Next Article in Journal
Nominal Land Valuation with Best-Worst Method Using Geographic Information System: A Case of Atakum, Samsun
Previous Article in Journal
An Urban Hot/Cold Spot Detection Method Based on the Page Rank Value of Spatial Interaction Networks Constructed from Human Communication Records
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Predicting Terrorism in Europe with Remote Sensing, Spatial Statistics, and Machine Learning

1
Geospatial Institute, Saint Louis University, St. Louis, MO 63108, USA
2
Department of Earth and Atmospheric Sciences, Saint Louis University, St. Louis, MO 63108, USA
3
Environmental Systems Research Institute, 380 New York Street, Redlands, CA 92373, USA
*
Author to whom correspondence should be addressed.
ISPRS Int. J. Geo-Inf. 2022, 11(4), 211; https://doi.org/10.3390/ijgi11040211
Submission received: 23 January 2022 / Revised: 10 March 2022 / Accepted: 12 March 2022 / Published: 22 March 2022

Abstract

:
This study predicts the presence or absence of terrorism in Europe on a previously unexplored spatial scale. Dependent variables consist of satellite imagery and socio-environmental data. Five machine learning models were evaluated over the following binary classification problem: the presence or absence of historical attacks within hexagonal-grid cells of 25 square kilometers. Four spatial statistics were conducted to assess the validity of the results and improve our inferential understanding of spatial processes among terror attacks. This analysis resulted in a Random Forest model that achieves 0.99 accuracy in predicting the presence or absence of terrorism at a spatial resolution of approximately 5 km. The results were validated by robust F1 and average precision scores of 0.96 and 0.97, respectively. Additionally, statistical analysis revealed spatial differences between separatists and all other terrorist types. This work concludes that remote sensing, machine learning, and spatial techniques are important and valuable methods for providing insight into terrorist activity and behavior.

1. Introduction

A precise definition of what terrorism is and what it is not the subject of debate dating back to the first use of the word in 1789, resulting in more than 109 legal definitions currently in use [1,2,3]. Due to the lack of clarity, this research has opted for a broad description of terrorism that can be understood as non-state actors’ use of violence against noncombatants with a primary goal of political coercion [4]. This classification steers away from other definitions that may include state actors or threats of violence, as such definitions that may introduce ambiguity in data screening and the discussion that follows.
Bahgat and Medina, in a 2013 meta-analysis of counter terrorism studies, noted a fixation on political and sociological perspectives to the determent of geographic ones, primarily due to a lack of high-quality geo-referenced data sets and untapped applications of Geographic Information Systems [5]. However, terrorism exhibits an important spatial dimension. It stands to reason that if governmental policies are designated within a defined territory, terrorism can, in some part, be understood as an attempt to influence control over political boundaries [6]. Similarly, strong links between a lack of territorial security, and the presence of terrorism have been found [7,8,9], as a lack of governmental control allows terrorists to view the environment as permissive to their acquisition of an autonomous zone [10].
Furthermore, high-population areas and those of governmental importance are both strategically attractive and cost-effective targets, and cities with high global and regional regard increase their attractiveness to terrorist target selection [11]. Terrorists’ specific motivations also have a geographic component, exemplified by religious groups targeting civilians seen as practicing immoral behavior and places of worship [12]; right-wing terrorists selecting governmental buildings [13]; persecuted individuals seeking out civilians in everyday locations such as malls [14]; territorial terrorists operating in peripheral environments [15]. There is further a self-reinforcing cycle in which areas previously attacked become increasingly attractive to future attackers [16], and a relationship between terrorists’ bases of planning and preparation [17,18,19] suggests target locations are a function of geographic convenience as much as an act of coercion.
Singh et al. combined Hidden Markov Chains to model, in real-time, activities deemed consistent with historical attacks and determine the best actions to prevent them [20]. Additionally, Dixon et al. developed a feed-forward neural network (NN) to identify deceptive behavior, producing an average accuracy of 0.6 with the best success rate of 0.68 [21]. An ensemble was also trained to predict the attributes of attacks with accuracy scores of 0.79 to 0.85 [22]. Mo et al. built a Support Vector Machine (SVM), Naïve Bayes classifier, and a Logistic Regression to predict terrorist events with a maximum accuracy of 0.78 [23].
Dixon et al. [24] developed a NN, SVM, and a Random Forest, in which the authors concluded 0.96 accuracy scores and robust classification reports in predicting attack locations, but noted the global aggregation reduced the model’s sensitivity to regional and local factors.
Most recently, Uddin et al. [25] developed five machine learning models based on NNs to predict the outcomes of attacks, such as attack type and weapon used. To supplement NN architectures, the researchers employed logistic regression, SVM, and Naïve Bayes classification. A comparison of results concluded that DNNs are more successful than other algorithms, achieving 0.95 accuracies compared to 0.83 for non-DNN models. In doing so, the team concluded the successful creation of a model that accurately predicts the future lethality of a terror organization based solely on the first 10 attacks attributed to it.
While the research to date has reported robust results, little has been performed to understand terrorism at the sub-state level. It is well understood that the causes of terrorism at general levels and there are qualitative inferences as to why it occurs within specific regions, but what is less clear is whether terrorism can be predicted at smaller scales. Additionally, few studies have focused on remote sensing and spatial sciences.
This research aims to predict terrorism in Europe at the sub-national level. The objectives of the study are the following: (1) develop a model to predict terrorism using satellite imagery and socio-environmental data; (2) develop a grid-cell-based spatial statistics approach to reveal specific causal variables and trends in this region at a previously unexplored spatial scale.

2. Methods

This study includes 18,741 attacks occurring between 1970 and 2018 in Eastern and Western Europe apart from Russia. The target was developed using the National Consortium for the Study of Terrorism and Responses to Global Terrorism Database (GTD) [26]. The GTD is an open-source dataset of terrorist incidents since 1970 that has been georeferenced, matches the definitional criteria of the study, and has been the primary source of terrorism studies in the United States.
Remotely sensed data was collected from a variety of sources including the 2000 Shuttle Radar Topography Mission, 2020 Copernicus land cover [27], and 2018 nighttime lights from the visible and infrared imaging suite (VIIRS) sensor on board the Joint Polar-orbiting Satellite System [28]. Figure 1 visualizes the study and samples the remote sensing data used in the study.
Geospatial and population features were collected from WorldPop, a peer-reviewed research data archive. From this archive, data was obtained on distances to major waterways, inland water, major road intersections, roadways, population counts, population densities, built settlement growth, and demographics from 2000–2020. Civil unrest was calculated from the Armed Conflict Location and Event Dataset (ACLED) [29]. It should be noted as a limitation, however, that this study covers terrorism until 2018 (the last year GTD has data available at the time of the study) while civil unrest is calculated from data beginning in 2018 (the earliest year ACLED has data available at the time of the study). It is therefore assumed this feature is representative of larger civil unrest during the study’s time period. For spatial-temporal analysis, the Integrated Crisis Early Warning System (ICEWS) [30], which documents socio-political interactions extracted via open-source documents, is used.
Shapefile boundaries were imported from the Department of State’s International Boundaries data set. ACLED data was imported as vector points before being converted to raster format at a 10 km ground sampling distance (GSD). Pixel values were calculated as the number of events occurring within a pixel. Next, 5-square-kilometer hexagonal cells were created within the area of study and vector points placed at the centroid of each polygon. Points falling within a 3-km buffer of attack locations were removed. The spatial resolution for each observation is therefore approximately 5-km and the results can be interpreted as such.
The dataset was imported into a Python 3.7 environment for processing. The 23 Copernicus land cover classifications were aggregated into urban, vegetation, agriculture, and water. The data was then randomly split into training (0.7), evaluation (0.15), and hold-out test splits (0.15). Evaluation data was used for comparison and hyper-parameter tuning while the hold-out test set was used only for final performance assessments, from which the reported results are derived.
An unpruned Random Forest of 100 trees was fit to the training data and permutation importance used to retrieve feature importance scores from the evaluation set to understand each feature’s generalizability. This methodology performs robustly on random values, data sets containing both categorical and binary features, as well as in the presence of co-linearity [31].
Features with lower feature importance and correlation coefficients higher than 0.7 were removed apart from binary and categorical features. Lastly, the data was normalized to a 0–1 scale. This resulted in the following features used for prediction: (1) distance to inland waterway, (2) distance to major road, (3) distance to major waterway, (4) elevation, (5) civil unrest, (6) population density, (7) slope, (8) nighttime lights, as well as (9) urban and (10) agricultural land-cover. The study workflow is visualized in Figure 2.
The predictor variables (Table 1) were chosen due to the interaction effect each likely has on the target variable. Proximity to major roadways provides convenient transportation to and from the target location while waterways may provide an additional, alternative, or backup means of escape for well-planned attacks in addition to the well-known geographic link between cities and bodies of water. Additionally, nighttime lights, population density, and land cover each track an important aspect of human geography. Naturally, terrorists are likely to attack urban centers with large numbers of civilians, and most likely, those that are well-developed. All of which is captured in the three variables. Slope and elevation were included to capture any geographic and spatial logic consistent among densely populated urban areas not previously captured; while civil unrest attempts to assess the public sentiment that may drive a terrorist to select, or not select, a specific location.
To evaluate model predictions, accuracy, average precision (AP), and F-1 scores are reported. However, due to accuracy’s sensitivity to class imbalances [32], AP and F-1 are used for final assessment and comparison. Average Precision, n   ( R n R n 1 )   P n   , is informative of the precision-recall curve, with R n and P n being the precision and recall scores at the nth step, while F-1, 2     ( P R ) P + R , is the harmonic mean of precision and recall globally [33]. Both metrics are therefore more robust and overcome overly optimistic metrics by assessing Type 1 and Type 2 errors [34].
Logistic regression classifies input data by maximizing the log odds that an observation belongs to the nth class. In doing so, it provides intuitive coefficients and class probabilities allowing for excellent inferential interpretation. Additionally, it has been shown to perform well in the face of more flexible non-parametric models such as Support Vector Machines and Neural Networks [35,36]. This model was optimized with stochastic gradient descent [37], leveraging an alpha value of 1 × 10−6, and an initial learning rate of 0.1, producing an 0.87 F-1 score.
The Random Forest classifier, by aggregating the predictions of multiple weak decision trees, has found success among co-linear features, provides fast convergence, is largely unresponsive to over-fitting [38], and provides impressive performance in handling categorical and continuous variables, unbalanced data, outliers, and in a variety of fields including remote sensing [39]. This study’s data set, containing categorical and continuous variables, highly unbalanced features, and by nature, all instances belonging to the positive class are outliers, suggests Random Forest is an ideal model for the topic. This model leveraged a max depth of 3 trees, Gini impurity, and considered a maximum of 3 features for each split, producing an F-1 of 0.96.
Support Vector Machines, well known for the “kernel trick” [40], delineate non-linearly separable features by mapping data points into an n-dimensional kernel to avoid the computational cost of calculating n-dot products in a 3-D feature (Equation (1)). The primary parameters of the Radial Basis Function kernel, gamma, and C were sampled from logarithmic grids of ranges 1.0 × 10−4–1.0 × 104 and 1.0 × 10−2–1.0 × 1010, respectively. However, despite the kernel trick’s success, SVMs are computationally expensive as fit times increase quadratically with the number of observations [41]. As a result, ten SVMs were trained in a bagged ensemble. Each child estimator was exposed to a random sample of 0.1 of the training data without replacement, decreasing fit times and improving generalization [42]. This model, utilizing the RBF kernel, leveraged a C and gamma of 1.0 and 6.9 × 10−3, resulting in a 0.87 F-1.
K ( x ,   x i ) = e x p ( | x x i |   2 σ 2   )
Neural networks, comprise an arbitrary number of layers connected by an arbitrary number of neurons, allowing it to learn non-linear decision boundaries via non-linear activation functions. The size of the model, both in terms of layers and neurons per layer, impacts the level of complexity that can be learned. However, larger models will often degrade in performance past a consistent depth due to the number of matrix computations performed. Therefore, it cannot be stated that a deeper or larger model will necessarily perform better. Only that, with proper techniques to avoid vanishing/exploding gradients and over-fitting, it will not likely perform significantly worse.
The shallow NN, obtained from Ref. [25], consisted of a single hidden layer of 10 neurons with an initial learning rate of 1 × 10−3, 500 epochs of training, Adam optimization, logistic activation function, and cross entropy loss. The DNN (Figure 3) leveraged the same hyperparameters as the single layer-NN, but with 5 layers consisting of 100, 50, 30, 10, and 5 neurons. The neural networks achieved a 0.91 and 0.92 F-1 score, respectively.

3. Results

Table 2 compares the results across accuracy, average precision computed from precision-recall curves, and F1 scores. Average precision and F1 were chosen as the evaluation metrics due to their robustness in the face of large class imbalances. Each model performed exceptionally well, but the Random Forest outperformed every other across all tasks, with Figure 4 visualizing feature importance scores obtained from the Random Forest model.
Spatial statistics were then used to validate the Random Forest’s spatial accuracy. Join counts were used to assess the spatial correlation between the classifier’s predictions. We can understand spatial processes and distributions as one of many, or potentially infinite, possibilities. Therefore, by modeling random distributions, join counts compare synthetic results with the observed values to assess the likelihood of geographic correlation.
The Random Forest did not demonstrate a statistically significant correlation among incorrect predictions at large, with a synthetic p-value of 0.191. With a high simulated p-value, this research can reject the null hypothesis that the results were clustered, and thus, spatial correlation is not occurring among incorrect predictions at large. However, the model did exhibit a significant spatial correlation in terms of false negative predictions, with a synthetic p-value of 0.001.
A DBSCAN model identified clusters of false negatives in the Donetsk region of Ukraine, Northern Ireland, Kosovo, the Basque country of Spain, and the island of Corsica, France (Figure 5).

4. Discussion

While the best-performing model, Random Forest, demonstrated clustered false negatives, this revealed an underlying trend. Each cluster is a known hot spot of terrorism in which territorial control is the primary grievance or objective. As noted earlier, Northern Ireland was inundated with ethno-nationalist conflict from the 1960s to the late 1990s [43]; the Basque country of Spain also saw armed conflict from the 1960s to the early 2000s between Basque organizations who sought independence [44]; Kosovo underwent upheaval with respect to autonomy in the 1990’s between Yugoslavian and Kosovo nationalists [45]; Corsican nationalists have fought French, Italian, and Spanish security forces regarding independence from France [46]; most recently, conflict in Eastern Ukraine, stemming from the 2014 Russian invasion, has resulted in Russian separatists fighting for annexation into Russia [47].
While non-territorial terrorists target highly populated urban areas with symbols of their grievance, separatism is a function of operating on the periphery, where the current government does not retain high degrees of control. These locations are likely to occur outside of the most populated areas that are typical of other types of terrorism. This is likely the reason for clustering but validates the geographic differences between these types of terrorism. Furthermore, the lack of clustering among non-territorial terrorism suggests sub-classes of terrorist types (right-wing, left-wing, environmental, etc.) maintain similar geographical logic and planning. Thus, it may be more appropriate for future spatial studies to examine terrorism in terms of its territorial or non-territorial nature rather than the specific issues that drive them.
These findings can play an important role in counter-terrorism studies. First, given the Random Forest’s outperformance of more complex models, it can be inferred that the complexity of terrorist target selection is not high, as can be deduced from an ensemble of decision trees. In fact, these results are such that it may be inferred that areas analysts believe to be likely targets based on common intuition and previously established literature are, in fact, the most likely targets, and rarely do terrorists venture outside of this. Additionally, the lack of significant relationships between ICEWS and GTD data suggests that terrorists are not likely to be mobilized by the larger socio-political discourse. It can be inferred that terrorists are either uninterested in public discourse or are largely disassociated from it. If the former is true, terrorism may be a marketing campaign of sorts, aimed at moving the direction of conversation towards an area of their favor. If the latter holds true, then more research should be performed to collect the interactions terrorists are interested in.
Final predictions (Figure 6) show the model correctly capturing current and past hot spots while removing some grids in which attacks have occurred and predicting new locations where they have not. For deployment in real-world applications, it is envisioned that points of interest would be sampled, and the results interpreted as a 25-square-kilometer area around the point. In this way, the results would prove more dynamic than the static map represented here. However, subject matter expertise in regional studies, terrorism, and machine learning should be considered when interpreting any results from the model, as terrorism is a complex topic with many caveats that no model can capture in its entirety, including, for example, the intricacies of lone wolf attacks.

5. Conclusions

Although this study demonstrated robust results, there remain challenges in the field and limitations to the study. First, this study created a 25 sq. km hexagonal grid cell approach to understand where terrorism is likely to occur. However, it did not consider neighboring pixel values in the rasters from which the features were sampled. It may be deduced that if an attack occurred in an area deemed agricultural but on the edge of the pixel nearest urban areas, the attack location was not chosen due to its agricultural nature but its proximity to urban centers. However, attempts to include this spatial attribute degraded model performance and limited inference. Additionally, categorical variables could not be computed in this way as it would result in the loss of the land cover class entirely and introduce a continuous component to a categorical variable.
To ensure this limitation was not detrimental to the results of the study, multiple experiments were conducted at different grid-cell sizes (100 and 50 square kilometers), shapes (square), and random sampling. Across all experiments, results differed marginally, by approximately 0.06. The method proposed in this study produced the highest results, but relative model performance remained consistent across all studies, with Random Forest outperforming every other model. Nonetheless, future research should improve upon this methodology and include the spatial relationship of nearby pixel values.
Additionally, the features collected for this data contained only a snapshot of the temporal period covered. For example, it is not believed a terrorist attack in 1970 could have foreseen the land use of Europe in 2020, and it is unlikely the classification would have remained across the fifty years. Greater control over the spatial-temporal aspect of terrorism should be a consideration of future research.
Lastly, despite these studies’ results suggesting traditional classifiers outperform neural network architectures, there remain significant areas in which deep learning could improve upon the limitations of this work. This study approached the topic from a vector-based solution, but the issue could also be applied from a computer vision approach using convolutional neural networks and key point detection. Research in this area would likely improve upon the shortcomings of this work.
The Random Forest outperformed more complex models, including multi-layered neural networks. This is likely due to Random Forest’s robustness in the presence of multiple issues inherent in anomaly detection studies, of which terrorism is most assuredly a spatial anomaly. Neural network performance, however, cannot be guaranteed in the presence of large data imbalances. In fact, class imbalance is perhaps one of the greatest pitfalls of fully connected networks [48].
However, the model demonstrated false negative spatial correlation and therefore may not capture all possible attack locations in Eastern Ukraine, Northern Ireland, the island of Corsica, and the central Balkans or project to those areas subject to separatist terrorism in the future. In doing so, this study quantitatively backed previous research’s understanding of the geographic difference between territorial and non-territorial terrorism. Future work should improve upon this study with respect to the consideration of surrounding pixel values among the raster data sets.
From this work, we can conclude the following: terrorist target selection is not complex and can largely be inferred. Additionally, non-separatist terrorism operates with like-spatial logic but distinct from that of separatists. Parsing the spatial dimension of territorial terrorism will likely require a unique set of explanatory variables and model selection that is not captured here.

Author Contributions

Conceptualization, Caleb Buffa and Vasit Sagan; methodology, Caleb Buffa and Vasit Sagan; validation, Caleb Buffa; formal analysis, Caleb Buffa; resources, Vasit Sagan; data curation, Caleb Buffa and Gregory Brunner; writing—original draft preparation, Caleb Buffa, Gregory Brunner, Vasit Sagan and Zachary Phillips; writing—review and editing, Caleb Buffa, Gregory Brunner, Vasit Sagan and Zachary Phillips; visualization, Caleb Buffa, Gregory Brunner, Vasit Sagan and Zachary Phillips; supervision, Vasit Sagan, Gregory Brunner and Zachary Phillips; project administration, Vasit Sagan, Gregory Brunner and Zachary Phillips. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Publicly available datasets were analyzed in this study. Data can be found here: www.worldpop.org (accessed on 11 March 2022). Other data presented in this study are openly available at https://doi.org/10.5281/zenodo.3939050 (accessed on 11 March 2022) https://www.doi.org/10.1177/0022343310378914 (accessed on 11 March 2022) and https://doi.org/10.7910/DVN/28075 (accessed on 11 March 2022), reference numbers [27,29,30].

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cooper, H.A. Terrorism: The problem of definition revisited. Am. Behav. Sci. 2001, 44, 881–893. [Google Scholar] [CrossRef]
  2. Sanchez-Cuenca, I.; de la Calle, L. What we talk about when we talk about terrorism. Politics Soc. 2011, 39, 451–472. [Google Scholar] [CrossRef]
  3. Murphy, J. Defining international terrorism: A way out of the quagmire. In The Progression of International Law; Dinstein, Y., Domb, F., Eds.; Brill Nijhoff: Leiden, The Netherlands, 2011; pp. 465–490. [Google Scholar] [CrossRef]
  4. Ruby, C.L. The definition of terrorism. Anal. Soc. Issues Public Policy 2002, 2, 9–14. [Google Scholar] [CrossRef]
  5. Bahgat, K.; Medina, R. An overview of geographical perspectives and approaches in terrorism research. Perspect. Terror. 2013, 7, 38–72. Available online: http://www.jstor.org/stable/26296908 (accessed on 8 November 2020).
  6. Flint, C. The Geography of War and Peace: From Death Camps to Diplomats; Oxford University Press: Oxford, UK, 2004. [Google Scholar]
  7. Galgano, F.A. A geographical analysis of un-governed spaces. Pa. Geogr. 2006, 44, 67. [Google Scholar]
  8. Kittner, C. The role of safe havens in Islamist terrorism. Terror. Political Violence 2007, 19, 307–329. [Google Scholar] [CrossRef]
  9. Korteweg, R. Black holes: On terrorist sanctuaries and governmental weakness. Civil Wars 2008, 10, 60–71. [Google Scholar] [CrossRef]
  10. Rock, J. The geographic nature of terrorism. Pa. Geogr. 2013, 44, 133. Available online: http://www.ontology.buffalo.edu/smith/courses01/papers/Rock(Geo).pdf (accessed on 8 November 2020).
  11. Savitch, H.; Ardashev, G. Does terror have an urban future? Urban Stud. 2001, 38, 2515–2533. [Google Scholar] [CrossRef]
  12. Hobbs, J. The geographical dimensions of Al-Qaeda rhetoric. Geogr. Rev. 2005, 95, 301–327. [Google Scholar] [CrossRef]
  13. Nunn, S. Incidents of terrorism in the United States, 1997–2005. Geogr. Rev. 2007, 97, 89–111. [Google Scholar] [CrossRef]
  14. Mustafa, D. The terrible geographicalness of terrorism: Reflections of a hazards geographer. Antipode 2005, 37, 72–92. [Google Scholar] [CrossRef]
  15. Braithwaite, A.; Li, Q. Transnational terrorism hot spots: Identification and impact evaluation. Confl. Manag. Peace Sci. 2007, 24, 281–296. [Google Scholar] [CrossRef]
  16. Kliot, K.; Charney, I. The geography of suicide terrorism in Israel. GeoJournal 2006, 66, 353–373. [Google Scholar] [CrossRef]
  17. Berrebi, C.; Lakdawalla, D. How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Def. Peace Econ. 2007, 18, 113–133. [Google Scholar] [CrossRef]
  18. Smith, B.L.; Cothren, J.; Roberts, P.; Damphousse, K.R. Geospatial Analysis of Terrorist Activities: The Identification of Spatial and Temporal Patterns of Preparatory Behavior of International and Environmental Terrorists; Terrorism Research Center in Fulbright College, 2008. Available online: https://www.ncjrs.gov/pdffiles1/nij/grants/222909.pdf (accessed on 8 November 2020).
  19. Rossmo, K.; Harries, K. The geospatial structure of terrorist cells. Justice Q. 2011, 28, 221–248. [Google Scholar] [CrossRef]
  20. Singh, S.; Allanach, J.; Tu, H.; Pattipati, K.; Krishna, P.; Willett, P. Stochastic modeling of a terrorist event via the ASAM system. In Proceedings of the 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), The Hague, The Netherlands, 10–13 October 2004. [Google Scholar] [CrossRef]
  21. Dixon, S.J.; Dixon, M.B.; Elliot, J.; Guest, E.; Mullier, D.J. A neural network for counter-terrorism. In Research and Development in Intelligent Systems XXVIII; Bramer, M., Petridis, M., Nolle, L., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 229–234. [Google Scholar]
  22. Saha, S.; Aladi, H.; Kurian, A.; Basu, A. Future Terrorist Attack Prediction Using Machine Learning Techniques; PESIT South Campus: Bengaluru, India, 2017. [Google Scholar] [CrossRef]
  23. Mo, H.; Meng, X.; Li, J.; Zhao, S. Terrorist event prediction based on revealing data. In Proceedings of the Institute of Electrical and Electronics Engineers, Beijing, China, 10–12 March 2017. [Google Scholar] [CrossRef]
  24. Ding, F.; Ge, Q.; Jiang, D.; Fu, J.; Hao, M. Understanding the dynamics of terrorism events with multiple-discipline datasets and machine learning approach. PLoS ONE 2017, 12, e0179057. [Google Scholar] [CrossRef] [Green Version]
  25. Uddin, M.I.; Zada, N.; Aziz, F.; Saeed, Y.; Zeb, A.; Shah, S.A.A.; Al-Khasawneh, M.A.; Mahmoud, M. Prediction of future terrorist activities using deep neural networks. Complexity 2020, 2020, 1373087. [Google Scholar] [CrossRef] [Green Version]
  26. LaFree, G. The global terrorism database (GTD): Accomplishments and challenges. Perspect. Terror. 2010, 4, 24–46. Available online: https://www.jstor.org/stable/26298434F (accessed on 8 November 2020).
  27. Buchhorn, M.; Smets, B.; Bertels, L.; De Roo, B.; Lesiv, M.; Tsendbazar, N.-E.; Herold, M.; Fritz, S. Copernicus Global Land Service: Land Cover 100m: Collection 3: Epoch 2019: Globe; Zenodo: Genève, Switzerland, 2020. [Google Scholar] [CrossRef]
  28. Li, X.; Zhou, Y.; Zhao, M.; Zhao, X. A harmonized global nighttime light dataset 1992–2018. Sci. Data 2020, 7, 168. [Google Scholar] [CrossRef]
  29. Raleigh, C.; Linke, A.; Hegre, H.; Karlsen, J. Introducing ACLED: An armed conflict location and event dataset. J. Peace Res. 2010, 47, 651–660. [Google Scholar] [CrossRef]
  30. Boschee, E.; Lautenschlager, J.; O’Brien, S.; Shellman, S.; Starz, J.; Ward, M. ICEWS Coded Event Data; Harvard Dataverse: Harvard, MA, USA, 2015. [Google Scholar] [CrossRef]
  31. Altmann, A.; Tolosi, L.; Sander, O.; Lengauer, T. Permutation importance: A corrected feature importance measure. Bioinformatics 2010, 26, 1340–1347. [Google Scholar] [CrossRef] [PubMed]
  32. Guo, X.; Yin, Y.; Dong, C.; Yang, G.; Zhou, G. On the Class Imbalance Problem. In Proceedings of the 2008 Fourth International Conference on Natural Computation, Jinan, China, 18–20 October 2008; pp. 192–201. [Google Scholar] [CrossRef]
  33. Pedregosa, F.; Varoquaux, G.; Gramfort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Prettenhofer, P.; Weiss, R.; Dubourg, V.; et al. Scikit-learn: Machine Learning in Python. J. Mach. Learn. Res. 2011, 12, 2825–2830. [Google Scholar]
  34. Grandini, M.; Bagli, E.; Visani, G. Metrics for Multi-Class Classification: An Overview. arXiv 2020, arXiv:2008.05756. [Google Scholar]
  35. Kalantar, B.; Pradhan, B.; Naghibi, S.A.; Motevalli, A.; Mansor, S. Assessment of the effects of training data selection on the landslide susceptibility mapping: A comparison between support vector machine (SVM), logistic regression (LR) and artificial neural networks (ANN). Geomat. Nat. Hazards Risk 2018, 9, 49–69. [Google Scholar] [CrossRef]
  36. Bui, D.T.; Pradhan, B.; Lofman, O.; Revhaug, I.; Dick, O.B. Application of support vector machines in landslide susceptibility assessment for the Hoa Binh province (Vietnam) with kernel functions analysis. Int. Congr. Environ. Model. Softw. 2012, 226. Available online: http://scholarsarchive.byu.edu/iemssconference/2012/Stream-B/226 (accessed on 8 November 2020).
  37. Zhang, T. Solving large scale linear prediction problems using stochastic gradient descent algorithms. In Proceedings of the Twenty-First International Conference on Machine Learning, Banff, AB, Canada, 4–8 July 2004. [Google Scholar] [CrossRef]
  38. Belgiu, M.; Dragut, L. Random forrest in remote sensing: A review of applications and future directions. ISPRS J. Photogramm. Remote Sens. 2016, 114, 24–31. [Google Scholar] [CrossRef]
  39. Rahayu, S.P.; Embong, A. Overview of random forest: Effective ensemble method in modern data mining. In Proceedings of the National Conference on Software Engineering and Computer Systems 2007 (NaCES 2007); 2007. Available online: http://umpir.ump.edu.my/id/eprint/982/1/NaCSES-2007-133_Overview_of_Random_Forest_Effective_Ensemble.pdf (accessed on 8 November 2020).
  40. Wang, L. (Ed.) Support Vector Machines: Theory and Applications; Springer: Berlin/Heidelberg, Germany, 2005; Volume 7. [Google Scholar]
  41. Suthaharan, S. Support vector machine. In Machine Learning Models and Algorithms for Big Data Classification; Springer: Berlin/Heidelberg, Germany, 2016; pp. 207–235. [Google Scholar] [CrossRef]
  42. Kim, H.C.; Pang, S.; Je, H.M.; Kim, D.; Bang, S.Y. Constructing support vector machine ensemble. Pattern Recognit. 2003, 36, 2757–2767. [Google Scholar] [CrossRef]
  43. Stevenson, J. The Price of Peace in Northern Ireland: “Say Nothing” Shows How Slow Reconciliation Can Be; Foreign Affairs: Congers, NY, USA, 2019; Available online: https://www.foreignaffairs.com/reviews/review-essay/2019-05-20/price-peace-northern-ireland (accessed on 8 November 2020).
  44. Balfour, S. A Brief History of Catalan Nationalism: The Roots of the Current Crisis. Foreign Affairs. 2017. Available online: https://www.foreignaffairs.com/articles/spain/2017-10-18/brief-history-catalan-nationalism (accessed on 8 November 2020).
  45. Kupchan, F.C.A. Independence for Kosovo. Foreign Affairs. 2005. Available online: https://www.foreignaffairs.com/articles/europe/2005-10-01/independence-kosovo (accessed on 8 November 2020).
  46. Thompson, I. Settlement and conflict in Corsica. Trans. Inst. Br. Geogr. 1978, 3, 259–273. [Google Scholar] [CrossRef]
  47. Motyl, A.J. War Comes to Ukraine: The Consequences of the Crash in Donetsk. Foreign Affairs. 2014. Available online: https://www.foreignaffairs.com/articles/russian-federation/2014-07-17/war-comes-ukraine (accessed on 8 November 2020).
  48. Johnson, J.M.; Khoshgoftaar, T.M. Survey on deep learning with class imbalance. J. Big Data 2019, 6, 27. [Google Scholar] [CrossRef]
Figure 1. The study area (a) with sample explanatory variables. Attacks occurring between 1970 and 2018 within this geographic region are considered. Explanatory variables were collected from remotely sensed data including (b) digital elevation model, (c) land cover classification [8], and (d) distance to major road intersections. DEM and distance to major road intersections data can be found at www.worldpop.org (accessed on 10 October 2021).
Figure 1. The study area (a) with sample explanatory variables. Attacks occurring between 1970 and 2018 within this geographic region are considered. Explanatory variables were collected from remotely sensed data including (b) digital elevation model, (c) land cover classification [8], and (d) distance to major road intersections. DEM and distance to major road intersections data can be found at www.worldpop.org (accessed on 10 October 2021).
Ijgi 11 00211 g001
Figure 2. The methodology workflow. Cell values were sampled from processed raster and vector data via hexagonal grid centroids. Feature engineering was performed on train, validation, and test splits. Five machine learning models compared, and four spatial statistics methods used to output a final prediction map.
Figure 2. The methodology workflow. Cell values were sampled from processed raster and vector data via hexagonal grid centroids. Feature engineering was performed on train, validation, and test splits. Five machine learning models compared, and four spatial statistics methods used to output a final prediction map.
Ijgi 11 00211 g002
Figure 3. Uddin et al. DNN architecture [25] used in the study outperformed larger and more complex models with regularization built for comparison producing an F1 score of 0.92.
Figure 3. Uddin et al. DNN architecture [25] used in the study outperformed larger and more complex models with regularization built for comparison producing an F1 score of 0.92.
Ijgi 11 00211 g003
Figure 4. Random Forest feature importance scores. Urban landcover classification, population density, and nighttime lights are the most important features impacting model prediction. These findings are in line with previous qualitative studies and enhance our understanding of terrorist target selection.
Figure 4. Random Forest feature importance scores. Urban landcover classification, population density, and nighttime lights are the most important features impacting model prediction. These findings are in line with previous qualitative studies and enhance our understanding of terrorist target selection.
Ijgi 11 00211 g004
Figure 5. DBSCAN false negative clusters (purple). Clustering is occurring within Northern Ireland, Northern Spain, Eastern Ukraine, Kosovo, and Corsica, France. Each region has the following attribute in common: large-scale and ongoing separatist terrorism. Thus, suggesting a common spatial attribute among territorial terrorism separate from non-territorial. Note, clusters were enlarged for visualization purposes and are therefore not to scale. The map is in the Albers equal- area conic projection system.
Figure 5. DBSCAN false negative clusters (purple). Clustering is occurring within Northern Ireland, Northern Spain, Eastern Ukraine, Kosovo, and Corsica, France. Each region has the following attribute in common: large-scale and ongoing separatist terrorism. Thus, suggesting a common spatial attribute among territorial terrorism separate from non-territorial. Note, clusters were enlarged for visualization purposes and are therefore not to scale. The map is in the Albers equal- area conic projection system.
Ijgi 11 00211 g005
Figure 6. Random Forest predictions of terrorist target locations. Each red dot represents a grid-cell the model has predicted as consistent with historical targets for terrorism. Those grids that have been attacked before are at elevated risk, while those that have never been attacked are predicted to be at risk should the political and social environment lend itself. Please note grid cells have been enlarged for visualization and are therefore not to scale. The map is in the Albers equal-area conic projection system.
Figure 6. Random Forest predictions of terrorist target locations. Each red dot represents a grid-cell the model has predicted as consistent with historical targets for terrorism. Those grids that have been attacked before are at elevated risk, while those that have never been attacked are predicted to be at risk should the political and social environment lend itself. Please note grid cells have been enlarged for visualization and are therefore not to scale. The map is in the Albers equal-area conic projection system.
Ijgi 11 00211 g006
Table 1. Description of input features, the year they were collected, and original raster resolution. All variables, accounting for various spatial resolutions, were aggregated and sampled via hexagonal grid-cells.
Table 1. Description of input features, the year they were collected, and original raster resolution. All variables, accounting for various spatial resolutions, were aggregated and sampled via hexagonal grid-cells.
FeatureDescriptionYearResolution
Distance to inland waterKilometers to
inland body of water
2016100 m
Distance to major roadKilometers to
OSM roadway
2016100 m
Distance to major waterwayKilometers to
major navigable waterway
2016100 m
ElevationSRTM meters
above sea level
2000100 m
Civil unrestArmed conflict
location and event dataset
201810 km
Population densityPeople per pixel20181 km
SlopeSRTM degree
of topographic slope
2000100 m
Nighttime lightsVIIRS temporally
calibrated nighttime lights
2018100 m
LandcoverCopernicus
calibrated nighttime lights
2018100 m
Table 2. Classification report results. Random Forest achieved the highest F1 and average precision scores. Due to class imbalances, F1 and AP are considered the primary evaluation metrics. Random Forest is therefore used for final predictions.
Table 2. Classification report results. Random Forest achieved the highest F1 and average precision scores. Due to class imbalances, F1 and AP are considered the primary evaluation metrics. Random Forest is therefore used for final predictions.
ModelAccuracyAPF1
DNN0.980.910.91
NN0.980.900.91
Random Forest0.990.970.96
Log Reg + SGD0.960.900.88
SVM Ensemble0.960.630.88
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Buffa, C.; Sagan, V.; Brunner, G.; Phillips, Z. Predicting Terrorism in Europe with Remote Sensing, Spatial Statistics, and Machine Learning. ISPRS Int. J. Geo-Inf. 2022, 11, 211. https://doi.org/10.3390/ijgi11040211

AMA Style

Buffa C, Sagan V, Brunner G, Phillips Z. Predicting Terrorism in Europe with Remote Sensing, Spatial Statistics, and Machine Learning. ISPRS International Journal of Geo-Information. 2022; 11(4):211. https://doi.org/10.3390/ijgi11040211

Chicago/Turabian Style

Buffa, Caleb, Vasit Sagan, Gregory Brunner, and Zachary Phillips. 2022. "Predicting Terrorism in Europe with Remote Sensing, Spatial Statistics, and Machine Learning" ISPRS International Journal of Geo-Information 11, no. 4: 211. https://doi.org/10.3390/ijgi11040211

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop