Skip to main content

Currently Skimming:

1 INTRODUCTION
Pages 11-15

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 11...
... For example, a more complete understanding of social-network theory could help to reduce a population's support for an IED organization, understanding how money moves through communities along informal routes could help to reduce an adversary's ability to obtain funds, and research in neuroscience, cognition, and decision theory could improve human interaction with data and algorithms for filtering and analyzing data from persistent surveillance systems. On February 14-15 and March 17-18, 2008, the National Research Council held two workshops to consider basic-research questions in a few of the IED-related technical and social sciences and at their interfaces.
From page 12...
... Figure 1.1 depicts an IED threat chain, which includes obtaining funding and bomb materials, recruiting people, constructing the IEDs, selecting targets, delivering the devices to their targets, carrying out the attacks, evading countermeasures after the attacks, and disseminating information about the attacks for training, propaganda, recruitment, or other purposes (National Research Council 2007)
From page 13...
... The human terrain provides the context of all counter-IED efforts. That is a critical element in an IED campaign, but it is also the most complex and probably the least well understood (National Research Council 2007)
From page 14...
... Those questions suggest some ways in which basic research, particularly in the social sciences, might help to counter an IED campaign. Similarly, basic research in areas such as data fusion, operations research, and statistics might also lead to improved counter-IED capabilities.
From page 15...
... discussions that took place as the participants considered basic research that would address the challenges of identifying the weak links in an organization and predicting IED activities.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.