UNIVERSITY OF DAYTON RESEARCH INSTITUTE Analyzing Terrorist Risk Levels An Alternative Methodology & Algorithmic Framework Wilson, Melody;Gaston, Cory 6/13/2013 United States security. This project explores a new methodology for identifying risk levels of potential threats through a computational program. By using an algorithm to analyze a number of variables we determine the risk level of a terrorist, terrorist group, or alleged terrorist organization. Variables include but are not limited to: location, structure, membership, funding, region, ethnicity and capabilities.The study of terrorist organizations is important to determine the full capacity in which a group can operate or attack at any given time. An increase in the number of terrorist groups with a wide array of capabilities and ideologies proliferate danger to Table of Contents EXECUTIVE SUMMARY ............................................................................................................ 2 INTRODUCTION .......................................................................................................................... 2 METHODOLOGY ......................................................................................................................... 3 Variable Diagram ........................................................................................................................ 4 Weighting .................................................................................................................................... 4 VARIABLES .................................................................................................................................. 5 Variable Spreadsheet ................................................................................................................... 5 Independent Variables ................................................................................................................. 6 Regions .................................................................................................................................... 6 Structure................................................................................................................................... 6 Support..................................................................................................................................... 7 Funding .................................................................................................................................... 8 Current & Past Conflicts.......................................................................................................... 8 Membership ............................................................................................................................. 9 Capabilities .............................................................................................................................. 9 Affiliation .............................................................................................................................. 10 Ideology ..................................................................................Error! Bookmark not defined. Co-Dependent Variables ........................................................................................................... 11 PROGRAM ................................................................................................................................... 12 Targets: ...................................................................................................................................... 12 User Input: ................................................................................................................................. 12 Program Ex. 1............................................................................................................................ 13 Program Ex. 2............................................................................................................................ 13 Coding/Output Screen Shots ..................................................................................................... 14 Output:....................................................................................................................................... 17 Limitation of Program: .............................................................................................................. 17 CONCLUSION ............................................................................................................................. 18 BIBLIOGRAPHY ......................................................................................................................... 19 1 EXECUTIVE SUMMARY Advancements in U.S. defense capabilities and intelligence have caused an increase in the emphasis on technology and education in the terrorist realm. These progressions have made it more challenging to protect the United States from immediate threats. Advancements in terrorist capabilities produce an increased demand for new ways to interpret data and meet these new challenges. Our goal is to deliver an alternative approach to analyzing terrorist networks through quantifying qualitative data analysis and computer science. Our computer program, the Terrorist Risk Level Program (TRLP), provides a way to catalog threat levels of terrorist/ terrorist organizations by analyzing characteristics and risk factors through a novel process that combines analytical reasoning and computer computations. The program uses an algorithm and weighted variables to calculate the probability in which a group’s capabilities can affect U.S. national security. Characteristics of groups are analyzed by weighing how each variable acts independently and, when relevant, co-dependently to enable the abilities of groups. A strong feature of this program is its ability to optimize large amounts of information by analyzing the key components that make terrorists dangerous. We do this by weighing the impact of critical components that aid in the abilities of terrorist networks. Assigning weighted factors allows for establishing importance as it relates to the impact of risk levels and priorities. In the final assessment, these weighted variables become a part of the calculation used to determine an accurate overall rating of a given organization. By simplifying the process of identifying a network or person’s risk level, the program enables the user to prioritize the importance of such groups based upon projected analysis. Nevertheless, this program is not intended to replace the analyst but to assist in cyphering through the nuances of infinite data and resources regarding the expectations of a terrorist group, person, or organization. This program can be useful to policymakers and analysts as a tool of reference for identifying terrorist risk levels. Improvements to the program are recommended in data storage after running the process, adding more dynamics to factors being analyzed, and also exploring different alternatives for calculation and weighting. The primary limitation of this program stems from the knowledge level of the user on the specific terrorist group. In other words, if the user is not informed or well aware of information regarding the terrorist factors being analyzed it can cause miscalculation or skewed perception of risk level. Another significant limitation could be over reliance on the software by the analyst. INTRODUCTION Although there is no universally accepted definition of terrorism, it is important to understand what it is and how it is perceived in order to counter terrorist acts on a national as well as 2 international level. 1,2 According to U.S. federal code, terrorism is defined as “the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.”3 Unfortunately, identifying terrorist organizations is a challenging task with consideration of the commonly used saying, "One man's terrorist is another's freedom fighter.”4,5 According to the U.S. Army handbook, “A Military Guide to Terrorism in the Twenty-First Century”: The threat of terrorism to the U.S. is present across the entire spectrum of conflict. The use of terrorism ranges from individual acts of wanton damage or destruction to property or person, to highly sophisticated operations conducted by organized extremist groups with social, environmental, religious, economic, or political agendas. Any of these terrorist activities can have significant negative impact on the conduct of missions by U.S. military forces.6 As a result of increased terrorist threats, the U.S. has used countless resources to develop new technologies that have the ability to aid the country in global security efforts. Nevertheless, as the years have passed, there has been a significant interest in the increase of terrorist organizations and alleged persons with the intent to harm the U.S. Studies show that between the years of 1970 and 2011, the United States experienced a total of 2,608 attacks and 226 of those attacks were fatal. 7 Preventing incidents such as those encountered during the September 11th attacks on the World Trade Center and the Pentagon fuel many government intelligence and security agencies to stay on the cutting edge of technology in science, cyber, and military tactics. Due to the increase in terrorist groups with the intent to harm the United State we developed TRLP to assist in aiding the US government, analyst and policymakers when analyzing possible terrorist risk levels. METHODOLOGY According to the FBI: “One of the most effective weapons in the prevention of terrorist attacks involves the gathering, analysis, and dissemination of intelligence and the full integration of that intelligence into investigations, operations, and crisis response.”8 Thus, different tools and research play critical roles in predicting motives of terrorist, threat levels, and intentions in our methodology. 1 (Terrorism, 97) (Terrorism Research) 3 (Plumer, 2013) 4 (What is Terrorism and Who Defines It?, 2013) 5 (Terrorism FAQ - Terrorism.com, 2012) 6 (PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models) 7 (Plumer, 2013) 8 (FBI) 2 3 In order to reduce bias, research was extracted from various sources such as government agencies, encyclopedias, reputable news sources, non-profit organizations (think tanks/research institutions) and scholarly articles to determine variables that associate terrorists with threats to the United States. The findings were analyzed, strategically assembled, weighted then compiled into charts based upon connections and significance. With easily accessible information, we constructed a computer program to determine the risk level of a specified terrorist group’s probability to attack the United States. We achieved this by collecting comprehensive information from the user relating to an organization, in which our program presents the risk level to be “Low”, “Medium”, “High” or “Extremely High.” Projected outputs are determined by the scoring/points a group or person receives once the variable weight values and algorithm are calculated. C++, an intermediate programming software, was used to write the coding for TRLP. By using C++, we were able optimize our findings based upon analyzed variables that are calculated using a linear algorithm. Variables refer but are not limited to: Ideology, Regions, Funding, Affiliation, Membership, Support and Structure. Variable Diagram Weighting When constructing an overall scale based on several variables, there is consideration that some of the variables are deemed more important than others. Weighting variables when adding 4 several in scale construction allows some of them to be given more weight based upon a variety of considerations. The simplest accumulation of variables with equal weights may be regarded as unfair when concluding that more important factors should be given more weight. These weights for given variables in this project arise from the data acquired through various procedures. Procedures involve factor analysis, which reduces a number of observed variables to a smaller number of underlying "factors", and each observed variable has a different weight towards each underlying factor. For example, the capabilities of a terrorist group or person(s) is weighted based on underlying factors such as weaponry, training, and technology which may impact the terrorist risk level by increasing the weight if a group possess a given factor. Qualitative data encompasses 83% of the factors being used to analyze the terrorist risk level. Quantitative data only accounts for 12% of the entire information gathered. In order to use the information from both data sets, everything had to be weighted with the intention of producing a numerical value that could be calculated into the final algorithm. The weighting of each individual variable allowed each factor to be represented on a scale of 1 to 5; with 1 being the lowest and 5 being the highest score obtainable. VARIABLES A total of 24 variables are used within the project to identify factors that play a role in increasing the ability of a terrorist group or person to attack the United States. 10 of these variables operate independently to impact the risk level, and the other 14 variables function as subcategories or codependent factors whose impact are influenced or influences that of the independent variable it is associated with. Below is a chart that summarizes the list of variables, definitions, and weights. Variable Spreadsheet **SHADED content denotes independent variables** Variable Region Structure Hierarchal Network Chain Network Hub/Star Network All-Channel Network Description Location of group/person How things are set-up; How orders are given/received All entities in organization are subordinate except one. There is hierarchy in the chain of command. More social, decentralized, and flexible. Has a wide span of control. Many interconnected groups. Linear flow of information and commands. Many networks interconnected and filtering through one central point of command. Many interconnected groups which the flow of command/information coming from multiple cells. Weight 6 9 3 5 3 4 5 5 Support Government Funding Government Aid Civilian/Popular Funding Current Conflicts Past Attacks Membership Size Recruitment Capabilities Training Weapons Technology Affiliations Societal Influences Culture Backing of groups that sustains the livelihood of group/persons abilities and resources Financial backing from government 8 Aid such as weapons, resources, etc. Acceptance from community/civilian population Financing consisting of the funds the cell needs to live and to plan, train for, and commit the terrorist act. Current issues post 2010 Attacks on the US prior to 2010 Who’s a part/ How many/ Why are they important Known/ Anticipated size of group Methods/ Status of members/Education Skills, aptitudes, and proficiencies the group/person has acquired or offers. Training camps/ preparation for recruits Bombs, guns, WMD, etc. Advanced capabilities Connected networks/enablers Philosophy/ values of group or person(s) Nature of their surroundings/Norms/extremes 5 2 5 5 3 2 4 1-5 5 10 3 5 5 7 1 1-5 Independent Variables Independent variables in this program are those deemed most important from acquired and analyzed information gathered during research. There are 10 independent variables, ranked on a scale of 1 to 10, based on the order of importance. This ranking provides a scalar for each variable that will be incorporated into the actual weight of the independent variable being assessed. For example, an independent variable with the ranking of 5 has a scalar of 5 for its calculation. Regions The location of a group or person can provide insight for evaluating outlooks toward the United States as well as judging the level of hostility of groups in a particular region. Geographic location can influence a group or person based upon stigmas that are imposed by the surroundings, economic standing, or government structure. Structure Association between or among terrorist groups increase their capabilities through the exchange of knowledge and other resources. With these common goals it allowed religions or organization to create affiliations and build several different structure types which increase their power, reach and capabilities. Simultaneously, it reduces sectarian conflict amongst the different religious 6 sects. There are two basis models of organizational structures of terrorist organizations; hierarchical and network structure with network structure having a variety of types. 9 Hierarchical structure organizations are those that have a well-defined vertical chain of command, control, and responsibility. In this type of structure, there will be specialized areas among the organization such as support, operations and intelligence. Usually the cell (individual group within the structure) leader will have acknowledgement of the other cells involved and their role. Each cell within the structure will have a particular political, social, or economic objective. Network structure is a little more complex and more prevalent in today’s organizations. A network distributes the responsibility for operations and plan for redundancies of key functions. As mentioned there are various types of network structures; the basic types are chain, hub/star, and all channel. Chain is designed so that each cell (group) is linked to the node in a sequence for a continuous link of communication; this is designed for smuggling goods, people or laundering money.10 Hub and Star network structure communication is directed at one central cell, not necessarily a leader or decision maker. It gives them the ability to communicate with the other cells; this structure is primary in financial or economic networks. All channel structure poses security risk considering all channels are connected and there is no command structure above it. The commands are distributed throughout the entire network with a continuous flow of communication; this enables the feasibility of directing orders. Support The U.S. Department of State has recognizes how state supported terrorist groups increase possibility of attack to the United States. For example, despite its pledge to support the stabilization of Iraq, in 2011 Iran continued to provide lethal support including: weapons, training, funding, and guidance to Iraqi Shia militant groups that targeted U.S. and Iraqi forces.11 It is important to understand there are different levels and participation of State support for terrorist groups. Other variable are critical in accessing the chance of attacks although the level of support does increase the risk levels. Non-state supported terrorist groups that operate autonomously, receiving no significant support from any government. In general these groups will hold no major threat. Other variables are important in accessing their intentions and discontent with the United States. State sponsorship of terrorism, also known as "state supported" terrorism, is when governments provide supplies, training, and other forms of support to non-state terrorist organizations.12 These groups are often very dangerous and can be compared to organizations such as Hamas and 9 PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models 11 (Bureau of Counterterrorism, 2012) 12 (Countries with Large Terrorist Presence) 10 7 Hezbollah, who are supported by foreign governments, specifically Syria and Iran. 13,14 Other factors are important include moral values, culture and other practices which can act as risk amplifiers. Funding Terrorist financing refers to the processing of funds to sponsor, facilitate or supply terrorists with resources to carry out their attacks.15,16 A terrorist group, like any other criminal organization, builds and maintains an infrastructure to facilitate the development of sources of funding, to channel those funds to the providers of materials and or services to the organization. Terrorist organizations accumulate income from a variety of sources, often combining both lawful and unlawful practices. Financial support can be in the form of donations, community solicitation, and other fundraising initiatives; this can derive from states, large organizations, or from individual donations. For example, some countries require a percent of income to go charities which, knowingly or unknowingly, are used for funding terrorist organizations.17 On other occasions wealthy antiAmerican individuals will propagate criminal activities by funding terrorism. Other revenue generating activities include kidnapping, extortion, smuggling, fraud, diamond trading or real estate investment. There are many avenues that terrorist organizations take to generate income, thus increase their strength by supplying them the resources they need to carry out their objectives. The ability they have to accumulate income provides organizations opportunities to begin tackling some of their operational and technical challenges. Well-funded terrorist groups have the ability to create and distribute chemical and biological weapons, to injure or kill a larger amount of individuals. Current & Past Conflicts Past and current conflicts play a critical role in identifying the intent of terrorist organizations. Understanding past events and the way a group or terrorist acted in the past can support the analysis in determining the probability of future threats. When taking into consideration the impact of past actions on the influence of possible future conflicts or those taking place currently, we keep in mind that the terrorist realm is ever changing. Constant advancements in this arena make it more challenging to declare that events or actions in the past will influence or impact their actions in the future. For this reason weighting of these variable in our program account for less than what we originally expected. The understanding of a central/common belief has shifted operational intensity from traditional sources of terrorism; state sponsors and formalized terrorist organizations, to loosely affiliated extremists. Greater cooperation among terrorist groups since the 1993 World Trade Center 13 (Bureau of Counterterrorism, 2012) (Countries with Large Terrorist Presence) 15 (International Monetary Fund, 2013) 16 (Fidis, 2009) 17 (IAGS, 2004) 14 8 bombing have produces homegrown extremists with seeming links to larger organizations.18 Theses links and affiliations can be associated with ongoing conflicts from anti-American theologies. Membership The impact of a group’s membership is not solely based upon how large a group may be. In some cases, smaller membership sizes are more effective than larger groups because of their tight cohesion and ability to alleviate multiple focuses and stay on the same page. Smaller groups or individuals can also play on the fact that they are harder to pin point as opposed to groups that are well known or with larger membership sizes. Advantages of larger groups can also be argued based upon their high numbers. Larger groups can inflict larger terrorist acts, reach more sources through multiple affiliations and still maintain operation if one person or cell is eliminated. For these reasons, large and small groups are weighted relatively equally. Regardless of the size, education tends to play a significant role in the effectiveness of any membership size. While poverty and ignorance represent most terrorist organizations, it is important to recognize that the education level of members in these groups makes a significant difference. Education increase risk levels and these organizations now have the ability to make connections with military officers, well-educated people abroad and scientists.19 For example, Lashkar-e-Taiba, is one of the world's most dangerous militant organizations, according to a study done by the Combating Terrorism Center at the U.S. Military Academy in West Point, N.Y. This particular group has ascended as a military organization despite its antiU.S. beliefs and many terrorist attacks in the Pakistan region; this is due to the well-organized, educated individuals, tactical strategies and influential leader that drive the group. Education has made a significant difference in the fact it has helped recruitment, assisted with connections and helped Hafiz Saeed (founder of Lashkar-e-Taiba) avoid imprisonment. Capabilities Capabilities are an important asset to consider when addressing the dangers of terrorism towards the United States and other nations. Capabilities in combination with other variables such as government support, structure and beliefs system will increase the chance of attacks toward the United States. These mixtures of capabilities can increase their strength, knowledge and reach of the organization. Listed below are some important capabilities that increase the risk of attacks to the United State and a description to highlight the importance. The weaponry and equipment (weapons) available is an important part of any capabilities assessment of organizations that use violence.20 Terrorists use a broad range of weapons. Virtually any type of firearm can be employed, as well as a wide variety of improvised explosive devices and conventional military munitions adapted for use in specific operational missions. In combination with the beliefs and other capabilities can make this asset a very dangerous 18 (Mueller III, 2013) (Rotella, 2013) 20 (PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models) 19 9 commodity for terrorist groups. In future versions of the program we hope to take these variations into account. Training proliferation of expertise and technology enables terrorist groups to obtain particular skills. In addition to the number of terrorists and terror groups that are willing and available to exchange training with one another, there are also experts in the technical, scientific, operational, and intelligence fields willing to provide training or augment operational capabilities on a contract basis.21 This type of expert training makes a group more efficient and dangerous. Affiliation Association between or among terrorist groups increase their capabilities through the exchange of knowledge and other resources. It is imperative to understand that terrorists are increasingly using a broader system of networks than previously experienced. Groups based on political or nationalistic agendas are becoming more synchronized because of common goals and the strength in numbers (affiliation) and technological reach brings organizations closer together. Technological advances can make networks more effective and reduced means such as couriers, paper messages, and landline telephones can enable networks to avoid detection and operate effectively in certain circumstances; which broaden the ability of affiliations to organize. 22 For example, affiliation was depicted during the death of Bin Laden, notice the follow countries/individuals that had links to al-Qaeda. Bin Laden was not the only top al-Qaeda leader who was removed from the battlefield in 2011.23 In June, Ilyas Kashmiri, one of the most capable terrorist operatives in South Asia, was killed in Pakistan. Also in June, Harun Fazul, an architect of the 1998 U.S. Embassy bombings in Kenya and Tanzania, and the foremost member of al-Qaeda in East Africa, was killed in Somalia by the Transitional Federal Government. In August 2011, Atiya Abdul Rahman, al-Qaeda’s second-in-command after bin Ladin’s death and a senior operational commander, was killed in Pakistan. In September, Anwar al-Aulaqi, alQaeda in the Arabian Peninsula’s chief of external operations, was killed in Yemen. Societal Influences It is important to understand that ethnicity or birth does not necessarily predetermine the choice of individuals or their behavior. People have a choice of identity and philosophical beliefs, and in this study we explore the impact of belief practices as it relates to terrorism. Although ethnic background increases the risk of exposer, it is the combination of other variables that make this attribute more prevalent; a combination of culture, religion and ideology. The culture of society surrounding the group can predicate social norms, grievances against other groups (US), and potentially increase hostilities of the groups/person(s). Understanding the nature of the society in which a group stems from can provide essential information in determining hostility levels and views of the US. Nevertheless, the ethnicity of a region or group does not determine the risk level in our project; however, underlying factors such as common 21 (PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models) (U.S. Army, 2007) 23 (Bureau of Counterterrorism, 2012) 22 10 practices and known oppositions will impact the output. Some recent literature exploring the causes and consequences of terrorism finds that the probability of a country being victimized by terrorist groups is positively related to measures of the target country’s ethnic, linguistic and religious fractionalization.24 So in connection with ethnicity and ideology the allegiance of U.S. citizens to western belief increases the risk of attack in the U.S. Ideological beliefs along with cultural and religious influences had a huge impact on motivating the terrorist in one of the deadliest attack on U.S. soil, September 11th. This attack was orchestrated by Osama Bin Laden who practiced jihad and followed the governance of Sharia Law.25 With that in consideration, it is important to understand Jihad intentional message is exerting of one’s power in repelling the enemy.26 With Sharia law violence increases because those groups usually practice Jihad which has a stricter law. Countries practicing interpretations of Sharia law that promotes violence or terrorist-like philosophies pose a real threat to the United States because their law is unlike any in the world and is composed of many death sentences on various practices which opposing Sharia law.27 While we generally look into Sharia Law due to its association with many of the most dangerous terrorist organization, this variable also includes other ideologies ranging between extreme nationalism to racism. Al Qaeda may not possess the organizational strength it had years ago, but its ideology perhaps gained more strength as its philosophy inspires new recruits; many outside the Arab world.28 As mentioned above it begins articulating a set of constraints of Muslim world brought on by the west (U.S.) and its Jewish allies; which they declare a global conspiracy to destroy Islam. This ideology persuades them to fight out of conviction not monetary gain, which accounts for their radical membership and threat to the U.S. Co-Dependent Variables Co-dependent variables are those that are subgroups of a larger variable within the chart. These variables, in most cases, operate only if the group or person possesses the independent variable it is associated with. It is very seldom, within this program, that the co-dependent variables impact the risk level of a terrorist, terrorist network, or organization exclusively without collaboration of another variable. These subgroups are important in determining the actual weight of a variable because they are multiplied by scalars to produce a more accurate rate/value. 24 (Basuchoudhar & Shughart II, 2007) (Kershaw, 2012) 26 (Ahmad) 27 (Sharia Law - Sharia Law Exposed) 28 PDF Strategic Ideology of Al Qaeda, IPRI Journal XIII, no.1 (Winter 2013): 1-12, Sye Manzar Abbas Zaidi 25 11 PROGRAM This program is comprised of researched variables weighted to display a specific value depending on the level of significance pertaining to the likelihood of terrorist attack. Each individual variable result is added to other tested/researched variable to display a cumulative result. This result represents the risk level of a specific group’s likelihood to attack the United States. Targets: The program focuses on terrorist organizations that represent threats to United States national security; these could be known terrorist organizations or newly formed organizations. The program also has the ability to analyze individual targets/persons according to the information inputs. User Input: Specific questions are asked pertaining to the organization being analyzed. The more information users know regarding the organization will more accurately depict the risk level of threat, concerning that specific organization. The impact of results from given questions were 12 previously researched and analyzed to provide variables with weights in association to thier impact on risk levels. Program Ex. 1 The process for a yes or no question is shown below. This is an example of how the program will handle inputs from the user when the answer either in the affirmative or negative. In this process, the program asks a question in which a user can respond yes or no, it retrieves the input and determines the weight of the variable being analyzed by the question. Once the value is determined, the program then calculates/adds the value into the algorithm. Program Ex. 2 This example shows how the program will handle inputs from multiple choice questions. Once the input is retrieved and the value is determined, the program then calculates/adds that value to the algorithm. 13 Coding/Output Screen Shots In the following images, the group “Al Qaeda” will be ran through the TRLP program. The inputs are based upon information gathered on this particular group. 14 Boxes outlined in “RED” provide the source code for the operation of the program. In the black program window you will see how the program displays the coding and collects the inputs required to determine the total weight of each group or person. Total weight in the program is represented in the program as “Total”. As stated in previous sections, the program uses three types of questions to collect inputs from the user. These questions consist of multiple choice, yes/ no, and “Fill-in the blank type questions. Examples of these questions and their operations will be shown throughout the following screen shots. The images below show the process of determining and calculating the weight of a group or person’s location. On the left, the program prompts the user to select the region in which a group or person is located. The coding on the right shows how the program goes through a series of arguments to determine which one will correspond to the selection. 15 16 Output: After a comprehensive description of the organization from questions presented in the program, the end result displays the possibility of attack in a low, medium, high and extremely high scheme. As previously explained the resulting prediction is reached based upon existing knowledge of organizations in responses to questions. Limitation of Program: One of the major limitations of this program is trying to quantify qualitative data which inevitably results in bias when taking into consideration the impact of risk levels. Input is limited to specific questions asked in the program resulting from research our team analyzed and determined significant. Research was gathered from various resources and similar research may result in conflicting risk factors, variable or weight depending on analyst. Scales of weighted variables may vary depending on analysis, sources of data or level of importance. 17 CONCLUSION The Terrorist Risk Level Program (TRLP) explores a new methodology for identifying risk levels of terrorist networks and provides a way to optimize extensive information on alleged terrorist groups or persons. This program uses an algorithm and weighted variables to calculate the probability in which a group’s capabilities can affect US national security. Thus, a group or person’s characteristics are analyzed on how they can enable the abilities of possible terrorist and risk levels. With easily accessible information and analysis, we be believe TRLP can be a computer program that can help policymakers and analyst determine risk levels of a specified terrorist group and their probability of attacking the United States Finalizing the program posed many challenges due to a combination of software capabilities and an abundance of information. We are aware that there are more factors that may be deemed critical to related studies in determining potential attacks and thus the variables represented in the program are those in which parallel to our research but are not limited to all the factors associated with terrorist organizations. Our future work will consist of expanding TRLP to store and update information in future uses and also we improving the algorithm used to calculate the risk level output. Enhancements to the TRLP program framework by professionals in analysis fields, mathematics, and terrorist studies can provide more validity and possibly increase the correlation between the group/person(s) being analyzed and algorithmic output. This study and project is ongoing and intends to develop a product that will assist in analyzing terrorist situations and ultimately protect the United States military, citizens, and country from terrorist threats. If properly used and with accurate information inputs we feel that the future of this product will increase the United States’ abilities of preventions and counter-terrorism. 18 BIBLIOGRAPHY (n.d.). PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models. IAGS. (2004). Retrieved June 5, 2013, from iags.org: http://www.iags.org/fuelingterror.html Fidis. (2009). Retrieved June 5, 2013, from fidis.net: http://www.fidis.net/resources/deliverables/identityof-identity/int-d2200/doc/27/ Terrorism FAQ - Terrorism.com. (2012, October 29). Retrieved April 15, 2013, from www.terrorism.com: http://www.terrorism.com/2012/10/29/terrorism-faq/ International Monetary Fund. (2013, March 31). Retrieved June 5, 2013, from imf.org: http://www.imf.org/external/np/exr/facts/aml.htm What is Terrorism and Who Defines It? (2013). Retrieved May 5, 2013, from about.com: http://terrorism.about.com/od/whatisterroris1/u/What_Is_Terrorism.htm%20-%20s2 Terrorism. (97, May 13). Retrieved April 1, 2013, from www.towson.edu: http://www.towson.edu/polsci/ppp/sp97/terror/intro.html Ahmad, S. (n.d.). True Spirit of Jihad. Retrieved Apirl 22, 2013, from The Lahore Ahmadiyya Movement: http://www.muslim.org/islam/jihad.htm Basuchoudhar, A., & Shughart II, W. F. (2007). On Ethnic Conflict and the Origins of Terrorism. Bureau of Counterterrorism. (2012, July 31). Retrieved April 6, 2013, from U.S. Department of State: http://www.state.gov/j/ct/rls/crt/2011/195540.htm Bureau of Counterterrorism. (2012). Country Reports on Terrorism 2011. US Department of State. Countries with Large Terrorist Presence. (n.d.). Retrieved May 4, 2013, from Terrorism Research: http://www.terrorism-research.com/state/countries.php FBI, U. D. (n.d.). FBI-Terrorism 2002/2005. Retrieved May 5, 2013, from www.fbi.gov: http://www.fbi.gov/stats-services/publications/terrorism-2002-2005 Global Focus. (n.d.). Retrieved June 15, 2013, from globalfocus.org: http://www.globalfocus.org/GFTerrorism.htm Kershaw, T. (2012, June 26). Osama Bin Laden's Religion and Political Views. Retrieved May 23, 2013, from http://hollowverse.com/osama-bin-laden/ Mueller III, R. S. (2013, June 13). The FBI. Retrieved June 18, 2013, from fbi.gov: http://www.fbi.gov/news/testimony/addressing-diverse-threats-to-our-nation-while-preservingcivil-liberties (n.d.). PDF A military guide to terrorism in the Twenty-First Century-Terrorist Organization Models. 19 Plumer, B. (2013, April 16). Eight facts about terrorism in the United States. Retrieved May 1, 13, from Washingtonpost.com: http://www.washingtonpost.com/blogs/wonkblog/wp/2013/04/16/eightfacts-about-terrorism-in-the-united-states/ Rotella, S. (2013, April 4). Terror Group Recruits From Pakistan’s ‘Best and Brightest’. Retrieved April 6, 2013, from Pro Publica: terror-group-recruits-from-pakistans-best-and-brightest Sharia Law - Sharia Law Exposed. (n.d.). Retrieved May 20, 2013, from http://www.billionbibles.org/sharia/sharia-law.html Terrorism Research. (n.d.). Retrieved May 5, 2013, from www.terrorism-research.com: http://www.terrorism-research.com/ U.S. Army. (2007, August 15). Retrieved May 10, 2013, from au.af.mil: http://www.au.af.mil/au/awc/awcgate/army/guidterr/ch03.pdf 20