=Paper=
{{Paper
|id=Vol-1433/tc_45
|storemode=property
|title=A Logic-Based Approach to Understanding
Lone-Actor Terrorism
|pdfUrl=https://ceur-ws.org/Vol-1433/tc_45.pdf
|volume=Vol-1433
|dblpUrl=https://dblp.org/rec/conf/iclp/AlrajehG15
}}
==A Logic-Based Approach to Understanding
Lone-Actor Terrorism==
Technical Communications of ICLP 2015. Copyright with the Authors. 1 A logic-based approach to understanding lone-actor terrorism Dalal Alrajeh Department of Computing, Imperial College London London SW7 2RH, United Kingdom dalal.alrajeh@imperial.ac.uk Paul Gill Department of Security and Crime Science, University College London London WC1H 9EZ, United Kingdom paul.gill@ucl.ac.uk submitted 29 April 2015; accepted 5 June 2015 Abstract The need for systematic research into behavioural factors of individual terrorists has been highlighted by much recent work on terrorism. Many existing methods follow a hypothesis- testing approach in which statistical modelling and analysis of existing data is conducted to either confirm or refute a hypothesis. However, the initial construction of hypotheses is not trivial, nor is the decision upon which of the variables are to be considered relevant for the testings. It has been argued that the lack of a methodical approach to represent, analyse, interpret and infer from existing data presents a pressing challenge to the progress of lone-actor terrorism research in particular, and the terrorism field more generally. This paper sets a new agenda for such research. We propose the use of a logic pro- gramming approach to address the shortcomings of existing methodologies in the study of lone-actor terrorism. Our method is based on transforming characteristic and behavioural codes into a logic program and applying inductive logic programming to learn hypothe- ses about potentially relevant factors associated with terrorist behaviour, as well as the influence of specific factors on such behaviour. This paper is an exploratory study of 111 lone-actor terrorists’ target selections (civilian vs. high-value targets) and the agency of their ideological orientation in determining their target choices. 1 Introduction An emerging consensus within terrorism studies posits analysing what terrorists do as opposed to merely studying who they are is more instructive (Horgan 2014). A growth in datasets focused upon individual, as opposed to group, behaviour has fostered a major new development in our understanding of terrorist behaviour (LaFree 2013). Rather than employing a single conception of the ‘terrorist’, these analyses disaggregate the sample and compare the subsets across specific charac- teristics and behaviours (Gill and Corner 2013). However, a number of problems remain endemic within the study of the individual terrorist. First, most of these new analyses rely upon testing hypotheses derived from the study of general criminal 2 Dalal Alrajeh and Paul Gill offenders whose psychologies and decision-making repertoires may not be gener- alizable to violent, politically-oriented offenders. In a field as underdeveloped as terrorism studies, hypothesis generation based purely on studies of terrorist be- haviour can be onerous. Second, commonly used statistical methods (bivariate and multivariate analyses) fail to capture causality relations between variables. These approaches also concentrate on subsets of variables theoretically linked with the observation being investigated. However, in some cases, this is not sufficient as they may only be explained by combinations of loosely related variables that potentially remain untested. Statistical findings do not speak for themselves: moving from ‘fac- tors’ to policy is not straightforward (Farrington 2000). As a consequence, it has been argued that a knowledge-base capable of supporting policy must contain more than a catalogue of factors, however exhaustive. It must include theories which advance explanations of how these factors are related to the outcome of interest (Wikstrom 2011). Knowledge is achieved when outcomes are explained, rather than merely described, or even predicted. In this paper, we explore a logic programming approach to representing and rea- soning about lone-actor terrorists’ characteristics and behaviours. We propose an approach for automatically generating hypotheses about lone actor terrorists with the aim of gaining better understanding of the links between individuals’ charac- teristics and behaviour with respect to the outcome of their event planning. In particular, we investigate the use of inductive logic programming (ILP) to con- duct two types of analyses: (i) identifying factors that are associated with and can differentiate between terrorists’ target selections (i.e., learning associations), and (ii) capturing the influence of specific factors in explaining such differences (i.e., learning influences). The approach is applied to a dataset containing antecedent behaviours and characteristics of 111 lone actors terrorists, originally described in (Gill et al. 2014). The overall objective of this work is to provide an exploratory ap- proach that overcomes limitations of the methods standardly applied in this area of study by: (a) automatically generating explanations that are guaranteed to cover all the observations; (b) suggesting alternative hypotheses to be tested; and (c) demonstrating how the presence or absence of a single factor can be associated with different observed outcomes when combined with others. The approach pre- sented in this paper forms the initial steps towards developing a logic-based, causal framework for reasoning about criminal behaviour with wider applicability in crime science studies. 2 Background 2.1 Lone-actor Terrorism Characteristic and Behavioural Codes In this paper, terrorism is defined as a violent action, or threat of violent action, aimed at intimidating and coercing a government or sections of the public, typically for political, religious or ideological ends. Terrorism can involve violence against a person, damage to property, endangering a person’s life other than that of the terrorist, creating a serious risk to the health or safety of the public or a section of the public. A lone-actor is either a single terrorist or an isolated dyad (a pair of individuals), operating independently of a group. Antecedent behaviour is the A logic-based approach to understanding lone-actor terrorism 3 behaviour of the offenders leading up to their planning or conducting a terrorist act. Demographic characteristics of lone-actor terrorists include gender, education and socio-economic indicators such as employment status. For analysis purposes, antecedent behaviour and demographic characteristics are typically represented as codes (also called variables). Each code c has a domain, denoted dom(c), of possible values. When C is a set of codes, we write dom(C ) as a shorthand for the set of domains for each c ∈ C . We are interested here in codes whose domains are non-empty, finite sets of discrete values. A code is binary if its domain contains two values only, and multi-valued if it contains more than two. Boolean codes are binary codes with domain {true,false}. A code can be assigned one or more values from its domain. Given a set of codes C , the function singlevalue : C → {true, false} returns true if a code takes one value only and false otherwise. Boolean codes are single valued. Given a set ID containing a unique identifier for each lone-actor, we define a labelling function θc : ID → 2dom(c) for each code c ∈ C . Where id ∈ ID is a lone-actor’s identifier, θc (id ) is a set of values from dom(c), giving the actual values of id ’s c code. We require that θc (id ) 6= ∅ in all cases and ∀c : C · (singlevalue(c) → ∀id ∈ ID · |θc (id )| = 1). For example, the terrorist with identifier pg011 targets both civilian and high-value groups: θtargetgroup (pg011) = {civilian, hvt}. We use θC to denote the set of assignment functions for each code in C . We sometimes refer to code assignments as factors. The full set of codes used in this paper is available at www.doc.ic.ac.uk/∼da04/iclp15/. 2.2 Inductive Logic Programming Inductive logic programming (ILP) (Muggleton 1991) is a logic-based machine learning technique the aims at automatically generating hypotheses from observed phenomena and a background theory expressed as logic programs. In this paper, we are concerned with learning normal logic programs. A normal logic program is one in which the clauses (or rules) are of the form A ← B1 , . . . , Bn , not C1 , . . . , not Cm where A is the head atom, Bi are positive body literals, and not Cj are negative body literals. Normal logic programs may have one, none, or several (minimal) models. The semantics of our logic programs are based on stable models semantics (Gelfond and Lifschitz 1988). Given a normal logic program Π, the reduct of Π with respect to I , denoted ΠI , is the program obtained from the ground instances of Π by (a) removing all clauses with a negative literal not a in its body where a ∈ I and (b) removing all negative literals from the bodies of the remaining clauses. If I is the least Herbrand model of ΠI then I is said to be a stable model of Π. This along with the notion of entailment are given below. Definition 1 A model I of Π is a stable model if I is the least Herbrand model of ΠI where ΠI is the definite program ΠI = {A ← B1 , . . . , Bn | A ← B1 , . . . , Bn , not C1 , . . . , not Cn is the ground instance of a clause in Π and I does not satisfy any of the Ci }. Definition 2 A logic program Π entails an expression φ (under the credulous stable model se- mantics), denoted Π |= φ, iff φ is satisfied in at least one stable model of Π. 4 Dalal Alrajeh and Paul Gill In ILP, mode declarations are used as a form of language bias to reduce the hypotheses search space. They provide a mechanism for specifying which predicates may appear in the heads and bodies of rules and for controlling the placement and linking of constants and variables within those clauses. A mode declaration M is either a head or body declaration, respectively modeh(s) and modeb(s) where s is called a schema. A schema s is a ground literal containing placemarkers. A placemarker is either ‘+type’ (input), ‘−type’ (output), ‘#type’ (ground) where type is a constant. Given the above, an ILP task is defined as follows where |= is interpreted under brave induction (Sakama and Inoue 2009). Definition 3 A nonmonotonic ILP task is a tuple hB , E + , E − , M i where E + and E − are sets of ground literals, called positive examples and negative examples respectively, B is a normal logic program, called background theory and M is a set of mode declarations defining a hypothesis space s(M ). An inductive solution (or hypothesis), H ⊆ s(M ), for E + ∪ E − w.r.t B is a set of clauses such that: B ∪ H |= e + , ∀e + ∈ E + and B ∪ H 6|= e − , ∀e − ∈ E − under brave induction (Sakama and Inoue 2009). We sometimes write B ∪ H |= E where E = E + ∪ E − as a shorthand for the two conditions above. In this paper, we focus on the use of a learning technique first introduced in (Ray 2009) and its implementation XHAIL. The technique is based on a three- phase Hybrid Abductive Inductive Learning (HAIL) approach (Ray et al. 2004). The XHAIL language and search bias mechanisms are based upon a compression heuristic that favours solutions containing the fewest number of literals. 3 Approach We first introduce an automated mechanism for mapping characteristic and be- havioural codes into a logic program. We then describe an ILP approach for con- ducting two types of analyses. The first aims at identifying combinations of factors that are associated with specific observations. We call this learning associations. The second is to understand the influence of specific factors when explaining these observations. We refer to this type as learning influences. Our focus in this paper will be on explaining terrorists’ target group selection, civilian targets vs. high-value targets, where the latter includes targets such as government, business, schools etc. We demonstrate the approach using a dataset of 111 individuals (of which 91 have known target selections) and 185 codes described in (Gill et al. 2014). 3.1 Modelling Codes in Logic Programs Our representation uses a sort ID for capturing the domain of unique lone-actor terrorists. It includes a unique predicate for each code c and type predicate to rep- resent the domain of c. The number of arguments for this predicate depends on the size of the code’s domain. If it is Boolean, e.g., mentalill, then, as a simplification, a predicate with a single argument of sort ID is introduced e.g., mentalill(id). If it is a non-Boolean variable, then a two argument predicate is introduced in which A logic-based approach to understanding lone-actor terrorism 5 the first argument is of sort ID and the second is of sort Dom(c). For instance, the nature of the location at which the attack occurred is encoded using a pred- icate location nature ⊆ ID × dom(location nature) where dom(location nature) = {government, business, private citizens, religious, military, other}. The language also contains a type predicate for representing dom(c). The encoding is given below. Definition 4 Let ID be a set of unique identifiers for lone-actors, C a set of codes named {c 1 , · · ·, c n }, D(C ) the set of C domains named {dc 1 , · · ·, dc n } respectively and θC their assignment functions. The logic program IDLP ∪ CLP ∪ DLP (C) ∪ ALP encoding of ID, C, D(C ) and θC is constructed such that: • IDLP contains a fact la iden(id ) for each id ∈ ID; • DLP (C) contains a fact dc k (j ) for each j ∈ dom(c k ); • for each id ∈ ID and c ∈ C, CLP contains a fact c k (id) where c k is a Boolean code and θc (id ) = {true}; • for each id ∈ ID and c ∈ C, CLP contains a fact c k (id , j ) where |dom(c k )| ≥ 2, c k is non-Boolean, j ∈ θc (id ) and j 6∈ {false, unknown}; • for each c ∈ C, if c is non-Boolean and singlevalue(c) = true, ALP contains the clause ← c(I, D1 ), c(I, D2 ), D1 6= D2 · Our encoding deploys a closed world assumption where unknown code values are treated as false, as assumed in (Gill et al. 2014). An example of the encoding is: IDLP = {la iden(pg018). la iden(pgpg101)...} DLP (C) = {ideo(rightwing). ideo(single issue)... loc(government)... tg(hvt). tg(citizens)...} CLP = {imprisoned(pg018). ideology(pg018, rightwing). mentalill(pg018). location nature(pg018, government). ... dryruns(pg101). ideology(pg101, single issue). f2f(pg101)...} ALP = {← ideology(I, D1 ), ideology(I, D2 ), D1 6= D2 ·, · · ·} The expressiveness of the formalism allows us to capture relationships between codes. For example, a code value both may be introduced for capturing individuals who have targeted both civilian and high-value groups, in which case dom(targetgroup) is extended with the value both and ALP is amended with the following: {targetgroup(I, both) ← targetgroup(I, hvt), targetgroup(I, civilian)·, ← targetgroup(I, both), not targetgroup(I, hvt)·, ← targetgroup(I, both), not targetgroup(I, civilian)·} 3.2 Learning Characteristic and Behavioural Associations In the context of characteristic and behavioural analyses, a code c1 is said to be associated with another code c2 if c1 forms part of at least one explanation of the observed behaviour represented by c2. In ILP terms, identifying codes associated with an observation amounts to finding an inductive solution in which the literals corresponding to these codes appear in the body of at least one rule in the solution. In the presented approach, we do not distinguish between codes that are causes and those that are correlates. Future work will clarify the distinction. Definition 5 Let ID be a set of unique lone-actor identifiers, C a set of codes, and D(C ) a set of C domains. Let ct ∈ C be a code representing the observed terrorist behaviour to 6 Dalal Alrajeh and Paul Gill be explained, and R = {cr |cr ∈ C, cr 6= ct } be the rest of variables in the language. The ILP task is defined with: • B = IDLP ∪ RLP ∪ DLP (R) ∪ DLP ({ct }) ∪ ALP ; • E + includes a fact ct (id ) for each id ∈ ID where ct is Boolean and θct (id ) = {true}, or a fact ct (id , j ) where ct is non-Boolean and j ∈ θct (id ); • E − includes a fact ct (id ) for each id ∈ ID where ct is Boolean and θct (id ) = {false}, or a fact ct (id , j ) where ct is non-Boolean, for every j ∈ dom(ct ) such that j 6∈ θct (id ); • M includes modeh(ct (+la iden)) (or modeh(ct (+la iden, #dct ))), and a pair of body declarations modeh(cr (+la iden)) (or modeh(cr (+la iden, #dcr ))) and modeb(not cr (+la iden)) (or modeb(not cr (+la iden, #dcr ))) for each cr ∈ R. Note that in this type of the analysis, we do not impose any restrictions on the number of rules, within an inductive solution, in which a body literal appears to be said associated with the observation, nor on the number of observations explained by the rule in which it appear. However, to quantify the relevance of that association for a given dataset, our algorithm calculates a measure (relative significance value) for each hypothesis in an inductive solution as defined below. Definition 6 Let B be a background theory, E = E + ∪ E − the set of examples, M the mode declaration and H = {h1 , · · ·hn } ⊆ s(M ) an inductive solution to E w.r.t B . Let Eh+i ⊆ E + be the set of positive examples explained by the hypothesis hi ∈ H such that B ∧ hi |= eh+i , for each eh+i ∈ Eh+i . Then the relative significance σ of hi , denoted |E + | σ(hi ), is calculated as: σ(hi ) = |Eh+i | In addition to the above, we also calculate for each hypothesis a measure, we call the predictive value of a hypothesis, which is based on the number of target selections the hypothesis infers for individuals with unknown target selections. Definition 7 Given an ILP task hB , E + , E − , M i constructed using Def. 5, let H = {h1 , · · ·hn } ⊆ s(M ) be an inductive solution to E + ∪E − , w.r.t B . Let ct be the predicate appearing in E . Let |P | be the set of ct (id ) atoms where ct is Boolean, or ct (id,j ) atoms where ct is non-Boolean, with id ∈ ID, j ∈ dom(ct ) and θct (id) = {unknown}, entailed by H ∪ B , such that H ∪ B |= p for every p ∈ P . Let Phi ⊆ P be the set of ct (id ), or ct (id,j ), atoms entailed by hi ∪ B where hi ∈ H , such that B ∪ hi |= phi , for every |Phi | phi ∈ Phi . Then the predictive ρ of hi , denoted ρ(hi ), is calculated as: ρ(hi ) = |P| · Our algorithm uses the Answer Set solver clingo (Gebser et al. 2007) to find models of B ∪ hi from which the relative significance and predictive values for each hypothesis are calculated. In summary, a logic program is constructed for each hypothesis hi ∈ H in conjunction with B . From this, the number of atoms representing target selections for each individual in the dataset in the answer set of the B ∪ hi is computed. We distinguish between the number derived for those with A logic-based approach to understanding lone-actor terrorism 7 known and unknown target selections by comparing the individuals’ id’s appearing in the answer set with those provided in the original dataset. In our case, to learn characteristics and antecedent behaviour that are associated with specific target selections, B includes the clauses representing code assign- ments and relationships for the dataset of 111 lone-actor terrorists. The positive examples include facts about the observed target selection for each individual, e.g., {targetgroup(pg018,hvt), targetgroup(pg101,civilian)} and the negatives includes facts about the groups that were not targeted, e.g., {targetgroup(pg018,civilian), targetgroup(pg101,hvt)}. The total number of positive examples is 95, and the total number of negative examples is 87. The mode declarations M includes modeh(targetgroup(+la iden, #tg)). It also comprises a total of 38 modeb declarations for codes such as crimcon, verbfam, dryruns and mentalill amongst others. Having defined the ILP task, we use the ILP system XHAIL (Ray 2009), to com- pute the hypotheses. Table 1 shows an extract of the inductive solution. A full list of the mode declarations and hypotheses can be found at www.doc.ic.ac.uk/∼da04/iclp15/. i hi |eh+ | |phi | i 1 targetgroup(I, civilian) ← not crimcon(I ), not history(I ), not f2f (I ), 4 2 otherknowledge(I ), not children(I )). 2 targetgroup(I,civilian,) ← dryruns(I ), not warning(I ), not imprisoned(I ), 3 1 not training(I ), mentalill(I ), not virtualinteract(I ). 3 targetgroup(I,civilian) ← not imprisoned(I ), not milexp(I ), not livealone(I ), 8 4 not training(I ), not virtuallearn(I ), not otherknowledge(I ). 4 targetgroup(I,civilian) ← not milexp(I ), verbfam(I ), livealone(I ), 4 4 not f2f (I ). 5 targetgroup(I,civilian) ← uniexp(I ), not warning(I ), not milexp(I ), 12 1 not virtuallearn(I ). ... ... ... ... ... 52 targetgroup(I,hvt) ← not warning(I ), mentalill(I ), children(I ). 2 2 53 targetgroup(I,hvt) ← not imprisoned(I ), virtuallearn(I ), f2f (I ), 1 0 otherknowledge(I ), recruit(I ) , not children(ˇ). 54 targetgroup(I,hvt) ← not dryruns(I ), not warning(I ), not religcon(I ), 5 2 verbfam(I ), not virtuallearn(I ), not f2f (I ). 55 targetgroup(I,hvt) ← not univexp(I ), not religcon(I ), mentalill(I ), 10 3 not recruit(I ). 56 targetgroup(I,hvt) ← not warning(I ), not imprisoned(I ), crimcon(I ), 1 0 livealone(I ), not training(I ), not mentalill(I ), not history(I ), not recruit(I ). Unique total 95 29 Table 1: Hypothesis for target selection for the full sample The solution shown above is not the minimal one. We have redefined the algo- rithm to terminate once it has found an optimal solution within a specified time bound. From the table above, we see that h5 has a higher relative significance value than h1 since σ(h5 ) = 0 · 12 > σ(h4 ) = 0 · 04, but a lower predictive value with ρ(h5 ) = 0 · 03 < ρ(h4 ) = 0 · 13. From a criminological perspective, the solution demonstrates that civilian targeting is associated with individuals with a history 8 Dalal Alrajeh and Paul Gill of mental illness (h2 ) who engage in dry runs and have not been imprisoned, un- dergone training, amongst others. At the same time, we observe that mental illness alone cannot determine the target selection outcome as shown by (h55 ) where men- tal illness exhibited with other characteristics, including no university experience or religious conversion prior to the attack, explains high-value target selections. Targeting high-value groups is also associated with criminal convictions and living alone which again may speak towards capability (in terms of both criminal ingenu- ity and having the space to develop a bigger plot). When this criminal ingenuity is not present, it may necessitate other behaviour like virtual learning, face to face interactions with co-ideologies and the attempt to recruit others (as witnessed in h52 ). 3.3 Learning Characteristic and Behavioural Influences The previous section is concerned with finding explanations using any subset of possible codes. In this section, we are interested in learning whether an observed behaviour can be explained with respect to particular characteristics and behaviour. We refer to this type of learning as learning influences. A characteristic or behaviour is said to influence the code c2 if every outcome of the observed behaviour represented by c2 can be explained in terms of the presence or absence of c1. In an ILP setting, the problem of learning influences is expressed in terms of finding inductive solutions in which every rule within that solution contains a body literal representing that characteristic or behaviour. For instance, in the case of exploring the influence of ideological orientation on target group selection, all hypotheses in an inductive solution must include a body literal corresponding to the individuals’ ideological orientation. Our algorithm for learning influences comprises four steps. First the dataset is split into subgroups, according to the value assigned to the code whose influence is being studied. Thus for a code cf , we have |dom(cf )| ≥ 2 subgroups. Note that these subgroups are not required to be mutually exclusive. For ease of reference, we use the notation df to denote the subgroup containing data for individuals whose cf value is df where the reference is obvious form the context. The second step involves applying the mapping in Def. 4 to each of the created subgroups separately. Then, a learning task hBdf , Ed+f , Ed−f , M i is defined for each subgroup df upon which the learning system XHAIL is executed. Once Hdf is generated for each subgroup, the resulting inductive solutions undergo a post-processing procedure to generate the final set of hypotheses. This is done by applying a transformation function defined below to each rules in the inductive solutions. Definition 8 Let Π be a normal logic program and b a literal. A transformation τ is defined such that Π0 = τ (Π, b) and Π0 is obtained from Π by adding a condition b to the body of every rule in Π. Given the function τ , we have, in the case of a Boolean code cf , the final solution 0 0 0 0 H = Htrue ∪ Hfalse where Htrue = τ (Htrue , cf (I)), and Hfalse = τ (Hfalse , not cf (I)). In the case of a non-Boolean code cf , the final solution H = {Hd0f } where Hd0f = i i A logic-based approach to understanding lone-actor terrorism 9 τ (Hdfi , cf (I, dfi )). Note that the correctness of solutions with respect to the union of the example sets is only guaranteed when the code values are independent. In the case of learning the influence of ideological orientation on target selection, the dataset of 111 individuals is split into three subgroups based on whether the individual’s ideological orientation is rightwing, single issue or religious. In our ex- ample, the subgroups contain data for 43, 30, 38 individuals respectively. In our dataset, these groups are mutually exclusive since singlevalue(ideology)=true. The XHAIL system is then run using three independent learning tasks, one on each of the subgroups. The final solutions are shown in Table 2. The relative significance and predictive values are calculated with respect to each subgroup. Religious Ideology i hi |eh+ | |phi | i 1 targetgroup(I,civilian) ← ideo(I,religious), not virtuallearn(I ), not mentalill(I ). 10 2 2 targetgroup(I,civilian) ← ideo(I,religious), univexp(I ), verbfam(I ), 7 0 not mentalill(I ). 3 targetgroup(I,civilian) ← not univexp(I ), f2f (I ). 3 0 4 targetgroup(I,civilian) ← ideo(I,religious),dryruns(I ), otherknowledge(I ). 5 1 5 targetgroup(I,hvt) ← ideo(I,religious),univexp(I ), mentalill(I ). 6 3 6 targetgroup(I,hvt) ← ideo(I,religious), not univexp(I ), not warning(I ), 9 2 crimcon(I ). 7 targetgroup(I,hvt) ← ideo(I,religious),not verbfam(I ), virtuallearn(I ). 9 2 Unique total 40 9 Single-issue Ideology i hi |eh+ | |phi | i 8 targetgroup(I,civilian) ← ideo(I,single issue), not dryruns(I ), 4 0 not crimcon(I ),not livealone(I ). 9 targetgroup(I,civilian) ← ideo(I,single issue), crimcon(I ), livealone(I ). 6 0 10 targetgroup(I,civilian) ← ideo(I,single issue), f2f (I ), not otherknowledge(I ). 11 0 11 targetgroup(I,civilian) ← ideo(I,single issue),mentalill(I ), not children(I ). 9 1 12 targetgroup(I,hvt) ← ideo(I,single issue), not livealone(I ), not history(I ), 4 0 children(I ). 13 targetgroup(I,hvt) ← ideo(I,single issue),imprisoned(I ), not mentalill(I ), 2 0 not recruit(I ),not children(I ). 14 targetgroup(I,hvt) ← ideo(I,single issue),livealone(I ), not mentalill(I ), 1 0 not history(I ), not f2f (I ). 15 targetgroup(I,hvt) ← ideo(I,single issue), not crimcon(I ), training(I ). 2 0 Unique total 31 1 Rightwing Ideology i hi |eh+ | |phi | i 16 targetgroup(I,civilian) ← ideo(I,rightwing), not dryruns(I ), livealone(I ). 14 4 17 targetgroup(I,civilian) ← ideo(I,rightwing),verbfam(I ), not mentalill(I ), 7 1 not children(I ). 10 Dalal Alrajeh and Paul Gill 18 targetgroup(I,civilian) ← ideo(I,rightwing),not training(I ), 16 4 not otherknowledge(I ), not children(I ). 19 targetgroup(I,civilian) ← ideo(I,rightwing),not warning(I ), mentalill(I ), 10 2 not recruit(I ). 20 targetgroup(I,hvt) ← ideo(I,rightwing), not livealone(I ), children(I ). 5 3 21 targetgroup(I,hvt) ← ideo(I,rightwing), mentalill(I ), 3 0 not virtualinteract(I ), otherknowledge(I ). 22 targetgroup(I,hvt) ← ideo(I,rightwing), not livealone(I ), training(I ), 1 0 not f2f (I ). 23 targetgroup(I,hvt) ← ideo(I,rightwing), warning(I ), mentalill(I ). 3 0 Unique total 46 12 Table 2: Hypothesis for target selection for three ideological orientation groups. The first part of Table 2 highlights a number of interesting facets related to a religious-inspired individual’s choice. The presence (or lack thereof) of mental health problems helps shape target choice toward civilians or high-value targets respectively depending on whether the individual has university experience or not (see solution h2 and solution h5 .) The lack of university experience (and perhaps the skills associated with overcoming complex tasks) can be mitigating for when targeting high-value targets by the presence of a criminal past and the nous that may develop through prior antecedent offending; see solution h2 . The second part in the table that refers to single-issue ideology indicates the need to disaggregate across ideological domains. Whereas the confluence of criminal histories and living alone appeared in Table 1 to suggest a close relationship with high-value targeting, the opposite is true for those individuals inspired by single issues (animal rights, en- vironmentalists) and may be a direct reflection of different targeting norms within these movements (see solution h9 ). In the absence of criminal histories, gaining training from a wider group appears to be a relevant substitute (see solution h15 ). The last part of the table referring to rightwing ideologies confounds some expecta- tions in the wider literature as it highlights the presence of mental health problems (solution h21 ) in terms of attacking high-value targets compared to civilian targets (the latter of which are presumably easier to plan). 4 Discussion In our approach, we focused on learning rules that capture associations between behaviour and influence of specific behaviour when explaining terrorists’ target se- lection. The performance of the learning algorithm used depended on the size of M amongst other factors such as the size of the examples. Experiments showed that it decreased when a larger M was considered. The performance of the algorithm for same M size was higher in the case of learning influences than it was when learn- ing associations, as expected given the examples size was smaller. Furthermore, we found that we were able to find a more optimal solution for learning influences than we did for associations for the fixed time-frame we gave (which was set to A logic-based approach to understanding lone-actor terrorism 11 360 minutes) for the same observation (56 rules in the case of learning associa- tions compared to 23 when learning influences). The choice of codes to use in M in the presented work was influenced by variables that are commonly investigated in existing literature. Furthermore, the optimization was driven by the total num- ber of literals appearing in an inductive solution in some cases resulting in more hypotheses with small potential significance values as opposed to fewer hypotheses with higher potential significance. The learning association approach is similar in essence to task discovery in data-mining, e.g.,(Dehaspe and Toivonen 1999), the aim here is to provide a reasoning platform capable of handling default negation which better suits the incremental hypothesis generation and refinement nature of the problem domain, and allows the integration of domain knowledge both in the background and in the heuristics defined over the search space. To evaluate our approach, we compared our results against those produced us- ing standard methods deployed in terrorism studies, rather than performed cross validation over our small sample set. In particular, we conducted a Smallest Space Analysis (SSA), shown in Fig. 1, of the antecedent behaviour and their relationship to one another for the full dataset of 111 individuals. Such analyses focus upon vari- able co-occurrence. Prominent examples include (Canter and Heritage 1990) work on serial rapists, and (Canter 2004) work on serial murder. The lone-actor terrorist typologies presented below utilises this specific method. It provides geometric rep- resentations of the level of association between variables. In other words, the Multi Dimensional Scaling outputs represent a matrix wherein variables that regularly co-occur are plotted closer together in a Euclidean space. The utility of such a rep- resentation is that the variable configuration is based upon variables’ relationships with each other rather than their relationships with pre-determined dimensions (Davis 2009). SSA is based upon the assumption that the underlying structure of complex systems is most readily appreciated if the relationship between each and every other variable is examined, but that such examination is much clearer if the relationships are represented visually not only in terms of numbers’ (Canter 2004). The Jaccard co-efficient (which represents the level of association between two vari- ables) was calculated for each pair-wise set of variables. The closer two variables appear within the matrix, the higher their co-occurrence across observations. For example, virtual learning (VirtualLearn) and virtual interaction (VirtualInteract) are extremely close and therefore occur very regularly together. The results visually illustrate some of the key findings produced in Table 1. The SSA output also helps demonstrate which of the “not” behaviour rarely co-occur with the present behaviour and which are specific to that combination of factors. As per h1 , other knowledge is situated very far from criminal convictions, history of violence, children indicated that this particular behaviour rarely co-occurs with these other factors. However, the SSA output demonstrates a relatively close rela- tionship between other knowledge and face-to-face interactions. h1 however shows these rarely co-occur when these other factors are also absent. The SSA output also helps illustrate the degree to which the “not” behaviour co-occur. Returning to h1 , children rarely co-occur with a history of violence. The types of hypotheses that the SSA struggles with are those that are purely made up of “not” occurrences because 12 Dalal Alrajeh and Paul Gill what underpins the SSA is the co-occurrence of two variables. To illustrate, h3 is very difficult to comprehend using the SSA. Fig. 1. Smallest Space Analysis results for 111 lone actor terrorists. 5 Conclusion and Future Work The aim of this paper is to examine the applicability of ILP for the purpose of generating relevant hypothesis about terrorists’ behaviour. The findings reported in the previous sections collectively show how ILP not only provides the ability to derive new insights but it is also clearly beneficial in outlining the explanatory power of rules. Whilst the SSA approach outlines the many diffuse relationships between a sizeable number of variables, it is very difficult to focus on the most relevant ones. The clusters that tend to emerge through identification by research teams tend to be quite subjective - more art than science - and are therefore subject to potential bias. The SSAs also tend to drag commonly occurring variables into the centre of the model whilst non-common variables are pushed to the extremes. The ILP approach, we believe, has the power to delineate which relationships are highly relevant and more immediately usable. Our ongoing and future work includes distinguishing between causal and non- causal factors when generating solutions, prioritizing hypotheses with causal ex- planations and higher relative significance values, and applications to other crimi- nological problems such as serial crimes. We plan to conduct further investigation into prioritizing and optimizing the selection of the body literals when constructing hypotheses, one possibility is by using the results from SSA or information gain the- ory . We also intended to investigate the use of probabilistic learning and methods capable of handling noise and uncertainty in this setting. A logic-based approach to understanding lone-actor terrorism 13 References Canter, D. 2004. Offender profiling and investigative psychology. Journal of Investigative Psychology and Offender Profiling 1, 1, 1–15. Canter, D. and Heritage, R. 1990. A multivariate model of sexual offence behaviour: developments in offender profiling. Journal of Forensic Psychiatry 1, 185–212. Davis, M. 2009. In defence of multidimensional scaling for the analysis of sexual offence behaviour: cautionary notes regarding analysis and interpretation. Psychology, Crime & Law 15, 6, 507–515. Dehaspe, L. and Toivonen, H. 1999. Discovery of frequent datalog patterns. Data Mining and Knowledge Discovery 3, 1, 7–36. Farrington, D. P. 2000. Explaining and preventing crime: The globalisation of knowl- edge — the ASC 1999 presidential address. Criminology 38, 1, 1–24. Gebser, M., Kaufmann, B., Neumann, A., and Schaub, T. 2007. clasp : A conflict- driven answer set solver. In Proceedings of 9th International Conference on Logic Programming and Nonmonotonic Reasoning. 260–265. Gelfond, M. and Lifschitz, V. 1988. The stable model semantics for logic program- ming. In Proceedings of the 5th International Conference on Logic Programming. The MIT Press, 1070–1080. Gill, P. and Corner, E. 2013. Disaggregating terrorist offenders: Implications for re- search and practice. Criminology & Public Policy 12, 1, 93–101. Gill, P., Horgan, J., and Deckert, P. 2014. Bombing alone: Tracing the motivations and antecedent behaviors of lone-actor terrorists. Journal of Forensic Sciences 59, 2, 425–435. Horgan, J. 2014. The Psychology of Terrorism, 2 ed. Routledge, Oxford, UK. LaFree, G. 2013. Lone-offender terrorists. Criminology & Public Policy 12, 1, 59–62. Muggleton, S. 1991. Inductive logic programming. New Generation Computing 8, 4 (Feb.), 295–318. Ray, O. 2009. Nonmonotonic abductive inductive learning. Journal of Applied Logic 7, 3, 329–340. Ray, O., Broda, K., and Russo, A. 2004. A hybrid abductive inductive proof procedure. Logic Journal of the IGPL 12, 5, 371–397. Sakama, C. and Inoue, K. 2009. Brave induction: a logical framework for learning fromincomplete information. Machine Learning 76, 1, 3–35. Wikstrom, P. 2011. Does everything matter? Addressing the problem of causation and explanation in the study of crime. In When Crime Appears: The Role of Emergence, J. McGloin, C. Sullivan, and L. Kennedy, Eds. Routledge.