RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS Modeling the Insurgent Activities with a Geographic Information System: A Case Study from Iraq MANOJ K. JHA1, BHEEM KATTEL2, AND MARCUS CARWELL3 Morgan State University 1700 East Cold Spring Lane Baltimore, MD 21251, USA 1 [email protected], [email protected], [email protected] Abstract: - This paper investigates the root causes of insurgency and exploits a Geographic Information System (GIS) to model the effects of terrain and urban infrastructure on insurgent behavior. It develops a mathematical model that can predict the likelihood of an individual turning into an insurgent based on various contributory factors. Insurgency in Iraq and Afghanistan has been on the rise, primarily to fight the United States (U.S.)-led coalition forces. Insurgents often seek complex terrain and urban infrastructure to ambush U.S.-led coalition forces which are carrying out military missions in Iraq and Afghanistan. Using examples from Iraq we model spatial and temporal trends in insurgent activities with a GIS, which may help understand the overall insurgency and behavior of insurgents who carry out attacks against U.S-led coalition forces. Key words: - terrain and urban infrastructure, insurgency, GIS. organizations, we can relate that to be a product of human behavior and certain human motives. Jim Ruvalcaba [20] has categorized insurgency into anarchists, egalitarians, traditionalists, pluralists, secessionists, reformists, and preservationists. Anarchists wish to eliminate the institutionalized political arrangement while the egalitarians seek to impose a new system based on ultimate value of distributional equality. Similarly, traditionalists seek to displace political system based on sacred values rooted in ancestral ties and religion and pluralists seek to establish a system in which values of individual freedom, liberty, and compromise are emphasized. Secessionists renounce the existing political system and seek to constitute a new and independent political community, reformists seek more political, social, and economic benefits but do not reject the political community or system of authority, and preservationists seek to maintain the status quo because of the political, social, and economic privileges they receive from it. Thomas O’Connor [18] categorizes the motives behind insurgent behavior into political, religious, sociological, psychological, psychiatric, and biological. He also classifies the contributory factors causing terrorist behavior into ( a1 …., a12 ): 1. Introduction Insurgency is not a new phenomenon. It has existed for over 100 years in many parts of the world, such as many African countries, Thailand, Somalia, Nepal, Kashmir, Iraq, and Afghanistan, to name a few. In this paper we explore the literature to understand the root causes of insurgency. We develop a mathematical model that may predict the likelihood of an individual turning into an insurgent due to various contributory factors. Finally, we exploit the Geographic Information System (GIS) to model insurgency trends over space and time in Iraq, which may help understand the influence of terrain and urban infrastructure on insurgent behavior. In the next section we discuss the root causes of insurgency. 1.1 Root Causes of Insurgency No human being is born corrupt or insurgent. It is the upbringing, the environment, social and economic factors that help in molding an individual’s behavior in a positive or negative direction [1-2, 16, 21-22]. According to the Central Intelligence Agency (CIA), insurgency is defined as, “a protracted political-military activity directed toward completely or partially controlling the resources of a country through the use of irregular military forces and illegal political organizations.” Since the definition includes military forces and political ISSN: 1790-5117 a. Precipitating factor ( a1 ) b. Biological: recognizes the influence of hormonal changes ( a 2 ) 213 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS in turning him into an insurgent. If sufficient number of (say, 100 or more) such captured insurgents from courtiers such as Iraq and Afghanistan were interviewed, a reliable mathematical relationship as noted in Eq. (1) can easily be established to predict the likelihood of an individual turning into an insurgent. Moreover, if sufficient insurgency data were available, the relative sensitivities of the 12 contributory factors could also be analyzed. We will perform this analysis in future works after collecting data on insurgency from news media and worldwide web. c. Psychological: recognizes the influences of rational choice and psychological drives ( a3 ) d. Psychological inclinations: relates terrorists as psychopaths (Cooper, 1977), alienated, depressive and a suicidal fanatic (Taylor, 1988; Laquer, 1999; and Stern, 2003) ( a 4 ) e. Facilitating factor ( a5 ) f. Religious/philosophy: about half of all the terrorist groups have a religious factor as cover (Hoffman, 1993) ( a 6 ) g. Sociological: Hypotheses such as frustrationaggression, relative-depravation, negativeidentity, narcissistic-rage, and moraldisengagement, have been attributed as facilitating factor for insurgency behavior ( a7 ) 2. Iraqi Insurgency Based on the contributory factors mentioned above, Iraqi insurgency can also be linked to human behavior. The strategies followed by the insurgents there, can be protracted war and urban warfare in which the insurgents attempt to prolong the fight because they know that ruling authority has force advantage and the insurgents employ terrorism as a key factor in destabilizing the society and its government. Among the various tactics used by insurgents in general [17], the Iraqi insurgents seem to have utilized psychological, strategy of chaos, and expressive terrorism, in which they try to take a swift deceptive move aimed at getting the enemy offbalance, or create an atmosphere of chaos to demonstrate the government’s inability to impose law and order, or to express dissatisfaction about something (in this case, the occupation by the US Military) without the intention of seizing power. Economy being one of the main factors for rising insurgency, the current widespread unemployment in Iraq and Afghanistan can have major impact in the recruitment of people for insurgent activities and hence the increase in insurgency. Sociological factors can also be aiding in the rising number of insurgency and can be facilitating it. Relative depravation hypothesis assumes that people get frustrated when the privileges enjoyed by them are taken away or similar others are getting favored advantages. This frustration can help in changing an individual into an insurgent. Similarly, death or disability caused to a family member by the government forces (justifiably or otherwise) can create a feeling of hatred and vengeance. This might ultimately be a reason for the insurgent behavior. h. Philosophical beliefs ( a8 ) i. Triggering factors ( a9 ) j. Opportunity ( a10 ) k. Means ( a11 ) l. Suitability of target ( a12 ) 1.2 Mathematical Representation of the Likelihood of an Individual turning into an Insurgent Based on above classification, mathematically, the likelihood of an individual turning into an Insurgent (I) can be expressed as the following equation: I = α 1 a1 + α 2 a 2 + ..... + α 12 a12 (1) where, α 1 ......α 12 are the coefficients of the 12 contributing factors whose values represent the relative strengths of the 12 factors contributing to turning an individual into an insurgent. If enough data were available then one could easily calculate I which may help predict the likelihood of an individual turning into insurgent. In order to numerically represent the values of the 12 contributory factors, qualitative information may be first collected and later represented on a scale of 1-10 where 1 being very weak and 10 being very strong. For example, an insurgent can be interviewed and asked to provide answers to the above 12 contributory factors on a scale of 1-10, which aided ISSN: 1790-5117 214 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS calculates a pattern of events such as transportation routes, topography and local geography. Being familiar with the geography of the area helps establish human spatial behavior. 2.1 Iraqi Insurgency Following U.S.-Led Invasion of Iraq Since the US-led invasion of Iraq in March 2003 numerous insurgent attacks have led to the deaths of many US-led coalition forces [3-15]. The insurgency has proven to be a challenge for the US in the war against Iraq. The insurgents implement attacks using Improvised Explosive Device (IED). The primary types of IED encountered by troops in Iraq are command-wire, remote and vehicle born IEDs, or VBIEDs (Michael J. Carden, March 2005), [3-15]. The command-wire IEDs use a detonation switch such as a car alarm, at one end of the wire and the explosives at the other end. Remote detonated IEDs are ignited by a transmitter similar to a cordless phone. The VBIEDs are vehicles turned bomb and they may have an extra wire and can be detonated by command wire or remote device. The use of IEDs enables the insurgents to attack unexpectedly and from long distances. When an attack is implemented they are able to fade into the population undetected. Because of these war tactics, being familiar with the geography, terrain, and infrastructure and population density can help locate insurgents and decrease deaths from IEDs. 2.3 History of Iraqi Regime The Iraqi Empire formally known as the Ottoman Empire (1299-1922) was invaded by the British during World War I. In 1920 Iraq was mandated by the UK and obtained its independence as a country in 1932 and the Republic of Iraq was declared in 1958. Over the years a number of dictators ruled Iraq but none more influential than Saddam Hussein. During his rule Saddam Hussein waged a territorial war against Iran from 1980 to 1988 and conquered Kuwait in 1990. Iraq was driven out of Kuwait during the Gulf War from January to February of 1991 by U.S.-led and UN coalition forces. During the freeing of Kuwait the UN Security Council (UNSC) called for Iraq to discard the complete arsenal of weapons of mass destruction, long range missiles and allow the UN council to confirm with an inspection. Iraq refused UNSC inspections over a period of 12 years and a U.S.-led invasion of Iraq occurred in March 2003 with the defeat of Saddam Hussein’s regime. The U.Ss and UN coalition forces remained in Iraq to help rebuild the infrastructure and implement a democracy while dealing with the persistent attacks by insurgents. Iraq was given sovereignty by the Coalition Provisional Authority in June 2004. Iraqis voted on January 2005 to have a Transitional National Assembly with 275 members to outline a new constitution to begin elections at the end of 2005. 2.2 Geographic Profiling Human spatial behavior in many forms can be analyzed and profiled, including where victims were picked up or dropped off, where phone calls were made, credit card and automatic teller machine (ATM) use, where graffiti or posters appear, and where supplies were purchased. Geographic profiling uses these and other factors to formulate a "hunting ground" as well as the most likely locations of a criminal within the hunting ground (Henry Kucera 2005), [3-15]. Geographic profiling has been effective even when criminals are aware of the technique and attempt to behave randomly. For these and other reasons, geographic profiling has significant potential as a tool for counter-insurgency. The U.S. National Technology Alliance (NTA) completed an evaluation of whether these types of analysis tools would be useful to aid in the hunt for insurgents, weapons caches and sources of bomb materials, thereby reducing civilian and military casualties (Henry Kucera, 2005), [3-15]. The basis for geographic profiling is an algorithm that ISSN: 1790-5117 2.4 Geography of Iraq The Republic of Iraq is located 33 00 N, 44 00 E, south east of Saudi Arabia bordering the Persian Gulf and Kuwait (see, Fig. 1). Iraq sits in the Middle East with Turkey to the Northwest, Jordan and Syria to the west and Saudi Arabia to the South West with Iran to the east and Kuwait to the South East. Iraq covers an area 136,235 sq mi which is three times the size of Ohio at 48,828 sq miles. Residing in the Sunni Triangle (Fig. 2), Iraq is densely populated consisting of Tikrit, Baqubah, Ramadi, Samarra and Fallujah. This area consists of Sunni Muslims and the Sunni Triangle (Fig. 2) which represented an area of power for the Dictator Saddam Hussein, who was a 215 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS Ottoman era is important because it contains the history of Sunni Islam and Shia Islam. Both groups are insurgents in the war against U.S.-led coalition forces in Iraq. An understanding of the existence and history of the Sunni and Shia Islam helps understand the behavior and the motive behind insurgent attacks in Iraq. Sunni Muslim. The Sunni Triangle borders the Persian Gulf with the Tigris and Euphrates rivers providing a source of environmental enrichment. Figure 2. Iraq’s “Sunni Triangle” (Source: http://en.wikipedia.org/wiki/Sunni_Triangle) Figure 1. The Republic of Iraq and its Surroundings Figure 2 shows the extent of the Sunni Triangle, which is roughly a triangular area with its three corners at Baghdad (east side of the triangle), Ramadi (west side), and Tikrit (north side). Iraq has four geographical regions, the desert to the west, and the mountains to the north between Upper Tigris and Euphrates rivers near Iran. Tigris and Euphrates rivers flow through the alluvial plane. The Tigris and the Euphrates rivers’ wealth of natural resources have caused wars throughout the centuries. The wars have transformed different religions and cultures based on the ruler at the time and the beginning transformation of the Muslim nation we now call Iraq today. During the periods of 1453-1683, there was a growth of territorial, economic, and cultural development adding to the growth of Iraq. During the period 1747-1831 Ottoman Empire was ruled by Mamluk Officers of Georgiana. During this era the population of Ottoman increased fewer than 5 million by the 20th century and the population consisted of Sunni and Shiites. The Shia Islam grew because of the conversion of Sunni Islam to Shia Islam. The ISSN: 1790-5117 3. Effect of Urban Infrastructure on Insurgency The urban infrastructure helps predict attacks because often insurgent attacks are focused on government, political symbols, crowded marketplace, and complex urban streets and buildings. In the case of Iraqi insurgents Saddam Hussein’s palace sits in the Sunni Triangle and its name so because majority of the population are Sunni. So, when Iraq was conquered the U.S.-led coalition forces took over the palace and majority of the Sunni Triangle. Because of the urban infrastructure that the U.S.-led coalition forces have now taken over insurgent attacks can be expected to undermine the U.S.-led coalition to keep control over the area. As the strategic environment has become less stable, more uncertain, and more dangerous, Army forces must be trained and ready to address persistent and evolving urban threats. These threats range from regional conventional military forces, paramilitary forces, guerrillas, and insurgents to terrorists, criminal groups, and angry crowds. These threats can 216 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS hide in plain sight and become indistinguishable from the noncombatant urban population that may help shield, protect, and sustain them. Although uncertain about events, Army forces can be clear about trends. Increasingly, the Army will face threats that severely differ in doctrine, organization, and equipment, are skilled at developing and adapting techniques to counter Army tactics, techniques, and procedures (TTP), and can fully interact with the three other components of the urban battlefield—terrain, society, and infrastructure. In urban operations, commanders must broaden their concept of the threat to include natural disasters, hunger and starvation, and rampant disease. Further, commanders must plan to contend with many passive urban threats, such as psychological illnesses and toxic industrial materials (TIM). These threats may be found in isolation, but most likely commanders will encounter them in various combinations. Moreover, each new threat will pose a different combination and likely have new capabilities that previous opponents lacked (Quadrennial Defense Review Report, 30 September 2001), [19]. The model (Fig. 3) may help answer the following question: does geography and terrain play any role in the decisions insurgents make? Further, based on the historical trend of insurgent activities vulnerable and safe locations can be identified using a user-specified threshold criteria (see, Figure 4). Point Management Modeling Output Map files Data Management Spatial Referencing Data Ouput Controls Map Display Modeling Controls Figure 3. Framework 4. GIS-based Modeling of Iraqi Insurgency Attack 1 Recent insurgency in Iraq has shown that insurgents constantly change tactic to be successful and cause maximum damage, in carrying out their missions. Therefore, spatial and temporal tracking of insurgency activities assume particular significance. Geographic Information System (GIS) technology can be exploited for spatial and temporal tracking of insurgent activities. We have developed an insurgency model using information on insurgency trends through newspaper articles, worldwide web, and other sources. The following steps are undertaken to create the model: Attack 2… Attack …n Insurgency activities obtained from the Database GIS-based Insurgency Modeling Categorization By GIS Model o Responsible Parties o Attack Severity o Type of attack Vulnerable and Safe Locations Figure 4. Steps in Identifying Vulnerable and Safe Locations 5. Application of the Insurgency Model in Iraq Step 1: Using insurgency trends create an insurgency database The above insurgency model (Fig. 3) is applied to assist the U.S. Army in developing counter-terrorism activities in Iraq. As an example, on a GIS compatible spatial city map of Baghdad (Fig. 5) we show locations of insurgency incidents between Nov. 1, 2006-April 30, 2007. At a minimum, we include the following information in a GIS database (Fig. 6) pertaining to the incidents: • No_Killed • Date • Iraqi_Killed Step 2: Obtain GIS compatible spatial maps of Iraq and the City of Baghdad Step 3: Map the insurgency database onto the Iraqi (including city of Baghdad) spatial map Step 4: Develop a GIS-based algorithm to investigate the insurgency trend over time and space, to allow spatial and temporal tracking of insurgency activities ISSN: 1790-5117 Coverage Management Database 217 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS • • • US_Troop_Killed Type_of_Attack Responsible_parties We use alphanumeric key-codes to represent certain information. For example, Possible Type of Attacks range from 1-10; Possible Responsible Parties range from A-D. The key-codes and kept in a separate document. Using the above model we show the following: • • • • A bar graph of No_Killed in different type of attacks over a sample specified time period (Fig. 7). A bar graph of No_Killed by different responsible parties over the specified time period (Fig. 8). The monthly variation of No_Killed over the specified time period (Fig. 9). Approximate area of the most vulnerable and safest neighborhoods. For this, we use a threshold No_Killed value and draw a buffer around points where No_Killed exceeded the threshold value to represent most vulnerable areas. A similar procedure is followed to show safest neighborhoods (see, Figs. 10-12). Figure 6. GIS Database of Insurgent Attacks Figure 7. Bar graph showing temporal variation of No_Killed in different types of attacks Figure 5. Spatial GIS Map of Baghdad Figure 8. Bar graph showing temporal variation of No_Killed by different responsible parties ISSN: 1790-5117 218 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS Figure 9. Bar graph showing monthly variation of No_Killed Figure 12. Sample GIS Program Code showing buffered Regions of Safest and Vulnerable Places 6. Conclusions and Recommendations In this paper we studied the causes of insurgency, developed a mathematical model to predict the likelihood of an individual turning into an insurgent, and developed a GIS-based model to investigate the insurgency trend over space and time in Iraq. A fast and efficient model that can show the insurgency trend over space and time can assist the decisionmakers in the Armed forces to appropriately allocate resources and contingencies as part of counterinsurgency activities. The conceptual GIS and mathematical models developed herein can further be expanded and tested after developing a comprehensive insurgency database. Data on insurgent activities can be obtained from news media and worldwide web and will have to be entered into the GIS database. The reliability of the model results will largely depend on the accuracy of the datasets. Figure 10. Snapshot of the GIS Algorithm 7. Future Works Future works will include populating the GIS database with trends in insurgency activity obtained from various sources, such as news media and worldwide web. It will also include adding a 3dimensional modeling capability and bringing up the GIS capability in an online environment. Figure 11. GIS Program Output ISSN: 1790-5117 219 ISBN: 978-960-474-152-6 RECENT ADVANCES in CIRCUITS, SYSTEMS, SIGNAL and TELECOMMUNICATIONS [18] O’Connor, R.T. North Carolina Wesleyan College. Slide Presentation on “The Psychology of Terrorism.” [19] Quadrennial Defense Review Report, (30 September 2001) [20] Ruvalcaba, J. (2004). Understanding Iraq’s Insurgency. The Fletcher School Online Journal for issues related to Southwest Asia and Islamic Civilization, Spring 2004, Article 7 [21] Stern, J. (2003). Terror in the Name of God. Harper Collins, NY. [22] Taylor, M. & Ryan, H. (1988). “Fanaticism, Political Suicide and Terrorism.” Terrorism 11(2): 91-111 8. Acknowledgements This project was partially funded by the Knowledge Integration and Management Center for Excellence (KIMCOE)-Morgan State University. The authors are thankful to undergraduate students Marlon Browne, Jamere James, and Victor Jennings for undertaking some of the earlier works in connection with the GIS compatible insurgency database development. The authors are also thankful to Dr. LeeRoy Bronner for leading the KIMCOE research team dealing with insurgency modeling and providing appropriate software tools and resources for carrying out the research. References: [1] Cooper, H. (1977). “What is a Terrorist? A Psychological Perspective.” Legal Medical Quarterly 1: 8-18 [2] Hoffman, B. (1993). Holly Terror. Santa Monica: RAND. [3] http://en.wikipedia.org/wiki/Geography_of_Iraq [4] http://en.wikipedia.org/wiki/Iraq [5] http://geography.about.com/library/cia/blciraq.ht m [6] http://glimpseofiraq.blogspot.com/2005/02/sunni -shiite-iraq.html [7] http://glimpseofiraq.blogspot.com/2005/02/sunni -shiite-iraq.html [8] http://news.yahoo.com/s/afp/20091010/wl_midea st_afp/lifestyleiraqreligionalcohol [9] http://www.arab.de/arabinfo/iraq.htm [10] http://www.defensetech.org/archives/002057.ht ml# [11] http://www.fastcompany.com/blog/chrisdannen/techwatch/predicting-attacksiraq?nav=inform-rl [12] http://www.globalsecurity.org/military/world/ira q/images/terrain.gif [13] http://www.globalsecurity.org/military/world/ira q/terrain.htm [14] http://www.infoplease.com/ce6/history/A086017 6.html [15] http://www.washingtonpost.com/wpsrv/world/countries/iraq.html?nav=el [16] Laquer, W. (1999). The New Terrorism. Oxford University Press, NY. [17] Merari, A. (1993). Terrorism and Political Violence, Vol. 5, No. 4, pp 213-251) ISSN: 1790-5117 220 ISBN: 978-960-474-152-6
© Copyright 2026 Paperzz