outfits and the attacks they have given shape during the time period 2003-2008,as

    labelled against them by the ministry of defence, Government of India.The data areas enunciated under :

    TERRORIST/BANNED GROUP INCIDENTS(2003-2008)

    CPI(M) 67

    ULFA 32

    AM 15

    JeM 36

    HuJI 31

    SIMI 8

    AQ 8

    JuD 14

    IM 17

    HuJeI 8

    TeJ 1

    HM 34

    LeT 69

    The above table illustrates the number of attacks carried out by the respective

    outfits during 2003-2008.

    We calculated the mean for the above distribution which came out to be 26.15

    Mean=26.15

    Which itself is an indicative of the dreaded situation. The above data infers that on an

    average 26 terrorist attacks have taken place which were given shape by the abovementioned groups in 6 years which implies that more than 4 major attacks have

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    13/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 13

    taken place each year on an average for the last six years which itself is the sleeve

    up alert for the defence system of India.

    Proceeding further we calculated the median which came out to be 17

    Med=17

    Since, the data set comprises of extreme values as the lowest number of incidents

    registered is 1 whereas the highest being 69,the median is likely to provide a better

    measure of central location than the mean. Even with the consideration of median,

    the threat to the security is hardly curtailed as the average number of attacks an

    year still amounts to more than 2.While the attack on November 26, 2008 at Taj hotel

    Mumbai left 380 casualties and over 1300 injured, hence, an estimated occurrence

    of more than 2 major incidents a year is a huge setback to the security system and a

    threat to life and property alike.

    The mode for the above distribution comes out to be 8

    Mode=8

    From the table above, it can also be inferred that the major challenge to the security

    of India is internal than external. With the frequency of attacks by CPI(M) highly

    active in central, eastern and south eastern belt of India, this group is proving to be a

    major warning to the internal security of the territory and study shows that its area of

    operation is rapidly expanding and is now trying to cover the south western India too

    under its terror map.

    LeT with its notorious blasts in J&K and along the line of border with few ofbombings at McMahan border line is another big threat to the internal security of

    India. Their frequencies of blast have augmented in past 3 years along the border of

    Pakistan.

    ULFA in the North-East have also accentuated their dynamic participation in

    violence as the number of incidents reported are 32 which is 4 less than the

    incidents given shape by JeM,an external agency.

    From the above observation it can be inferred that the distribution is positively

    skewed as Mean>Med>Mode

    Hence, the concentration of values is more towards the right side of the average of

    the distribution

    Hence, The above distribution can be represented as under :

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    14/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 14

    Where, Mean>Med>Mode

    Let us now proceed to find the Standard Deviation of the above distribution. The

    standard deviation on calculation comes out to be 21.79 which is mathematically a

    high figure.

    STDEV=21.79

    Hence the extent of scatterings of the data in the above data set from the central

    value is high. Had there been a consistency in the occurrence of the terroristincidents in the given time frame, the STDEV would have been less, but as the

    STDEV for the above data set is high, it can be inferred that the occurrence of these

    incidents were inconsistent, and hence, it was difficult to obtain a pattern as to

    which time during a year the frequency of attacks were more and hence a proper

    counter measure could not be formulated.

    Let us formulate the z-scores of each of the observations pertaining to each group

    ZCPI(M)=1.8

    ZULFA=0.26

    ZAM=-0.5

    ZJeM=0.45

    ZHuJI=0.22

    ZSIMI=-0.83

    ZAQ=-0.83

    ZJuD=-0.56

    ZIM=-0.41

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    15/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 15

    ZHuJeI=-0.83

    ZTeJ=-1.15

    ZHM=0.36

    ZLeT=1.9

    Hence, From above values of z-scores it can be inferred that there are no outlayers

    as the z-score lies between -1.15 and 1.9.There are no values of z-score which

    corresponds to either >3 or >-3.

    LeT is 1.9 STDEV away from mean i.e. farthest in positive side(more) and TeJ is -

    1.15 STDEV away from mean, i.e. farthest in the negative side(less than)

    Now, let us compute the value of (Mean-1STDEV) and (mean+1STDEV)

    The range comes out to be 4.09 and 48.67

    Now, we might simply notice that the values 1,69 and 67 does not fall into this range.

    Rest all the 10 values are within this range which makes 76 percentage of the total

    values in the data set.

    Empirical rule states that at least 68 percentage of the values will fall in the aforesaid

    range which holds good in this scenario.

    Now, similarly let us get the value for (Mean +2STDEV) and (Mean-2STDEV).The

    range comes out to be -18.2 and 69.73.As the number of incidents can not be

    negative let us confine the minimum limit to zero. Hence from the observation wemight see that all the data values fall in this range.

    Empirical rule states that at least 95 percentage of the values should lie in the

    aforesaid range which holds good again in this scenario.

    Hence, the data in the data set are believed to approximate the positively skewed

    normal distribution.

    Now, let us consider a bivariate distribution. This bivariate distribution analysis will

    essentially throw light on the effectiveness of the operation of IB&RAW personnel

    during the year 2008.

    Let, X representsthe strength (in numbers) of INFORMERS cum DIRECT FIELDOPERATION PERSONNEL of IB & RAW

    And, Y represents number of major terrorist attacks in 2008.

    MONTH X Y

    JAN 625 1

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    16/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 16

    FEB 559 0

    MARCH 521 3

    APRIL 530 1

    MAY 510 1

    JUNE 536 0

    JULY 532 2

    AUG 517 1

    SEP 517 4

    OCT 523 4

    NOV 579 1

    DEC 583 1

    As we see from the above table, we can generalize the performance of the IB and

    RAW in the year 2008.From February to march there was decline in the strength

    which gave way for 3 major attacks in march, one blast in the army camp at

    Kupwada, another at Dras and an attack in CRPF camp at Beladila. On April, there

    was sudden rise in strength owing to the attacks in preceding months hence the

    attack dropped down to 1,maoist attack on RPF camp at Jhajha.But there after there

    had been a aberrant trend that was seen

    The strength kept on decreasing and hence, the attacks augmented, the IB and RAW

    could come into action only on December by the time major attacks like the one in

    November at Nariman point, Victoria terminal and Taj, one of the major, already took

    place.

    Let us find out the degree of association among these 2 variables

    Using Karl-pearsons correlation,

    SDx=35.05

    SDy=1.38

    COV(X,Y)=-17.61

    Therefore, r =-17.61/(35.05X1.38)=-0.36

    From the value of r, it can be inferred that the two variables are moderately

    negatively co-related.Hence,i t would not be wrong to put in question the

    effectiveness of the personnels performance of RAW & IB to optimum the optimum

    level.

    Now with the data observed in 2008,

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    17/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 17

    Let N be the no. Of incidents took place in 2008.

    A be the event of people being killed when an attack takes place.

    B be the event of property being damaged when an attack takes place.

    Now, in total of the 19 cases there were 17 cases where there had been casualties.

    And in 18 cases, property has been damaged.

    Hence P(A)=f/N=17/19=0.89

    P(B)=f/N=18/19=0.94

    Where,

    f is the frequency favouring the event and N is the total number of occurence

    These two events are not mutually exclusive

    Hence, the chances of casualties occurring in next terrorist attacks are at a very

    higher side slated to be around 89 %

    And the chances that the next attack would bring in damage to the property is about

    94 percent

    The number of events wherein both, there have been casualties as well as damage

    to property are essentially 17.

    Hence, P(A intersection B)=17/19=0.89

    Now,probability that in an attack there have been casualties while damage to

    property has already taken place = P(A|B)=P(A intersection B)/P(B)=0.89/0.94=0.95

    And the chances of vice versa is=P(B|A)=P(A intersection B)/P(A)=0.89/0.89=1

    THIS IS ALMOST SURE!

    Hence, statistically there is a lot that can be predicted about the future. Let us see

    what it would look like based on our evaluation and input by Terrorism expert, IB,Mr.Gehlot

    Future Trends in TerrorismFuture Trends in TerrorismFuture Trends in TerrorismFuture Trends in Terrorism

    As a conflict method that has survived and evolved through several millennia to

    flourish in the modern information age, terrorism continues to adapt to meet the

    challenges of emerging forms of conflict, and exploit developments in technology

    and society. Terrorism has demonstrated increasing abilities to adapt to counter-terrorism measures and political failure. Terrorists are developing new capabilities

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    18/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 18

    of attack and improving the efficiency of existing methods. Additionally, terrorist

    groups have shown significant progress in escaping from a subordinate role in

    nation-state conflicts, and becoming prominent as international influences in their

    own right. They are becoming more integrated with other sub-state entities, such as

    criminal organizations and legitimately chartered corporations, and are gradually

    assuming a measure of control and identity with national governments

    Adaptive Capabilities of Terror GroupsAdaptive Capabilities of Terror GroupsAdaptive Capabilities of Terror GroupsAdaptive Capabilities of Terror Groups

    Terrorists have shown the ability to adapt to the techniques and methods of counter-

    terror agencies and intelligence organizations over the long term. The

    decentralization of the network form of organization is an example of this. Adopted

    to reduce the disruption caused by the loss of key links in a chain of command, a

    network organization also complicates the tasks of security forces, and reduces

    predictability of operations.

    Terrorists have also been quick to use new technologies, and adapt existing ones to

    their uses. The debate over privacy of computer data was largely spurred by the

    specter of terrorists planning and communicating with encrypted data beyond law

    enforcement's ability to intercept or decode this data. To exchange information,

    terrorists have exploited disposable cellular phones, over the counter long-distance

    calling cards, Internet cafes, and other means of anonymous communications.

    Embedding information in digital pictures and graphics is another innovation

    employed to enable the clandestine global communication that modern terrorists

    require.

    Terrorists have also demonstrated significant resiliency after disruption by counter-

    terrorist action. Some groups have redefined themselves after being defeated or

    being forced into dormancy. The Shining Path of Peru (Sendero Luminosa) lost its

    leadership cadre and founding leader to counter-terrorism efforts by the Peruvian

    government in 1993. The immediate result was severe degradation in the operational

    capabilities of the group. However, the Shining Path has returned to rural operations

    and organization in order to reconstitute itself. Although not the threat that it was,

    the group remains in being, and could exploit further unrest or governmental

    weakness in Peru to continue its renewal.

    In Italy, the Red Brigades (Brigate Rossi) gradually lapsed into inactivity due to

    governmental action and a changing political situation. However, a decade after thesupposed demise of the Red Brigades, a new group called the Anti-Capitalist Nuclei

    emerged exhibiting a continuity of symbols, styles of communiqus, and potentially

    some personnel from the original Red Brigade organization. This ability to

    perpetuate ideology and symbology during a significant period of dormancy, and re-

    emerge under favorable conditions demonstrates the durability of terrorism as a

    threat to modern societies.

    IncreasingIncreasingIncreasingIncreasing Capabilities of TerroristsCapabilities of TerroristsCapabilities of TerroristsCapabilities of TerroristsTerrorists are improving their sophistication and abilities in virtually all aspects oftheir operations and support. The aggressive use of modern technology for

    information management, communication and intelligence has increased theefficiency of these activities. Weapons technology has become more increasingly

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    19/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 19

    available, and the purchasing power of terrorist organizations is on the rise. Theready availability of both technology and trained personnel to operate it for anyclient with sufficient cash allows the well-funded terrorist to equal or exceed thesophistication of governmental counter-measures.

    Likewise, due to the increase in information outlets, and competition with increasingnumbers of other messages, terrorism now requires a greatly increased amount ofviolence or novelty to attract the attention it requires. The tendency of major mediato compete for ratings and the subsequent revenue realized from increases in theiraudience size and share produces pressures on terrorists to increase the impactand violence of their actions to take advantage of this sensationalism.

    Today, most experts believe that certain parts of the Middle East, Pakistan andAfghanistan are turning out to be the main power centers for terrorism. Decades oflawlessness and corruption have seen Islamic terrorist groups fill the power vaccumin this region and continue to turn out an alarming number of religiously motivatedterrorists.

    THANK YOU

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    20/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 20

    APPENDICES

    1. ABBREVIATIONS USED IN THE PROJECT

    IB Intelligence bureau

    RAW Research & Analysis Wing

    CPI(M) Communist Party of

    India(Maoist)

    ULFA United Liberation Front of

    Assam

    AM Al Mansurian

    LeT Lashkar-e-Taiba

    JeM Jaish-e-Mohammed

    HuJI Harkat-ul-jihad-Islami

    SIMI Students Islamic Movement of

    India

    AQ Al-Qaeda

    JuD Jamat-ud-Dawa

    IM Indian Mujahideen

    HuJeI Harkat-ul-Jihad_e-islami

    TeJ Tehrik-e-Jaffiria

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    21/23

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    22/23

    PROJECT ON STATISTICS

    P G D M 0 9 - 1 1 , I F I M B - S C H O O L Page 22

    c)Standard deviation:

    Where : xi-u represents the gap from the mean

    And n is the number of observation. N=n-1

    d)covariance: The covariance between two real-valued random variables Xand Y, withexpected values and is defined as

    e)Correlation:

    Degree of relationship between the variables under study

    f) Probability:

    It is a numerical measure of the possible outcomes of a non-deterministic

    experiment.

    3.REFERENCES

    a)Crime journal

    b)Gazette of India

    c)The Hindu

    d) Web Portals

    -Naxalwatch.blogshot.com

    -Democratic.undergronud.com

    -world-check.com

    -worldpress.com

    -dawn.com

    -indiamart.news.com

    -news.outlookindia.com

    -Bing.com

  • 8/9/2019 study the trend of the terrorist attacks in the time period(2003-2008) by various banned/terrorist outfits

    23/23

    PROJECT ON STATISTICS

    -Google.com

    -terrorwatch.com

    -cdi.org

    -fas.org/irp/world/india/ib

    e) Terrorism and homeland security : An introduction-Jonathan R.White

    f) Inside Terrorism- Bruce Hoffman

    g)Insurgency and Terrorism: From Revolution to Apocalypse-Bard O'Neillh)Oxford English Lexicon

    i)26/11 commission report