Weapon of the Market-Dominant: A Market Theory of Terrorism in Civil War

Size: px
Start display at page:

Download "Weapon of the Market-Dominant: A Market Theory of Terrorism in Civil War"

Transcription

1 Weapon of the Market-Dominant: A Market Theory of Terrorism in Civil War Aslihan Saygili, Renanah Miles, and Laura Resnick-Samotin Columbia University Abstract How does the distribution of capabilities among rebel groups affect their use of terrorist tactics? We argue that the amount of civil wartime terrorism perpetrated by a rebel group depends on its market share the group s military capabilities assessed vis-à-vis other rebel groups in the same conflict. Market-dominant rebel groups have both the material capabilities to make proliferate and deadly use of terrorist attacks and the strategic incentives to do so as a means of maintaining their monopolistic position in the conflict. By highlighting the links between relative strength, competition, and tactics, we add nuance to the conventional wisdom that conflicts involving multiple rebel groups are inherently more prone to terrorism. Using data on 342 non-state actors involved in internal armed conflicts between 1970 and 2011, we find that rebel groups who militarily dominate the conflict market use terrorism more extensively. Controlling for rebel strength vis-à-vis the government, terrorism appears to be a weapon of the market-dominant among non-state actors involved in civil conflict. Our findings demonstrate the explanatory power of inter-rebel distribution of capabilities for predicting terrorism in civil war and make an important modification to outbidding studies in the terrorism literature. 1

2 1 Introduction How does rebel strength relative to other rebel groups influence the use of terrorism in civil war? One of the key points of consensus among terrorism scholars is that terrorist tactics are primarily employed by militarily inferior groups who lack other means of coercing the target government (Crenshaw 1981, 387). There are two important puzzles, however, that the conventional wisdom about rebel strength and terrorism fail to explain. First, the vast majority of armed non-state actors are militarily weaker than the governments they fight, yet we see significant variation in the extent to which rebel groups rely on indiscriminate attacks against civilian populations. 1 Second, there are many examples of militarily advanced rebel groups who are notorious for their extreme use of terrorism alongside conventional or guerilla tactics. In East Africa, for instance, Somalia and Kenya have suffered scores of high-profile terrorist attacks perpetrated by al-shabaab, a powerful rebel organization that controls large swaths of territory in central and southern Somalia and even managed to capture parts of the capital city of Mogadishu during its peak in While examples like al-shabaab do not falsify the common notion of terrorism as a weapon of the weak, they indicate important gaps in our understanding of the relationship between rebel military capabilities and terrorism. This study suggests that a closer examination of the ways that the distribution of rebel capabilities in civil conflict influence rebel tactics will fill in some of these gaps. Although a growing literature explores the strategic logic of terrorism in civil war (Fazal 2017; Findley and Young 2012a; Fortna 2015; Stanton 2013; Thomas 2014), the relationship between inter-rebel distribution of capabilities and terrorism remains poorly theorized. Many empirical studies of civil wartime terrorism either neglect military capabilities altogether or conceptualize rebel 1 In this study, we use Fortna s (2015, 522) definition of terrorism as intentionally indiscriminate violence against public civilian targets to influence a wider audience. 2

3 strength in strictly dyadic terms relative to the government. This gap in the literature is puzzling given that outbidding competitors is one of the key strategic objectives that terrorism is considered to serve (Kydd and Walter 2006). Surprisingly, the empirical literature on the relationship between rebel competition and terrorism also makes minimal reference to relative capabilities, failing to acknowledge that how rebel groups perceive and respond to potential competition depends largely on their military strength compared to other actors. In this article, we posit a more complex relationship between rebel strength, competition, and terrorism than previously assumed. Our main theoretical proposition is that the amount of terrorism perpetrated by rebel groups varies their rebel market share, defined as the share of available military resources that they command relative to other groups. These resources represent the troops, weapons, and materiel that enable rebels to fight. We argue that, as a rebel group gains a larger share of the resources available in the conflict system and approaches market domination, both its capacity and incentives for profligate and deadly use of terrorism increase. Market domination introduces the burden of maintaining a monopolistic position and preventing potential competitors from arising, which incentivizes the use of terror as a means of exerting authority. We refer to this dynamic as the monopoly effect. Monopoly effects also create structural conditions that may exacerbate non-strategic use of terrorism; for example, by reducing a group s ability to gauge public support for its choice of tactics. At the same time, additional military capabilities may increase the ability to produce terrorism as well as the willingness to accept the risks inherent in its use. We call this dynamic the wealth effect. The outcome is larger production of terrorism by militarily superior rebel groups who dominate the conflict market. We test our hypothesis using new data on terrorist attacks perpetrated by all rebel groups 3

4 that were operational between 1970 and 2011, which we compile by matching actors from the Non-State Actor (NSA) data (Cunningham, Gleditsch, and Salehyan 2009; 2013) with those from the Global Terrorism Database (GTD) (LaFree and Dugan 2007). Our dataset introduces an original measure of rebel market share that we operationalize by calculating the proportion of troops that each rebel group controls relative to all rebel troops active in the conflict year. Using zero-inflated negative binomial estimations, we find strong support for our hypothesis: rebel groups with a larger market share carry out a significantly higher number of attacks and are responsible for significantly more deaths from terrorism. The finding is robust to alternative specifications, demonstrating the explanatory power of inter-rebel power differentials for predicting terrorism in the context of civil war. Our study makes several important contributions to the scholarship on terrorism in civil war. First, we show that the relationship between military strength and terrorist tactics in the context of civil war is more complex than traditional theories can account for, with terrorism appearing to be the weapon of the stronger in a given conflict market. Our empirical findings suggest that, in a given distribution of power among rebel groups fighting the same government, it is the market dominators and monopolists who make profligate use of terrorist attacks. These powerful rebel actors not only have the weaponry, manpower, and logistical access to urban centers that facilitate their execution of deadly attacks, they also have incentives to use terrorism to deter competition from rival groups or internal factions that emerge from within. Second, by highlighting the link between relative capabilities and competition, we add missing nuance to the conventional wisdom that civil wars that feature multiple rebel groups are naturally prone to increased terrorism. Multiparty conflicts characterized by a roughly even distribution of capabilities among rebel groups differ significantly from those where one group 4

5 militarily dominates the conflict landscape. While the former may engender competition and incentives to use terrorism, the latter is a doubly dangerous context where dominant groups possess both the material capabilities and motives to employ terror extensively. 2 Literature Review The relationship between rebel capabilities, competition, and choice of coercive tactics has received widespread attention across literatures on intra-state violence. Studies of terrorism and civilian targeting offer insights about how militarily disadvantaged parties use attacks against civilians to compensate for their comparative weakness (Crenshaw 1981; Downes 2008). Hultman (2007, 206) argues that killing civilians serves as a militarily cheap and easy strategy to raise the government s costs for standing firm when battlefield losses weaken rebels coercive capacity. Others suggest that military losses erode popular support for rebels and increase defection rates, creating incentives to intimidate civilians through selective targeting (Kalyvas 2006) or indiscriminate violence (Wood and Kathman 2015). While some studies treat terrorism and other forms of civilian targeting interchangeably (e.g., Eck and Hultman 2007; Wood 2010), we differentiate between them, following Stanton s (2013, 1009) argument that different forms of violence are associated with different strategic objectives. Terrorist attacks target civilians randomly to coerce a different audience, usually the government (Fortna 2015, 4). Other civilian targeting, in contrast, often seeks to coerce the civilians themselves, whether to induce collusion, deter defection, or extract resources. For its part, the terrorism literature takes the relationship between military weakness and terrorist violence almost as a truism. Widely characterized as a weapon of the weak (Crozier 1960), terrorism is seen as an attractive strategy for non-state actors who seek political concessions yet lack the physical capacity to inflict material costs large enough to induce a shift 5

6 in government behavior. Polo and Gleditsch (2016), for instance, argue that rebel groups who are sufficiently equipped to rely on a conventional military strategy have few incentives to employ terrorism, given its low military impact against the target and potentially counterproductive effects such as legitimacy costs. For insurgents in a position of strength, terrorism is thus considered unnecessary and even wasteful (Thornton 1964, 89). While the weapon of the weak argument has found empirical support, it fails to fully capture the interplay between rebel military capabilities and strategic incentives for terrorism. Because of the widespread assumption that capabilities only matter insomuch as their inferiority makes terrorism a necessity, most empirical studies of civil wartime terrorism conceptualize and measure rebel strength vis-à-vis the government (e.g., Fortna 2015; Polo and Gleditsch 2016; Stanton 2013). This dyadic measure fails to capture meaningful variation in military capabilities across rebel groups, as most groups are significantly weaker than the government forces they oppose. Around 94% of rebel group-year observations in our dataset on civil wars that took place between 1970 and 2011 are coded as weaker or much weaker than the government. 2 As such, these studies fail to account for the variation in tactics across the bulk of rebel actors who are outnumbered by government forces yet sufficiently equipped to fight a civil war. The literature on inter-rebel competition and terrorist outbidding highlights another problem with treating government forces as the sole basis of comparison when examining the link between rebel capabilities and tactics. Not all terrorist attacks are meant to coerce the government: in multiparty conflicts, rebel leaders may see terrorizing civilians as an effective instrument to eliminate competition. When rival organizations threaten their access to material support from the local population, rebel groups may use terrorist attacks to signal their 2 We use the NSA dataset measure of relative strength. Of the 342 rebel groups in our dataset, only six surpass the government forces in strength at any point in the conflict. 6

7 commitment to the cause and attract support away from the competition (Kydd and Walter 2006). Outbidding theories predict an increase in high-profile terrorist attacks on the government s civilian constituency when armed groups compete for popular support and recruits (Bloom 2005; Oots 1989). Terrorist outbidding is hypothesized to help groups secure local support through attraction rather than intimidation; the assumption is that aggrieved people want to be represented by zealots (Kydd and Walter 2006, 76-78). As Bloom (2005, 78) puts it, terrorism becomes the litmus test of militancy among rival groups vying to represent the population. In environments where outbidding may occur, we expect relative strength to be a key determinant of how each group perceives and responds to threats posed by its rivals. However, most empirical studies operationalize rebel incentives for outbidding with the number of nonstate actors party to the same conflict, treating competition as an inherent characteristic of multiparty civil wars (e.g., Findley and Young 2012b; Polo and Gleditsch 2016; Stanton 2013). 3 This overlooks the fact that each rebel group is likely to perceive threats posed by potential competitors differently, depending on where it stands in a given distribution of power. Yet we cannot accurately assess the strength of a group s incentives to outbid competitors or the conditions under which they translate into increased use of terrorism without accounting for the group s relative conflict standing. In sum, extant theories of terrorism in civil war fail to fully elucidate how rebels military capabilities influence their use of extreme tactics in civil war. The weapon of the weak thesis invokes a narrower definition of rebel strength vis-à-vis the government, while studies of inter- 3 An exception is Nemeth (2014, 355), who finds that competition may reduce terrorism, but that the relationship is contingent on the state s acceptance of violence and the group s ideology. However, his measure of market share is based on ex post outputs (i.e., number of attacks) rather than the ex ante distribution of capabilities that we measure here. 7

8 rebel competition pay insufficient attention to the ways that rebel strength vis-à-vis other groups shapes their tactical preferences. Next, we present a novel account of civil wartime terrorism that seeks to bridge these theoretical gaps. 3 Theory: Rebel Market Share and Terrorism We argue that rebels use of terrorism is affected by the distribution of capabilities among all rebel groups active in an ongoing civil war. We conceptualize these groups as operating within a rebel conflict market. The market consists of available military resources, including the troops, materiel, and arms that generate fighting power. Market share thus captures the interrebel distribution of material power: the group with the largest share is the most powerful rebel actor in a given conflict. This conceptualization draws on economic models of civil war that characterize conflict as a kind of industry in which different firms compete by attempting to disable opponents (Hirshleifer 2001, 331). Unlike economic markets, however, conflict markets are zero-sum and value is redistributed by force (Hirshleifer 2001, ). 4 Our main proposition is that in the context of civil war, terrorism is employed more intensively by rebel organizations that command a larger portion of the military resources available in the conflict market. Increasing market share affects the use of terrorism in several ways. As groups amass market share, their incentives for using terror as a means of exerting authority and deterring potential challengers increase through a monopoly effect, which may also increase nonstrategic use of terrorism. At the same time, their capacity to commit attacks and willingness to incur the costs of doing so increases through a wealth effect. 4 Formal contest models of conflict adopt this terminology to examine the effects of combatant strength on war outcomes. In these models, armed groups produce violence, allocate resources to defeat their adversaries and, if they win, appropriate the defeated parties resources. For an overview in the context of civil wars, see Blattman and Miguel (2010). 8

9 3.1 Monopoly Effects Monopoly effects occur when a rebel group controls much or all of a conflict market. Much like a monopolistic firm in an economic market, rebel groups who attain market dominance face pressure to maintain their monopolistic position vis-à-vis potential competitors. This pressure creates strategic incentives to use extreme tactics like terrorism. 5 Market-dominant groups are also more likely to miscalculate in their use of terrorism, much like monopolies produce inefficiencies in economic markets. 6 First, we briefly consider how monopoly effects may induce non-strategic use of terrorism; next, we discuss how they shape strategic incentives. In the absence of competition, rebel leaders face a problem of asymmetric information that limits their ability to assess the level of local support for terrorist tactics. As Nemeth (2014, 337) puts it, The terrorism literature is replete with accounts of groups miscalculating the amount of violence a society was willing to endure. An example is Iraq in 2007, when al-qaeda in Iraq s excessive brutality cost it the support of the local Sunni population. By reducing groups ability to gauge public support and by reducing their accountability to the public for support market-dominant rebel groups become less constrained by societal preferences against terrorism. Monopolistic rebels can ignore the legitimacy costs of terrorism more easily, whether because they cannot hear public rebuke or because they feel emboldened not to listen. Monopoly effects also give rise to strategic incentives to use extreme tactics. When faced with challenges to their power by rising competitors or internal factions, monopolistic and 5 Importantly, we only examine strategic reasons why groups might choose terrorism not whether or not terrorism is effective. Some scholars find that terrorism does not pay in terms of concessions (Abrahms 2012) or victory (Fortna 2015), but others find that extreme tactics succeed in driving governments to the bargaining table (Thomas, 2014). We simply note that, effective or not, groups continue to use it as a tactic, thus meriting scholarly attention. 6 Vickers (1996) provides a useful discussion of the different ways that monopolies and collusion introduce economic and social inefficiencies in markets. In particular, Vickers explains ways that monopolistic markets can cause private and social interests to diverge (13). 9

10 market-dominant groups may perceive terrorism as an effective means to re-exert authority and raise barriers to market entry by other groups. 7 Market-dominant rebel groups enjoy strong military capabilities and control a large share of all available resources, which facilitates the execution of terrorist attacks. At the same time, the threat of losing that share in the future raises concern over preventing incipient challenges. Possession of a dominant market share coupled with the threat of future monopoly loss thus creates a doubly dangerous situation. Importantly, a group does not have to be the only non-state actor in a conflict for monopoly effects to occur; the logic also applies to rebel groups that command a large market share. We expect, however, that these dynamics will become more pronounced as a group s market share grows. One way that market dominators use terrorism strategically to eliminate competition is through a combination of provocation and outbidding. As theorized in the literature, terrorism is sometimes used to provoke government backlash, under the expectation that harsh and indiscriminate counterterrorism responses will radicalize the local population and drive recruits and supporters into the rebels camp (Kydd and Walter, 2006). This strategy also serves monopolistic and market-dominant rebel groups efforts to prevent relatively weaker competitors from accumulating power. A government backlash so brutal that only the strongest can survive may be seen as a risky but effective way to eliminate smaller groups who would grab larger market share if allowed to grow. The Liberation Tigers of Tamil Eelam (LTTE) in Sri Lanka illustrates how powerful rebel groups can outbid competitors through terrorist provocation. The LTTE emerged in 1974 as 7 Of course, terrorism is not the only tactic that market-dominant groups use to deter or eliminate competition. Rebel groups often strive to become the only game in town by engaging their rivals militarily, using terrorism in conjunction with conventional attacks. Another tactic, widely used by the LTTE, is to physically eliminate the leadership of rival organizations. In contrast to outbidding and provocation, which target competitors through indirect mechanisms, these tactics aim directly to destroy rivals organizational and fighting capabilities. 10

11 one of many Tamil separatist groups purporting to fight for Tamil independence. In the 1970s and 80s, relatively weaker Tamil rebel groups competed with the LTTE for recruits. The LTTE s early archrival, the People s Liberation Organization of Tamil Eelam (PLOTE) refrained from attacking civilians, which a U.S. intelligence assessment concluded had given it a broader base among Tamils than LTTE has (Central Intelligence Agency 1986, 6). The LTTE, however, believed that terrorism would provoke harsh government reprisals that would target Tamil civilians, increasing support for the LTTE and wresting it away from their rivals. The strategy worked: the LTTE s use of terrorism provoked a massive counter-terrorism response from the government that helped, along with direct attacks on its rivals, to wipe out the weaker groups. As such, use of terrorism enabled the Tamil Tigers to consolidate a conflict market monopoly Wealth Effects While monopoly effects shape group motives for using terrorism, wealth effects influence the capacity and risk acceptance needed to execute attacks. Our observation on capacity is straightforward: for groups already inclined to use extreme tactics like terrorism, any increase in capabilities will increase their ability to execute attacks. Powerful actors have more weapons, soldiers, and access to urban centers, all of which facilitate the execution of terrorist attacks. Scholars find that group size associates positively with terrorism (Asal and Rethemeyer 2008a; 2008b; Boyns and Ballard 2004). Even if smaller groups want to use terrorism, they often lack the requisite human and material capital, essentially creating a labor constraint (Clauset and Gleditsch 2012, 2) on the production of violence that diminishes as groups grow and gain experience (Asal and Rethemeyer 2008b). Indeed, the three groups with the highest number of terrorist attacks in a given year for which we have troop data are Shining Path (Sendero 8 At its peak, the LTTE was one of the best-equipped rebel organizations in the world and the only rebel group to boast its own army, navy, air force, and merchant marine (Mampilly 2011). 11

12 Luminoso; SL hereafter) in Peru (1984), Communist Party of India (CPI-Maoist) (2010), and the Taliban in Pakistan (2009). Although these groups vary in terms of geography, ideology, and goals, they share a common feature: disproportionately large shares of the overall capabilities across rebel groups active in the war. 9 Our second point is more nuanced: as groups are able to do more, they become willing to do more. The economics literature has a familiar term for this dynamic: wealth effect. The wealth effect posits that as individuals assets increase in value, they feel more secure about their wealth and thus are willing to spend more. In the context of civil war, this means that willingness to produce terrorism may grow with the capacity to do so. The common wisdom is that as capabilities increase, terrorism will decrease due to countervailing incentives. Scholars argue that because the non-material costs of terrorism outweigh its material benefits, rational rebels will apply all their resources toward conventional military strategies when they can (Polo and Gleditsch 2016, 818; Wood 2014). While we agree that rebels who can hit government forces will do so, we question whether use of terrorism is zero-sum or mutually exclusive with other tactics. The logic of wealth effects predicts that more capabilities represent extra capacity and additional expendable assets, encouraging risk-acceptant behavior. Risk acceptance in this context refers to the costs that terrorism incurs, namely legitimacy and reputation costs. Wintrobe (2006, 186) similarly argues that an increase in the capacity of rebel organizations affects their preferences over tactics: [A]s wealth increases, the leader will switch to a relatively more risky portfolio, that is, make relatively more use of extremist methods. In a nutshell, groups may view control of resources as a license to use all available tactics not as a reason to 9 At their peaks of violence, CPI-Maoist and the TTP were the only active groups in their conflict while SL commanded 93% of the troops on the battlefield. 12

13 exercise self-restraint. In civil wars where outcomes hinge on the population s support, groups may see the ability to terrorize the people who depend on the government for protection as a way to continue applying political pressure. As groups grow stronger, the threat to impose costs becomes more credible and certain strategies of terrorism, such as attrition, become more viable. In attrition, groups use terrorism to signal the ability and resolve to continue imposing costs in the future (Kydd and Walter 2006, 59-60). Indeed, evidence suggests that rebels use it to disrupt and discredit the processes of government (Crenshaw 1981, 387) or to ratchet up pressure on the government to make compromises (Thomas 2014), often in tandem with guerrilla warfare. As one of the notorious perpetrators of terrorism in civil war, Peru s SL illustrates the wealth effects associated with market dominance. SL, along with other left-wing groups, emerged from the Peruvian Communist Party (PCP) in the 1960s. The group split from the PCP in 1964 because of a disagreement over tactics; while most of the PCP s members preferred peaceful means of change, SL sought a violent people s war to bring about revolution in Peru (McCormick 1990). When SL began to use terrorism during the 1980 Peruvian elections, it was already a comparatively strong insurgent group; in 1987, they were estimated to have between 4000 to 5000 dedicated, full-time cadres operating in the country (Central Intelligence Agency 1987). By 1990, SL had administrative control over an estimated 25 to 40% of the country and had developed a high degree of military and organizational professionalism (U.S. Congressional Hearing 1992, 13, 17). Rather than eschew terrorism as their strength grew and the conflict morphed into a long-running guerrilla insurgency, SL embraced it. Between 1982 and 1999, SL conducted an average of 121 attacks per year; in 1984 alone, they carried out 260 attacks. SL s profligate and effective use of terrorism owed not only to its military strength per se 13

14 but also to its command of a large market share in the absence of strong competitors. Even after the emergence of the Tupac Amaru Revolutionary Movement (MRTA) in the mid-1980s as a rival group, SL s dominant market position as well as its notoriety for widespread terror persisted. A comparison between the two rebel groups helps illustrate this: overall, the MRTA lacked the lavish finances of Sendero, and paled in most other respects as well. It had less than 10 percent of Sendero Luminoso s membership base, and was responsible for less than 10 percent of the number of violent deaths attributed to Sendero Luminoso (Rochlin 2003, 73). Our data also support this assessment. During its peak years ( ), MRTA possessed only 6.5% of all rebel troops in the conflict and carried out around 100 attacks in total, while the SL controlled the rest of the market and executed more than 600 attacks in the same period. Taken together, monopoly effects predict that market-dominant groups will use terrorist tactics to consolidate control and prevent emergence of competition. Wealth effects predict that as rebel group capabilities increase, so does their ability to conduct terrorism and the willingness to employ potentially risky strategies. Together, these insights yield our main hypothesis that groups with more rebel market share will use more terrorism. 4 Research Design and Data To test our hypothesis empirically, we construct a new dataset of rebel group terrorism in civil wars, matching rebel groups in the NSA dataset with terrorist organizations identified in the GTD data. The NSA s inclusion criterion, based on a 25-battle-death threshold of armed conflict, allows us to create a more comprehensive sample of rebel actors than similar studies that only include groups involved in conflicts reaching 1000 battle deaths in a given year (e.g., Stanton 2013; Fortna 2015). We expand the NSA spells into panel data for a rebel group-year unit of analysis, which captures periods of overlapping rebel group activity as well as changes in rebel 14

15 strength over time. We include in the dataset all non-state actors for the years , with the exception of those involved in a coup d état, which usually have a short lifespan of a few days, and groups identified as irregulars, which we exclude due to their lack of an organizational structure. Our final dataset comprises 342 rebel groups and 2,032 rebel group-year observations. 4.1 Dependent Variable We use two primary measures of the dependent variable, terror attacks and terror fatalities. 10 The first measure is the annual number of terrorist incidents perpetrated by each rebel group; the second measure is the number of fatalities from those incidents. We rely on the GTD coding of terrorist events, selecting only those incidents that match all three of the GTD terrorism criteria. 11 We then filter the GTD dataset to include the following attack types: armed assault, bombing, hijacking, facility/infrastructure attacks, and hostage taking (barricade and kidnapping incidents). We exclude incidents that are not clearly perpetrated against a civilian target (i.e., military, police, and government targets). After applying these filters, we match the number of incidents and fatalities per year to the groups in our data. 12 In most cases, we rely on exact name matches and only record incidents whose perpetrator in the GTD exactly matches the rebel group name in NSA. 13 Our variables only capture terrorist attacks associated with specific 10 Young (2016, 3) surveys 21 journals to show that the two most common operationalizations of terrorism as a dependent variable are event counts and number of fatalities. He also shows that results are sensitive to alternative specifications, such as number of attacks versus fatalities, which is why we operationalize the dependent variable in two different ways. 11 For inclusion in GTD, incidents must meet at least two of three criteria, namely that attacks have a broader (political, social, etc.) goal, target a larger audience than the immediate victims, and fall outside the context of legitimate warfare activities (LaFree and Dugan 2007, 188). 12 Our primary measure follows Fortna s (2017) coding of terrorist activity by rebel groups. Further details about our coding procedures are in the Appendix. To ensure that our results do not depend on a specific definition of terrorism, we use alternative measures in robustness tests that rely on a more restrictive set of attack and target types. Results are reported in the Appendix. 13 See the appendix for details on name-matching between the datasets in ambiguous cases. 15

16 rebel organizations; we do not attribute unclaimed attacks to any rebel group in the target country in order to avoid overestimating the amount of terrorism perpetrated by civil war actors. Nearly 42% of the rebel groups (143 out of 342) in our dataset use terrorism at some point in their lifetime, while around 62% of the civil wars in our sample have at least one rebel group using terrorism. 4.2 Independent Variable Our main independent variable rebel troop share estimates the distribution of capabilities among rebel groups concurrently fighting the government. We create this variable using the NSA data on the size of rebel armed forces. For each state-rebel group dyad year, we first identify all other groups that were party to the same conflict in the given year. Next, using the NSA estimates of rebel forces, we calculate the proportion of troops that each rebel group controls relative to all the rebel troops active in the conflict year. For example, in 1990, Revolutionary Armed Forces of Colombia (FARC) fought against the Colombian government alongside two other groups, National Liberation Army (ELN) and Popular Liberation Army (EPL). Each of these is represented as a separate rebel group-year in the dataset. Using NSA data on troop number estimates, we estimate the FARC s troop share at around 74% for 1990, while the other two groups have 19% and 7% troop shares respectively. Table 1 presents the ten rebel groups from our dataset that conducted the highest number of terrorist attacks between 1970 and During their peak years of terrorist activity, almost all of these groups commanded more than 75% of all rebel troops available in the battlefield; most enjoyed complete monopoly over the conflict landscape. 14 The observation that the most 14 The Taliban troop share is not calculated due to the presence of at least one other rebel group in the conflict for whom troop data are not available. Nonetheless, the Taliban is well known as a military powerful rebel actor. 16

17 notorious perpetrators of civil wartime terrorism are market-dominant and monopolistic rebel groups provides preliminary support for our theory. One exception to the observed trend of large amounts of terrorism being perpetrated by groups with high market status is the ELN in Colombia, who used terrorist attacks extensively even though its market share was significantly constrained with FARC s rapid growth in the early 1980s. Table 1. Rebel Groups with Highest Levels of Terrorist Activity and Their Market Share During Peak Years This empirical pattern holds when we examine the distribution of the dependent variables terrorist attacks and fatalities across market shares. Figure 1 below displays the distribution of the dependent variables by market share, where groups with troop share below

18 are coded as low share ; groups with troop share 0.5 or greater, but less than 1, are coded as market dominators ; and groups with a troop share of 1 are coded as monopolists. Figure 1. Distribution of Dependent Variables by Market Share 4.3 Control Variables We include a number of control variables that potentially correlate with both terrorism and rebel capabilities. We control for the regime type of the government party to the civil war democracy using the Polity2 score (Marshall, Jaggers, and Gurr 2013). The literature suggests that democracies make attractive targets for terrorists due to their citizenry s low threshold for civilian casualties (Hultman 2012; Kydd and Walter 2006; Pape 2003) as well as certain regime attributes, such as respect for civil liberties, which facilitate the planning and execution of terrorist operations (Eyerman 1998; Li 2005). Regime type might also be related to rebel capabilities; in democratic countries where counterinsurgency measures are subject to normative and institutional constraints, rebels can maneuver more easily to recruit and mobilize supporters. 18

19 At the same time, democracies may also offer alternative channels of political expression to the aggrieved population, thereby hurting rebels ability to recruit sympathizers to their rank (Eyerman 1998; Ross 1993; Schmid 1992). Another control variable is log-transformed GDP per capita, which captures the level of economic development in the target country. 15 Given that material resource flows are vital for rebels organizational survival, fighting a high-income target country may increase the perceived effectiveness of particular types of terrorism, such as hostage-taking and kidnapping for ransom, which provide the rebels a low-cost source of war funding. Operating as a proxy for state capacity as well as economic well-being, the GDP variable also is plausibly related to rebel strength. Higher income levels may hurt the rebel ranks; as Fearon and Laitin (2003, 80) argue, recruiting young men into the life of a guerilla is easier when the economic alternatives are worse. We also control for factors operating at the conflict and group levels. At the conflict level, we use a dummy variable for conflict intensity to differentiate between minor conflict years (25 99 battle deaths) and major conflict years (more than 1000 battle deaths). Terrorism may increase as violence increases across the board. Moreover, conflict intensity and rebel group strength are likely correlated. Stronger groups are able to mount larger challenges to the government and may have more ambitious aims, leading to conflicts being fought more intensely (Buhaug 2006). At the group level, we control for rebel strength relative to government. We use the rebel-to-government troop ratio variable, which we create using the NSA troop estimates and military personnel data from the Correlates of War Project s National Material Capabilities 15 GDP per capita data are from Gleditsch (2002) and the Penn World Tables (Feenstra, Inklaar, and Timmer 2015). 19

20 (NMC) dataset (Singer et al. 1972). We also control for foreign support and group ideology. Rebel groups who receive financial and military assistance from foreign states are not only better equipped to execute terrorist operations, but also might undertake drastic, highly visible campaigns to signal to their sponsors their commitment to the rebellion (Hovil and Werker 2005, 7). Data for the foreign support variable come from the NSA dataset. For group ideology, we include a dummy variable, nationalist-separatist, coded by Polo and Gleditsch (2016) indicating whether the rebel group pursues a nationalist-separatist agenda. Polo and Gleditsch argue that ethno-nationalist ideals yield a strong sense of othering within the ethnic community that rebels claim to represent, thereby increasing the legitimacy of terrorist attacks targeting the out-group(s) associated with the government. Other studies make the opposite prediction, suggesting that separatists are less likely to use terrorism as they hope to gain legitimacy and support for statehood in the international arena (Fazal 2017). Ethno-nationalist ideology may also influence capabilities, particularly in terms of rebel recruitment. Weinstein (2005), for instance, argues that ethnic linkages and regional identities are social endowments that help rebel leaders make credible commitments to deliver the future benefits of joining the rebellion. Finally, we control for the Cold War time period. Kalyvas and Balcells (2010) argue that superpower support for both proxy state and rebel actors affected their military capacity, leading to different warfighting strategies, or technologies of rebellion. Different modes of warfighting might also have influenced rebel decisions over tactics. For example, evidence suggests that civil war terrorism has increased since the end of the Cold War (Enders and Sandler 1999). 4.4 Model Specification Given that our dependent variable, the number of rebel group terrorist attacks, is an event count with overdispersion (i.e., observed variance exceeding the mean) and excessive zeros, we 20

21 use zero-inflated negative binomial (ZINB) models to test our hypotheses. Similar work suggests ZINB models as the appropriate method for dealing with the abundance of zeros in the data, which Drakos and Gofas (2006a, 74) call an intrinsic statistical property of terrorist counts. 16 ZINB models combine a negative binomial count model with a logit model that predicts excess zeros, assuming that there are two separate data-generating processes for the zero outcomes (Greene 1994). Essentially, this approach distinguishes between at-risk groups who have some probability of using terrorism, and certain-zero groups who lack the incentives or means for terrorism due to structural factors and thus never employ the tactic. 17 Of course, it is debatable whether any groups have a truly zero probability of using terrorism since they could theoretically adopt the tactic at any time. The highly skewed distribution of our attack count variable as well as the results from Vuong tests (Vuong 1989) suggest that the ZINB model is appropriate, however. We use separate sets of covariates in the inflation and count equations, because there are theoretical reasons to believe that different variables affect the likelihood of any terrorism occurring versus the amount of terrorism that occurs. Our approach is informed by Li s (2005, 293) objection to employing the same variables in both parts, which implies that the data generation process is one and the same, apparently inconsistent with the rationale for using the zero-inflated estimator. In fact, our data show significant overlap between authoritarian settings and certain-zero outcomes: 82% of the rebel groups in our dataset who have never used terrorism operate in a non-democratic country. 18 Our data also suggest that rebel strength relative to the 16 Similar studies using this method include Piazza (2011); Findley and Young (2012b); and Santifort- Jordan and Sandler (2014). 17 The intuition behind this distinction is that the set of covariates generating a zero count for at-risk groups is different from those that govern the zero-always process (Drakos and Gofas 2006a). 18 Drakos and Gofas (2006b) attribute this overlap to two potential factors: (i) non-democratic regimes tendency to underreport terrorist activities and (ii) structural factors that make authoritarian regimes less 21

22 government is a potential predictor of excessive zeros. For the handful of observations where rebel forces match or outnumber government forces, terrorist activities is near zero for all groups except for Sierra Leone s Revolutionary United Front (RUF) and Somalia s Al-Shabaab. Accordingly, we include a measure of democracy and a measure of rebel strength relative to the government in the inflated portion of the models. 5 Results Table 2 presents the results. In all of our models, robust standard errors are clustered by rebel group to allow for intragroup correlation of the error terms. Model 1 tests the market share hypothesis using a count of terrorist attacks by rebel group. The coefficient for our main explanatory variable, rebel troop share, is positive and statistically significant at the level, providing strong support for our hypothesis. The finding demonstrates that rebel groups who possess a larger share of all troops available in the conflict execute a higher number of terrorist attacks. The coefficient on troop share corresponds to an incidence rate ratio of 4.97; this means that the incidence rate of terrorist attacks for a monopolistic group (i.e., troop share=1) is around 5 times that of a group with near-zero troop share. A group that possesses 20% market share has an incidence rate of 1.38, whereas a market-dominant group with 80% troop share has a rate of susceptible to terrorism. They also underline that, while the ZINB model addresses the issue of excessive zeros in a methodologically progressive way, it cannot disentangle between these two zero-generating factors. 22

23 Table 2. Zero-Inflated Negative Binomial Models of the Effect of Rebel Market Share on Terrorism In Model 2, we use the terror fatalities count as the dependent variable. Similar to Model 1, the coefficient for rebel troop share is significant at the level. Our analysis of incidence rate ratios shows that the rate of fatalities from terrorist attacks perpetrated by a monopolistic group is 2.68 times that associated with a militarily powerless group with near zero market share. 23

24 In line with our theory, both findings from Models 1 and 2 suggest increasingly more extensive use of terrorism by rebel groups who establish military dominance in the conflict landscape. Figure 2 displays the predicted number of attacks and fatalities at different values of rebel market share. 19 For rebels who are substantially weaker than their competitors and command only a minuscule share of troops in the conflict market, the predicted amount of terrorist activity is around 2-3 attacks and 7-8 fatalities. In Figure 2a, as we move along the x-axis towards the 50% threshold (the range above which hosts market dominators and monopolists), the predicted number of terrorist attacks by rebel group more than doubles. Similarly, as displayed in Figure 2b, the predicted number of fatalities for rebel groups with 50% market share is significantly larger than the predictions associated with groups that have a low market share. Within the % range for rebel troop share which corresponds to groups with the highest market power, the predicted attack count more than quadruples (>10 attacks) and the fatalities count more than doubles (>20 fatalities) the amount of terrorist activity associated with relatively weaker rebel groups with troop shares in the %0-10 range. Figure 2: Predicted Number of Attacks and Fatalities by Rebel Market Share 19 Predicted attacks and fatalities are calculated with all controls held at their median values. 24

25 The models also illustrate that that the negative coefficient for rebel-to-government troop ratio fails to achieve statistical significance (p-values: 0.07 in Model 1; 0.22 in Model 2). This finding suggests that the weapon of the weak thesis holds limited explanatory power when applied to terrorism in the context of civil war. In line with our expectations, rebel strength relative to potential competitors appears to be a much stronger predictor of civil wartime terrorism than rebel strength relative to government. The other control variables behave largely as predicted. Rebel groups involved in conflicts with more intensive fighting, as well as those operating in democratic countries, engage in higher levels of terrorist activity, although the democracy variable is statistically significant only in Model 1. On the other hand, rebel groups with nationalist-separatist ideology carry out significantly fewer attacks. The coefficients for GDP per capita, foreign support and post-cold War variables fail to achieve statistical significance in either model. In the inflated models, the polity measure has a negative and statistically significant coefficient, which suggests that rebel groups operating in countries with higher levels of democracy are much less likely to be in the certain-zero category. This is in line with our observation that regime type predicts excessive zeros, with the majority of non-terrorist rebels operating under authoritarian regimes. While the positive coefficient of the rebel strength variable is consistent with the literature s prediction that exceptionally powerful rebels are more likely to be in the certain-zero group, the variable does not achieve statistical significance. These two findings confirm our intuition that, while several factors influence the amount of terrorist activity carried out by rebel groups, rebels strategic decision to employ or eschew the tactic altogether is largely determined by structural factors such as regime type. Our findings about the relationship between rebel market share and terrorism are robust 25

26 to a variety of alternative measurement and model specifications, including more restrictive measures of terror attacks and fatalities and estimations with fixed-effects negative binomial regression. Due to space constraints, the results are presented in the Appendix. 5.1 Effects of Market Share in Multi-Party Conflicts Roughly two-thirds of the observations in our data set represent monopolized conflict markets, where the rebel group is fighting the government in the absence of any competition. While we expect monopolistic groups to produce high amounts of terrorism in civil wars, our theory offers similar predictions about stronger rebel groups operating in multi-actor conflicts, who possess the capabilities for proliferate terrorist activity while also having incentives to use terrorism as a means of safeguarding their market-dominant position vis-à-vis competitors. In order to confirm that our findings also hold for conflicts that resemble competitive markets, we examine the variation in terrorist activity across rebel groups involved in multi-party civil wars. Table 3 presents models estimated using a subsample from our dataset that only includes observations where a rebel group has at least one competitor in the given year. Model 3 looks at the effect of rebel market share on terror attacks; Model 4 re-estimates the same model using terror fatalities as the dependent variable. Similar to our earlier estimations with the full sample, the troop share variable has a statistically significant and positive effect on the number of terrorist attacks by rebel group. The incidence rate of attacks for market-dominant rebels with 80% troop share is 1.86 times that of groups commanding 20% market share; the ratio from the same comparison is 2.03 when we look at the incidence rates of terror fatalities. These findings confirm our expectation: in competitive conflict markets, the rebel organizations that are stronger than their potential rivals tend to produce larger amounts of terrorism. 26

27 Table 3. ZINB Models of Rebel Terrorist Activity in Competitive Conflict Markets Our closer examination of multi-party civil wars provides the additional insight that, when studying terrorist activity at the group level, we need to consider how competitive dynamics may play out differently for rebel organizations depending on their power position relative to potential competitors. As such, explanatory variables that only focus on the number of 27

28 rebel groups in the conflict, commonly employed in empirical analyses of terrorist outbidding, fail to capture the difference between the strong and weak actors in terms of their military capabilities and perception of threats posed by rival groups, thereby making only loose proxies for inter-group competition. 6 Conclusion In this article, we advance a market theory of civil wartime terrorism that highlights the relationship between rebels military strength relative to other armed groups and their use of terrorist tactics. Our main proposition is that rebel groups who control a larger portion of resources in the conflict landscape will employ terrorist attacks more extensively, with increased market share driving terrorism through a mix of capabilities and strategic incentives. As rebel groups secure a larger market share in the conflict, they become more capable of carrying out widespread terrorist attacks and more acceptant of risks associated with the tactic, such as legitimacy costs. In addition, groups who obtain dominant market shares become incentivized to use terrorism to maintain their position vis-à-vis potential competitors. We test our argument using a new measure of rebel troop share on all rebel groups in civil wars between 1970 and Our hypothesis finds strong support groups possessing larger shares of military capabilities perpetrate significantly more terrorism, both in terms of attacks and fatalities. Our findings diverge from much of the current literature on the determinants of civil war terrorism. First, we add nuance to the widespread belief that multi-party conflicts are inherently more likely to produce terrorism. What matters is the distribution of power within the rebel conflict system, not the number of actors per se. A multi-party conflict where one rebel group controls a dominant share of the fighting capabilities is more likely to experience terrorism than a conflict with the same number of groups but a more equal distribution of power. 28

29 This insight has important implications for the literature that models conflict as an economic process. Most of this scholarship assumes that conflict inverts traditional economic logic, with competition, not monopoly, leading to worse outcomes for civilians (e.g., Metelits 2010; Wood and Kathman 2015). We find instead that conflict markets operate much like economic ones insomuch as the presence of dominant actors drives inefficiencies (in our interpretation, violence against civilians in the form of terrorism). This suggests the need for a more nuanced understanding of the effects of competition in the context of civil war. We also contribute to the literature by proposing a new measure of rebel market share, which we operationalize by measuring each group s troop number as a proportion of the total rebel fighting force within the same conflict. The market share variable provides important information about a rebel group s military standing in a conflict, which cannot be captured in standard comparisons of strength between rebel groups and the target government. Our approach, somewhat paradoxically, also makes rebel-to-government measures more informative. For example, imagine two rebel groups, A and B, with similar troop numbers in two separate conflicts, each coded as weaker than the government. Group A is the smallest of several rebel actors involved in the conflict and, according to our market theoretical logic, will commit comparatively little terrorism. Group B, on the other hand, is the sole non-state actor and thus commands all of the available resources in the conflict market. We demonstrate empirically that Group B poses a greater threat for extensive and lethal use of terrorism, controlling for other factors. This insight also has implications for counter-terrorism policies. In particular, it suggests that relative strength between groups is a better indicator for assessing the threat of terrorism than relative strength vis-à-vis the government. 29

30 Finally, future research should focus on developing even more accurate measures of rebel group competition, taking into account not only military capabilities, but also other aspects of intergroup interaction such as geographical overlap and clashes over territory. An important area for inquiry is how shifts in capabilities drive changes over time. Evidence from the civilian targeting literature suggests that declines in relative capabilities, induced by new market entrants, may lead to increased brutality (Wood and Kathman 2015); whether this logic holds in the context of terrorism is an important empirical question to investigate. 30

31 References Abrahms, Max The Political Effectiveness of Terrorism Revisited. Comparative Political Studies 45(3): Asal, Victor, and R. Karl Rethemeyer. 2008a. The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks. The Journal of Politics 70(2): b. Dilettantes, Ideologues, and the Weak: Terrorists Who Don t Kill. Conflict Management and Peace Science 25(3): Blattman, Christopher, and Edward Miguel "Civil War." Journal of Economic Literature, 48(1): Bloom, Mia M Dying to Kill: The Allure of Suicide Terror. New York: Columbia University Press. Boyns, David, and James David Ballard Developing a Sociological Theory for the Empirical Understanding of Terrorism. The American Sociologist 35(2): Buhaug, Halvard Relative Capability and Rebel Objective in Civil War. Journal of Peace Research 43(6): Central Intelligence Agency. Directorate of Intelligence Sri Lanka: The Growing Insurgency. NESA Accessible online at: Insurgency and Counterinsurgency in Peru, Columbia, and Ecuador. NI IIM Accessible online at: Clauset, Aaron, and Kristian Skrede Gleditsch The Developmental Dynamics of Terrorist Organizations. PLoS One 7(11): Crenshaw, Martha The Causes of Terrorism. Comparative Politics 13(4): Crozier, Brian The Rebels: A Study of Post-War Insurrections. Boston: Beacon Press. Cunningham, David E., Kristian Skrede Gleditsch, and Idean Salehyan It Takes Two: A Dyadic Analysis of Civil War Duration and Outcome. Journal of Conflict Resolution 53(4): Non-State Actors in Civil Wars: A New Dataset. Accessible online at: 31

32 Downes, Alexander B Targeting Civilians in War. Ithaca, NY: Cornell University Press. Drakos, Konstantinos and Andreas Gofas. 2006a. In Search of the Average Transnational Terrorist Attack Venue. Defence and Peace Economics 17(2): b. The Devil You Know but Are Afraid to Face: Underreporting Bias and its Distorting Effects on the Study of Terrorism. Journal of Conflict Resolution 50(5): Eck, Kristine, and Lisa Hultman One-Sided Violence against Civilians in War. Journal of Peace Research 44(2): Enders, Walter, and Todd Sandler Transnational Terrorism in the Post-Cold War Era. International Studies Quarterly 43(1): Eyerman, Joe Terrorism and Democratic States: Soft Targets or Accessible Systems. International Interactions 24(2): Fazal, Tanisha M Rebellion, War Aims & the Laws of War. Daedalus 146(1): Fearon, James D. and David D. Laitin Ethnicity, Insurgency and Civil War. American Political Science Review 97(1): Feenstra, Robert C., Robert Inklaar, and Marcel P. Timmer The Next Generation of the Penn World Table. American Economic Review 105(10): Findley, Michael G., and Joseph K. Young. 2012a. Terrorism and Civil War: A Spatial and Temporal Approach to a Conceptual Problem. Perspectives on Politics 10(2): b. More Combatant Groups, More Terror?: Empirical Tests of an Outbidding Logic. Terrorism and Political Violence 24(5): Fortna, Virginia Page Do Terrorists Win? Rebels Use of Terrorism and Civil War Outcomes. International Organization 69(3): Gleditsch, Kristian S Expanded Trade and GDP Data. Journal of Conflict Resolution 46: Greene, William H Accounting for Excess Zeros and Sample Selection in Poisson and Negative Binomial Regression Models. Working Paper No.EC-94-10, Department of Economics, New York University. Accessible online at: Hirshleifer, Jack The Dark Side of the Force: Economic Foundations of Conflict Theory. New York: Cambridge University Press. 32

33 Hovil, Lucy and Eric Werker Portrait of a Failed Rebellion: An Account of Rational, Sub-Optimal Violence in Western Uganda. Rationality and Society 17(1): Hultman, Lisa Attacks on Civilians in Civil War. International Interactions 38(2): Battle Losses and Rebel Violence: Raising the Costs for Fighting. Terrorism and Political Violence 19(2): Kalyvas, Stathis N The Logic of Violence in Civil War. New York: Cambridge University Press. Kalyvas, Stathis N., and Laia Balcells International System and Technologies of Rebellion: How the End of the Cold War Shaped Internal Conflict. American Political Science Review 104(3): Kydd, Andrew H., and Barbara F Walter The Strategies of Terrorism. International Security 31(1): Lafree, Gary, and Laura Dugan Introducing the Global Terrorism Database. Terrorism and Political Violence 19(2): Li, Quan Does Democracy Promote or Reduce Transnational Terrorist Incidents? Journal of Conflict Resolution 49(2): Mampilly, Zachariah Cherian Rebel Rulers: Insurgent Governance and Civilian Life During War. Ithaca, NY: Cornell University Press. Marshall, Monty G., Keith Jaggers, and Ted Robert Gurr Polity IV Project: Political Regime Characteristics and Transitions, McCormick, Gordon The Shining Path and the Future of Peru. Santa Monica, CA: RAND Corporation. Metelits, Claire Inside Insurgency: Violence, Civilians, and Revolutionary Group Behavior. New York: New York University Press. Nemeth, Stephen The Effect of Competition on Terrorist Group Operations. Journal of Conflict Resolution 58(2): Oots, Kent Layne Organizational Perspectives on the Formation and Disintegration of Terrorist Groups. Terrorism 12(3): Piazza, James A Poverty, minority economic discrimination, and domestic terrorism. Journal of Peace Research 48(3):

34 Polo, Sara MT, and Kristian Skrede Gleditsch Twisting Arms and Sending Messages. Journal of Peace Research 53(6): Rochlin, James F Vanguard Revolutionaries in Latin America: Peru, Colombia, Mexico. Boulder, CO: Lynne Rienner Publishers. Ross, Jeffrey I Structural Causes of Oppositional Political Terrorism: Towards a Causal Model. Journal of Peace Research 30(3): Santifort-Jordan Charlinda and Todd Sandler An Empirical Study of Suicide Terrorism: A Global Analysis. Southern Economic Journal 80(4): Schmid, Alex P Terrorism and Democracy. Terrorism and Political Violence 4(4): Singer, David J., Stuart Bremer, and John Stuckey Capability Distribution, Uncertainty, and Major Power War, In Peace, War and Numbers, edited by Bruce Russett, Beverly Hills, CA: Sage. Stanton, Jessica A Terrorism in the Context of Civil War. Journal of Politics 75(4): Thomas, Jakana Rewarding Bad Behavior: How Governments Respond to Terrorism in Civil War. American Journal of Political Science 58(4): Thornton, Thomas Perry Terror as a Weapon of Political Agitation. In Internal War: Problems and Approaches, ed. Harry Eckstein. New York: Free Press of Glencoe. United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Western Hemisphere Affairs. The Threat of the Shining Path to Democracy in Peru: Hearings before the Subcommittee on Western Hemisphere Affairs of the Committee on Foreign Affairs. Washington, DC: GPO, Vickers, John Market Power and Inefficiency: A Contracts Perspective. Oxford Review of Economic Policy 12(4): Vuong, Quang H Likelihood Ratio Tests for Model Selection and Non-nested Hypotheses. Econometrica 57(2): Weinstein, Jeremy M Resources and the Information Problem in Rebel Recruitment. Journal of Conflict Resolution 49(4): Wintrobe, Ronald Extremism, Suicide Terror, and Authoritarianism. Public Choice 128(1/2):

35 Wood, Reed M Rebel Capability and Strategic Violence against Civilians. Journal of Peace Research 47(5): Opportunities to Kill or Incentives for Restraint? Rebel Capabilities, the Origins of Support, and Civilian Victimization in Civil War. Conflict Management and Peace Science 31(5): Wood, Reed M., and Jacob D. Kathman Competing for the Crown: Inter-Rebel Competition and Civilian Targeting in Civil War. Political Research Quarterly 68(1): Young, Joseph K Measuring Terrorism. Terrorism and Political Violence. Online first at: 35

36 Appendix for Weapon of the Market-Dominant: A Market Theory of Terrorism in Civil War I Constructing the Dataset For this project, we constructed a dataset that matches rebel groups in the Non-State Actor (NSA) dataset (Cunningham, Gleditsch, and Salehyan 2009; 2013) with terrorist organizations identified in the Global Terrorism Database (GTD) (LaFree and Dugan 2007). Using the NSA dataset, which expands on the Uppsala-PRIO Armed Conflict Dataset (ACD) (Melander, Pettersson, and Themner, 2016), allowed us to gather more information on rebel group characteristics such as military capabilities and organizational structure. 20 Matching NSA to GTD To build our dataset, we expanded NSA s state-rebel group dyad spells into panel data rather than using the ACD state-rebel group dyad years. We did so to avoid losing data on rebel group behavior for years during which a group was active but missing from the dataset due to its battle death numbers falling under the civil war threshold. The ACD excludes any year in which the level of conflict falls below 25 battle deaths for each state-rebel group dyad, regardless of whether the rebel organization involved in that conflict remains operational in the given year, whereas the NSA dyad spells end only if there is a period exceeding two calendar years in which the level of conflict falls below 25 battle deaths in a year (Cunningham, Gleditsch and Saleyhan 2013, 519). The ACD s restrictive inclusion criterion may introduce selection bias when modeling the relationship between rebel capabilities and use of terrorism, particularly if intermittent drops in level of violence are correlated with both variables. For ongoing armed conflicts, excluding years with low-level or no violence from analyses could mean losing information on how rebel tactics respond to exogenous shifts in conflict intensity (e.g., the government announces a ceasefire) or to sudden changes in the distribution of military capabilities among conflict parties. 20 Our approach is similar to Polo and Gleditsch s (2016) ACD2GTD dataset, which matches GTD perpetrators and incidents with rebel groups in the ACD. 36

37 We attempted to overcome these problems by matching the GTD data with NSA dyad spells, which cover intermittent periods of low-level violence as well as high-intensity conflict years. Matching Group Names Within the GTD dataset, many attacks are either unattributed to a specific group i.e., the group name variable (gname) is unknown or attributed to a group identified only by a vague descriptor (e.g., Kachin insurgents ). In a limited number of situations, where a vague group name clearly matched only one group in the conflict, we added those attacks to the group s total. In other situations, the GTD group name was not a perfect match, but clearly referred to a specific group. These situations include cases where one group has two different naming conventions in the literature or cases where one data source used the group s full name while the other used the acronym. The following chart shows which vague identifiers or slightly mismatched names in GTD (gname) were matched with groups in NSA (side b). Country GTD gname NSA side b Myanmar Kachin Insurgents Kachin Independence Army KIO Myanmar Shan State Army-North SSPP Nicaragua Contras FDN FDN/Contras Niger Air Azawak Liberation Front FLAA Rhodesia ZANU ZAPU Zimbabwe Patriotic Front ZANU-PF (only matched for the period after 1976) Russia Chechen Rebels Republic of Chechnya Rwanda Hutus Opposition alliance Somalia Islamic Courts Union (ICU) ARS/UIC Soviet Union Armenian Extremists Armenian Guerrillas Armenian Nationalist Armenian Militants Government of Armenia and ANM 37

38 South Sudan Sudan Thailand South Sudan Liberation Army (SSLA) Sudan People s Liberation Army (SPLA) Muslim Separatists Islamic Extremists SSLM/A SPLM Patani Insurgents Uganda NRM UPM/NRA Yugoslavia Kosovo Liberation Army (KLA) UCK A number of extremely vague descriptors were unable to be matched back to specific groups in NSA. We delete the following gnames from both the restricted and expanded versions: Other Unaffiliated Individual(s) Miscreants Narco-Terrorists Youths Villagers Unemployed Persons Terrorists Taxi Drivers Students Strikers Strike Enforcers Squatters Rioters Protesters Political Group Political Activists Opposition Group 38

39 Mob Individual Gunmen Armed People Anti-Government Group Anti-Government Demonstrators GTD and the Missing 1993 Data As reported in Lafree and Dugan (2007, 186), GTD is missing data from the year During the process of physically transferring PGIS the data source off which GTD was built to the University of Maryland, the authors discovered that the data for 1993 had been lost in an earlier move by the PGIS team. GTD2 attempts to re-collect this missing data, but the collection methods vary from the rest of the original data set. Because there is no way to rectify this (and because we can reasonably treat the data as missing at random), we follow the standard procedure in the terrorism literature of simply using the GTD data as-is. Handling the Weakest Groups Some rebel groups in states experiencing a civil war may be too weak to appear in our dataset, given the NSA battle death inclusion threshold. In this case, the group would have been eliminated from our dataset, even if they were recorded in GTD as having committed terrorist attacks which met our inclusion criteria. This exclusion of the smallest and weakest groups is standard in the literature on terrorism within the context of civil war (Fortna 2015, 531). We do not believe that excluding these groups would significantly change our results. II Data and Coding Procedures Independent Variable: Rebel Troop Share Data for our rebel troop share variable come from the NSA data, which provides estimates of rebel organizations armed forces. For each state-rebel group dyad year, we first identify all other rebel groups that were party to the same conflict in a given year, using the ACD conflict identifier. We then use the NSA estimates of rebel forces to calculate the proportion of troops that each rebel group controls relative to all the rebel troops active in the conflict year. 39

40 Specifically, we use the NSA rebestimate variable, which provides the best estimate of the size of rebel armed forces (Cunningham, Gleditsch, and Salehyan 2012, 4). Because we expand the NSA data from state-rebel dyad spells into panel data, we impute the troop information, which is provided at the spell level, to the corresponding panel years. Dependent Variable: Terror Attacks and Fatalities The data for our dependent variables Terror Attacks and Terror Fatalities are from the GTD, which contains global information on domestic and transnational terrorist events from 1970 to present. In order for the GTD to include an incident, it must be: (1) intentional, (2) violent, or have the threat of violence, and (3) perpetrated by a non-state actor. Additionally, an incident must satisfy two of three criteria (LaFree and Dugan 2007, 188): (1) The act must be aimed at attaining a political, economic, religious, or social goal. In terms of economic goals, the exclusive pursuit of profit does not satisfy this criterion. (2) There must be evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims. And (3) the action must be outside the context of legitimate warfare activities; that is, the act must be outside the parameters permitted by international humanitarian law (particularly the admonition against deliberately targeting civilians or noncombatants. Our sample only includes incidents that meet all three criteria in an effort to exclude as many other forms of violence as possible. The GTD allows researchers to apply additional filters, including attack and target. For our primary specifications of the dependent variable, we filter the dataset to include only the following attack types: hijacking, hostage taking (kidnapping and barricade incidents), armed assault, bombing/explosion, and facility/infrastructure attacks. This excludes three attack types: assassination, unarmed assault, and unknown, following Fortna (2017, 12). In particular, assassinations do not meet our criteria for deliberately indiscriminate attacks, given that they are the targeted killing of a single politically-relevant individual. We likewise filter targets to include only the following target types: airports and aircraft, business, educational institution, food or water supply, private citizens and property, religious figures/institutions, telecommunication, tourists, transportation, utilities, and unknown. We exclude target types that are unlikely to be truly indiscriminate, such as journalists and NGOs. Although these groups are often reprehensibly targeted for violence in conflict zones, we argue 40

41 that these attacks tend to be selective and thus not terrorism as defined here. We also exclude governmental and military targets. Rebel groups almost always are weaker than the government, which means that by default they use asymmetric means. To mitigate this potential bias, which would over-represent the use of terrorism, we only count attacks if they are directed against civilian targets. III Descriptive Statistics Table 4. Summary Statistics 41

42 Figure 3. Distribution of Single and Multi-Party Conflict Years Figure 4. Distribution of Rebel Group Troop Share 42

43 Figure 5. Distribution of Rebel Group Market Share Table 5. Control Variables Variable Operationalization Sources Rebel-togovernment Troop Ratio Ratio of rebel to government troops NSA dataset and the Correlates of War National Material Capabilities (NMC) dataset (Singer et al. 1972) Democracy Logged GDP per capita Conflict Intensity Foreign Support Polity2 variable, which ranges from -10 to 10 Logarithmized Gross Domestic Product per capita in constant 2005 US$ Binary indicator that takes a value of 2 in major conflict years (> battle deaths) and 1 in minor conflict years (25-99 battle deaths) Dummy variable that takes a value of 1 if a group receives Polity IV dataset (Marshall, Jaggers, and Gurr 2013) Gleditsch (2002) and the Penn World Tables (Feenstra, Inklaar, and Timmer, 2015) Uppsala-PRIO Armed Conflict Dataset (ACD) (Melander, Pettersson, and Themner, 2016) NSA dataset 43

44 Nationalist- Separatist Post Cold War Number of Competitors financial or military assistance from foreign states Dummy variable that takes a value of 1 if a rebel group has a nationalist-separatist agenda Dummy variable that takes a value of 1 for years > 1989 Count of the number of other rebel groups active within the same conflict-year (used in multi-party models) Polo and Gleditsch (2016) IV Robustness Checks We run additional statistical analyses to demonstrate that our findings are robust to different operationalizations of the dependent variable and alternative model specifications. Models 5 through 15 present the results from the robustness checks. First, to ensure that our results do not rely on the particular coding of terrorism, we re-estimate the models employing different operationalizations of terrorist activity. The first one is an alternative count variable for terror attacks, which is coded using a more restrictive definition of terrorism. Our restricted count limits attack types to the two most frequent modes of attack: armed assault and bombing/explosion. We keep the target types, but exclude any unknown targets from this coding. The other variable, employed in Model 6, is the restrictive attack count from Polo and Gleditsch (2016). 21 The results, presented in Table 6 and displayed in Figure 6, are largely consistent with 21 Polo and Gleditsch (2016, 821): Since definitions of terrorism are disputed, we use two operationalizations with different event inclusion criteria. The most inclusive is the GTD definition covering all events that satisfy at least two of the criteria in the GTD codebook. A more restrictive version requires that events satisfy all three criteria, and excludes all attacks against military targets, even if classified by the GTD as falling outside guerrilla warfare. 44

45 the original findings and support our rebel market share hypothesis. Next, we examine whether our findings hold with alternative model specifications. First, we estimate negative binomial regression models, using both the extensive and restrictive measures of terror attacks and fatalities. Next, we specify fixed-effect negative binomial (FENB) models, which account for the time-invariant, unobserved group-specific effects. We estimate these using rebel group dummies (i.e., unconditional FENB) instead of the conditional FENB method proposed by Hausman et al. (1984), which has been shown to fall short of removing individual fixed effects in count panel data (see Allison and Waterman 2002, Greene 2005; Guimarães 2008). The results from negative binomial (Models 7-10) and unconditional FENB models (Models 11-14) mirror our original findings; in all models, the coefficients for rebel troop share are statistically significant. One notable difference from original findings is that, in some of the models where the DV is terror attacks, the rebel-to-government troop ratio variable has a negative and statistically significant effect on rebel group terrorism. This suggests some evidence in favor of the traditional weapon of the weak hypothesis, although the finding is not too robust and the market share variable still appears as the stronger predictor of terrorist attacks. Finally, in Model 15, we include a quadratic term in the ZINB model of terror attacks to check whether is a non-linear, U-shaped relationship between rebel market share and terrorism. The results, displayed in Figure 7, do not indicate the presence of a curvilinear effect. 45

46 Table 6. Re-estimating ZINB Models with Alternative Measures of Rebel Group Terrorism 46

47 Figure 6: Predicted Number of Attacks and Fatalities by Rebel Market Share (Using Alternative Measures of Terrorist Activity by Rebel Group) 47

48 Table 7. Negative Binomial Regressions of the Effect of Rebel Market Share on Terrorist Activity 48

49 Table 8. Unconditional Fixed-Effects Negative Binomial Regression of the Effect of Rebel Market Share on Terrorist Activity 49

50 Table 9. ZINB Model Examining the Presence of a Non-monotonic Relationship Between Rebel Market Share and Terrorism 50

51 Figure 7: Predicted Number of Attacks by Rebel Market Share (ZINB Model with Quadratic Term) Appendix References Allison, Paul D and Richard P. Waterman Fixed-Effects Negative Binomial Regression Models. Sociological Methodology 32: Cunningham, David E., Kristian Skrede Gleditsch, and Idean Salehyan It Takes Two: A Dyadic Analysis of Civil War Duration and Outcome. Journal of Conflict Resolution 53(4): Codebook for the Non-State Actor Data. Accessible online at: Non-State Actors in Civil Wars: A New Dataset. Accessible online at: Feenstra, Robert C., Robert Inklaar, and Marcel P. Timmer The Next Generation of the Penn World Table. American Economic Review 105 (10): Fortna, Page Is Terrorism Really a Weapon of the Weak? Testing the Conventional Wisdom Columbia University. Paper Presented at ISA Accessible online at: pdf 51

Twisting Arms and Sending Messages: Terrorist Tactics in Civil War

Twisting Arms and Sending Messages: Terrorist Tactics in Civil War Twisting Arms and Sending Messages: Terrorist Tactics in Civil War Sara Polo Rice University sara.polo@rice.edu Kristian Skrede Gleditsch University of Essex & Peace Research Institute Oslo ksg@essex.ac.uk

More information

WEB APPENDIX. to accompany. Veto Players and Terror. Journal of Peace Research 47(1): Joseph K. Young 1. Southern Illinois University.

WEB APPENDIX. to accompany. Veto Players and Terror. Journal of Peace Research 47(1): Joseph K. Young 1. Southern Illinois University. WEB APPENDIX to accompany Veto Players and Terror Journal of Peace Research 47(1): 1-13 Joseph K. Young 1 Departments of Political Science and Criminology/Criminal Justice Southern Illinois University

More information

Chapter 8: The Use of Force

Chapter 8: The Use of Force Chapter 8: The Use of Force MULTIPLE CHOICE 1. According to the author, the phrase, war is the continuation of policy by other means, implies that war a. must have purpose c. is not much different from

More information

Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset.

Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset. Supplementary Material for Preventing Civil War: How the potential for international intervention can deter conflict onset. World Politics, vol. 68, no. 2, April 2016.* David E. Cunningham University of

More information

BOOK SUMMARY. Rivalry and Revenge. The Politics of Violence during Civil War. Laia Balcells Duke University

BOOK SUMMARY. Rivalry and Revenge. The Politics of Violence during Civil War. Laia Balcells Duke University BOOK SUMMARY Rivalry and Revenge. The Politics of Violence during Civil War Laia Balcells Duke University Introduction What explains violence against civilians in civil wars? Why do armed groups use violence

More information

Winning with the bomb. Kyle Beardsley and Victor Asal

Winning with the bomb. Kyle Beardsley and Victor Asal Winning with the bomb Kyle Beardsley and Victor Asal Introduction Authors argue that states can improve their allotment of a good or convince an opponent to back down and have shorter crises if their opponents

More information

Terror From Within: The Political Determinants of Domestic Terrorism 1

Terror From Within: The Political Determinants of Domestic Terrorism 1 Terror From Within: The Political Determinants of Domestic Terrorism 1 Sara Polo 2 Department of Government University of Essex March 14, 2012 (Draft, please do not circulate) Abstract How do domestic

More information

The Effect of Sexual Violence on Negotiated Outcomes in Civil Conflict: Online Appendix

The Effect of Sexual Violence on Negotiated Outcomes in Civil Conflict: Online Appendix The Effect of Sexual Violence on Negotiated Outcomes in Civil Conflict: Online Appendix Summary statistics The following table presents information about the variables used in Table 1 of the manuscript.

More information

Regime Types and Terrorism Revisited: The Institutional Determinants of Terrorism

Regime Types and Terrorism Revisited: The Institutional Determinants of Terrorism Regime Types and Terrorism Revisited: The Institutional Determinants of Terrorism Richard K. Morgan * Postdoctoral Research Fellow Varieties of Democracy Institute University of Gothenburg Michael A. Rubin

More information

SHOULD THE UNITED STATES WORRY ABOUT LARGE, FAST-GROWING ECONOMIES?

SHOULD THE UNITED STATES WORRY ABOUT LARGE, FAST-GROWING ECONOMIES? Chapter Six SHOULD THE UNITED STATES WORRY ABOUT LARGE, FAST-GROWING ECONOMIES? This report represents an initial investigation into the relationship between economic growth and military expenditures for

More information

Terrorism, Democracy, and Credible Commitments 1

Terrorism, Democracy, and Credible Commitments 1 International Studies Quarterly (2011) 55, 357 378 Terrorism, Democracy, and Credible Commitments 1 Michael G. Findley Brigham Young University and Joseph K. Young American University What explains the

More information

Foreign Sanctuary and Rebel Violence: The Effects of International Borders on Rebel. Treatment of Civilians. Robert P. Allred

Foreign Sanctuary and Rebel Violence: The Effects of International Borders on Rebel. Treatment of Civilians. Robert P. Allred Foreign Sanctuary and Rebel Violence: The Effects of International Borders on Rebel Treatment of Civilians by Robert P. Allred Department of Political Science Duke University Date: Approved: Kyle Beardsley,

More information

Regime Type and Terrorism Revisited:

Regime Type and Terrorism Revisited: Regime Type and Terrorism Revisited: The Institutional Determinants of Terrorism Supplementary Materials Richard K. Morgan and Michael A. Rubin November 6, 2018 A Appendix: Quantitative Data and Robustness

More information

Conclusion. This study brings out that the term insurgency is not amenable to an easy generalization.

Conclusion. This study brings out that the term insurgency is not amenable to an easy generalization. 203 Conclusion This study brings out that the term insurgency is not amenable to an easy generalization. Its causes, ultimate goals, strategies, tactics and achievements all add new dimensions to the term.

More information

Civil War and Political Violence. Paul Staniland University of Chicago

Civil War and Political Violence. Paul Staniland University of Chicago Civil War and Political Violence Paul Staniland University of Chicago paul@uchicago.edu Chicago School on Politics and Violence Distinctive approach to studying the state, violence, and social control

More information

Contiguous States, Stable Borders and the Peace between Democracies

Contiguous States, Stable Borders and the Peace between Democracies Contiguous States, Stable Borders and the Peace between Democracies Douglas M. Gibler June 2013 Abstract Park and Colaresi argue that they could not replicate the results of my 2007 ISQ article, Bordering

More information

Partial Peace. Rebel Groups Inside and Outside of Civil War Settlements. Abstract

Partial Peace. Rebel Groups Inside and Outside of Civil War Settlements. Abstract Partial Peace Rebel Groups Inside and Outside of Civil War Settlements Abstract Previous research proposes that for peace to become durable it is essential to include all rebel groups in any settlement

More information

The Principle of Convergence in Wartime Negotiations. Branislav L. Slantchev Department of Political Science University of California, San Diego

The Principle of Convergence in Wartime Negotiations. Branislav L. Slantchev Department of Political Science University of California, San Diego The Principle of Convergence in Wartime Negotiations Branislav L. Slantchev Department of Political Science University of California, San Diego March 25, 2003 1 War s very objective is victory not prolonged

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH Research Report General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH Please think about the environment and do not print this research report

More information

Appendix: Regime Type, Coalition Size, and Victory

Appendix: Regime Type, Coalition Size, and Victory Appendix: Regime Type, Coalition Size, and Victory Benjamin A. T. Graham Erik Gartzke Christopher J. Fariss Contents 10 Introduction to the Appendix 2 10.1 Testing Hypotheses 1-3 with Logged Partners....................

More information

THE IMPACT OF EXTERNAL SUPPORT ON INTRASTATE CONFLICT

THE IMPACT OF EXTERNAL SUPPORT ON INTRASTATE CONFLICT Parente, Impact of External Support on Intrastate Conflict THE IMPACT OF EXTERNAL SUPPORT ON INTRASTATE CONFLICT Adam Parente Abstract Supporting participants in intrastate conflict often appears as a

More information

Reconciling With. The Taliban? Ashley J. Tellis

Reconciling With. The Taliban? Ashley J. Tellis Reconciling With The Taliban? Toward an Alternative Grand Strategy in Afghanistan Ashley J. Tellis Synopsis The stalemate in coalition military operations in Afghanistan has provoked a concerted search

More information

1975 TO A Thesis. submitted to the Faculty of the. Graduate School of Arts and Sciences. of Georgetown University

1975 TO A Thesis. submitted to the Faculty of the. Graduate School of Arts and Sciences. of Georgetown University THE EFFECTS OF STRUCTURAL POLICIES ON TERRORIST INCIDENTS IN DEMOCRACIES, 1975 TO 1995 A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial

More information

The conditional impact of military intervention on internal armed conflict outcomes

The conditional impact of military intervention on internal armed conflict outcomes Article The conditional impact of military intervention on internal armed conflict outcomes Conflict Management and Peace Science 1 20 Ó The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalspermissions.nav

More information

Following the Leader: The Impact of Presidential Campaign Visits on Legislative Support for the President's Policy Preferences

Following the Leader: The Impact of Presidential Campaign Visits on Legislative Support for the President's Policy Preferences University of Colorado, Boulder CU Scholar Undergraduate Honors Theses Honors Program Spring 2011 Following the Leader: The Impact of Presidential Campaign Visits on Legislative Support for the President's

More information

Mixed Motives? Explaining the Decision to Integrate Militaries at Civil War's End

Mixed Motives? Explaining the Decision to Integrate Militaries at Civil War's End Political Science Faculty Publications Political Science 4-2014 Mixed Motives? Explaining the Decision to Integrate Militaries at Civil War's End Caroline A. Hartzell Gettysburg College Follow this and

More information

Findings in recent literature make the occurrence

Findings in recent literature make the occurrence Rewarding Bad Behavior: How Governments Respond to Terrorism in Civil War Jakana Thomas Michigan State University Although violent organizations often use terrorism as a means to achieve political aims,

More information

The Importance of Territory: Probing the Nature and Effectiveness of Terrorism

The Importance of Territory: Probing the Nature and Effectiveness of Terrorism The Importance of Territory: Probing the Nature and Effectiveness of Terrorism Luis de la Calle, Juan March Institute Frank Foley, Centro de Estudios Constitucionales y Políticos (CEPC) Ignacio Sánchez-Cuenca,

More information

Nipping Them in the Bud: The Onset of Mediation in Low-Intensity Civil Conflicts 1

Nipping Them in the Bud: The Onset of Mediation in Low-Intensity Civil Conflicts 1 Nipping Them in the Bud: The Onset of Mediation in Low-Intensity Civil Conflicts 1 J. Michael Greig Associate Professor Department of Political Science University of North Texas P.O. Box 305340 Denton,

More information

the notion that poverty causes terrorism. Certainly, economic theory suggests that it would be

the notion that poverty causes terrorism. Certainly, economic theory suggests that it would be he Nonlinear Relationship Between errorism and Poverty Byline: Poverty and errorism Walter Enders and Gary A. Hoover 1 he fact that most terrorist attacks are staged in low income countries seems to support

More information

Rethinking Civil War Onset and Escalation

Rethinking Civil War Onset and Escalation January 16, 2018 Abstract Why do some civil conflicts simmer at low-intensity, while others escalate to war? This paper challenges traditional approaches to the start of intrastate conflict by arguing

More information

Durable state rivals: Hezbollah and Lebanon

Durable state rivals: Hezbollah and Lebanon Georgia State University ScholarWorks @ Georgia State University Political Science Theses Department of Political Science 8-11-2015 Durable state rivals: Hezbollah and Lebanon Hend Charif Follow this and

More information

All s Well That Ends Well: A Reply to Oneal, Barbieri & Peters*

All s Well That Ends Well: A Reply to Oneal, Barbieri & Peters* 2003 Journal of Peace Research, vol. 40, no. 6, 2003, pp. 727 732 Sage Publications (London, Thousand Oaks, CA and New Delhi) www.sagepublications.com [0022-3433(200311)40:6; 727 732; 038292] All s Well

More information

Tyrants and Terrorism: Why some Autocrats are Terrorized while Others are Not

Tyrants and Terrorism: Why some Autocrats are Terrorized while Others are Not Tyrants and Terrorism: Why some Autocrats are Terrorized while Others are Not Courtenay R. Conrad University of North Carolina at Charlotte Justin Conrad University of North Carolina at Charlotte Joseph

More information

Promise and Pitfalls of Terrorism Research

Promise and Pitfalls of Terrorism Research International Studies Review (2011) 13, 1 21 Promise and Pitfalls of Terrorism Research Joseph K. Young American University Michael G. Findley Brigham Young University Using a database of recent articles

More information

Coups and Democracy. Marinov and Goemans in BJPolS Online Appendix. June 7, 2013

Coups and Democracy. Marinov and Goemans in BJPolS Online Appendix. June 7, 2013 Coups and Democracy Marinov and Goemans in BJPolS Online Appendix June 7, 2013 1 1 Coup Occurrence Our argument posits some relationships between the coup and post-coup stages. It would be instructive

More information

the two explanatory forces of interests and ideas. All of the readings draw at least in part on ideas as

the two explanatory forces of interests and ideas. All of the readings draw at least in part on ideas as MIT Student Politics & IR of Middle East Feb. 28th One of the major themes running through this week's readings on authoritarianism is the battle between the two explanatory forces of interests and ideas.

More information

OUTSOURCING COUNTER-INSURGENCY: STATE INVESTMENT IN PRO-GOVERNMENT MILITIAS AS A RESPONSE TO REBEL STRENGTH. Bailee Donahue.

OUTSOURCING COUNTER-INSURGENCY: STATE INVESTMENT IN PRO-GOVERNMENT MILITIAS AS A RESPONSE TO REBEL STRENGTH. Bailee Donahue. OUTSOURCING COUNTER-INSURGENCY: STATE INVESTMENT IN PRO-GOVERNMENT MILITIAS AS A RESPONSE TO REBEL STRENGTH Bailee Donahue A thesis submitted to the faculty of the University of North Carolina at Chapel

More information

Global Conflict & Terrorism Trends. National Press Club

Global Conflict & Terrorism Trends. National Press Club Global Conflict & Terrorism Trends National Press Club Monday, September 14, 2009 Peace and Conflict Ledger and Conflict Trends Joseph Hewitt CIDCM University of Maryland Over the past two years, the risks

More information

Is Mediation an Effective Method of Reducing Spoiler Terror in Civil War?

Is Mediation an Effective Method of Reducing Spoiler Terror in Civil War? 1 Is Mediation an Effective Method of Reducing Spoiler Terror in Civil War? Ishita Chowdhury Abstract Previous civil war literature has proposed that spoiler groups are goal driven and therefore certain

More information

THE HOMEGROWN THREAT State Strength, Grievance and Domestic Terrorism

THE HOMEGROWN THREAT State Strength, Grievance and Domestic Terrorism 1 THE HOMEGROWN THREAT State Strength, Grievance and Domestic Terrorism by SambuddhaGhatak University of Tennessee & Brandon C. Prins University of Tennessee Similar to insurgency, scholars maintain that

More information

Militarization of Cities: The Urban Dimension of Contemporary Security.

Militarization of Cities: The Urban Dimension of Contemporary Security. Análisis GESI, 10/2013 Militarization of Cities: The Urban Dimension of Contemporary Security. Katarína Svitková 3 de noviembre de 2013 In addition to new dimensions and new referent objects in the field

More information

POL 135 International Politics of the Middle East Session #7: War and Peace in the Middle East

POL 135 International Politics of the Middle East Session #7: War and Peace in the Middle East POL 135 International Politics of the Middle East Session #7: War and Peace in the Middle East What is a War? Sustained combat between/among military contingents involving substantial casualties (with

More information

When Insurgents Go Terrorist: The Role of Foreign Support in the Adoption of Terrorism

When Insurgents Go Terrorist: The Role of Foreign Support in the Adoption of Terrorism Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2014 When Insurgents Go Terrorist: The Role of Foreign Support in the Adoption of Terrorism Jeffrey F.

More information

1. The Relationship Between Party Control, Latino CVAP and the Passage of Bills Benefitting Immigrants

1. The Relationship Between Party Control, Latino CVAP and the Passage of Bills Benefitting Immigrants The Ideological and Electoral Determinants of Laws Targeting Undocumented Migrants in the U.S. States Online Appendix In this additional methodological appendix I present some alternative model specifications

More information

The System Made Me Stop Doing It. The Indirect Origins of Commercial Peace

The System Made Me Stop Doing It. The Indirect Origins of Commercial Peace Erik Gartzke UCSD egartzke@ucsd.edu The System Made Me Stop Doing It The Indire The System Made Me Stop Doing It The Indirect Origins of Commercial Peace Erik Gartzke UCSD egartzke@ucsd.edu May 7, 2016

More information

In the second half of the century most of the killing took place in the developing world, especially in Asia.

In the second half of the century most of the killing took place in the developing world, especially in Asia. Warfare becomes less deadly The 2 th century saw dramatic changes in the number of people killed on the world s battlefields. The two world wars accounted for a large majority of all battle-deaths in this

More information

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 1/13/2009 Terrorism 2 Unfortunately, the term terrorism is one that has become a part of our everyday vocabulary

More information

Citizen Fears of Terrorism in the Americas 1

Citizen Fears of Terrorism in the Americas 1 AmericasBarometer Insights: 2010 (No. 46)* Citizen Fears of Terrorism in the Americas 1 Elizabeth J. Zechmeister, Vanderbilt University Daniel Montalvo, Vanderbilt University Jennifer L. Merolla, Claremont

More information

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 What is Terrorism? 10/15/2013 Terrorism 2 What is Terrorism? Unfortunately, the term terrorism is one that has become a part of our

More information

Logic Models in Support of Homeland Security Strategy Development. Journal of Homeland Security and Emergency Management

Logic Models in Support of Homeland Security Strategy Development. Journal of Homeland Security and Emergency Management Logic Models in Support of Homeland Security Strategy Development Author #1 An Article Submitted to Journal of Homeland Security and Emergency Management Manuscript 1126 Copyright c 2005 by the author.

More information

Civilianizing Civil Conflict: Civilian Defense Militias and the Logic of Violence in Intra-State Conflict

Civilianizing Civil Conflict: Civilian Defense Militias and the Logic of Violence in Intra-State Conflict Civilianizing Civil Conflict: Civilian Defense Militias and the Logic of Violence in Intra-State Conflict Clayton, G., & Thomson, A. (2016). Civilianizing Civil Conflict: Civilian Defense Militias and

More information

The interaction between democracy and terrorism

The interaction between democracy and terrorism The interaction between democracy and terrorism Marianne Oenema Abstract There is a great deal of research about terrorism and policy changes, but the broader political dimension has thus far received

More information

Chapter 6 Online Appendix. general these issues do not cause significant problems for our analysis in this chapter. One

Chapter 6 Online Appendix. general these issues do not cause significant problems for our analysis in this chapter. One Chapter 6 Online Appendix Potential shortcomings of SF-ratio analysis Using SF-ratios to understand strategic behavior is not without potential problems, but in general these issues do not cause significant

More information

Research Statement. Michael A. Rubin michaelarubin.com October 25, 2017

Research Statement. Michael A. Rubin michaelarubin.com October 25, 2017 Research Statement Michael A. Rubin michaelarubin.com mar2252@columbia.edu October 25, 2017 My research investigates the causes and consequences of inter- and intra-state armed conflict. The dissertation

More information

Does government decentralization reduce domestic terror? An empirical test

Does government decentralization reduce domestic terror? An empirical test Does government decentralization reduce domestic terror? An empirical test Axel Dreher a Justina A. V. Fischer b November 2010 Economics Letters, forthcoming Abstract Using a country panel of domestic

More information

Armed intervention and civilian victimization in intrastate conflicts

Armed intervention and civilian victimization in intrastate conflicts Armed intervention and civilian victimization in intrastate conflicts Reed M. Wood School of Politics and Global Studies Arizona State University Jacob D. Kathman Department of Political Science University

More information

Just War or Just Politics? The Determinants of Foreign Military Intervention

Just War or Just Politics? The Determinants of Foreign Military Intervention Just War or Just Politics? The Determinants of Foreign Military Intervention Averyroughdraft.Thankyouforyourcomments. Shannon Carcelli UC San Diego scarcell@ucsd.edu January 22, 2014 1 Introduction Under

More information

STRUCTURE APPENDIX D APPENDIX D

STRUCTURE APPENDIX D APPENDIX D APPENDIX D This appendix describes the mass-oriented insurgency, the most sophisticated insurgency in terms of organization and methods of operation. It is difficult to organize, but once under way, it

More information

Nuclear Proliferation, Inspections, and Ambiguity

Nuclear Proliferation, Inspections, and Ambiguity Nuclear Proliferation, Inspections, and Ambiguity Brett V. Benson Vanderbilt University Quan Wen Vanderbilt University May 2012 Abstract This paper studies nuclear armament and disarmament strategies with

More information

How to Intervene in Civil Wars: Strategic Interests, Humanitarianism, and Third-Party Intervention. Sang Ki Kim University of Iowa

How to Intervene in Civil Wars: Strategic Interests, Humanitarianism, and Third-Party Intervention. Sang Ki Kim University of Iowa How to Intervene in Civil Wars: Strategic Interests, Humanitarianism, and Third-Party Intervention Sang Ki Kim University of Iowa Abstract This paper examines how major powers intervene in civil wars in

More information

The Origin of Terror: Affluence, Political Freedom, and Ideology

The Origin of Terror: Affluence, Political Freedom, and Ideology The Origin of Terror: Affluence, Political Freedom, and Ideology An Empirical Study of the Risk Factors of International Terrorism Caitlin Street Economics Honors Thesis College of the Holy Cross Advisor:

More information

CAN FAIR VOTING SYSTEMS REALLY MAKE A DIFFERENCE?

CAN FAIR VOTING SYSTEMS REALLY MAKE A DIFFERENCE? CAN FAIR VOTING SYSTEMS REALLY MAKE A DIFFERENCE? Facts and figures from Arend Lijphart s landmark study: Patterns of Democracy: Government Forms and Performance in Thirty-Six Countries Prepared by: Fair

More information

Retrospective Voting

Retrospective Voting Retrospective Voting Who Are Retrospective Voters and Does it Matter if the Incumbent President is Running Kaitlin Franks Senior Thesis In Economics Adviser: Richard Ball 4/30/2009 Abstract Prior literature

More information

Fallujah and its Aftermath

Fallujah and its Aftermath OXFORD RESEARCH GROUP International Security Monthly Briefing - November 2004 Fallujah and its Aftermath Professor Paul Rogers Towards the end of October there were numerous reports of a substantial build-up

More information

FIGHTING FOR FRAMES OR PROSPECTS FOR PEACE? BUILDING A PROSPECT THEORY MODEL OF ETHNIC CIVIL WAR TERMINATION. Robert Davis Butts

FIGHTING FOR FRAMES OR PROSPECTS FOR PEACE? BUILDING A PROSPECT THEORY MODEL OF ETHNIC CIVIL WAR TERMINATION. Robert Davis Butts FIGHTING FOR FRAMES OR PROSPECTS FOR PEACE? BUILDING A PROSPECT THEORY MODEL OF ETHNIC CIVIL WAR TERMINATION by Robert Davis Butts A.B., Government (2006) Dartmouth College Submitted to the Department

More information

Kent Academic Repository

Kent Academic Repository Kent Academic Repository Full text document (pdf) Citation for published version Clayton, Govinda and Thomson, Andrew (2016) Civilianizing Civil Conflict: Civilian Defense Militias and the Logic of Violence

More information

Allying to Win. Regime Type, Alliance Size, and Victory

Allying to Win. Regime Type, Alliance Size, and Victory Allying to Win Regime Type, Alliance Size, and Victory Christopher J. Fariss Erik Gartzke Benjamin A. T. Graham Abstract Studies of regime type and war reveal that democracies tend to win the wars they

More information

Weapon of Choice. Axel Dreher 1 and Merle Kreibaum 2 Paper presented at the 2015 CSAE Conference in Oxford

Weapon of Choice. Axel Dreher 1 and Merle Kreibaum 2 Paper presented at the 2015 CSAE Conference in Oxford Weapon of Choice Axel Dreher 1 and Merle Kreibaum 2 Paper presented at the 2015 CSAE Conference in Oxford Abstract We investigate the effect of natural resources on whether ethno-political groups choose

More information

A COMPARISON BETWEEN TWO DATASETS

A COMPARISON BETWEEN TWO DATASETS A COMPARISON BETWEEN TWO DATASETS Bachelor Thesis by S.F. Simmelink s1143611 sophiesimmelink@live.nl Internationale Betrekkingen en Organisaties Universiteit Leiden 9 June 2016 Prof. dr. G.A. Irwin Word

More information

Recruiting Your Way to Victory: Varying Strategies in Insurgent/Counterinsurgent Warfare

Recruiting Your Way to Victory: Varying Strategies in Insurgent/Counterinsurgent Warfare Recruiting Your Way to Victory: Varying Strategies in Insurgent/Counterinsurgent Warfare D. Scott Bennett Department of Political Science The Pennsylvania State University 318 Pond Lab University Park,

More information

Drug trafficking and the case study in narco-terrorism. "If you quit drugs, you join the fight against terrorism." President George W.

Drug trafficking and the case study in narco-terrorism. If you quit drugs, you join the fight against terrorism. President George W. 1 Drug trafficking and the case study in narco-terrorism "If you quit drugs, you join the fight against terrorism." President George W.Bush, 2001 Introduction Drug trafficking has a long history as a world-wide

More information

!!!!!!!!! The Nuclear Balance and International Conflict

!!!!!!!!! The Nuclear Balance and International Conflict !!!!!!!!!! The Nuclear Balance and International Conflict Matthew Kroenig Georgetown University Research Affiliate Project on Managing the Atom Harvard University Michael Weintraub Georgetown University!

More information

Select Publically Available Conflict and Violence Datasets- Regional Typology Overview (October, 2015)

Select Publically Available Conflict and Violence Datasets- Regional Typology Overview (October, 2015) Dataset ACLED GTD Igarapé INSCR/CSP -MEPV INSCR/CSP- HCTB RDWTI UCDP- GED Title and Igarapé Institute Institution Homicide Monitor Website Armed Conflict Location Event Dataset Project (ACLED) www.acleddata.

More information

Tyrants and Terrorism: Why Some Autocrats are Terrorized While Others are Not 1

Tyrants and Terrorism: Why Some Autocrats are Terrorized While Others are Not 1 International Studies Quarterly (2014) 1 11 Tyrants and Terrorism: Why Some Autocrats are Terrorized While Others are Not 1 Courtenay R. Conrad University of California, Merced Justin Conrad University

More information

Written Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016

Written Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016 Written Testimony Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016 Chairman, honorable members, is a world leader in International

More information

Cultures of Violence and Acts of Terror: Applying a Legitimation Habituation Model to Terrorism

Cultures of Violence and Acts of Terror: Applying a Legitimation Habituation Model to Terrorism Crime Delinquency OnlineFirst, published on May 14, 2010 as doi:10.1177/0011128710364807 Article Cultures of Violence and Acts of Terror: Applying a Legitimation Habituation Model to Terrorism Crime &

More information

2014 GLOBAL TERRORISM INDEX

2014 GLOBAL TERRORISM INDEX 2014 GLOBAL TERRORISM INDEX Institute for Economics and Peace Wednesday, 26 th November 2014 #TerrorismIndex INSTITUTE FOR ECONOMICS AND PEACE The Institute for Economics and Peace is an independent, not-for-profit,

More information

AMERICAN MILITARY READINESS MUST INCLUDE STATE-BUILDING by Roger B. Myerson and J. Kael Weston November 2016

AMERICAN MILITARY READINESS MUST INCLUDE STATE-BUILDING by Roger B. Myerson and J. Kael Weston November 2016 AMERICAN MILITARY READINESS MUST INCLUDE STATE-BUILDING by Roger B. Myerson and J. Kael Weston November 2016 In recent decades, America's armed forces have proven their ability to prevail in virtually

More information

Rebel Finance and Sexual Violence

Rebel Finance and Sexual Violence Rebel Finance and Sexual Violence Justin Conrad, James Igoe Walsh & Beth Elise Whitaker University of North Carolina at Charlotte November 14, 2015 (UNC Charlotte) PSSA 2015 1 / 12 Sexual Violence in Wartime

More information

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction ECONOMIC APPROACHES TO TERRORISM: AN OVERVIEW Terrorism would appear to be a subject for military experts and political scientists,

More information

Making and Unmaking Nations

Making and Unmaking Nations 35 Making and Unmaking Nations A Conversation with Scott Straus FLETCHER FORUM: What is the logic of genocide, as defined by your recent book Making and Unmaking Nations, and what can we learn from it?

More information

The Past is Ever-Present: Civil War as a Dynamic Process 1. Benjamin T. Jones

The Past is Ever-Present: Civil War as a Dynamic Process 1. Benjamin T. Jones The Past is Ever-Present: Civil War as a Dynamic Process 1 Benjamin T. Jones jones.2781@osu.edu Abstract The literature on civil wars is extensive and growing. Past studies have focused on a series of

More information

Research Note: Toward an Integrated Model of Concept Formation

Research Note: Toward an Integrated Model of Concept Formation Kristen A. Harkness Princeton University February 2, 2011 Research Note: Toward an Integrated Model of Concept Formation The process of thinking inevitably begins with a qualitative (natural) language,

More information

ETHNIC GROUPS, POLITICAL EXCLUSION AND DOMESTIC TERRORISM

ETHNIC GROUPS, POLITICAL EXCLUSION AND DOMESTIC TERRORISM Defence and Peace Economics, 2016 Vol. 27, No. 1, 37 63, http://dx.doi.org/10.1080/10242694.2014.987579 ETHNIC GROUPS, POLITICAL EXCLUSION AND DOMESTIC TERRORISM SEUNG-WHAN CHOI a * AND JAMES A. PIAZZA

More information

Course: Government Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring 2007

Course: Government Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring 2007 Document Title: Styles of W riting and the Afghanistan Model A uthor: Andrew Yeo Course: Government 100.03 Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring

More information

Definitions, sources and methods for Uppsala Conflict Data Program Battle-Death estimates

Definitions, sources and methods for Uppsala Conflict Data Program Battle-Death estimates Definitions, sources and methods for Uppsala Conflict Data Program Battle-Death estimates Uppsala Conflict Data Program (UCDP) Department of Peace and Conflict Research, Uppsala University This document

More information

Topic 1 Causes, Practices and Effects of War in the Twentieth Century (Compiled from 10 Topic and 6 Topic Format)

Topic 1 Causes, Practices and Effects of War in the Twentieth Century (Compiled from 10 Topic and 6 Topic Format) IB HL History Topic 1 Causes, Practices and Effects of War in the Twentieth Century 1985-2014 (Compiled from 10 Topic and 6 Topic Format) [Since 1998, the pattern is: two subject specific questions, two

More information

democratic or capitalist peace, and other topics are fragile, that the conclusions of

democratic or capitalist peace, and other topics are fragile, that the conclusions of New Explorations into International Relations: Democracy, Foreign Investment, Terrorism, and Conflict. By Seung-Whan Choi. Athens, Ga.: University of Georgia Press, 2016. xxxiii +301pp. $84.95 cloth, $32.95

More information

Lecture 19 Civil Wars

Lecture 19 Civil Wars Lecture 19 Civil Wars Introduction Much of the literature of civil war lies outside economics measurement difficulties importance of non economic factors such as personalities & leadership civil wars are

More information

Human Rights Violations and Competitive Elections in Dictatorships

Human Rights Violations and Competitive Elections in Dictatorships Human Rights Violations and Competitive Elections in Dictatorships Jessica Maves The Pennsylvania State University Department of Political Science jessica.maves@psu.edu Seiki Tanaka Syracuse University

More information

Territorial Control, Governance, and Civilian Agency in Rebellion

Territorial Control, Governance, and Civilian Agency in Rebellion Michael A. Rubin michaelarubin.com mar2252@columbia.edu August 9, 2018 Research Statement My research investigates the causes, conduct, and consequences of inter- and intra-state conflict. I am currently

More information

Please do not cite or distribute. Dealing with Corruption in a Democracy - Phyllis Dininio

Please do not cite or distribute. Dealing with Corruption in a Democracy - Phyllis Dininio Paper prepared for the conference, Democratic Deficits: Addressing the Challenges to Sustainability and Consolidation Around the World Sponsored by RTI International and the Latin American Program of the

More information

Conflating Terrorism and Insurgency

Conflating Terrorism and Insurgency Page 1 of 6 MENU FOREIGN POLICY ESSAY Conflating Terrorism and Insurgency By John Mueller, Mark Stewart Sunday, February 28, 2016, 10:05 AM Editor's Note: What if most terrorism isn t really terrorism?

More information

Terrorism, Spoiling, and the Resolution of Civil Wars

Terrorism, Spoiling, and the Resolution of Civil Wars Terrorism, Spoiling, and the Resolution of Civil Wars Michael G. Findley Department of Government University of Texas at Austin mikefindley@austin.utexas.edu Joseph K. Young School of Public Affairs American

More information

In civil wars throughout the world, achieving durable peace

In civil wars throughout the world, achieving durable peace Terrorism, Spoiling, and the Resolution of Civil Wars Michael G. Findley, University of Texas at Austin Joseph K. Young, American University Civil war combatants use terrorism frequently, yet we understand

More information

Partial Peace Rebel Groups Inside and Outside Civil War Settlements

Partial Peace Rebel Groups Inside and Outside Civil War Settlements Public Disclosure Authorized Pol i c y Re s e a rc h Wo r k i n g Pa p e r 4572 WPS4572 Public Disclosure Authorized Public Disclosure Authorized Pos t -Co n f l i c t Tr a n s i t i o n s Wo r k i n g

More information

Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate

Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate MPRA Munich Personal RePEc Archive Comment on Claude Berrebi and Esteban F. Klor (2008): Are voters sensitive to terrorism? Direct evidence from the Israeli electorate Hlavac, Marek Georgetown University

More information

The Chilcot inquiry into the

The Chilcot inquiry into the Does public debate about the pros and cons of the UK s involvement in Iraq undermine the chances of military success? Radha Iyengar examines the incentives of Iraqi insurgent groups to commit acts of violence,

More information