Chapter 1: Introduction.- Chapter 2: History of Boko Haram.- Chapter 3: Temporal Probabilistic Rules and Policy Computation Algorithms.- Chapter 4: Sexual Violence.- Chapter 5: Suicide Bombings.- Chapter 6: Abductions.- Chapter 7: Arson.- Chapter 8: Other Types of Attacks.- Appendix A: All TP-Rules.- Appendix B: Data Collection.- Appendix C: Most Used Variables.- Appendix D: Sample Boko Haram Report.