terrorism and crime their
play

Terrorism and Crime: Their Similarities, Differences, and Lessons - PowerPoint PPT Presentation

Terrorism and Crime: Their Similarities, Differences, and Lessons Learned Laura Dugan University of Maryland Department of Criminology and Criminal Justice & The National Consortium for the Study of Terrorism and Response to Terrorism


  1. Terrorism and Crime: Their Similarities, Differences, and Lessons Learned Laura Dugan University of Maryland Department of Criminology and Criminal Justice & The National Consortium for the Study of Terrorism and Response to Terrorism (START) Some of this research was supported by the U.S. Department of Homeland Security (DHS) Science and Technology Directorate’s Office of University Programs through START. Any opinions, findings, conclusions or recommendations presented here are solely the authors’ and are not representative of DHS or the United States Government .

  2. Both are Bad Bad Things If we can leverage what we understand about crime and controlling crime while allowing for departures due to their differences, criminologists could contribute to the reduction of global terrorism.

  3. LaFree and Dugan Book Chapter in DeFlem 2004  Marks a point in time when criminologists needed to be prodded to study terrorism.  Predates most terrorism-related research in major criminological journals.  Was published eight years ago.  This presentation will use that chapter as a departure point, updating it along the way.

  4. Conceptual Similarities & Differences Differences Similarities  Terrorism is not a  Cross disciplinary specific offense. boundaries  Terrorism crosses  Social constructions jurisdictional  Definitional ambiguity boundaries.  Perpetrator  Terrorists seek public demographics recognition.  Terrorists operate  Undermine social trust toward a broader goal. “altruists”   Terrorists innovate.

  5. A Closer Look Reveals that Terrorism is Conceptually Similar to Specific Crimes  Organizational Structure  Organized crime, Gang activity, Corporate crime  Sustained Program of Violence  Organized crime, Gang activity, Serial murder  Victim Selection  Mixture of targeted versus convenient  Personal versus impersonal

  6. Corporate Crime & Terrorism (Dugan & Gibbs 2008) Comparing Corporations to the Terrorist Organization  Very different at first glance Corporation are legal entities, terrorist organizations are  illegal by definition.  YET, each strives to survive in a highly competitive environment. Corporations pursue profit.  Terrorist orgs recruit and maintain strong membership.   Both have become decentralized over time. That decentralization hinders detection & prosecution. 

  7. Corporate Crime & Terrorism (cont.) Implications for Crime Control  Structural complexity diffuses responsibility & obstructs intelligence.  Both rely on constituency approval. Recommendations  Interorganizational task forces  Encourage whistle-blowing  Focus on prevention

  8. Data Similarities & Differences “All science begins with counting things...” Crime Data Sources Terrorism Data Sources  Official  Open source media reports  Victimization GTD   Self-report RAND (RAND-MIPT)  ITERATE  Other regional/type  specific

  9. Key Methodological Differences Strategies must accommodate  Terrorists innovate.  Causality moves in both directions.  Terrorists mostly operate in dynamic groups.

  10. Spatial & Temporal Patterns of Terrorist Attacks by ETA Takes advantage of this difference by exploiting the dependence of attacks by the same organization to inform our understanding of hierarchical and contagion diffusion.

  11. Key Methodological Similarities  Analysis of distributions and trends  Geographic mapping  Time series  Series hazard modeling  Causal analysis  Life-course analysis  Network analysis

  12. Applying Trajectory Analysis to the Terrorist Organization 60 50 Frequency of Attacks 40 3.6% 30 9.2% 20 9.3% 10 11.1% 41.1% 25.4% 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Years Since Birth Avg HF PERS Avg HF DECL Avg MF PERS Avg MF DES Avg LF PERS Avg LF DES Pred HF PERS Pred HF DECL Pred MF PERS Pred MF DES Pred LF PERS Pred LF DES

  13. Applying Network Analysis to the Terrorist Organization al-Qaeda Jamatul Mujahedin Moro Islamic Liberation Front Mujahideen Shura Organization Bangladesh (MILF) Council in the Land of the Two Rivers al-Fatah Palestinian/Lebanese Bangladesh Jemaah PIJ Iraqi Jihadist Islamiya (JI) Abu Sayyaf Ansar al-Islam PRA Group Taliban PFLP Mexican PULO Marxists Hezbollah Asbat al-Ansar Hizbul Mujahideen Ansar al-Sunnah HAMAS (HM) Army Lashkar-I-Omar al-Qaeda European Anarchist Takfir wa Hijra Harakat ul-Mudjahidin UVF (HuM) Venezuelan Marxist LVF FLNC Lashkar-e-Taiba RHD al-Qaeda Central (LeT) Jaish-e-Mohammad Corsican Separatist (JeM) Tupamaro Revolutionary Movement Jan. 23 Ulster Loyalist Pakistani/Kashmiri Armed Islamic EIJ Lashkar-e-Jhangvi CPN-M Group Latin American (LeJ) GAI Himalayan Maoist Marxist Movsar Baryayev Informal Anarchist Iraqi Shia Mahdi Gang Federation Riyad us-Saliheyn CPI-M PWG Army Chechens Martyrs' Brigade Anarchist + New People ’ s Black Star Army (NPA) Southeast Anti-Indian Ethnonationalist Group of Carlo Giuliani Group of Carlo Giuliani Asian ELN Marxist International NDFB Solidarity FARC ETA RO-N17 KYKL Anti-Globalization DHKP-C ULFA Greek Marxist + Right-Wing PKK GRAPO Islamic Great NSCN-IM Latin American Eastern Raiders IRA Front European Marxist AUC Turkish/Central Asian European Ethnonationalist

  14. Applying These Ideas to Help Control Terrorism Drawing on Criminological Theory and Methods

  15. Typical Application of Rational Choice Theory on Violent Behavior E( u terror ) = p U( y - F ) + (1- p ) U( y ) where p = perceived probability of punishment y = anticipated benefits of perpetration; and F = perceived penalty of the act Lesson: Raise the costs of perpetration through increased certainty and severity so that the utility of perpetration falls below the benefit of the act. In other words: DETERRENCE

  16. Deterrence Findings on Terrorism  Sometimes works  High risk of backlash  Labeling theory  Legitimacy

  17. Northern Ireland Study (LaFree, Dugan, and Korte 2009) Terrorist Attacks by Republicans 250 200 Frequency 150 100 50 0 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 Operation Motorman Criminalization Loughall Falls Curfew Incident Gibraltar Internment Incident

  18. Northern Ireland Results 2 1.872 1.8 1.598 1.6 1.417 1.4 1.2 1.000 1 Internment Criminalization Falls Curfew Operation Gibralter Motorman 0.8 0.6 0.543 0.4

  19. Other Results  Metal Detectors reduce hijackings… but increase other forms of hostage taking situations (Enders and Sandler 1993)  US bombings in Afghanistan increased Osama bin Laden’s popularity in the region (Malvesti 2002)  Israel’s bombings in Lebanon reduced Lesson: If raising the costs of one type of terrorism just immediate rocket attacks, but increased leads to switching to another tactic with lower costs, why international support for Hezbollah not raise the benefits of nonterrorism. (Eppright 1997)  One of our student projects show that the 2004 FACE act seemed to reduce abortion clinic violence by making it more punishable.

  20. How do We Raise the Benefits of Living a Crime-Free Life?  Rehabilitation versus punishment  Weed and seed  Early intervention programs  Nurse Home Visitations  Problem oriented policing

  21. Raising the Benefits of Abstaining from Terrorism E( u nonterror ) = q U( x + G ) + (1- q ) U( x ) where q = perceived probability of rewards from abstention x = value of current situation; and G = anticipated rewards of abstention

  22. Ways to Raise the Benefits of Abstention from Terrorism  Establishment of Basque Autonomous Communities in Spanish Constitution  Turkish opening of educational and health facilities to Kurdish population  Undoing previous restrictions (e.g., lifting curfews)  Releasing prisoners

  23. Dugan and Young Policy Proposal for ASC on US Extremism Target the same group of disenfranchised persons to participate in the policy process, making them active stakeholders and reducing their vulnerability to radical rhetoric. Vulnerable Government Persons

  24. What Others Have Done to Raise the Benefits of Abstaining from Terrorism

  25. Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel (ASR, 2012) Laura Dugan, Criminologist & Erica Chenoweth, Political Scientist

  26. Data: Part of Larger DHS-Funded Research  Government Actions in a Terrorist Environment (GATE)  Contains a full range of government actions toward non-state actors — from fully conciliatory to excessively repressive  Israel, Turkey, Lebanon, Egypt, and Algeria

  27. 3- Tiered Data Collection Strategy 1. Literature Search 2. Textual Analysis by Augmented Replacement Instructions (TABARI) Searches lead sentences of news sources based on  complex dictionary that specifies subject, verb, and object (actor-action-target), using CAMEO codes Filters observations into a database  Keeps all action by state actors against sub-state  actors Auto code in SAS according to assigned action  3. Human validation of auto coding

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend