Where Genocide Is Most Likely To Happen Next

A Rwandan peacekeeper patrolling Bangui, Central African Republic

Jerome Delay/AP

AA Font size + Print

A Rwandan peacekeeper patrolling Bangui, Central African Republic

One university team may have found a way to predict the world’s next genocides. By Ben Watson and Kedar Pavgi

Twenty years after the horrors of the Rwandan genocide, researchers at The University of Sydney have created a model predicting which countries will experience targeted mass violence across the globe.

Known as the Atrocity Forecasting Project, the model plugs in more than a dozen “instability variables,” which include statistics on civil wars, regime changes, assassinations, neighboring state conflicts, infant mortality rates, and instances of previous genocides. It is similar to the Pentagon-funded Integrated Crisis Early Warning System (ICEWS), a data tool used to forecast a variety of international emergencies.

The project could help “major players” like the United States, European Union, or the United Nations, “by giving them an early warning to increase readiness for military intervention, when necessary to stop such violence soon after it starts,” Ben Goldsmith, one of the chief researchers, told Defense One.

And their latest projections have proven remarkably accurate. As a control, the model was first applied to atrocities falling between the years 1988 to 2003. Their results turned out to be 90.9 percent accurate in predicting when major genocides like the ones in Rwanda, Yugoslavia and Sudan, actually occurred.

Forecasting through 2015, the Central African Republic (CAR) tops their list—a timely reflection of statements by officials as well as the U.N. Security Council’s unanimous decision Thursday to send peacekeepers there to counter the exodus of some 625,000 residents fleeing brutal sectarian violence in recent months. The Democratic Republic of Congo, Chad and Somalia follow CAR, with Afghanistan and Syria also in the top 15.

Researchers hope their findings will one day influence not only the work of international relief organizations, but maybe even alter the plans of malignant actors in the world’s most violent places.

“Such monitoring,” Goldsmith said, “might in itself serve as a deterrent, for example if actors considering incitement to mass killing are aware that there will be sufficient evidence to prosecute them for the crimes against humanity they are contemplating.”

The research team plan to produce an updated forecast later next year that extends beyond 2015.

The maps below compare the project’s findings first for the control study, then for the 15 countries most at risk for genocide or politicide. (What’s the difference? See here.)

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.