ArjunPandit wrote:not a guru, but this is a good suggestion. i think people who need to know the hot beds of terrorism know it already. You can prepare a ready reckoner, by mapping incidents in last few years. That said, the interconnectedness is not st fwd.
1. The terrorist is from one district,
2. attacks are carried out in another district
3. Infiltration might be done from some other district
3. money might have moved from elsewhere
this is a complex , well oiled and well networked playground of operations and counter operations. That said, you will learn a lot from this exercise. I would suggest you go ahead and keep pasting it on an image of the valley
Ever wondered why reliance or big bazaar gives you a loyalty card??
They know precisely your spending patterns, they know exactly what you buy, which sales promotions appeal to you, when and where you shop and the time that you enter and leave and so on. Correlation of card data with surveillance camera data can identify bottlenecks, wait times, billing efficiencies and the need to either increase or decrease staff/ billing counters etc at specific time periods (can rationalize overtime expenses).
Based on this, and of course a similar analysis of tens and tens of thousands of such loyalty cards they are able to rationalize and optimize their display shelves.
They place items that are frequently purchased in combination, items that are usually paired or grouped, such items are placed close to one another in order to induce purchase and sell more.
This subtly suggestive and also subliminally messaged marketing is a powerful tool and also they subtly route the customer in predetermined pathways or aisles where offers are very suggestively and attractively displayed so that the customer is induced to picks up some of those items without a second thought, and often times many items purchased are not even needed but we have succumbed to the lure of these techniques.
Consumption data dictates stocking decisions, lead times from suppliers can be changed and also inventory carrying costs can be optimized.
I went into such detail because you have described the cashmere problem in a reverse way to what I have outlined.
1. The terrorist is from one district,
2. attacks are carried out in another district
3. Infiltration might be done from some other district
3. money might have moved from elsewhere
this is a complex , well oiled and well networked playground of operations and counter operations. That said, you will learn a lot from this exercise. I would suggest you go ahead and keep pasting it on an image of the valley
For the problem, you have described, and sufficient data being available, there are any number of algorithms that can decode/analyze the data, depending on specific need, and give a clearer picture as to what is happening on the ground, in a bird's eye sort of way that will give the operations guys the big picture.
But I am reasonably certain that such a procedure may already be in place and is being used both by the IA operations and the intelligence guys to target infiltrators and their local contacts.