Countering Violent Extremism: A mathematical model
Countering Violent Extremism: A mathematical model
Santoprete, Manuele
2019-01-15 00:00:00
MANUELE SANTOPRETE Abstract. The term radicalization refers to the process of developing extremist religious political or social beliefs and ideologies. Radicalization becomes a threat to national security when it leads to violence. Prevention and de-radicalization initiatives are part of a set of strategies used to combat violent extremism, which taken together are known as Countering Violent Extremism (CVE). Prevention programs aim to stop the radicalization process be- fore it starts. De-radicalization programs attempt to reform convicted extremists with the ultimate goal of social reintegration. We describe prevention and de-radicalization programs mathematically using a compartmental model. The prevention initiatives are modeled by including a vaccination compartment, while the de-radicalization process is modeled by in- cluding a treatment compartment. The model exhibits a threshold dynamics characterized by the basic reproduction number R . When R < 1 the system has a unique equilibrium 0 0 that is asymptotically stable. When R > 1 the system has another equilibrium called \en- demic equilibrium", which is globally asymptotically stable. These results are established by using Lyapunov functions and LaSalle's invariance principle. We perform numerical simulations to con rm our theoretical results. January 25, 2019 1. Introduction The term radicalization refers to the process of developing extremist religious political or social beliefs and ideologies. While radical thinking is by no means problematic in itself, it becomes a threat to national security when it leads to violence. Because of this fact, radicalization is of particular concern for governments, law enforcement and security agencies. A conventional, but arguably antiquated, approach to national security is based on coun- terterrorism. Counterterrorism strategies consist of a law enforcement component (terrorists are arrested, tried, and convicted) and a military component (terrorists lose their life or are captured on the battleground). Practitioners of counterterrorism, however, agree that these approaches alone cannot break the cycle of violence [23]. In light of this, governments use an additional set of initiatives collectively known as countering violent extremism (CVE). CVE programs can be classi ed into three categories[23, 13, 5] (1) Prevention programs, which aim to stop the radicalization process before it starts; (2) Disengagement programs, which endeavor to block radicalization while it is taking place. arXiv:1901.05440v2 [physics.soc-ph] 24 Jan 2019 2 (3) De-radicalization programs, which aim to reform convicted extremists with the ulti- mate goal of social reintegration. The development of viable intervention strategies to mitigate radicalization and violence requires a thorough understanding of the radicalization process, prevention, disengagement and deradicalization programs. Mathematical models can provide a rst step in this direc- tion. The aim of this paper is to use a compartmental epidemiological model to analyze CVE programs, focusing on prevention and deradicalization initiatives. The use of dierential equations to describe social science problems dates back, at least, to the work of Lewis F. Richardson [20] who pioneered the application of mathematical techniques by studying the causes of war, and the relationship between arms race and the eruption of war. A summary of his research was published posthumously in the book [19]. Modern applications of compartmental models to the social sciences range from models of political party growth, to models of the spread of crime (see for instance [6, 8, 10, 15, 16, 21, 25, 26, 27]). In recent years compartmental models have also been used to study terrorism, the spread of fanatic behavior, and radicalization [2, 1, 7, 14, 22, 17]. Furthermore, an age-structure model of radicalization was considered by Chuang, Chou and D'Orsogna [3], a bi-stable model of radicalization within sectarian con
ict was studied Chuang, D'Orsogna and Chou [4], and a game theoretic model of radicalization was analyzed by Short, McCalla and d'Orsogna [24]. The model we study here extends the one considered in [22] by including a vaccinated class. The purpose of this model is to analyze two of the CVE strategies, namely prevention programs and de-radicalization programs. As in [14, 22] we use Lyapunov functions to study the global stability of the equilibria of the model and the basic reproduction number R to assess initiatives for combating terrorism. Although the literature indicates some degree of success of CVE programs, according to [13], there is little consensus regarding the validity of CVE prevention programs or disengagement/de-radicalization programs, largely due to the lack of empirical data. Fur- thermore, it is very dicult to evaluate these programs since indicators of success and mea- sures of ecacy remain elusive [18]. These are key issues, since the degree of government support for these programs depends, to a large extent, on demonstrating their eectiveness. The results we present in this paper are theoretical in nature and are fairly independent from the speci c choices of the parameter values. Our model can, in principle, be used to evaluate the ecacy of CVE programs in combating terrorism whenever empirical data are known. 2. Equations We use a compartmental model to describe the dynamics. We divide the population at risk of adopting an extreme ideology into ve compartments (1) (S) Susceptible (2) (E) Extremists (3) (R) Recruiters 3 (4) (T ) Treated (5) (V ) Vaccinated. Our model is extends the treatment model studied in [22] by adding a vaccinated com- partment (V ). This allows us to describe individuals in prevention programs. Our transfer diagram is similar, but dierent, to the one proposed by Yang, et al. [29] to model the spread of tuberculosis with vaccination and treatment. The dierences in the models are enough to create some complications in the construction of Lyapunov functions for our problem. The transfer diagram for our system is given below. V ( + d )E p q V R V E V E (1 k)T c V q SR p E E E p c R c E S T S R E q SR p R R R S ( + k)T ( + d )R Recruitment occurs in the system with rate constant > 0. Of these individuals, a fraction p enters the vaccination compartment, while a fraction p = 1 p enters the V S V susceptible population. The rate at which susceptibles are recruited is SR. A fraction q of the newly recruited individuals are assumed to transfer to the extremist class, while the remainder q = 1 q 1 transfer to the recruiter class. Vaccinated individuals are R E recruited at a reduced rate q V R, with 0 1. The rate constant at which an individual leaves the extremist compartment to became a recruiter is c , while c is the E R rate constant at which a recruiter abandons the recruiter class to become an extremist. The natural death rate constant is , d and d are supplementary death rate constants for E R individuals in compartments E and R, respectively. The additional rates d and d take E R into consideration individuals that die or are sentenced to lifelong incarceration as a result of police or military action. The rate constants of extremists transferred to the treatment compartment is p , while p is the rate constant of extremists moving to compartment T . E R 4 Treated individuals exit T at a rate . We remove a fraction k 2 [0; 1] of treated individ- uals, since eectively treated individuals are de-radicalized forever. For a fraction 1 k of treated individuals the de-radicalization program is unsuccesful. These individuals get into the E compartment after treatment. Based on the above assumptions we obtain the following model: S = p + c V S SR S V E = q SR + q V R ( + d + c + p )E + c R + (1 k) T E E E E E R R = q SR + c E ( + d + c + p )R (2.1) R E R R R T = p E + p R ( + )T E R V = p c V V q V R V V E where q + q = 1, q ; q 2 [0; 1]. To simplify system (2.1) we introduce the following E R E R parameters b = + d + c + p , b = + d + c + p , b = + and b = c + . E E E E R R R R T V V Using these new constants in (2.1) yields: S = p + c V S SR S V E = q (S + V )R b E + c R + (1 k) T E E R R = q SR + c E b R (2.2) R E R T = p E + p R b T E R T V = p b V q V R: V V E It is not dicult to show that the region = (S; E; R; T; V ) 2 R : S + E + R + T + V is a compact positively invariant and attracting set that attracts all solutions of (2.2) with initial conditions in R . See Proposition 2.1 in [22] for a proof of a similar statement. 3. Radicalization-free equilibrium and basic reproduction number R There is a unique equilibrium with E = R = T = 0 given by x = (S ; 0; 0; 0; V ), where 0 0 0 c c V V p + p p + S V S V V (3.1) S = = V = 0 0 b b V V We denote by R the spectral radius of the matrix G evaluated at x . R is called the basic 0 0 0 reproduction number and can be obtained as outlined by Van Den Driessche and Watmough [28]. First we identify the infected classes, that in this example turn out to be E; R; T . Suppose F , F and F are the rates of arrival of newly radicalized individuals in the E R T + + compartment E, R, and T , respectively. Let V = V V , with V be the rate of trans- j j j mission of individuals into compartment j 2 fE; R; Tg by all remining methods, and V the j 5 rate of removal of individuals from compartment j, where j is one of E; R, and T . In our problem 2 3 2 3 F q (SR + V R) E E 4 5 4 5 F = F = q SR R R F 0 and 2 3 2 3 V b E c R (1 k)T E E R 4 5 4 5 V = V = b R c E : R R E V b T (p E + p R) T T E R Then consider the matrices 2 3 2 3 @F @F @F @V @V @V E E E E E E @E @R @T @E @R @T 6 7 6 7 6 7 6 7 @F @F @F @V @V @V R R R R R R F = (x ) and V = (x ); 6 7 6 7 0 0 @E @R @T @E @R @T 4 5 4 5 @F @F @F @V @V @V T T T T T T @E @R @T @E @R @T which in our problem take the form 2 3 2 3 0 q (S + V ) 0 b c E 0 0 E R E 4 5 4 5 F = 0 q S 0 and V = c b 0 ; R 0 E R 0 0 0 p p b E R T where = (1 k). Finally, we can compute the next generation matrix G = FV : 2 32 3 0 q (S + V ) 0 b b ( p + c b ) b E 0 0 R T E R R T E R 4 54 5 G = 0 q S 0 c b p b b c R 0 E T E E E T E E b D 0 0 0 b p c p b p c p b b + c c R E E R E R R E E R R E 2 3 q c b (S + V ) q ( p b b )(S + V ) q c S E E T 0 0 E E E E T 0 0 E E E 0 4 5 = q c b S q ( p b b )S q c S ; R E T 0 R E E E T 0 R E E 0 b D 0 0 0 where D = b b c c (b p + c p ) > 0. Since the matrix G has only one non-zero E R E R R E E R eigenvalue, its spectral radius is: E E S (c q + b q q ) + V q c 0 E E E R R 0 E E (3.2) R = : b b c c (c p + b p ) E R E R E R R E 4. Global Asymptotic Stability of x for R < 1 0 0 In this section we prove the global asymptotic stability of the equilibrium x . For this purpose we introduce the following Lyapunov function 2 2 (S S ) (V V ) H 0 0 U = A + + ; 2S 2V b c 0 0 T E 6 where H is the function de ned by H (E; R; T ) = b c E + (b b p )R + c T: T E T E E E E E Let Q = b b p = ( + )( + d + c ) + p + kp > 0; T E E E E E E E then E E c q + b q q E E E R R A = is a positive constant since q q R R c q + (b b p ) = c q + Q > 0: E E E T E E E E b b T T We can now prove the following theorem Theorem 4.1. Suppose Ap < 4, and R 1 then x is globally asymptotically stable on V 0 0 R . Proof. We study the stability of x by taking the Lyapunov function 2 2 (S S ) (V V ) H 0 0 U = A + + 2S 2V b c 0 0 T E where H is the function de ned by H (E; R; T ) = b c E + (b b p )R + c T; T E T E E E E E with Q = b b p = ( + )( + d + c ) + p + kp > 0; T E E E E E E E and E E c q + b q q E E E R R A = is a positive constant since q q R R c q + (b b p ) = c q + Q > 0: E E E T E E E E b b T T Using (3.1) we obtain p = b V V V 0 (4.1) p = S c V : S 0 V 0 7 Dierentiating U with respect to t along the trajectories of the system (2.2), and using both equations in (4.1) to rewrite p and p yields V S 0 0 0 (S S ) (V V ) b c E + (b b p )R + c T 0 0 T E T E E E E E 0 0 0 U =A S + V + S V b c 0 0 T E 2 2 (S S ) (V V ) 0 0 =f (S; V ) A R q R A (S S )R E 0 S V 0 0 q (V V )R + A SR + q V R + R E 0 E b c T E f (S; V ) A (S S )R q (V V )R + A SR + q V R + R 0 E 0 E b c T E =f (S; V ) + A S + q V + R 0 E 0 b c T E D A S + q V 0 E 0 =f (S; V ) + 1 + b c R T E b c D T E =f (S; V ) + [1 R ] R b c T E 2 2 (S S ) (V V ) (S S )(V V ) 0 0 0 0 where f (S; V ) = A b + A c . It remains to show that V V S V S 0 0 0 f (S; V ) 0 and f (S; V ) = 0 if and only if S = S and V = V . 0 0 Note that the Hessian matrix of f (S; V ) is 2 3 2A Ac S S 0 0 4 5 Ac 2b V V S V 0 0 A(AV c 4S b ) 0 0 V and its determinant is . By the second derivative test, (S; V ) = (S ; V ) is 2 0 0 S V 2A a maximum when the determinant is positive, and < 0. The latter inequality holds, hence, it only remains to study the determinant. Since A > 0 we must have AV c + 4S b > 0. Substituting S and V in this expression we obtain 0 V 0 0 2 2 AV c + 4S b = Ap c + 4b c + 4p b 0 0 V V V V S V V V Since b = c + the expression inside the bracket reduces to V V (4 Ap )c + 4c + 4p p ; V V S V which proves that the determinant is always positive if p A < 4. In this case, for R 1, we have U 0, with equality if and only if S = S and V = V , 0 0 0 and R = 0. The largest invariant set for which U = 0, then consists of just the equilibrium x . The theorem then follows from LaSalle's Invariance Principle. Note that, Theorem 4.1 holds when the parameters satisfy the inequality Ap < 4. This does not seem to pose a substantial restriction in the allowable value of the constants, since 8 Ap is a small number for any reasonable choice. For instance if we choose the parameters as in Figure 3, then Ap = 6:633301503 10 . It may be of interest to see if it is possible to remove the restriction Ap < 4 by using a dierent Lyapunov function. 5. Endemic Equilibrium We now look for equilibria of (2.2) for which at least one of the populations E ; R ; T and V is dierent from zero. We call such point an endemic equilibrium and we denote it by x = (S ; E ; R ; T ; V ) 2 R . The endemic equilibria of (2.2) are given by the following >0 system of equations p + c V S SR = 0 S V q (S + V )R b E + c R + (1 k) T = 0 E E R q SR + c E b R = 0 (5.1) R E R p E + p R b T = 0 E R T p b V q V R = 0: V V E Solving the rst, third, fourth and fth equation in (5.1) and treating R as a parameter we obtain the following c p V V S = p + + R b + q R V E E = !R (5.2) p ! + p E R T = R V = ; b + q R V E where b q S b b q + b c q + p q R R R T E T R R R R E ! = = > 0; c q (b b p ) + c q b E R E T E E E E T since (b b p ) > 0. Substituting the expressions in 5.2 in the second equation of (5.1) E T E E yields the following equation for R R (R ) + R + = 0 2 1 0 where = q Db 2 E T = b (b + q )D + (((b q + c q )b + (k 1)q p p + b c p )) q 1 T V E E R E E T R E S T E V E = b b D (R 1) 0 T V 0 This equation has solution if either R = 0 or (5.3) (R ) = (R ) + R + = 0: 2 1 0 9 The case R = 0 must be excluded since it yields a solution with E = R = T = 0, which was already known. Consider equation (5.3). Clearly, < 0 (since D > 0) and > 0 2 0 whenever R > 1. It follows that (5.3) has a unique positive root R if R > 1. Since is 0 0 attracting within R we have that R 2 (0; =). Note that we can also nd an useful formula for S as a function of V . This formula can be obtained by substituting the equations for E and T given in (5.2) into the second line of (5.1), and solving for S . This gives b b c c (p c + p b ) q c V E R E R R E E R E E (5.4) S = : E E (c q + b q q ) E E E R R Theorem 5.1. The endemic equilibrium x of (2.2) is globally asymptotically stable on R , >0 whenever R > 1. Proof. Consider the Lyapunov function S E R T V W = S g + a E g + a R g + a T g + a V g 1 2 3 4 S E R T V with g(x) = x 1 ln x, and a > 0 (i = 1; : : : ; 4), where the a s are constants to be i i 1 5 determined. Clearly, W is C , W (x ) = 0 , and W > 0 for any p 2 R such that p 6= x . >0 Computing the derivative of W along the solutions of (2.2) gives S E R T V 0 0 0 0 0 0 W = 1 S + a 1 E + a 1 R + a 1 T + a 1 V 1 2 3 4 S E R T V = 1 [p + c V S SR] S V + a 1 [q (S + V )R b E + c R + (1 k)T ] 1 E E R R T + a 1 [q SR + c E b R] + a 1 [p E + p R b T ] 2 R E R 3 E R T R T + a 1 [p b V q V R] 4 V V E =C ( + a q R )S + (a q + a q 1) SR + ( a b + a c + a p )E 2 R 1 E 2 R 1 E 2 E 3 E + (S + a c a b + a p + a q V )R + (a a b )T + (c a b )V 1 R 2 R 3 R 4 E 1 E 3 T V 4 V S E E R T + q (a a )V R p a p T a c R a p T a E E 1 4 S 3 E 2 E 3 R 1 E S T R T E R SR V R V S a c E a q E a q E a p c V : 1 R 1 E 1 E 4 V V E E E V S 10 where C = + S + a b E + a b R + a b T + a b V . For simplicity denote w = , 1 E 2 R 3 T 4 V E R T V x = , y = , z = , and v = . Then E R T V W =C ( + a q R )S w + (a q + a q 1) S R wy + ( a b + a c + a p )E x 2 R 1 E 2 R 1 E 2 E 3 E + (S + a c a b + a p + a q V )R y + (a a b )T z + (c a b )V v 1 R 2 R 3 R 4 E 1 E 3 T V 4 V 1 x x y z + q (a a )V R vy p a p E a c E a p R a T E 1 4 S 3 E 2 E 3 R 1 E w z y z x y wy vy 1 v a c R a q S R a q V R a p c V : 1 R 1 E 1 E 4 V V x x x v w Following the method used in [12] and [11] we introduce the following set 1 1 v x x y z y vy wy D = v; w; x; y; z; vy; wy; ; ; ; ; ; ; ; ; ; : v w w z y z x x x x We now list all the subsets of D for which the product of all functions within each subset is equal to one n o 1 1 x y x z (5.5) v; ; w; ; ; ; ; ; v w y x z x 1 vy x 1 wy x z y x 1 v 1 v x wy ; ; ; ; ; ; ; ; ; w; ; ; ; ; ; : v x y w x y x z y v w v w y x We associate the following terms to the subsets in equation (5.5): 1 1 x y x z 2 v ; 2 w ; 2 ; 2 ; v w y x z x 1 vy x 1 wy x z y x 1 v 3 ; 3 ; 3 ; 3 w ; v x y w x y x z y v w 1 v x wy 4 : v w y x As in [12], we de ne a Lyapunov function using the terms above: 1 1 x y (5.6) H (v; w; x; y; z) = b 2 v + b 2 w + b 2 1 2 3 v w y x x z 1 vy x + b 2 + b 3 4 5 z x v x y 1 wy x z y x + b 3 + b 3 6 7 w x y x z y 1 v 1 v x wy + b 3 w ; +b 4 8 9 v w v w y x 11 where b ; : : : ; b are unknown constants. We look for solutions of the equation G(v; x; y; z) = 1 9 H (v; w; x; y; z) with a > 0 (i = 1; : : : ; 4) and b 0 (k = 1; : : : ; 9) i k Setting like terms in G and H equal yields: vy : q (a a ) = 0 E 1 4 wy : a q + a q 1 = 0 1 E 2 R x : a b + a c + a p = 0 1 E 2 E 3 E y : S + a c a b + a p + a q V = 0 1 R 2 R 3 R 4 E z : a a b = 0 1 E 3 T v : b = (c a b )V 1 V 4 V yx : b = a c R 3 1 R xz : b = a p E 4 3 E vyx : b = a q V R 5 1 E (5.7) yz : b = a p R 7 3 R zx : b + b = a T 4 7 1 E v : b + b + b + b = a p 1 5 8 9 4 V xy : b + b + b + b + b = a c E 3 5 6 7 9 2 E v : 2(b + b + b + b ) + 3(b + b + b + b ) + 4b = C 1 2 3 4 5 6 7 8 9 w : b + b = ( + a q R )S 2 8 2 R w : b + b = p 2 6 S cw : b + b = c V 8 9 V wyx : b + b = a q S R 6 9 1 E The rst ve lines of (5.7) form an overdetermined consistent system of ve equations in the variables a ; : : : ; a , with solution 1 4 a = a = > 0 1 4 c q + b q q E E E R E R 1 E a = > 0 q c q + b q q R E E E R E R E E a = > 0: c q + b q q E E E R E R The following six lines of (5.7) form an overdetermined consistent system of six equations in the variables b ; b ; b ; b ; b , with a unique solution where b ; b ; b ; b ; b > 0. The next 1 3 4 5 7 1 3 4 5 7 12 two lines can be easily seen to be consistent with the other equations, but because they are dependent from other equations they can be discarded. The last group of equations in (5.7) is a system of ve equations in the variables b ; b ; b 2 6 8 and b . It remains to prove that this system has a solution with b ; b ; b ; b > 0. The 9 2 6 8 9 augmented matrix of the system given by the last ve equations of (5.7) is 2 3 2 3 3 4 d 6 7 1 0 1 0 d 6 7 6 7 1 1 0 0 d 6 7 4 5 0 0 1 1 d 0 1 0 1 d where d = C 2(b + b + b ) 3(b + b ), d = ( + a q R )S , d = p , d = c V , 1 1 3 4 5 7 2 2 R 3 S 4 V and d = a q S R . Performing row operations we can reduce the augmented matrix to 5 1 E row echelon form 2 3 1 0 1 0 d 6 7 0 1 1 0 d d 3 2 6 7 6 7 0 0 1 1 d 6 7 4 5 0 0 0 0 (d + d 3d ) d 1 2 3 4 0 0 0 0 d d + d d 5 3 2 4 A computations involving the last two rows of the augmented matrix above shows that the system is consistent, but since only the rst three rows are independent it follows that the solution is not unique. Solutions of the system are given by b = d t 2 2 b = (d d ) + t 6 3 2 b = d t 9 4 with b = t. For the solutions to be positive we must have max(0; d d ) < t < min(d ; d ). 8 2 3 2 4 Hence, for this system of equation to always have a positive solution we must have that d d < d , d d < d and d ; d > 0. The rst inequality is always satis ed since d > 0. 2 3 2 2 3 4 2 4 3 The second inequality holds since d d + d d = 0, so that d + d d = d < 0. 5 3 2 4 3 2 4 5 Clearly, d > 0. The fact that d > 0 follows from the fact that a > 0, which completes the 4 2 2 proof. 6. Numerical Simulations We now use numerical simulations of system (2.1) to illustrate and support the results of our mathematical analysis. We assume that the life expectancy is 80 years, which implies that death rate is = 1 1 0:000034247 (days) [9]. We take = 600 (days) , which corresponds to a population size of about 17.5 million. The remaining parameters are taken to be = 0:0000005 (days) , 1 1 1 d = 0:00083 (days) , d = 0:00083 (days) , p = 0:00175, p = 0:0019 (days) , c = E R E R E 1 1 1 0:0006 (days) , c = 0:0008 (days) , and = 0:0016 (days) , q = 0:86, q = 0:14 = 0:2 R E R 13 1e7 1.750 1.745 1.740 1.735 1.730 1.725 1.720 0 200000 400000 600000 800000 1000000 0 200000 400000 600000 800000 1000000 t (Days) t (Days) (a) (b) 200 1000 0 0 0 200000 400000 600000 800000 1000000 0 200000 400000 600000 800000 1000000 t (Days) t (Days) (c) (d) 0.04 0.02 0.00 0.02 0.04 0 200000 400000 600000 800000 1000000 1.720 1.725 1.730 1.735 1.740 1.745 1.750 1e7 t (Days) S (e) (f ) Figure 1. Time history and phase portraits of system (2.1) for = 0:0000005, q = 0:86, q = 0:14, d = 0:00083, d = 0:000083, p = 0:00175, p = 0:0019, p = 1, R E R E R S p = 0, = 0:8, c = 0:0006, c = 0:0008, k = 0:66, = 0:0016, = 0:000034247, V E R = 600 and k = 0:66. We also assume that, initially, there is no prevention program by choosing p = 1 , p = 0. S V T E 14 In this case we nd that R = 1:0183912670368627, and hence, x is globally asymptoti- cally stable in R by Theorem 5.1. >0 Figures 1 (a)-(d) show that the number of individuals in the compartments S; E; R, and T , approach a constant value. Figure 1 (e) shows that the number of individuals in the vaccination compartment is, in this case zero. Figure (f ), instead, is a phase portrait for the system. These gures con rm that the solutions approach a globally asymptotically stable equilibrium point. This case illustrates the unwanted scenario where terrorists and recruiters become endemic to the population. If we raise p to p = 0:1 (days) without changing the other parameters, then R = V V 0 1:0126247813740998 and the endemic equilibrium x is still globally asymptotically stable. S; E; R, and T still approach a constant value as t ! 1, however, the number of individuals in the compartments E and R is much less than before, see Figure 2 (a)-(f ). If we increase p to p = 0:9, keeping the other parameters constant, then R = V V 0 0:9664928960719988, so that x is globally asymptotically stable. Figures 3 (a){(d) show that S; E; R; V ! 0, as t ! 1, supporting our result on the asymptotic stability of x . This means that if a large enough number of susceptible individuals is targeted by eective prevention programs it is possible to change the stability of the equilibria, ensuring that extremists and recruiters eventually disappear from the population. 7. Conclusions This paper considers a model of radicalization in which the population is divided into ve compartments: Susceptible, Vaccinated, Extremists, Recruiters and Treated. The model incorporates as part of the analysis two key strategy of CVE, namely, prevention and de- radicalization. This work builds upon the papers of McCluskey and Santoprete [14], and Santoprete and Xu [22]. The model considered in this paper has a threshold dynamics governed by the basic re- production number R . If R 1, then there is only one equilibrium, free from extremists 0 0 and recruiters, which is globally asymptotically stable provided Ap > 4. In this case the extremist ideology will be eradicated. If R > 1, the equilibrium mentioned above becomes unstable while an additional equilibrium, which we call \endemic", appears. This second equilibrium is globally asymptotically stable forR > 1. In this case the ideology will become endemic, that is, recruiters and extremists will establish themselves in the population. The analysis in [14] showed that an increase in police and military action, that is, increasing the parameters d and d , decreased R . The same conclusion applies in the model studied E R 0 in this paper. In [22] we established that an increase in the success rate of the de-radicalization programs, or an increase in the rates p and p at which individuals in the R and E compartments R E enter the Treated class caused R to decrease. Similar conclusions apply in the present model, proving that de-radicalization programs can be an integral part of a successful eort to combat violent extremism. If it is not possible to change k, p or p it is often possible E R to increase , the average prison sentence, which in turn decreases R . As observed in 1e7 1.740 1.735 1.730 1.725 1.720 0 200000 400000 600000 800000 1000000 0 200000 400000 600000 800000 1000000 t (Days) t (Days) (a) (b) 200 1000 100 500 0 0 0 200000 400000 600000 800000 1000000 0 200000 400000 600000 800000 1000000 t (Days) t (Days) (c) (d) 0 0 0 200000 400000 600000 800000 1000000 1.720 1.725 1.730 1.735 1.740 1e7 t (Days) S (e) (f ) Figure 2. Time history and phase portraits of system (2.1) for = 0:0000005, q = 0:86, q = 0:14, d = 0:00083, d = 0:000083, p = 0:00175, p = 0:0019, p = 0:9, R E R E R S p = 0:1, = 0:8, c = 0:0006, c = 0:0008, k = 0:66, = 0:0016, = 0:000034247, V E R = 600 [22], this illustrates that incrementing prison sentences length could be used to remedy the shortcoming of poorly designed de-radicalization programs. T E 16 1e7 1.74 1.72 1.70 1.68 1.66 1.64 0 200000 400000 600000 800000 1000000 0 200000 400000 600000 800000 1000000 t (Days) t (Days) (a) (b) 2.00 1000000 1.75 1.50 1.25 1.00 0.75 0.50 0.25 0.00 0 0 200000 400000 600000 800000 1000000 0 200000 400000 600000 800000 1000000 t (Days) t (Days) (c) (d) Figure 3. Time history of system (2.1) for = 0:0000005, q = 0:86, q = 0:14, E R d = 0:00083, d = 0:000083, p = 0:00175, p = 0:0019, p = 0:1, p = 0:9, = 0:8, E R E R S V c = 0:0006, c = 0:0008, k = 0:66, = 0:0016, = 0:000034247, = 600 E R Moreover, an increase in the fraction p of individuals entering the Vaccinated class pro- duces a reduction in R . Similarly, a decrease in , which accounts for the decreased rate at which vaccinated individuals enter the Extremist class, corresponds to a decrease in R . This demonstrates that prevention strategies can be eective in reducing extremism. As we have seen, since the basic reproduction number is expressed in terms of the model parameters, it is easy to evaluate various strategies to be used in combating violent extrem- ism. However, there are two shortcoming in our analysis. The rst one is that it is dicult to obtain realistic estimates of the parameters. This is, at least in part, due to a lack of empirical data regarding CVE programs [13]. The second is that we made many simplifying assumptions in the model. Some of these are listed in [22]. These simplifying assumptions open up a number of research paths that we intend to address in future work. References [1] E. T. Camacho, The development and interaction of terrorist and fanatic groups, Communications in Nonlinear Science and Numerical Simulation, 18 (2013), pp. 3086{3097. R S E 17 [2] C. Castillo-Chavez and B. Song, Models for the transmission dynamics of fanatic behaviors, Bioterrorism-mathematical modeling applications in homeland security. Philadelphia: SIAM, (2003), pp. 155{172. [3] Y.-L. Chuang, T. Chou, and M. R. D'Orsogna, Age-structured social interactions enhance radi- calization, The Journal of Mathematical Sociology, (2018), pp. 1{24. [4] Y.-L. Chuang, M. R. D'Orsogna, and T. Chou, A bistable belief dynamics model for radicalization within sectarian con
ict, arXiv preprint arXiv:1805.07480, (2018). [5] L. Clutterbuck, Deradicalization programs and counterterrorism: A perspective on the challenges and bene ts, Understanding Deradicalization: Pathways to Enhance Transatlantic Common Perceptions and Practices, (2015). [6] N. M. Crisosto, C. M. Kribs-Zaleta, C. Castillo-Chavez, and S. Wirkus, Community re- silience in collaborative learning, Discrete and Continuous Dynamical Systems Series B, 14 (2010), pp. 17{40. [7] S. Galam and M. A. Javarone, Modeling radicalization phenomena in heterogeneous populations, PloS one, 11 (2016), p. e0155407. [8] J. Hayward, Mathematical modeling of church growth, The Journal of mathematical sociology, 23 (1999), pp. 255{292. [9] J. M. Hyman and T. LaForce, Modeling the spread of in
uenza among cities, in: H.T. Banks, C. Castillo-Chavez (Eds.), Bioterrorism: Mathematical modeling applications in homeland security, SIAM, (2003), pp. 215{240. [10] R. A. Jeffs, J. Hayward, P. A. Roach, and J. Wyburn, Activist model of political party growth, Physica A: Statistical Mechanics and its Applications, 442 (2016), pp. 359{372. [11] S. Lamichhane and Y. Chen, Global asymptotic stability of a compartmental model for a pandemic, Journal of the Egyptian Mathematical Society, 23 (2015), pp. 251{255. [12] J. Li, Y. Xiao, F. Zhang, and Y. Yang, An algebraic approach to proving the global stability of a class of epidemic models, Nonlinear Analysis: Real World Applications, 13 (2012), pp. 2006{2016. [13] C. Mastroe and S. Szmania, Surveying CVE metrics in prevention, disengagement and deradical- ization programs, Report to the Oce of University Programs, Science and Technology Directorate, Department of Homeland Security. College Park, MD: START, (2016). [14] C. McCluskey and M. Santoprete, A bare-bones mathematical model of radicalization, Journal of Dynamics & Games, 5 (2018), p. 243. [15] D. McMillon, C. P. Simon, and J. Morenoff, Modeling the underlying dynamics of the spread of crime, PloS one, 9 (2014), p. e88923. [16] F. Mohammad and U. M. Roslan, Analysis on the crime model using dynamical approach, in AIP Conference Proceedings, vol. 1870, AIP Publishing, 2017, p. 040067. [17] O. Nathan, G. Lawi, and J. Nthiiri, Modelling the dynamics of radicalization with government intervention, Neural, Parallel, and Scienti c Computations, 26 (2018), pp. 211{224. [18] P. O'Halloran, The challenges of evaluating attitudinal change: A case study of the eectiveness of international countering violent extremim (CVE) programs, preprint, (2017). [19] L. Richardson, Arms and Insecurity;ba Mathematical Study of the Causes and Origins of War; Edited by Nicolas Rashevsky and Ernesto Trucco, Boxwood Press, 1960. [20] L. F. Richardson, Mathematical psychology of war, Nature, 136 (1935), p. 1025. [21] D. M. Romero, C. M. Kribs-Zaleta, A. Mubayi, and C. Orbe, An epidemiological approach to the spread of political third parties, Discrete and Continuous Dynamical Systems-Series B (DCDS-B), 15 (2011), pp. 707{738. [22] M. Santoprete and F. Xu, Global stability in a mathematical model of de-radicalization, Physica A: Statistical Mechanics and its Applications, (2018). 18 [23] G. Selim, Approaches for countering violent extremism at home and abroad, The ANNALS of the American Academy of Political and Social Science, 668 (2016), pp. 94{101. [24] M. B. Short, S. G. McCalla, and M. R. D'Orsogna, Modelling radicalization: how small violent fringe sects develop into large indoctrinated societies, Royal Society open science, 4 (2017), p. 170678. [25] J. Sooknanan, B. Bhatt, and D. Comissiong, Catching a gang{a mathematical model of the spread of gangs in a population treated as an infectious disease, International Journal of Pure and Applied Mathematics, 83 (2013), pp. 25{43. [26] , A modi ed predator{prey model for the interaction of police and gangs, Royal Society open science, 3 (2016), p. 160083. [27] J. Sooknanan and D. Comissiong, A mathematical model for the treatment of delinquent behaviour, Socio-Economic Planning Sciences, 63 (2018), pp. 60{69. [28] P. Van den Driessche and J. Watmough, Reproduction numbers and sub-threshold endemic equilib- ria for compartmental models of disease transmission, Mathematical biosciences, 180 (2002), pp. 29{48. [29] Y. Yang, S. Tang, X. Ren, H. Zhao, and C. Guo, Global stability and optimal control for a tuberculosis model with vaccination and treatment., Discrete & Continuous Dynamical Systems-Series B, 21 (2016). Department of Mathematics, Wilfrid Laurier University, Waterloo, ON, Canada
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pngMathematicsarXiv (Cornell University)http://www.deepdyve.com/lp/arxiv-cornell-university/countering-violent-extremism-a-mathematical-model-I8I5qmfdT0
Countering Violent Extremism: A mathematical model