In honor of Professor Vladimir Lefebvre
The Institute of World Politics
1521 16th Street, NW
Washington, DC 20036-1464
Click here for a Google Map
Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. There is now a pressing need to develop new mathematical and computational techniques to assist in the analysis of this information, both to quantify future threats and to quantify the effectiveness of counterterrorism operations and strategies. Concepts and techniques from mathematics-specifically, from Lattice Theory and Reflexive Theory-have already been applied to counterterrorism and computer security problems. The following is a partial list of such problems.
- Strategies for disrupting terrorist cells
- Border penetration and security
- Terrorist cell formation and growth
- Data analysis of terrorist activity
- Terrorism deterrence strategies
- Information security
A primary intention of the Third Conference on Mathematical Methods in Counterterrorism (CMMC)is to present talks that are accessible to the broader public, especially policy makers, politicians, and members of the intelligence and law enforcement communities.
Jonathan Farley, Stanford University, email@example.com
Stefan Schmidt, Dresden Technical University, Germany, firstname.lastname@example.org
Bernard Brooks, Rochester Institute of Technology, email@example.com
Anthony Harkin, Rochester Institute of Technology, firstname.lastname@example.org
Please submit title and abstracts of papers to Jonathan Farley at email@example.com.