Terrorism and counterterrorism: an overview

Size: px
Start display at page:

Download "Terrorism and counterterrorism: an overview"

Transcription

1 Oxford Economic Papers, 2015, 1 20 doi: /oep/gpu039 Advance Access Publication Date: 5 November 2014 Terrorism and counterterrorism: an overview By Todd Sandler School of Economic, Political & Policy Sciences, University of Texas at Dallas, Richardson, TX 75080, USA; tsandler@utdallas.edu Abstract This introduction sets the stage for the articles collected in this special issue of Oxford Economic Papers. It begins by introducing essential concepts including domestic terrorism, transnational terrorism, defensive actions, proactive countermeasures, and guerrilla warfare. Three terrorist event databases, used by seven of the articles, are briefly introduced. These data sets are then used to display some stylized facts about domestic and transnational terrorism during the past four decades. Next, some essential strategic distinctions are drawn between defensive and proactive measures in the case of transnational terrorism when multiple countries are confronted by a common terrorist group. These strategic concerns vanish for domestic terrorism as a central government is able to internalize potential externalities. Finally, the key findings of the articles in the special issue are highlighted in two tables. JEL classifications: D74, H23, H56 1. Introduction Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate noncombatant victims (Enders and Sandler, 2012, p.4). The two essential ingredients of terrorism are its violence and its political or social motive. Terrorists tend to employ shockingly violent acts, such as beheadings, downing of commercial airlines, bombings in public markets, and armed attacks in public places, to intimidate an audience. Their unpredictable and horrific attacks are meant to make everyone feel at risk even though the true likelihood of falling victim to a terrorist incident is rather minuscule, roughly equivalent to that of drowning in one s bathtub (Mueller, 2006). Terrorists seek to circumvent normal channels for political change by traumatizing the public with brutal acts so that governments feel compelled to either address terrorist demands or divert public funds into hardening potential targets. Terrorist campaigns are more prevalent in liberal democracies, where the government s legitimacy hinges on its ability to protect the lives and property of its citizens (Eubank and Weinberg, 1994). VC Oxford University Press 2014 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs licence ( which permits non-commercial reproduction and distribution of the work, in any medium, provided the original work is not altered or transformed in any way, and that the work properly cited. For commercial re-use, please contact journals.permissions@oup.com

2 2 TERRORISM AND COUNTERTERRORISM The four airplane hijackings on 11 September 2001 (9/11) are terrorist acts since the perpetrators were members of al-qaida, a subnational terrorist group, bent on pressuring the USA to remove its troops from Saudi Arabia, which was al-qaida s primary political goal at the time. These skyjackings intimidated a global audience, caused huge temporary losses to the major stock exchanges (Chen and Siems, 2004), and created $80 90 billion in direct and indirect damages (Kunreuther et al., 2003). Even though stock exchanges recovered lost values in just over a month, the death of almost 3,000 people caused rich industrial countries to allocate more resources to counterterrorism, shook insurance markets, and made an indelible impression on virtually the entire world. Heinous terrorist incidents continue to capture headlines with recent newsworthy incidents involving al-shabaab s armed attack on the Westgate Mall in Nairobi, Kenya, on 21 September 2013; Chechen separatists suicide bombings of a train station and a trolley in Volgograd, Russia, on 29 and 30 December 2013, respectively; and Boko Haram s kidnapping of more than 200 female students in Chibok, Nigeria, on April These and countless other incidents since 9/11 indicate that the government must allocate resources in an effective and measured manner to counterterrorism activities so that terrorists cannot circumvent legitimate political processes or cause significant economic losses. These losses may involve reduced foreign direct investment (Enders and Sandler, 1996; Abadie and Gardeazabal, 2008), lower economic growth (Abadie and Gardeazabal, 2003; Eckstein and Tsiddon, 2004; Gaibulloev and Sandler, 2008, 2011), less trade (Nitsch and Schumacher, 2004), reduced tourism (Enders et al., 1992; Drakos and Kutan, 2003), or lost values of stock and bond indexes (Kollias et al., 2013). Economic impacts of terrorism are greatest in small terrorism-plagued countries and developing countries (Keefer and Loayza, 2008; Sandler and Enders, 2008). Modern industrial economies can insulate themselves through judicious fiscal and monetary policy, rapid counterterrorism responses, and the transference of economic activities (Enders and Sandler, 2012). The latter involves economic activities moving from terrorism-prone sectors and regions to safer areas, which advanced, diversified economies allow. Thus, economic activity may switch from the tourism sector to other sectors when the former is targeted. In Spain, economic investment switched from the Basque Country to other Spanish provinces because of Euskadi ta Askatasuna attacks (Abadie and Gardeazabal, 2003). Modern-day econometric methods time series, panel, and discrete-choice models lend themselves to the quantification of these economic losses as shown in this special issue by Choi (2015), Egger and Gassebner (2015), and Younas (2015). Additionally, gametheoretic models can display counterterrorism interactions among terrorists and governments as in the contributions in this issue by Carter (2015) and Kaplan (2015). In fact, game theory is an excellent tool to study interactions among targeted governments, between rival terrorist groups, between a terrorist group and its sponsoring state, and among the media, the terrorist group, and the public. 1 The purpose of this article is to provide the requisite background to the studies in this special issue of Oxford Economic Papers. This task requires a fuller discussion of the notion of terrorism and its two primary subdivisions domestic and transnational terrorism in Section 2. The three event data sets employed in empirical studies, including seven 1 On the game-theoretic literature on terrorism, see Bandyopadhyay and Sandler (2011), Bandyopadhyay et al. (2011, 2014), Sandler and Arce (2003), Bueno de Mesquita (2005), and Sandler and Siqueira (2009).

3 T. SANDLER 3 of the eight articles in this issue, are briefly presented in Section 3. In Section 4, two of these data sets are used to display some recent trends and aspects of domestic and transnational terrorism during the last four decades. Essential concepts of counterterrorism are then presented in Section 5, where proactive measures are distinguished from defensive actions. Key findings of the four terrorism and four counterterrorism articles contained in this special issue are highlighted in two summarizing tables in Section 6. Concluding remarks follow in Section On terrorism I now return to the definition of terrorism, given at the outset of this article. Any definition of terrorism involves much debate (Hoffman, 2006; Enders and Sandler, 2012). The research community is converging to a consensus based on an operational definition on which to construct event data sets to test theoretical propositions. The article puts forward a definition that is consistent with that used by the main event data sets and relied on by researchers. Also, this definition possesses the main ingredients that are agreed on by economists, political scientists, and political economists. The three stakeholders in this definition are the perpetrators, the victims, and the audience. By limiting terrorism to subnational agents including individuals or a lone wolf, my definition rules out state terror in which a government terrorizes its own people. The definition, however, does not rule out state-sponsored terrorism where a government clandestinely assists a terrorist group through various means, including supplying weapons, safe haven, intelligence, training, funding, or safe passage (Mickolus, 1989; Bapat, 2006). There was a lot of state sponsorship of terrorism during the final decade of the Cold War with groups such as the Abu Nidal Organization serving as a terrorist group for hire (Hoffman, 2006). 2 The most controversial element of my definition is the victim, since some definitions exclude combatants, so that attacks against an occupying army, such as US forces in Iraq or Afghanistan, are not viewed as terrorism. Generally, an attack against peacekeepers, such as the 23 October 1983 suicide bombing of the US Marines barracks at Beirut International Airport, is considered an act of terrorism. The barracks bombing had the political objective of removing peacekeepers from Lebanon, which happened in February Attacks against US soldiers and their dependents stationed in Germany constitute terrorist incidents, because these targeted individuals were noncombatants when attacked. Audience refers to the collective that terrorists seek to intimidate through their wanton brutality. With sufficient and sustained intimidation, the audience will apply pressures on the besieged government to concede to the terrorist group s political demands or alternatively to take decisive action to annihilate the group. 3 In the latter case, the Italian authorities dismantled the Italian Red Brigades in the 1980s. 2 The Abu Nidal Organization was headed by Sabri Khali al-banna. Its notorious attacks included the simultaneous armed attacks on the Rome and Vienna airports on 27 December 1985, the armed attack on the Neve Shalom Synagogue in Istanbul on 6 September 1986, and the attempted hijacking of Pan Am flight 73 in Karachi, Pakistan, on 5 September 1986 (Enders and Sandler, 2012). This group is credited with the first simultaneous terrorist attacks. 3 On alternative ways that terrorist groups end, see Carter (2012), Gailbulloev and Sandler (2014), and Phillips (2014a).

4 4 TERRORISM AND COUNTERTERRORISM There are some crucial distinctions to draw between terrorism and related concepts. For instance, there is the distinction between terrorism and crime. A kidnapping for ransom is a criminal act of extortion when the kidnappers are not pursuing or financing a political agenda. If a political motive is tied to the kidnapping, then it is a terrorist incident even with ransom demands being made. The hijacking of a commercial airliner by a deranged person is a crime but not terrorism. In the absence of a political motive, an armed attack by a student on fellow students or teachers is a criminal action. Next consider an insurrection, which is a politically based uprising intended to overthrow the established system of governance and to bring about a redistribution of income (Sandler and Hartley, 1995, p. 307). Leaders of insurrections recruit from the peasantry and general population in the hopes of challenging the government s hold on power (Grossman, 1991). Successful rebel operations can generate new recruits and may ideally cause the government to impose draconian measures on its citizens, which subsequently create more support for the insurgency. If a tipping point is attained, then the government may be sufficiently challenged to lose its power to the rebels. In distinction to insurrections, guerrilla warfare generally involves a band of rebel forces (e.g., the Revolutionary Armed Forces of Colombia [FARC], Abu Sayyaf in the Philippines, or Shining Path in Peru) that controls a sector of the country, from which to dispatch its operatives to confront government forces. Some guerrilla wars take place in urban centers. In contrast to most terrorist groups, guerrilla groups are larger in number and organized like a military force. Some guerrilla groups engage in terrorist acts, such as the three justmentioned groups, to raise funds to secure their operations and pursue their political aims. For example, FARC kidnaps government officials and others for ransoms. Unlike an insurrection, guerrilla groups are not bent on overthrowing the government or engaging in propaganda to gain popular support (Hoffman, 2006). Shining Path and FARC apply threats and harsh measures to gain the compliance of the people in the territory that they control. Guerrilla groups rely on surprise and cover to harass numerically superior government forces. Terrorism is a tactic employed by both insurrections and guerrilla movements. As a consequence, many guerrilla groups are listed as terrorist groups despite their control of territory. Often, countries with jungle cover or mountainous terrain provide remote areas where guerrillas can conduct training and operations. In this special issue, Carter (2015) is interested in the interaction between a guerrilla group and the government, as the former chooses between terrorism and the control of territory and the latter chooses between defensive counterterrorism actions and proactive military responses to influence the group s decision. 2.1 Domestic versus transnational terrorism Domestic terrorism is homegrown and home-directed, and represents the most common form of terrorism. For domestic acts of terrorism, the perpetrators, victims, and audience hail from the venue country, where the attack takes place. Domestic terrorist incidents include Timothy McVeigh s bombing of the Alfred P. Murrah Federal Building in Oklahoma City on 19 April 1995 or Eric Rudolph s anti-abortionist bombing of Centennial Olympic Park in Atlanta, Georgia, on 27 July Civil wars often involve numerous domestic terrorist attacks before and during the conflict by the adversaries (Findley and Young, 2012). 4 These terrorist acts are more apt to be domestic when an intervention by a third party from 4 On the relationship between civil wars and terrorism, see Sambanis (2008).

5 T. SANDLER 5 outside the country is not involved. Boko Haram s kidnapping of more than 200 female students is a domestic terrorist incident, which involves victims and perpetrators from the venue country of Nigeria. Boko Haram is an Islamic jihadist terrorist group that controls territory in the northeast portion of Nigeria. Given the country s limited military capabilities, its government sought some assistance from the USA in terms of military advisors and intelligence in addressing the significant threat that Boko Haram poses. At times, Boko Haram crosses into Chad. If one or more of the schoolgirls are moved into a neighboring country, then the kidnapping becomes a transnational terrorist incident. In general, poor countries may request foreign assistance if they cannot properly confront an indigenous terrorist group that may attack at home or abroad (Azam and Thelen, 2010; Fleck and Kilby, 2010; Bandyopadhyay et al., 2011, 2014; Young and Findley, 2011). Terrorism is transnational when an incident in the venue country concerns perpetrators or victims from another country. If a terrorist attack in the UK is perpetrated by terrorists from Yemen, then the incident is one of transnational terrorism. When a terrorist attack in France harms Dutch citizens, the attack is transnational. If one or more victims or perpetrators are not citizens of the venue country, then the terrorist attack is transnational. The kidnapping in January 2002 and subsequent murder of US reporter Daniel Pearl in Pakistan is classified as a transnational terrorist incident. The same is true of the near-simultaneous bombings of the US embassies in Kenya and Tanzania on 7 August Terrorist attacks against another country s embassy, even when perpetrated by citizens of the venue country, are transnational terrorist events because an embassy s grounds represent foreign soil. Similarly, terrorist attacks against international organizations personnel or property are considered to be transnational terrorist acts. An important transnational terrorist incident is the August 2006 plot to use liquid explosives to blow up 10 or more transatlantic flights departing the UK for the USA and Canada. A skyjacking originating in one country that is diverted to another country for political purposes is a transnational terrorist event. If a politically motivated hijacked plane has citizens from more than one country, the event is transnational terrorism even if the flight is domestic and ends in the country of origin. On 9/11, the four skyjackings are transnational terrorist acts since the victims were citizens from upward of 80 nations and the perpetrators were foreigners. The kidnapping of US journalist James Foley in Syria on 22 November 2012 and his beheading on 19 August 2014 is a transnational terrorist act. The victim was American, whereas the murderer is allegedly a British citizen from the Islamic State in Iraq and Syria (ISIS), also known as Islamic State (IS). Transnational terrorist incidents frequently imply transnational externalities for example, perpetrators from one country impose uncompensated costs on the victims of another country. If a country provides safe haven to a transnational terrorist group that attacks other countries interests, then transnational externalities ensue. 5 The Taliban in Afghanistan had given safe haven to Osama bin Laden s al-qaida, which planned and executed the events of 9/11. When the Taliban would not surrender bin Laden to the USA following 9/11, the USA led an invasion of Afghanistan on 7 October 2001 (Enders and Sandler, 2012). In this extreme case, the transnational externality resulted in a military invasion with the intent to defeat the Taliban and al-qaida. Transnational externalities also arise from counterterrorism policies of targeted countries, which result in inefficient 5 How terrorist groups choose their home base is discussed in this special issue by Gaibulloev (2015). On the definition of terrorist groups, see Phillips (2014b).

6 6 TERRORISM AND COUNTERTERRORISM levels of these policies (Sandler and Lapan, 1988; Sandler and Siqueira, 2006; Bueno de Mesquita, 2007). Actions by one targeted country to secure its borders and ports of entry may merely transfer the attack abroad, where borders are more porous (see Section 5). Since 9/11, few transnational terrorist incidents occur on US soil but 35% to 40% of such incidents involve US people or property in other countries (Enders and Sandler, 2006, 2012). 2.2 Some historical considerations of transnational terrorism Hoffman (2006, pp.63 5) traces the modern era of transnational terrorism to the 22 July 1968 hijacking of an Israeli El Al flight en route from Rome to Athens by three armed members of the Popular Front for the Liberation of Palestine (PFLP) terrorist group. This skyjacking was motivated by the intention of the PFLP terrorist to trade its hostages for Palestinian prisoners held by Israel. This event is noteworthy for a number of reasons. First, through its protracted 40-day negotiations, the Israelis were forced to negotiate with the Palestinian terrorists, which the Israelis had hitherto vowed they would never do (Hoffman, 1998, p.68). Second, the media coverage demonstrated to terrorists worldwide that such incidents could garner worldwide attention for their cause. Not surprisingly, transnational terrorist attacks increased greatly in numbers during the years following this incident (see the figures in Section 4). Third, there was evidence of state sponsorship after the diverted plane landed in Algiers as Algerian forces secured the hostages and held some Israeli hostages until 1 September 1968 when a deal was concluded (Mickolus, 1980, pp.93 4). Fourth, Israel eventually traded 16 Arab prisoners from the 1967 Arab-Israeli War for the remaining Israeli hostages. This trade showed terrorists that hostage taking could yield significant concessions. Transnational terrorist groups were primarily nationalists/separatists or leftists (socialists) during the late 1960s until the late 1980s (Rapoport, 2004). Even the Palestinian terrorists were secular until the end of the 1980s with the rise of Hamas, Palestinian Islamic Jihad, and other groups. After the mid-1990s, the religious fundamentalists came to dominate and increased the carnage (Enders and Sandler, 2000; Gaibulloev and Sandler, 2014). The phenomenon of religious-based transnational terrorism is not novel and can be traced back to the Sicarii or Zealots, a Jewish sect that conducted a terror campaign against the Romans and their Jewish collaborators in Judea from CE 48 to 73 (Rapoport, 1984; Bloom, 2005). Sicarii terrorists engaged in daytime assassinations in public places that typically resulted in the death of the assassin. As such, their dagger attacks were an early form of suicide terrorism, since the perpetrator had little chance of escape. 6 From 1090 to 1256, the Islamic Assassins opposed Sunni rule in Persia and Syria, with the intent to set up their own community and state of believers in the region (Bloom, 2005). Although the Assassins terrorist campaign was on a much smaller scale, their goal was similar to that of ISIS. Like the Sicarii, the Assassins relied on politically motivated assassinations, performed with a dagger. Perpetrators usually sacrificed their own lives by making no efforts to escape after the deed. 6 In this special issue, Choi (2015) investigates suicide terrorism, which may be domestic or transnational in nature. Suicide terrorist attacks grew in numbers after 1988 (Santifort-Jordan and Sandler, 2014).

7 T. SANDLER 7 3. Event data sets In the beginning of the 1980s, the first terrorist event data set International Terrorism: Attributes of Terrorist Events (ITERATE) was made available to researchers. ITERATE only includes transnational terrorist attacks. Coverage starts in 1968, the beginning of the modern era of transnational terrorism, and runs until the end of 2012, with annual updates in August (Mickolus et al., 2013). ITERATE codes many variables for example, incident date, country start location, country end location, attack type, target entity, terrorist group, perpetrators nationalities, number of deaths, number of injuries, victims nationalities, logistical outcome, US victims, state sponsorship, and scene of attack in its Common File of over 40 variables. In addition, there is a Fate File indicating the fate of the terrorists for example, the number of terrorists captured, the number of terrorists sentenced, and their length of incarceration. There is also a Hostage File, which has invaluable observations used by researchers to analyze logistical and negotiation success of hostage taking (Santifort and Sandler, 2013). If an attack is completed as planned, then it is a logistical success. For hostage missions, securing one or more hostages is deemed a logistical success. The Hostage File of ITERATE is currently updated through Finally, there is a Skyjacking file with additional observations, and variables on skyjacking missions such as the duration of the incidents, airline involved, and negotiation strategies used. ITERATE, like the other event data sets, relies on the news media print, broadcast, and digital for the observations of its variables. An initial focus of empirical studies was on transnational terrorism because ITERATE was the most extensive data set available throughout the 1980s and 1990s. Its lengthy series of daily data were ideal for time-series studies, which dominated the research landscape except for a few survival studies, the first being Atkinson et al. s (1987) study of the duration of hostage-taking incidents. Today, panel studies are prevalent including those in this special issue Berrebi and Ostwald (2015), Choi (2015), Egger and Gassebner (2015), Gries et al. (2015), and Younas (2015). Another competing event data set, modeled after ITERATE, is the RAND (2012) data set, which currently codes incidents for and is not being updated. Gaibulloev (2015) uses the RAND event data in conjunction with Jones and Libicki s (2008) classification of terrorist groups ideologies in his study of groups location decisions. For , RAND event data only include transnational terrorist attacks; after 1998, RAND data distinguish between transnational and domestic terrorist attacks in a manner consistent with my early definitions. Compared to ITERATE, RAND data code fewer variables and, for transnational terrorist incidents, have more limited coverage than ITERATE as demonstrated by Enders (2007). The third event data set, germane to this special issue, is that of the Global Terrorism Database (GTD), which records both domestic and transnational terrorist incidents (La Free and Dugan, 2007; National Consortium for the Study of Terrorism and Response to Terrorism, 2013). Although GTD recorded both kinds of incidents, until 2013 it did not distinguish between the two kinds of incidents. Enders et al. (2011) devised a five-step procedure for distinguishing between domestic and transnational terrorist incidents in GTD for and made their breakdown available to researchers. This division is now applied to (see Enders et al., 2014). A breakdown of terrorism into its two components is essential because the two types of terrorism may affect economic variables and counterterrorism differently for example, economic growth or foreign direct

8 8 TERRORISM AND COUNTERTERRORISM investment is more influenced by transnational terrorism (Gaibulloev and Sandler, 2008). Moreover, the influence of other variables on domestic and transnational terrorism may differ (Sandler, 2014; Choi, 2015). The Enders et al. (2011) procedure does a much better job in distinguishing between the two types of events than recent GTD efforts, based on the authors method without attribution. GTD has tens of thousands of unclassified incidents compared to Enders et al. (2011). There are some things to note about GTD. First, it has changed its coding conventions a few times, most recently for the 2012 data. Coding was also changed after the National Consortium for the Study of Terrorism and Responses to Terrorism (2013), based at the University of Maryland, took charge of the data around As shown by Enders et al. (2011), there are periods of undercounting and overcounting of incidents, which can be addressed by these authors calibration methods. Second, GTD data for 1993 are very incomplete because in an office move by Pinkerton, which originated the database, the box containing 1993 fell off of the truck! Third, perpetrators nationalities are not identified. Fourth, GTD does not contain any hostage negotiation variables, making the study of hostage-taking incidents impossible with this database. Fifth, GTD coverage of some kinds of domestic incidents, such as kidnappings, is virtually nonexistent prior to the late 1990s (Enders et al., 2011). Table 1 indicates key empirical or theoretical aspects of the terrorism and counterterrorism articles contained in this special issue. For each study, the table identifies the type of terrorism studied, the method employed, the unit of analysis used (if applicable), the terrorism data source applied, and the years and countries covered. As shown, there are two theoretical studies that address aspects of counterterrorism. Currently, there are no global counterterrorism data sets available with a wide range of counterterror variables. ITERATE has some counterterror variables, such as negotiation responses of the authorities. Specific countries for example, Israel maintain data sets of their counterterrorism responses; these data sets are difficult to acquire. A variety of empirical techniques are applied by the six empirical articles. In his cross-sectional study of the location choice of terrorist groups, Gaibulloev (2015) relies on a conditional logit estimator. To account for the count nature of the dependent terrorism variable, Choi (2015) and Gries et al. (2015) apply a negative binomial panel estimator. Endogeneity between the dependent variable and one or more independent variables is addressed in various ways: the Berrebi and Ostwald (2015) article employs instrumental variables (IV), consisting of lagged domestic terrorist attacks in neighboring countries, whereas the Younas (2015) article uses system generalized method of moments (SGMM) to augment his feasible generalized least squares (FGLS) estimates. The Gries et al. (2015) article addresses endogeneity with lagged values of the independent variables and also SGMM estimates. The Choi (2015) article primarily uses lagged independent variables to partly handle the endogeneity concern. 4. Domestic and transnational terrorism: some data plots Figure 1 is based on ITERATE. The solid time series, whose values are measured on the left-hand vertical axis, displays the annual number of transnational terrorist events for This plot indicates how there were relatively few such incidents during at the onset of the modern era of transnational terrorism. As shown, transnational terrorism data displays cycles (i.e., regularly spaced peaks and troughs), generated by the

9 T. SANDLER 9 Table 1. Key aspects of the articles for the special issue Article Type of terrorism Methods Unit of analysis Data sources Years/countriess Terrorism studies Gaibulloev Transnational Conditional logit Group-base country RAND Jones and Libicki 113 countries Egger and Gassebner Transnational Poisson pseudo-maximum likelihood Country-month ITERATE OECD 181 partner countries Berrebi and Ostwald Total and domestic Panel/IV, first differences Country-year GTD* countries Gries et al. Transnational Panel negative binomial, SGMM Country-year ITERATE countries Counterterrorism studies Kaplan Domestic or transnational Queuing theory Not applicable GTD* Game theory USA Carter Domestic or transnational Game theory Not applicable Not applicable Not applicable Younas Total, domestic, transnational Panel/SGMM Country-year GTD* Panel/FGLS 120 countries Choi Domestic, transnational, suicide Panel negative binomial, Rare event logit Country-year GTD* countries Notes: *denotes that Enders et al. (2011) breakdown of GTD into domestic and transnational terrorist incidents was used. ITERATE ¼ International Terrorism: Attributes of Terrorist Events; GTD ¼ Global Terrorism Database.

10 10 TERRORISM AND COUNTERTERRORISM Fig. 1. ITERATE transnational terrorist incidents and total casualties per year, interplay of the terrorists and the authorities (Faria, 2003; Enders and Sandler, 2012). Transnational terrorism attained its highest annual totals during The end of the era of state sponsorship of terrorism in the 1980s and the end of the Cold War in 1991 roughly coincided with the precipitous drop in transnational terrorism. With the fall of communism, many left-wing terrorist groups stopped operations or were defeated by the authorities. These left-wing groups were replaced by more ruthless and bloodthirsty religious fundamentalist terrorist groups that went for more bang for the buck with fewer incidents containing greater casualties (deaths or injuries) (Enders and Sandler, 2000; Hoffman, 2006; Gaibulloev and Sandler, 2014). The dashed series in Fig. 1 measures annual casualties on the right-hand vertical axis for transnational terrorism. These casualties are generally higher after 1999 despite the huge fall in incidents. Sandler (2014) shows that the proportion of transnational terrorist incidents with casualties was much greater after 1990 and the rising dominance of religious fundamentalist terrorists. Figure 2 employs GTD data to indicate the annual number of total, domestic, and transnational terrorist incidents. Note that the domestic terrorism series lends its shape to the total terrorism series insofar as domestic terrorism constitutes the overwhelming component of total terrorism. The huge drop in 1993 in all three series is due to the lost box of data and does not denote a respite or vacation on the part of the terrorists. The steep rise in 2012 corresponds to a GTD change in coding methods. Also, Enders et al. (2011) demonstrate that there was an undercounting of events during much of the 1970s as GTD trained coders. Discontinuities in GTD coding pose significant concerns and challenges for time series, cross-sectional, and panel studies. In a recent study, Enders et al. (2014) broke their analysis into two periods and to address the lost box of 1993 data and calibrated the data to handle coding inconsistencies. Fortunately, these two periods roughly corresponds to left-wing and religious fundamentalist terrorist dominance, so that the split is conceptually interesting. In Fig. 3, the transnational terrorism series involving US interests is displayed annually for 1968 to 2012, based on ITERATE data. Peaks and troughs are evident. Annually, about

11 T. SANDLER 11 Fig. 2. GTD terrorist incidents per year, Fig. 3. ITERATE attacks against US interests per year,

12 12 TERRORISM AND COUNTERTERRORISM Fig. 4. Annual number of casualties per attack 35% to 40% of transnational terrorist incidents are against US interests even though relatively few such incidents occurred on US soil during the past two decades. This is a clear indication of the transference of attacks from secure US borders to foreign venues, which constitutes a transnational externality. The declining series in Fig. 3 is consistent with the declining transnational terrorism series in Fig. 1 because a fairly constant proportion of such incidents are against US interests. In this special issue, the Gries et al. (2015) article investigates some drivers of these anti-us attacks abroad. Figure 4 returns to the issue of casualties and depicts the annual number of casualties per terrorist attack for transnational and domestic terrorism using ITERATE and GTD data, respectively. Since 1999 and the overwhelming dominance of the religious fundamentalist terrorist groups, the casualties per attack is generally higher for transnational terrorism. Thus, on a per attack basis, transnational terrorist attacks are more worrisome than domestic terrorist attacks. However, because domestic terrorist attacks far outnumber transnational terrorist attacks each year, there are more annual casualties with domestic than with transnational terrorism. This is also bolstered by a higher proportion of domestic terrorist incidents, compared to transnational terrorist attacks, that results in casualties (Sandler, 2014). 5. Counterterrorism This special issue contains articles on terrorism and counterterrorism. Given my discussion of terrorism and its concepts, it is now instructive to introduce some basic concepts and concerns that are associated with the practice of counterterrorism. Quite simply, counterterrorism corresponds to actions to ameliorate the threat and consequences of terrorism. These actions can be taken by governments, military alliances,

13 T. SANDLER 13 international organizations (e.g., INTERPOL), private corporations, or private citizens. Counterterrorism comes in two basic varieties: defensive and proactive measures. Defensive countermeasures protect potential targets by making attacks more costly for terrorists or reducing their likelihood of success. When, however, successful terrorist attacks ensue, defensive actions also serve to limit the resulting losses to the target. Defensive measures have generally been reactive, instituted after some successful or innovative terrorist attacks. In the USA, airline passengers are now required to remove their shoes when being screened, following the innovative, but fortunately unsuccessful, attempt by Richard Reid to bring down American Airlines flight 63 en route from Paris to Miami on 22 December 2001 with explosives hidden in his shoes. Before the installation of metal detectors to screen passengers at US airports on 5 January 1973, there were on average over 25 skyjackings each year in the USA (Enders et al., 1990). After their installation, attempted US skyjackings dropped to fewer than four a year. The success of these metal detectors in US airports led to their installation worldwide over the next six months. Following the downing of Pan Am flight 103 over Lockerbie, Scotland, on 21 December 1988 and the downing of UTA flight 772 over Niger on 19 September 1989, bombdetecting devices were used to screen checked luggage. Defensive or protective counterterror actions may involve more than technological barriers. Other instances of defensive measures include target hardening, such as defensive perimeters around government buildings or embassies, or guards at key points of a country s infrastructure. Defensive measures can also take the form of issuing terrorism alerts, enacting stiffer penalties for terrorism offenses, enhancing first-responder capabilities, and stockpiling antibiotics and antidotes for biological and chemical terrorist attacks. This list of defensive actions is by no means exhaustive. By contrast, proactive measures are offensive as a targeted government directly confronts the terrorist group or its supporters. Proactive measures may destroy terrorists resources (e.g., training camps), curb their finances, eliminate their safe havens, or kill and capture their members. In recent years, the Obama administration has relied on drone attacks to assassinate terrorist leaders and operatives. Proactive operations may assume myriad other forms, including a retaliatory raid against a state sponsor that provides resources, training, sanctuary, logistical support, or intelligence to a terrorist group. On 15 April 1986, the USA launched a retaliatory bombing raid on targets in Libya for its alleged support in the terrorist bombing of the La Belle discotheque in West Berlin on 4 April 1986, where 3 died and 231 were wounded, including 62 Americans (Mickolus et al., 1989, vol. 2, pp.365 7). Another proactive measure takes the form of a preemptive attack against a terrorist group or a harboring country, such as the US-led invasion of Afghanistan four weeks after 9/11. A preemptive strike differs from a retaliatory raid because the former is more sustained and meant to severely compromise the capabilities of the terrorists to conduct future missions. Such strikes or raids concern transnational terrorism where a targeted country confronts the foreign threat. Other proactive measures include infiltrating terrorist groups, engaging in military action, conducting propaganda campaigns against the terrorists, and gathering intelligence to foil terror plots (Kaplan, 2015). Military action generally refers to operations by the host government against a resident terrorist group as in Carter (2015). Actions that improve the economy, which in turn reduces grievances, can also be proactive (Choi, 2015). Younas (2015) demonstrates empirically that increased globalization of a country s economy may also be proactive by limiting harmful and therefore grievance-causing effects of terrorism on economic growth. In this special issue, the

14 14 TERRORISM AND COUNTERTERRORISM four counterterrorism articles primary address aspects of proactive measures. Only Carter (2015) considers both defensive and proactive counterterrorism responses. The game-theoretic literature on counterterrorism draws some fascinating strategic contrasts between defensive and proactive countermeasures. Suppose that two or more countries are confronted by the same Islamic jihadist terrorist group for example, al-qaida in the Arabian Peninsula (AQAP). In this transnational terrorism scenario, each at-risk country is inclined to work at cross-purposes by engaging in a defensive race in the hopes of transferring the terrorist attacks to other targeted countries (Sandler and Lapan, 1988; Arce and Sandler, 2005). In the process, the countries engage in too much defense since the negative transference externality is not internalized. The only check on this adverse defense race stems from the countries having large interests abroad, which may be hit when attacks are transferred abroad recall Fig. 3 and attacks against US interests (Bandyopadhyay and Sandler, 2011; Bandyopadhyay et al., 2011). Next consider proactive measures in these multicountry scenarios. Any country s actions to confront the common terrorist threat confer purely public (nonrival and nonexcludable) benefits to all potential target countries. As a result, there is too little proactive response as each country tries to free ride on the actions of other countries. Thus, defensive measures are strategic complements as one country s actions encourage those of other countries (i.e., reaction paths are upward-sloping), whereas proactive measures are strategic substitutes as one country s actions inhibit those of other countries (i.e., reaction paths are downward-sloping) (Eaton, 2004; Sandler and Siqueira, 2006). Moreover, leadership can be shown to curb the defensive race, whereas leadership exacerbates the free-riding underprovision of offensive measures (Sandler and Siqueira, 2006). Thus, there is no simple fix for these concerns among sovereign targeted nations. For domestic terrorism, countries possess the proper incentives to choose defensive and proactive measures judiciously, because all associated costs and benefits are internalized (Enders and Sandler, 2012). Thus, Kaplan s (2015) finding that the USA staffs about the right number of intelligence analysts to intercept terror plots is consistent with past game-theoretic findings regarding domestic counterterrorism optimality. Carter s (2015) article is also geared to domestic terrorism, whereas Choi (2015) and Younas (2015) may involve economic-based countermeasures for either type of terrorism. 6. Findings of the articles of the special issue Tables 2 and 3 summarize some of the most important findings of the articles of this special issue. Table 2 does so for the terrorism articles, and Table 3 does so for the counterterrorism articles. Every article is rich in results, so those listed in the tables are not exhaustive. This special issue contains many noteworthy advances in the study of terrorism. Gaibulloev (2015) is the first article to address terrorist groups base location choice; currently, the study of terrorist group survival is an active area of research. Berrebi and Ostwald (2015) is the initial study to examine the impact of terrorism on fertility. Younas (2015) and Choi (2015) refine the relationship between terrorism and growth; Egger and Gassebner (2015) show that terrorism has less of an effect on trade than conventionally believed. Kaplan (2015) investigates the social efficiency of intelligence staffing in intercepting terror plots. Carter s (2015) analysis is novel because the terrorist group must decide between terrorist attacks and holding territory in reaction to the government s countermeasures. The interface between terrorism and other forms of political violence is seldom

15 T. SANDLER 15 Table 2. Key findings of terrorism studies Gaibulloev Egger and Gassebner Berrebi and Ostwald Gries et al. Terrorist groups are attracted to base their operations in countries with other terrorist groups that possess a similar ideology. This is particularly true for left-wing terrorist groups. Risk of state failure and/or political instability is conducive for terrorist groups to establish their home base. Generally, terrorist groups locate closer to where they conduct their attacks abroad. However, the distance consideration is nonlinear. Cooperation is needed between host and venue countries to address a common terrorist threat. There is little or no immediate or short-run effect of transnational terrorism on international trade when monthly data are used. Transnational terrorism impacts bilateral and unilateral trade, if at all, in the medium term, about one and a half years after incidents. The analysis intends to remove measurement errors when terrorism is aggregated over a year or else general equilibrium effects are ignored. Authorities should look beyond trade as to where to counter the adverse economic effects of terrorism. Terrorist attacks reduce both total fertility and crude birth rates owing to stress and intervening factors. The author s findings account for endogeneity with an instrumental variable accounting for lagged domestic terrorist attacks in neighboring countries. The findings are robust over myriad model specifications, accounting for fixed effects and first differences. This article shows that terrorism can have consequences beyond economic considerations. US aid-recipient countries characteristics (e.g., human rights violations) can affect or motivate US-directed attacks. A positive association between anti-american terrorism and US-associated economic and military aid is somewhat attenuated by local oppression in the client (recipient) state. There is no evidence that US assistance curbs anti-american attacks even in oppressive regimes. These results hold when accounting for potential endogeneity between US aid and anti-american terrorist attacks. studied. Finally, the Gries et al. (2015) study extends knowledge of the determinants of anti-american terrorist attacks, which comprise 35 40% of all transnational terrorism. 7. Concluding remarks Terrorism remains an active research area in economics, political economy, and political science. Given the microeconomic and macroeconomic consequences of terrorism, its study is a fitting topic for a general economics journal such as Oxford Economic Papers. Following 9/11, industrial countries engaged in a huge reallocation of resources toward counterterrorism, whose efficacy can be best studied and understood with the theoretical and empirical tools drawn from economics. The rise of ISIS and the considerable threat that its Western fighters pose for their home countries means that terrorism will remain a policy concern. AQAP s war on the USA

16 16 TERRORISM AND COUNTERTERRORISM Table 3. Key findings of counterterrorism studies Kaplan Carter Younas Choi Assuming a proportional hazard function, the article computes how many agents are necessary to detect an acceptable percentage of terrorist plots. Terrorists select their optimal number of plots given the socially optimum staff. Thus, the terrorists move first, followed by the government s staffing choice. Based on event data for the USA, the article computes the socially efficient number of detections. A numerical example shows that the USA is close to a socially efficient optimum based on calculated benefits and costs. State first allocates between defensive and proactive countermeasures, followed by the group s choice between terrorism and controlling territories in guerrilla operations. Under weak assumptions, the more capable governments confront more terrorism as they employ more boots on the ground to protect against guerrilla warfare. When it is optimal for a group to employ both terrorist incidents and guerrilla attacks, the state generally focuses on limiting the group s capture of territory in guerrilla operations. Corner solutions with the government protecting against guerrilla war are likely, which can fuel more serious terrorist attacks. Globalization lessens the negative impact of total, domestic, and transnational terrorism on economic growth in developing countries. The author finds, when relevant, the critical value where globalization completely offsets the harmful growth effects of terrorism. The analysis is robust to the use of disaggregate measures of openness. Globalization can be a counterterrorism tool. High industrial economic growth reduces domestic and transnational terrorist incidents. High agricultural economic growth has little or no impact on domestic and transnational terrorist incidents. High industrial economic growth can, however, be associated with more suicide terrorism, which seeks out hard targets. Generally, high industrial economic growth is favorable to reducing terrorism, especially since few countries suffer suicide terrorism. and its allies is yet another terrorist threat. Just as Africa appears to be achieving sustained economic growth in select countries, significant terrorist challenges arise from Boko Haram and al-shabaab in Nigeria and Kenya, respectively. Failed states for example, Afghanistan, Iraq, Somalia, Syria, and Yemen supply safe havens for terrorist groups that threaten Western interests. It is my hope that this special issue on terrorism and counterterrorism will stimulate further research in these two topics. Acknowledgements The present collection arises from a set of papers presented at the sixth conference on Terrorism and Counterterrorism Policy at the University of Texas, Dallas. Held between 21 May and 24 May 2014, this conference invited many leading contributors to the study of terrorism and counterterrorism. Past conferences resulted in special issues published in Economics & Politics (November 2009), Journal of Conflict Resolution (April 2010), Journal of Peace Research (May 2011), Public Choice (December 2011), and Southern Economic Journal (April 2013). While assuming full responsibility for any remaining shortcomings, this article has profited from comments from Anindya Banerjee, who also advised me on the special issue. Khusrav Gaibulloev

17 T. SANDLER 17 read and commented on an earlier version. Finally, I thank all of this special issue s reviewers, most of whom are major contributors to the study of terrorism. These reviewers provided rigorous reviews in a timely fashion. All articles went through a careful and demanding prescreening process, followed by two rounds of reviews by two to three anonymous referees. I appreciate the understanding of those authors whose papers did not make it into the special issue. Funding The Vibhooti Shukla Endowment and the Center for Global Collective Action at the University of Texas at Dallas funded the May 2014 Conference on Terrorism and Counterterrorism Policy, where these articles along with others were initially presented. References Abadie, A. and Gardeazabal, J. (2003) The economic cost of conflict: a case study of the Basque Country, American Economic Review, 93, Abadie, A. and Gardeazabal, J. (2008) Terrorism and the world economy, European Economic Review, 52, Arce, D.G. and Sandler, T. (2005) Counterterrorism: a game-theoretic analysis, Journal of Conflict Resolution, 49, Atkinson, S.E., Sandler, T., and Tschirhart, J. (1987) Terrorism in a bargaining framework, Journal of Law and Economics, 30, Azam, J.-P. and Thelen, V. (2010) Foreign aid versus military intervention in the war on terror, Journal of Conflict Resolution, 54, Bandyopadhyay, S. and Sandler, T. (2011) The interplay between preemptive and defensive counterterrorism measures: a two-stage game, Economica, 78, Bandyopadhyay, S., Sandler, T., and Younas, J. (2011) Foreign aid as counterterrorism policy, Oxford Economic Papers, 63, Bandyopadhyay, S., Sandler, T., and Younas, J. (2014) Foreign direct investment, aid, and terrorism, Oxford Economic Papers, 66, Bapat, N. A. (2006) State bargaining with transnational terrorist groups, International Studies Quarterly, 50, Berrebi, C. and Ostwald, J. (2015) Terrorism and fertility: evidence for a causal inference of terrorism on fertility, Oxford Economic Papers, 67, Bloom, M. (2005) Dying to Kill: The Allure of Suicide Terror, Columbia University Press, New York. Bueno de Mesquita, E. (2005) The quality of terror, American Journal of Political Science, 49, Bueno de Mesquita, E. (2007) Politics and the suboptimal provision of counterterror, International Organization, 61, Carter, D.B. (2012) A blessing or curse? State support for terrorist groups, International Organization, 66, Carter, D.B. (2015) When terrorism is evidence of state success: securing the state against territorial groups, Oxford Economic Papers, 67, Chen, A.H. and Siems, T.F. (2004) The effects of terrorism on global capital markets, European Journal of Political Economy, 20, Choi, S.-W. (2015) Economic growth and terrorism: domestic, international, and suicide, Oxford Economic Papers, 67, Drakos, K. and Kutan, A.M. (2003) Regional effects of terrorism on tourism in three Mediterranean countries, Journal of Conflict Resolution, 47,

General Course Information

General Course Information Course ECON 3369_HN1 The Political Economy of Terrorism Professor Todd Sandler Term Fall 2016 Meetings M, W 10:00-11:15 a.m., GC 1.208B Professor s Contact Information Office Phone 972-883-6725 Office

More information

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction ECONOMIC APPROACHES TO TERRORISM: AN OVERVIEW Terrorism would appear to be a subject for military experts and political scientists,

More information

Q : So you tried to apply to this issue techniques that are commonly used in economics? A : That is exactly right.

Q : So you tried to apply to this issue techniques that are commonly used in economics? A : That is exactly right. Fighting terrorism: what economics can tell us Todd Sandler (Interview parue dans Challenge, en mai 2002) Sophisticated economic analyses, says this long-time student of terrorism, suggest that the best

More information

August 2013 Security Threat to Americans Abroad

August 2013 Security Threat to Americans Abroad Number of Attacks BACKGROUND REPORT August 2013 Security Threat to Americans Abroad On Aug. 2, 2013 the U.S. State Department issued an alert 1 to Americans traveling abroad, particularly in the Middle

More information

Worldwide Caution: Annotated

Worldwide Caution: Annotated Worldwide Caution: Annotated Terrorism 9/14/2017 On September 14, 2017, the U.S. Department of State s Bureau of Consular Affairs released an updated version of its Worldwide Caution. This report is an

More information

Conflating Terrorism and Insurgency

Conflating Terrorism and Insurgency Page 1 of 6 MENU FOREIGN POLICY ESSAY Conflating Terrorism and Insurgency By John Mueller, Mark Stewart Sunday, February 28, 2016, 10:05 AM Editor's Note: What if most terrorism isn t really terrorism?

More information

Transnational Terrorism

Transnational Terrorism CREATE Research Archive Published Articles & Papers 6-1-2008 Transnational Terrorism Todd Sandler University of Texas at Dallas, tsandler@utdallas.edu Daniel G. Arce University of Texas at Dallas, darce@utdallas.edu

More information

Trade and Terrorism: A Disaggregated Approach. December Abstract

Trade and Terrorism: A Disaggregated Approach. December Abstract Trade and Terrorism: A Disaggregated Approach Subhayu Bandyopadhyay, * Todd Sandler, and Javed Younas December 2016 Abstract This paper constructs a model of trade consequences of terrorism, where firms

More information

The Macroeconomic Effects of Terrorism. Michael Siers. from as far back as 66 A.D. indicate terrorism by religious zealots in Palestine (Enders &

The Macroeconomic Effects of Terrorism. Michael Siers. from as far back as 66 A.D. indicate terrorism by religious zealots in Palestine (Enders & Verge 7 The Macroeconomic Effects of Terrorism Michael Siers Terrorism has existed in various forms for much of modern civilization. Records from as far back as 66 A.D. indicate terrorism by religious

More information

The Embassy Closings

The Embassy Closings The Embassy Closings August 20, 2013 by Bill O'Grady of Confluence Investment Management In the first week of August, the Obama administration announced the closing of 22 embassies and consulates across

More information

2014 GLOBAL TERRORISM INDEX

2014 GLOBAL TERRORISM INDEX 2014 GLOBAL TERRORISM INDEX Institute for Economics and Peace Wednesday, 26 th November 2014 #TerrorismIndex INSTITUTE FOR ECONOMICS AND PEACE The Institute for Economics and Peace is an independent, not-for-profit,

More information

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 1/13/2009 Terrorism 2 Unfortunately, the term terrorism is one that has become a part of our everyday vocabulary

More information

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction

More information

LECTURE: TERRORISM DEFINING TERRORISM

LECTURE: TERRORISM DEFINING TERRORISM DEFINING TERRORISM I) What is terrorism? a. According to Joseph Nye, Harvard professor, it is a method of violence with roots that stretch far back in history. i. Terrorism reaches back to Greece and Rome

More information

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 What is Terrorism? 10/15/2013 Terrorism 2 What is Terrorism? Unfortunately, the term terrorism is one that has become a part of our

More information

Working Paper Series. Trade and Terrorism: A Disaggregated Approach. Subhayu Bandyopadhyay, Todd Sandler and Javed Younas

Working Paper Series. Trade and Terrorism: A Disaggregated Approach. Subhayu Bandyopadhyay, Todd Sandler and Javed Younas RESEARCH DIVISION Working Paper Series Trade and Terrorism: A Disaggregated Approach Subhayu Bandyopadhyay, Todd Sandler and Javed Younas Working Paper 2016-001B https://doi.org/10.20955/wp.2016.001 January

More information

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH

More information

States & Types of States

States & Types of States States & Types of States Political Geography Nation: a group of people with a common culture - Tightly knit group of people possessing shared cultural beliefs & unity: genous - Ancestry or historical events

More information

Fallujah and its Aftermath

Fallujah and its Aftermath OXFORD RESEARCH GROUP International Security Monthly Briefing - November 2004 Fallujah and its Aftermath Professor Paul Rogers Towards the end of October there were numerous reports of a substantial build-up

More information

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~ Forum: Issue: Student Officer: Position: General Assembly First Committee: Disarmament and International Security Foreign combatants in internal militarised conflicts Ethan Warren Deputy Chair Introduction

More information

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) Until the 1990s, terrorism was widely considered to be a security concern of the second

More information

Transnational Terrorism: An Economic Analysis

Transnational Terrorism: An Economic Analysis Transnational Terrorism: An Economic Analysis by Todd Sandler School of International Relations University of Southern California Von Kleinsmid Center 330 Los Angeles, CA 90089-0043 USA tsandler@usc.edu

More information

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS: A. It is important for an individual to understand the history of

More information

Negotiating with Terrorists an Option Not to Be Forgone

Negotiating with Terrorists an Option Not to Be Forgone KOMMENTARE /COMMENTS Negotiating with Terrorists an Option Not to Be Forgone MICHAEL DAUDERSTÄDT I t is very tempting, in the wake of the many shocking terrorist attacks of recent times such as those in

More information

the notion that poverty causes terrorism. Certainly, economic theory suggests that it would be

the notion that poverty causes terrorism. Certainly, economic theory suggests that it would be he Nonlinear Relationship Between errorism and Poverty Byline: Poverty and errorism Walter Enders and Gary A. Hoover 1 he fact that most terrorist attacks are staged in low income countries seems to support

More information

In the aftermath of the attacks on the World Trade Center

In the aftermath of the attacks on the World Trade Center c01.tex (1-10) 5/12/03 1:24 PM Page 1 CHAPTER 1 Target: Corporate America In the aftermath of the attacks on the World Trade Center and the Pentagon by the Al Qaeda organization, it has become clear that

More information

THE AFGHAN SUMMER OF WAR Paul Rogers

THE AFGHAN SUMMER OF WAR Paul Rogers International Security Monthly Briefing September 2006 THE AFGHAN SUMMER OF WAR Paul Rogers Lebanon During September, substantial numbers of foreign troops entered southern Lebanon to act as an enhanced

More information

WikiLeaks Project* The Taliban s Assets in the United Arab Emirates

WikiLeaks Project* The Taliban s Assets in the United Arab Emirates A Counter-Terrorism Analysis of WikiLeaks The Taliban s Assets in the UAE WikiLeaks Project* The Taliban s Assets in the United Arab Emirates By Adam Pankowski, ICT Intern Team As the US s War on Terrorism

More information

The Effects of Terrorism on Labor Market Case Study of Iraq

The Effects of Terrorism on Labor Market Case Study of Iraq The Effects of Terrorism on Labor Market Case Study of Iraq Asmaa Yaseen PhD Candidate Department of Economics University of Kansas 1/12/2018 Effect Of Terrorism On Labor Market 1 Motivation Acts of Terrorism

More information

Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate

Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate MPRA Munich Personal RePEc Archive Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate Hlavac, Marek Georgetown University

More information

AN ECONOMIC PERSPECTIVE ON TRANSNATIONAL TERRORISM

AN ECONOMIC PERSPECTIVE ON TRANSNATIONAL TERRORISM AN ECONOMIC PERSPECTIVE ON TRANSNATIONAL TERRORISM by Todd Sandler School of International Relations University of Southern California Von Kleinsmid Center 330 Los Angeles, CA 90089-0043 tsandler@usc.edu

More information

An economic perspective on transnational terrorism

An economic perspective on transnational terrorism European Journal of Political Economy Vol. 20 (2004) 301 316 www.elsevier.com/locate/econbase An economic perspective on transnational terrorism Todd Sandler a, *, Walter Enders b a School of International

More information

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II UNIT SIX: CHALLENGES OF THE MODERN ERA Part II ARMS PROLIFERATION Spread of weapons of mass destruction (WMDs) (nuclear, chemical & biological weapons) throughout the world.* This is seen as dangerous

More information

United States Foreign Policy

United States Foreign Policy United States Foreign Policy Contemporary US F.P. Timeline In the early 20th century, U.S. isolates and remains neutral ahead of 1 st and 2 nd World Wars, US has to intervene to help end them, after 2

More information

Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset.

Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset. Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset. World Politics, vol. 68, no. 2, April 2016.* David E. Cunningham University of

More information

An economic perspective on transnational terrorism. Todd Sandler a, *, Walter Enders b

An economic perspective on transnational terrorism. Todd Sandler a, *, Walter Enders b An economic perspective on transnational terrorism Todd Sandler a, *, Walter Enders b a School of International Relations, University of Southern California, Von Kleinsmid Center 330 Los Angeles, CA 90089-0043

More information

The Geography of Terrorism

The Geography of Terrorism The Geography of Terrorism More than 80 percent of last year's terrorism fatalities occurred in just five countries. KATHY GILSINANNOV 18 2014, 6:08 PM ET Institute for Economics and Peace Of the 17,958

More information

PIPA-Knowledge Networks Poll: Americans on Iraq & the UN Inspections II. Questionnaire

PIPA-Knowledge Networks Poll: Americans on Iraq & the UN Inspections II. Questionnaire PIPA-Knowledge Networks Poll: Americans on Iraq & the UN Inspections II Questionnaire Dates of Survey: Feb 12-18, 2003 Margin of Error: +/- 2.6% Sample Size: 3,163 respondents Half sample: +/- 3.7% [The

More information

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? International Terrorism: What is Terrorism? A. Dr. Jim Ray (2010) argues that terrorism has been around for a long time- terrorist

More information

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management War Gaming: Part I January 10, 2017 by Bill O Grady of Confluence Investment Management One of the key elements of global hegemony is the ability of a nation to project power. Ideally, this means a potential

More information

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs) Friday September 19 - V7 - BLUE UN Security Council Resolution on Foreign Terrorist Fighters (FTFs) 1. Reaffirming that terrorism in all forms and manifestations constitutes one of the most serious threats

More information

Collective versus unilateral responses to terrorism

Collective versus unilateral responses to terrorism Public Choice (2005) 124: 75 93 DOI: 10.1007/s11127-005-4747-y C Springer 2005 Collective versus unilateral responses to terrorism TODD SANDLER School of International Relations, University of Southern

More information

ASHTON UNDER-LYNE SIXTH FORM COLLEGE BTEC EXTENDED DIPLOMA PUBLIC SERVICES

ASHTON UNDER-LYNE SIXTH FORM COLLEGE BTEC EXTENDED DIPLOMA PUBLIC SERVICES ASHTON UNDER-LYNE SIXTH FORM COLLEGE BTEC EXTENDED DIPLOMA PUBLIC SERVICES Unit 8: Understand the impact of war, conflict and terrorism on public services Assignment : Workbook Assignment title: The impact

More information

Continuing Conflict in SW Asia. EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement?

Continuing Conflict in SW Asia. EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement? Continuing Conflict in SW Asia EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement? Directions Today, we will be looking at the causes of important ongoing conflicts

More information

After the Cold War. Europe and North America Section 4. Main Idea

After the Cold War. Europe and North America Section 4. Main Idea Main Idea Content Statements: After the Cold War The Soviet Union collapsed in 1991 and the Cold War came to an end, bringing changes to Europe and leaving the United States as the world s only superpower.

More information

Global Conflict & Terrorism Trends. National Press Club

Global Conflict & Terrorism Trends. National Press Club Global Conflict & Terrorism Trends National Press Club Monday, September 14, 2009 Peace and Conflict Ledger and Conflict Trends Joseph Hewitt CIDCM University of Maryland Over the past two years, the risks

More information

Following the Money to Combat Terrorism, Crime and Corruption

Following the Money to Combat Terrorism, Crime and Corruption Following the Money to Combat Terrorism, Crime and Corruption ACAMS Houston Chapter April 19, 2017 Celina B. Realuyo Professor of Practice William J. Perry Center for Hemispheric Defense Studies, National

More information

The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups

The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups A Monograph by MAJ Joshua Glonek United States Army School of Advanced Military Studies United States

More information

EIU Political Science Review. International Relations: The Obama Administration s Relationship with Israel. Matthew Jacobs

EIU Political Science Review. International Relations: The Obama Administration s Relationship with Israel. Matthew Jacobs International Relations: The Obama Administration s Relationship with Israel Matthew The politics of international relations have always been complex. Yet despite this, such relations are essential to

More information

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism Committee: Human Rights Council Student Officer: Soo Young Yun, President from Wikimedia Commons Introduction: With

More information

Paris, Sharm el-sheikh and the Resurrection of Old Europe

Paris, Sharm el-sheikh and the Resurrection of Old Europe Paris, Sharm el-sheikh and the Resurrection of Old Europe Nov. 25, 2015 Europe is considering its options following the Islamic State s attacks on French and Russian targets. By George Friedman The attacks

More information

The Changing Nonlinear Relationship between Income and Terrorism

The Changing Nonlinear Relationship between Income and Terrorism Article The Changing Nonlinear Relationship between Income and Terrorism Journal of Conflict Resolution 2016, Vol. 60(2) 195-225 ª The Author(s) 2014 Reprints and permission: sagepub.com/journalspermissions.nav

More information

Period 9 Notes. Coach Hoshour

Period 9 Notes. Coach Hoshour 1 2 3 4 5 6 7 8 9 10 11 Unit 9: 1980-present Chapters 40-42 Election 1988 George Bush Republican 426 47,946,000 Michael S. Dukakis Democratic 111 41,016,000 1988-1992 Domestic Issues The Only Remaining

More information

Strategic Analysis of Terrorism

Strategic Analysis of Terrorism Strategic Analysis of Terrorism Daniel G. Arce and Todd Sandler Abstract Two areas that are increasingly studied in the game-theoretic literature on terrorism and counterterrorism are collective action

More information

U.S. DEPARTMENT OF STATE Bureau of Diplomatic Security. Top Private-Sector Security Concerns in 2008

U.S. DEPARTMENT OF STATE Bureau of Diplomatic Security. Top Private-Sector Security Concerns in 2008 U.S. DEPARTMENT OF STATE Bureau of Diplomatic Security For Immediate Release Jan. 7, 2009 Contact: Brian Leventhal 571-345-2499 (office) 202-997-5747 (cell) LeventhalBH@state.gov Top Private-Sector Security

More information

The Key Groups: The Irish Republican Army (IRA) The Palestinian Liberation Organisation (PLO) Al-Qaeda

The Key Groups: The Irish Republican Army (IRA) The Palestinian Liberation Organisation (PLO) Al-Qaeda In this section, you need to know the following key themes: What exactly is meant by terrorism? The motivation of terrorist groups? Similarities and differences between terrorist groups? How governments

More information

Political Geography. What is a state? Development of the State Concept. Development of the State Concept. Problematic States. Problematic States

Political Geography. What is a state? Development of the State Concept. Development of the State Concept. Problematic States. Problematic States What is a state? Political Geography A region on the earth that has: Defined territory Population Political structure Sovereignty country is synonymous with state nation is synonymous with ethnicity Development

More information

INTERNATIONAL TERRORISM. Shimko, ch. 12, notes by Denis Bašić

INTERNATIONAL TERRORISM. Shimko, ch. 12, notes by Denis Bašić INTERNATIONAL TERRORISM Shimko, ch. 12, notes by Denis Bašić POLICY RESPONSES TO TERRORISM A cosmopolitan approach treats terrorist attacks as criminal acts against humanity as a whole, requiring a legal

More information

ASK FORM 1 NATIONAL [N=500] AND CITIES ONLY: Q.2 All in all, are you satisfied or dissatisfied with the way things are going in this country today?

ASK FORM 1 NATIONAL [N=500] AND CITIES ONLY: Q.2 All in all, are you satisfied or dissatisfied with the way things are going in this country today? PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS LATE AUGUST 2002 YEAR-AFTER 9/11 POLL FINAL TOPLINE August 14-25, 2002 National Sample: N=1001 / New York City Sample: N=401 / Washington, DC Sample: N=400

More information

H. RES. ll. Expressing the sense of the House of Representatives with respect to United States policy towards Yemen, and for other purposes.

H. RES. ll. Expressing the sense of the House of Representatives with respect to United States policy towards Yemen, and for other purposes. ... (Original Signature of Member) 115TH CONGRESS 1ST SESSION H. RES. ll Expressing the sense of the House of Representatives with respect to United States policy towards Yemen, and for other purposes.

More information

Terrorism and Related Terms in Statute and Regulation: Selected Language

Terrorism and Related Terms in Statute and Regulation: Selected Language Order Code RS21021 Updated December 5, 2006 Terrorism and Related Terms in Statute and Regulation: Selected Language Summary Elizabeth Martin American Law Division 1 Congress has used the term terrorism

More information

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Overview Since the downfall of the Federal Republic of Somalia s dictatorial regime under president Siad Barre

More information

Crisis Watch: An Assessment of Al Qaeda and Recommendations for the United Kingdom s Overseas Counter Terrorism Strategy

Crisis Watch: An Assessment of Al Qaeda and Recommendations for the United Kingdom s Overseas Counter Terrorism Strategy Crisis Watch: An Assessment of Al Qaeda and Recommendations for the United Kingdom s Overseas Counter Terrorism Strategy In the United Kingdom s National Security Strategy (NSS) the National Security Council

More information

Georgia Studies. Unit 7: Modern Georgia and Civil Rights. Lesson 3: Georgia in Recent History. Study Presentation

Georgia Studies. Unit 7: Modern Georgia and Civil Rights. Lesson 3: Georgia in Recent History. Study Presentation Georgia Studies Unit 7: Modern Georgia and Civil Rights Lesson 3: Georgia in Recent History Study Presentation Lesson 3: Georgia in Recent History ESSENTIAL QUESTION: How did the policies and actions of

More information

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire 2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important

More information

J0MUN XIII INTRODUCTION KEY TERMS BACKGROUND. JoMUN XIII General Assembly 6. Forum: General Assembly 6

J0MUN XIII INTRODUCTION KEY TERMS BACKGROUND. JoMUN XIII General Assembly 6. Forum: General Assembly 6 J0MUN XIII Forum: Issue: Student Officer: Position: Effectiveness of methods to eradicate international/local terrorism Minjae Lee President INTRODUCTION Terrorist threats have become more severe and diversified

More information

Terrorism in Africa: Challenges and perspectives

Terrorism in Africa: Challenges and perspectives African Training and Research Centre in Administration for Development Hanns Seidel Foundation The Governance of National Security: Challenges and Prospects New Strategies to Address Growing Security Threats

More information

Part V Dangerous Crossroads

Part V Dangerous Crossroads Part V Dangerous Crossroads Introduction: Controlling the Crossroads When abroad on the international highway, states sometimes get involved in situations which are of a different order to those in which

More information

Concept of Terrorism and its Implication. Introduction

Concept of Terrorism and its Implication. Introduction Concept of Terrorism and its Implication Introduction Terrorism involves the systematic use of terror as a means of coercion. Terrorism refers to the violent acts that are made to create fear or terror

More information

The Terror OCTOBER 18, 2001

The Terror OCTOBER 18, 2001 The Terror OCTOBER 18, 2001 Philip C. Wilcox Jr. Font Size: A A A The author, a retired US Foreign Service officer, served as US Ambassador at Large for Counterterrorism between 1994 and 1997. The Bush

More information

Terrorist Group Location Decision: An Empirical Investigation*

Terrorist Group Location Decision: An Empirical Investigation* Terrorist Group Location Decision: An Empirical Investigation* Khusrav Gaibulloev Department of Economics American University of Sharjah University City, PO Box 26666 Sharjah, UAE kgaibulloev@aus.edu Draft:

More information

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department. Statement of Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department Before the Committee on Homeland Security s Subcommittee on Intelligence,

More information

The Situation in Syria

The Situation in Syria The Situation in Syria Topic Background Over 465,000 people have been killed in the civil war that is ongoing in Syria. Over one million others have been injured, and more than 12 million individuals -

More information

Chapter 6 Foreign Aid

Chapter 6 Foreign Aid Chapter 6 Foreign Aid FOREIGN AID REPRESENTS JUST 1% OF THE FEDERAL BUDGET FOREIGN AID 1% Defense 19% Education 4% Health 10% Medicare 13% Income Security 16% Social Security 21% Net Interest 6% Veterans

More information

Monitoring social and geopolitical events with Big Data

Monitoring social and geopolitical events with Big Data Monitoring social and geopolitical events with Big Data Boston University Alumni Club of Spain Tomasa Rodrigo April 2018 Monitoring economic, social and geopolitical events with Big Data Index 01 Opportunities

More information

A Sustained Period of Low Oil Prices? Back to the 1980s? Oil Price Collapse in 1986 It was preceded by a period of high oil prices. Resulted in global

A Sustained Period of Low Oil Prices? Back to the 1980s? Oil Price Collapse in 1986 It was preceded by a period of high oil prices. Resulted in global Geopolitical Developments in the Middle East 10 Years in the Future Dr. Steven Wright Associate Professor Associate Dean Qatar University A Sustained Period of Low Oil Prices? Back to the 1980s? Oil Price

More information

Briefing Paper Pakistan Floods 2010: Country Aid Factsheet

Briefing Paper Pakistan Floods 2010: Country Aid Factsheet August 2010 Briefing Paper Pakistan Floods 2010: Country Aid Factsheet Pakistan is in the grips of a major natural disaster with severe flooding affecting an estimated three million people. As the government

More information

Unit 7 Station 2: Conflict, Human Rights Issues, and Peace Efforts. Name: Per:

Unit 7 Station 2: Conflict, Human Rights Issues, and Peace Efforts. Name: Per: Name: Per: Station 2: Conflicts, Human Rights Issues, and Peace Efforts Part 1: Vocab Directions: Use the reading below to locate the following vocab words and their definitions. Write their definitions

More information

Terror From Within: The Political Determinants of Domestic Terrorism 1

Terror From Within: The Political Determinants of Domestic Terrorism 1 Terror From Within: The Political Determinants of Domestic Terrorism 1 Sara Polo 2 Department of Government University of Essex March 14, 2012 (Draft, please do not circulate) Abstract How do domestic

More information

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council Montessori Model United Nations S/12/BG-Terrorist Acts General Assembly Distr.: Middle School Twelfth Session XX March 2018 Original: English Security Council This is a special part of the United Nations.

More information

Confronting the Terror Finance Challenge in Today s Middle East

Confronting the Terror Finance Challenge in Today s Middle East AP PHOTO/MANU BRABO Confronting the Terror Finance Challenge in Today s Middle East By Hardin Lang, Peter Juul, and Trevor Sutton November 2015 WWW.AMERICANPROGRESS.ORG Introduction and summary In the

More information

Drug trafficking and the case study in narco-terrorism. "If you quit drugs, you join the fight against terrorism." President George W.

Drug trafficking and the case study in narco-terrorism. If you quit drugs, you join the fight against terrorism. President George W. 1 Drug trafficking and the case study in narco-terrorism "If you quit drugs, you join the fight against terrorism." President George W.Bush, 2001 Introduction Drug trafficking has a long history as a world-wide

More information

Security in a Dangerous World

Security in a Dangerous World 4 Vocabulary Builder Use the information below and the following resources to teach the high-use word from this section. Teaching Resources, Unit 5, p. 87; Teaching Resources, Skills Handbook, p. 3 High-Use

More information

Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism Volume 3 Number 1 Volume 3, No. 1: March 2010 Journal of Strategic Security Article 12 Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism John A. Sautter Green Mountain College

More information

Weekly Geopolitical Report

Weekly Geopolitical Report January 19, 2010 Reflections on Terrorism On December 25 th, Umar Farouk Abdulmutallab attempted to detonate an improvised explosive device (IED) on a Northwest Airlines flight. The flight, which originated

More information

31/ Effects of terrorism on the enjoyment of all human rights

31/ Effects of terrorism on the enjoyment of all human rights United Nations General Assembly Distr.: Limited 23 March 2016 A/HRC/31/L.13/Rev.1 Original: English Human Rights Council Thirty-first session Agenda item 3 Promotion and protection of all human rights,

More information

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal Montessori Model United Nations A/C.6/11/BG-108 General Assembly Distr.: Upper Elementary Eleventh Session XX September 2016 Original: English Sixth Committee Legal This group focuses on legal questions.

More information

Content Articles in Economics

Content Articles in Economics Content Articles in Economics In this section, the Journal of Economic Education publishes articles concerned with substantive issues, new ideas, and research findings in economics that may influence or

More information

Measures to eliminate international terrorism

Measures to eliminate international terrorism Forum: General Assembly 6 Issue: Measures to eliminate international terrorism Student Officer: Sama Ayoub Position: Head Chair Introduction Terrorism acts are often carried as an attempt to cause disruption

More information

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter?

Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? Lecture 2: What is Terrorism? Is this man a Terrorist or a Freedom Fighter? International Terrorism: What is Terrorism? A. Dr. Jim Ray (2010) argues that terrorism has been around for a long time- terrorist

More information

WINTER. March 24. Template

WINTER. March 24. Template March 24 WINTER EQ- What are the different state shapes and types of boundaries? Agenda: 1. Daily Sheet 2. Review 3. Nation, State, Nation-States Gallery walk 4. Types of Boundaries Notes 4. Shapes of

More information

Challenges Facing the Asian-African States in the Contemporary. Era: An Asian-African Perspective

Challenges Facing the Asian-African States in the Contemporary. Era: An Asian-African Perspective Challenges Facing the Asian-African States in the Contemporary Era: An Asian-African Perspective Prof. Dr. Rahmat Mohamad At the outset I thank the organizers of this event for inviting me to deliver this

More information

Growth Consequences of Terrorism in Western Europe

Growth Consequences of Terrorism in Western Europe KYKLOS, Vol. 61 2008 No. 3, 411 424 Growth Consequences of Terrorism in Western Europe Khusrav Gaibulloev and Todd Sandler I. INTRODUCTION The unprecedented terrorist attack on the World Trade Center and

More information

A Climate of Vulnerability International Protection, Palestinian Refugees and the al-aqsa Intifada One Year Later

A Climate of Vulnerability International Protection, Palestinian Refugees and the al-aqsa Intifada One Year Later BADIL Occasional Bulletin No. 08 September 2001 A Climate of Vulnerability International Protection, Palestinian Refugees and the al-aqsa Intifada One Year Later This Bulletin aims to provide a brief overview

More information

Regime Types and Terrorism

Regime Types and Terrorism Regime Types and Terrorism Khusrav Gaibulloev, James A. Piazza, and Todd Sandler Abstract Regime type has opposing effects on terrorism. If a regime constrains the executive branch, then terrorism may

More information

U.S. Attitudes toward Terrorism and Counterterrorism Gary LaFree, Stanley Presser, Roger Tourangeau, Amy Adamczyk

U.S. Attitudes toward Terrorism and Counterterrorism Gary LaFree, Stanley Presser, Roger Tourangeau, Amy Adamczyk U.S. Attitudes toward Terrorism and Counterterrorism Gary LaFree, Stanley Presser, Roger Tourangeau, Amy Adamczyk garylafree@gmail.com LIKELIHOOD OF CALLING THE POLICE, BY SCENARIO If Aware of Person(s)

More information

The Centre for Public Opinion and Democracy

The Centre for Public Opinion and Democracy GLOBAL POLL SHOWS WORLD PERCEIVED AS MORE DANGEROUS PLACE While Criminal Violence, Not Terrorism, Key Concern In Daily Life, Eleven Country Survey Shows That U.S. Missile Defense Initiative Seen As Creating

More information

Radicalization/De-radicalization:

Radicalization/De-radicalization: Center on Global Counterterrorism Cooperation Project on U.S. Global Engagement Radicalization/De-radicalization: Lessons for the Next U.S. President 4 December 2008 SUMMARY In the third installment in

More information

chapter 1 people and crisis

chapter 1 people and crisis chapter 1 people and crisis Poverty, vulnerability and crisis are inseparably linked. Poor people (living on under US$3.20 a day) and extremely poor people (living on under US$1.90) are more vulnerable

More information

WATERGATE. In 1972, Nixon ran for reelection.

WATERGATE. In 1972, Nixon ran for reelection. THE MODERN ERA 1968-1992 RICHARD NIXON In 1968 conservative Richard Nixon became President. One of Nixon s greatest accomplishments was his 1972 visit to communist China. Visit opened China to American

More information