Laila Wahedi, Ph.D. Candidate
Address: 3700 O St NW
City: Washington, District of Columbia - 20057
Country: United States
Laila A. Wahedi is a Fellow at the Massive Data Institute at the McCourt School of Public Policy at Georgetown University, and an Adjunct Research Associate at the Institute for Defense Analyses. Her research interests vary across the field of security studies and international relations, but focus on understanding networks of militant organizations: why do groups align, and what is the impact of patterns of alignment on these groups? Laila also works in strategic force mix and readiness issues. She has done work on assessing force mixes and readiness requirements for an uncertain future, understanding and modeling force generation across the military services, and on the impact of energy on force readiness across the services. Laila enjoys taking on side projects in her spare time. Her interests include computational modeling, and understanding the neural mechanisms driving competition and cooperation.
Conflict Processes & War
Networks And Politics
Terrorism And Insurgency
Violent Actor Networks
Military Force Planning
Violent non-state actors train together, share information, trade together, and conduct attacks together. They also fight as they compete over scarce resources and supporters, and when they cannot commit to cooperation. Cooperation can benefit groups greatly, but competitive pressures and limited resources make trust and cooperation costly. The balance between cooperation and competition leads to dynamic cooperation networks. My dissertation research explores these militant networks: tradeoffs that violent non-state actors make when aligning with others, the consequences of those tradeoffs, and the ways in which a group’s position in a global network affects their vulnerabilities and behavior. I explore these tradeoffs through several research prongs, each contained in separate dissertation papers.
How do violent groups learn their violent tactics? How do violent tactics diffuse across networks of partners?
Adopting new violent tactics is risky because failure compromises a group’s operatives and reputation. Sharing operational information necessary for success is also risky, because it risks losing information to security operatives. Groups compensate for these risks by sharing with and learning from trusted partners. This means that network structures mediate the flow of technical knowledge through violent organizations.
Working paper available upon request.How does a militant group’s network of partners constrain or benefit that group? Do different patterns of partnerships have different effects?
I examine the ways in which groups are constrained and enabled by their network of partners. The structure of a network shapes the ways in which goods and vulnerabilities flow across a network. For example, redundant ties may be inefficient from an information flow standpoint, but may also provide robustness to a trade network at risk of disruption. It follows, then, that different network topologies are more suited to certain tasks, and that groups constrained by certain network topologies may have different vulnerabilities and different strengths than groups constrained by other topologies. I find that more centralized networks tend to be more efficient, facilitating the sharing of information, capacity for violence, and group survival. Moreover, well-connected groups in centralized networks have greater capacity, survival, and learning, with each new partner they have, while well-connected groups in decentralized networks have lower capacity, are less likely to survive, and adopt fewer tactics.
Working paper available on upon requestHow do transnational groups decide who to support in local conflicts?
How do transregional groups (such as al Qaeda) choose their local partners, given many options? Which civil wars, and which rebel groups within civil wars, will contribute to a global threat? When do local groups accept sponsorship and when do they refuse? I argue that despite principal agent problems, transregional groups prefer strong local partners, but strong local partners generally do not need sponsorship and prefer autonomy. Partnership is only possible when strong local groups lose access to a critical resource.
Working paper available upon request.How do groups choose their partners?
Groups will select a portfolio of partnerships that maximizes their net gains from cooperation and minimizes their net risks. I theorize about two different alliance formation strategies: a symmetric strategy and an asymmetric strategy. Because an individual group’s choices are not made independent of the choices made by other groups, I will model these strategies using a computational network model, and compare the resultant network to extant militant group networks. Forced Migration
With the Singh Lab at Georgetown’s Massive Data Institute.
As part of an effort to create a migration early warning system, we are identifying predictive signals from online media and social media sources. Knowing when migrants are likely to flee catastrophes of different types, and where they are likely to go, will help us to more efficiently prepare and deliver aid. This wealth of data also provides opportunities for more micro-level hypothesis testing on forced migration to help us understand and alleviate root causes.
As a first step, we are examining migrant flows in Iraq as a response to ISIS related violence.Rhetorical Influence of Violent Groups
With the Singh Lab at Georgetown’s Massive Data Institute.
Using official statements from ISIS and Al Qaeda, and social media posts from potential sympathizers, I seek to trace the influence of ISIS and al Qaeda both on one another, as well as on far right Islamists generally. I will examine influence over time, and how it is affected by major events and territorial change. This project is in the data collection phase, but will soon move to topic modeling of collected text.Social Media Information Networks
With the Singh Lab at Georgetown’s Massive Data Institute.
Using twitter data from authorities on parenting, and their social networks, we are examining the flow of information on Twitter and the ways in which these networks interact. Do they cluster by topic? How is information processed and distributed among followers and their networks? This research contributes to a broader project on understanding parental behavior and how social media signals relate to survey data. It will also help us to understand how the flow of information on Twitter differs among consumers and authorities.Readiness and Stochastic Risk Assessment
Conducted with the Institute for Defense Analyses.
Click here for the latest SARA report
The SARA model is a tool for assessing force structures and force readiness policies under uncertainty over the future threat environment. As one of the lead developers for the model, I built a demand model to use user expectations about the future to simulate random futures and generate force requirements. I also contributed to and built force generation models to meet these uncertain demands, and produced various risk measures. This involved developing an understanding of current and potential force management policies and constraints, and building a model to meet department needs.Energy and Readiness
Conducted wit the Institute for Defense Analyses
Click here for the latest report
Fuel prices are budgeted and appropriated roughly two years in advance, but in recent years, fuel prices have been highly volatile. If fuel prices increase substantially, then funds may be unavailable for pilots to fly, for ships to steam, or for units to drive, which could impact training. What is the effect of an unexpected fuel price increase on readiness? What systems are in place to handle these effects, and is the department facing a potentially serious readiness problem?Using historical data, and conducting interviews with offices across the Navy, Air Force, and Army, we found no effect of fuel price increases. Reliable systems are in place to handle fuel funding shortfalls. That being said, fuel price increases have the potential to exacerbate already strained budgets when other stressors are present.
Types of Cookies we use
This site employs two first-party cookies (served from us and by us that are essential for the site to operate) and two third-party cookies that deliver external services.
We use a server-generated session cookie to remember you when you are logged in to the site. This is essential to making sure that your profile details are those that are updated when you log in to make changes. This also lets us know who is logging into the site and when.
This site also uses a cookie that is created by your browser to remember when you agree to the cookie notice popup. This cookie stores nothing but the word "true" if you have agreed to the terms and is deleted when you close your browser. This cookie's only function is to prevent the cookie notice from popping up every time you refresh the site's homepage.
How to Disable Cookies Altogether
Information on how to disable cookies in your browser can be found here. Please keep in mind that disabling cookies will prevent the essential functions of most interactive websites and web applications, this site included.
This privacy notice discloses the privacy practices for (womenalsoknowstuff.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:
Information Collection, Use, and Sharing
If you have any questions about this Privacy Notice, or need to contact us, we can be reached at .
Terms and Conditions
Last updated: August 04, 2019
Please read these Terms and Conditions ("Terms", "Terms and Conditions") carefully before using the http://womenalsoknowstuff.com website (the "Service") operated by Women Also Know Stuff ("us", "we", or "our"). Your access to and use of the Service is conditioned upon your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who wish to access or use the Service. By accessing or using the Service you agree to be bound by these Terms. If you disagree with any part of the terms then you do not have permission to access the Service.
Our Service allows you to post, link, store, share and otherwise make available certain information, text, graphics, videos, or other material ("Content"). You are responsible for the Content that you post on or through the Service, including its legality, reliability, and appropriateness. By posting Content on or through the Service, You represent and warrant that: (i) the Content is yours (you own it) and/or you have the right to use it and the right to grant us the rights and license as provided in these Terms, and (ii) that the posting of your Content on or through the Service does not violate the privacy rights, publicity rights, copyrights, contract rights or any other rights of any person or entity. We reserve the right to terminate the account of anyone found to be infringing on a copyright. You retain any and all of your rights to any Content you submit, post or display on or through the Service and you are responsible for protecting those rights. We take no responsibility and assume no liability for Content you or any third party posts on or through the Service. However, by posting Content using the Service you grant us the right and license to use, modify, publicly perform, publicly display, reproduce, and distribute such Content on and through the Service. You agree that this license includes the right for us to make your Content available to other users of the Service, who may also use your Content subject to these Terms. Women Also Know Stuff has the right but not the obligation to monitor and edit all Content provided by users. In addition, Content found on or through this Service are the property of Women Also Know Stuff or used with permission. You may not distribute, modify, transmit, reuse, download, repost, copy, or use said Content, whether in whole or in part, for commercial purposes or for personal gain, without express advance written permission from us.
When you create an account with us, you guarantee that you are above the age of 18, are a woman in the academic field of Political Science, and that the information you provide us is accurate, complete, and current at all times. Inaccurate, incomplete, or obsolete information may result in the immediate termination of your account on the Service. You are responsible for maintaining the confidentiality of your account and password, including but not limited to the restriction of access to your computer and/or account. You agree to accept responsibility for any and all activities or actions that occur under your account and/or password, whether your password is with our Service or a third-party service. You must notify us immediately upon becoming aware of any breach of security or unauthorized use of your account.
The Service and its original content (excluding Content provided by users), features and functionality are and will remain the exclusive property of Women Also Know Stuff and its licensors. The Service is protected by copyright, trademark, and other laws of both the United States and foreign countries. Our trademarks and trade dress may not be used in connection with any product or service without the prior written consent of Women Also Know Stuff. Links To Other Web Sites Our Service may contain links to third party web sites or services that are not owned or controlled by Women Also Know Stuff Women Also Know Stuff has no control over, and assumes no responsibility for the content, privacy policies, or practices of any third party web sites or services. We do not warrant the offerings of any of these entities/individuals or their websites. You acknowledge and agree that Women Also Know Stuff shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such third party web sites or services. We strongly advise you to read the terms and conditions and privacy policies of any third party web sites or services that you visit.
We may terminate or suspend your account and bar access to the Service immediately, without prior notice or liability, under our sole discretion, for any reason whatsoever and without limitation, including but not limited to a breach of the Terms. If you wish to terminate your account, you may simply discontinue using the Service, or notify us that you wish to delete your account. All provisions of the Terms which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity and limitations of liability.
You agree to defend, indemnify and hold harmless Women Also Know Stuff and its licensee and licensors, and their employees, contractors, agents, officers and directors, from and against any and all claims, damages, obligations, losses, liabilities, costs or debt, and expenses (including but not limited to attorney's fees), resulting from or arising out of a) your use and access of the Service, by you or any person using your account and password; b) a breach of these Terms, or c) Content posted on the Service.
Limitation Of Liability
In no event shall Women Also Know Stuff, nor its directors, employees, partners, agents, suppliers, or affiliates, be liable for any indirect, incidental, special, consequential or punitive damages, including without limitation, loss of profits, data, use, goodwill, or other intangible losses, resulting from (i) your access to or use of or inability to access or use the Service; (ii) any conduct or content of any third party on the Service; (iii) any content obtained from the Service; and (iv) unauthorized access, use or alteration of your transmissions or content, whether based on warranty, contract, tort (including negligence) or any other legal theory, whether or not we have been informed of the possibility of such damage, and even if a remedy set forth herein is found to have failed of its essential purpose.
Your use of the Service is at your sole risk. The Service is provided on an "AS IS" and "AS AVAILABLE" basis. The Service is provided without warranties of any kind, whether express or implied, including, but not limited to, implied warranties of merchantability, fitness for a particular purpose, non-infringement or course of performance. Women Also Know Stuff, its subsidiaries, affiliates, and its licensors do not warrant that a) the Service will function uninterrupted, secure or available at any particular time or location; b) any errors or defects will be corrected; c) the Service is free of viruses or other harmful components; or d) the results of using the Service will meet your requirements.
Some jurisdictions do not allow the exclusion of certain warranties or the exclusion or limitation of liability for consequential or incidental damages, so the limitations above may not apply to you.
These Terms shall be governed and construed in accordance with the laws of the state of Arizona and the United States, without regard to its conflict of law provisions. Our failure to enforce any right or provision of these Terms will not be considered a waiver of those rights. If any provision of these Terms is held to be invalid or unenforceable by a court, the remaining provisions of these Terms will remain in effect. These Terms constitute the entire agreement between us regarding our Service, and supersede and replace any prior agreements we might have had between us regarding the Service.
We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a revision is material we will provide at least 30 days notice prior to any new terms taking effect. What constitutes a material change will be determined at our sole discretion. By continuing to access or use our Service after any revisions become effective, you agree to be bound by the revised terms. If you do not agree to the new terms, you are no longer authorized to use the Service.
If you have any questions about these Terms, please contact us at .