Summary and Critique by Michael Pouch
Summary:
Lisa Kaati and Pontus Svenson uses Analysis of
Competing Hypothesis (ACH) to help introduce a model to target similarities
between different lone wolf cases. The purpose of the study is to outline this
analytic tool to investigate lone wolf terrorists by showing how this method
could be applied.
Before the authors began to examine their study, they
introduce and define what lone wolf terrorism is. Next, they looked at the characteristics regarding the lone wolves background, and behavior that lone wolves share. They also point out the difficulty that
law enforcement and intelligence community have to prevent lone wolf terrorist
attacks. They specify that it is unfeasible for analysts to gather information
and evaluate all data concerning radicalization processes of possible lone wolf
terrorists, without any analytic method or process. However, analytic tools
that assist the analysts could help
facilitate the process. This will help gather and scope the information to
gather more data and investigate more possibilities for lone wolf radicalization.
One these tools that the authors mention was ACH.
When identifying a hypothesis for lone wolf terrorism, while using ACH, the analyst needs to pose hypotheses regarding them and their behavior. Foremost, they need to brainstorm possible hypothesis by making a list of significant evidence for and against each hypothesis. Next, the evidence needs to be evaluated by the likelihood of alternative hypotheses or helpfulness during the investigation. This will help by drawing tentative conclusions about the hypothesis and have an objective during the investigation. Lastly, the analyst proceeds to collect information about an individual with the ACH format, as shown in figure 1.
The
researchers describe an outline that can
be used to categorize and analyze about possible lone wolf terrorists in the effort
to prevent an attack while using ACH
(Shown in figure 2). First, the analyst
identifies a hypothesis to begin a framework for
the examination of a possible lone wolf. Second, the hypothesis is constantly
developing and cultivating to help scope and specify a likely lone wolf. Third,
is the process of collecting information that confirms
or refute the hypotheses that
Figure 2: Mode of operation for the framework.
|
Critique:
The use of ACH to help prevent an attack from a lone wolf is likely an
effective analytic method to use to help organize and have a framework for identifying a lone wolf. However, there is room for bias in
selecting the template hypothesis, relevant evidence, and weighing the
individual to likely become a possible lone wolf. Due to this, there is no
guarantee that ACH will automatically select a possible lone wolf attacker.
Despite bias in the selecting and evaluating process, ACH does help create a systematic process that increases the odds of
preventing a lone wolf attack by giving valuing and indicating a possible lone wolf. Additionally, ACH helps the analyst leave a
trail of evidence that can be interpreted. Overall, ACH is a useful analytic tool to establish a framework
of potential lone wolves that can be measured.