Computational Methods for Counterterrorism