Abstract
Keywords
Introduction
Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate victims (Enders & Sandler, 2012). This definition is consistent with others in the literature (Hoffman, 2006; RAND, 2012). Violence is a hallmark of terrorism, with some terrorist groups engaging in gruesome attacks to create widespread anxiety or revulsion. To qualify as terrorism, an attack must have a political motive. By limiting terrorism to subnational agents, the above definition rules out state terror, where a government terrorizes its own people. However, the definition does not eliminate state-sponsored terrorism, in which a government secretly aids a terrorist group through funds, intelligence, safe passage, or some other means. Finally, the definition emphasizes that the true target of the anxiety-generating attacks is a wider public, who may pressure the government to concede to the demands of the terrorists.
The study of terrorism has been an active field of research in economics, political science, sociology, and related disciplines since the late 1960s. At first, political science took a conceptual and historical approach to the study of terrorism, which was pragmatic in the absence of data and theoretical constructs for terrorist behavior. The early conceptual approach focused on the definition of terrorism, the myriad causes of terrorism, the tactics of the terrorists, and the identity of the primary terrorist groups and movements (e.g. Crenshaw, 1981; Wilkinson, 1986).
The analytical study of terrorism derived, in part, from scholars, such as William Landes, who viewed terrorists as rational actors. Rationality is based on predictability rather than on the desirability of terrorists’ tactics or goals. If changes in terrorists’ constraints, say through government policies, result in predictable behavioral responses by the terrorists, then terrorists are rational actors. Some researchers – most notably Abrahms (2008) – questioned whether terrorists are rational, because they usually do not achieve their sought-after goal. Abrahms (2008: 83) stated: ‘I found that in a sample of twenty-eight well-known terrorist campaigns, the terrorist organizations accomplished their stated policy goals zero percent of the time by attacking civilians’. In contrast, Jones & Libicki (2008) indicated 132 campaigns where the terrorist groups renounced terrorism and joined the political process or else achieved their goal. Although Abrahms (2008) raised many interesting challenges to rationality, his evidence is somewhat selective. 1
The analytical study of terrorism was also fostered by the collection of event data. In his landmark study of skyjackings, Landes (1978) used US Federal Aviation Association (FAA) data on skyjackings to estimate the deterrent effects of US antiterrorism policies against skyjackings during 1961–79. Landes (1978) applied methods and concepts from the economic analysis of crime to identify effective deterrents to US skyjackings – e.g. the likelihood of apprehension, the likelihood of conviction, length of prison sentences, the presence of airport metal detectors, and sky marshals on planes. Most important, he found that airport metal detectors reduced US skyjackings by 4.4 to 8.8 incidents per year. Landes could then translate these findings into the value of metal detector installation.
After the heinous attacks on 11 September 2001 (9/11), there was an explosion of terrorism literature, both conceptual and analytical. The main purpose of this article is to present an eclectic overview of the analytical approach to the study of terrorism. The analytic literature is voluminous, so I must selectively choose which articles to cite. I favor articles that have either garnered a lot of citations or else, I believe, will do so in the future. This survey is organized as follows. In the next section, three primary terrorist event datasets are briefly introduced, because most of the empirical literature used one or more of them. In the ensuing five sections, the article highlights active areas of research that have much policy relevance. First, a knowledge of terrorist trends can inform forecasting and policy. Second, analyses of the economic consequences of terrorism identify some of the social costs of terrorist campaigns. Knowledge of these costs can indicate the potential gains from effective counterterrorism policies that limit terrorist attacks. Third, governments must ascertain the effectiveness of their defensive and proactive countermeasures, so that ineffective measures are discontinued. Fourth, understanding the root causes of terrorism allows a society to take steps to reduce grievances and, therefore, limit terrorism. Fifth, the relationship between democracies and terrorism can educate policymakers on the inherent risks of political regimes at home and in countries where these policymakers have vital interests. The next-to-last section presents some major new developments in the analytical study of terrorism – e.g. deconstructing terrorism into domestic and transnational attacks, game-theoretic analyses of counterterrorism, and the role of foreign aid. These developments are highlighted because there are lots of recent articles on these topics. Moreover, I believe that interest in these topics will continue in the future. The final section contains future directions for research and a few concluding remarks.
Event databases
An important distinction for the three event databases concerns domestic and transnational terrorism. Domestic terrorist incidents are homegrown
The empirical research on terrorism has profited greatly from event databases that record key variables of terrorist incidents. Since the 1970s, the International Terrorism: Attributes of Terrorist Events (ITERATE) dataset has coded many variables (e.g. incident date, country location, target entity, attack type, casualties, perpetrators’ nationalities, terrorist group, victims’ nationalities, and logistical outcome) for transnational terrorist incidents. Currently, ITERATE’s coverage is 1968–2011, with yearly updates coming during the summer (Mickolus et al., 2012). ITERATE, like the other event databases, relies on the news media for its variables. For hostage-taking incidents, ITERATE also contains negotiation variables, which have been invaluable in studies on hostage taking (e.g. Gaibulloev & Sandler, 2009). The initial fixation of empirical articles on transnational terrorist incidents occurred because ITERATE was the most extensive dataset available during the 1980s and 1990s. Another competing dataset is the RAND (2012) terrorist event database, which currently codes terrorist incidents for 1968–2009. After 1997, the RAND dataset began recording domestic terrorist incidents, so that it identifies transnational terrorist incidents for 1968–2009 and domestic terrorist incidents for 1998–2009. Compared to ITERATE, the RAND event dataset codes fewer variables and for transnational terrorist incidents has more limited coverage than ITERATE (Enders, 2007).
The Global Terrorism Database (GTD) records both domestic and transnational terrorist incidents (La Free & Dugan, 2007), which could assist researchers in identifying differences between the two types of terrorism – e.g. their impacts on economic growth. For GTD, this partition of domestic and transnational terrorist incidents was first accomplished by Enders, Sandler & Gaibulloev (2011) for 1970–2007 and has been updated by them through 2010. There are many essential differences between GTD and ITERATE beyond the coverage of domestic terrorism by GTD. For example, the perpetrators’ nationalities are not recorded in GTD after 1997; very few logistical failures are listed in GTD; and many insurgent attacks are included before 1998 in GTD. These datasets can serve many useful purposes provided that researchers are aware of their idiosyncrasies.
How has terrorism changed since 1968?
Because event datasets only go back to 1968, any study of the patterns of terrorism must commence with 1968. Terrorism data show specific cycles (i.e. regular-spaced peaks and troughs) attached to alternative modes of attacks as terrorists and their government adversaries respond to one another’s countermeasures. As a general rule of thumb, more complex attack modes – e.g. skyjackings – display longer cycles than simpler modes – e.g. threats and hoaxes or bombings (Sandler & Enders, 2004). Insofar as bombings are a composite of many different kinds of attacks (e.g. letter bombs, explosive bombings, and car bombings), bombings are represented by multiple cycles of alternative lengths. By knowing these cycles, law enforcement agents may be able to anticipate the next wave of attacks when cycles are regular.
Transnational terrorist attacks rose from 1968 to the mid-1980s when there were about 500 incidents per year, as shown in Figure 1 based on ITERATE data. The 1980s was the decade of state-sponsored terrorism (Hoffman, 2006). After the mid-1990s, the number of transnational terrorist incidents fell precipitously to approximately 100 to 200 events per year. This fall is attributed to the decline in state sponsorship and the decline of left-wing terrorists. In Figure 2, I display the proportion of transnational and domestic terrorist events with casualties (i.e. deaths and/or injuries), based on ITERATE and GTD, respectively. 3 As shown, transnational terrorism shows a rising proportion of incidents with casualties from 1997 on, corresponding to the growing dominance of the religious fundamentalist terrorists, who sought greater carnage (Enders & Sandler, 2000; Rapoport, 2004). Before 1990, 26% of transnational terrorist attacks ended in casualties; after 1990, 41% of these attacks resulted in casualties. Based on Enders, Sandler & Gaibulloev’s (2011) division of GTD data, Figure 2 also indicates that the proportion of domestic terrorist events with casualties displays a rising trend from 1989 to 2005. As shown, the proportion of domestic terrorist attacks with casualties is always greater than that of transnational terrorist attacks with casualties. Moreover, domestic terrorist incidents outnumber transnational terrorist incidents by four to ten times depending on the dataset and time period consulted.
Another interesting pattern comes from the terrorists’ choice of targets. Suppose that targets are partitioned into four general categories: officials, military, business, and private parties. As shown in Figure 3 (based on ITERATE), transnational terrorists have rationally responded to security measures in their targeting decisions. As officials were afforded protection by the state, transnational terrorists increasingly attacked softer business targets in the 1970s. As businesses protected their assets, terrorists switched to attacking private parties, so that these
Number of transnational terrorist incidents (ITERATE), 1968–2011 Proportion of transnational and domestic terrorist events with casualties

Economic consequences of terrorism
The total direct and indirect costs of the four hijackings on 11 September 2001 have been estimated to be $80 to
Cumulative number of transnational terrorist incidents by target type, 1968–2010
Economic consequences of terrorism can be at the macroeconomic level in terms of reduced GDP or lost GDP growth. Macroeconomic aggregates – consumption, investment, and government expenditures – may also be affected by terrorist attacks. A country that experiences a significant terrorist campaign may lose investment owing to a higher perceived risk on the part of the investors (Blomberg, Hess & Orphanides, 2004). Moreover, such investors may be expected to transfer their funds to other countries with similar rates of returns but lower risks of terrorism. The need for more government-supported counterterrorism measures may crowd out public and private investments owing to higher taxes. There may also be microeconomic level impacts from terrorism as some sectors or locations are at greater peril from terrorist attacks. In a time-series analysis, Enders, Sandler & Parise (1992) showed that terrorist attacks directed at the Greek tourist industry cost Greece 23.4% of its annual tourism revenue for 1988. Another wave of terrorist attacks in Austria during 1985–87 cost Austria 40.7% of its annual tourist revenues for 1988 (also, see Drakos & Kutan, 2003).
There are some general economic principles that can be drawn from the voluminous literature on the economic consequences of terrorism. First, rich, diversified countries are generally able to withstand their annual terrorist attacks with few macroeconomic impacts. This follows because economic activities move from terrorism-prone sectors (provinces) to safer sectors (provinces) within the country (Sandler & Enders, 2004). This first principle is consistent with the observation that most terrorist incidents cause few casualties (i.e. one death on average) and modest property damage based on ITERATE. Advanced economies can offset the effects of terrorism with well-directed fiscal and monetary policies, as the USA did following 9/11 (Enders & Sandler, 2012: 296–298). Second, small terrorism-plagued economies – e.g. Israel, Colombia, and the Basque Country in Spain – will experience significant losses of GDP amounting to upwards of 10% of GDP during sustained terrorist campaigns (e.g. Abadie & Gardeazabal, 2003). Third, small developing countries are apt to show detrimental economic effects from terrorism (Enders & Sandler, 2012; Gaibulloev & Sandler, 2011). This is likely true of failed states that host terrorist groups, because such groups will scare away foreign direct investment (FDI), which is an important source of savings and, hence, growth. If, however, a developing country has only a modest amount of terrorism, then the country should weather these attacks with little economic stress. Fourth, most cross-sectional and panel studies of regional aggregates found that terrorism caused a small, but significant, negative impact on per capita GDP growth (Enders & Sandler, 2012: 298–304). In Blomberg, Hess & Orphanides (2004), the fall in this growth rate was about 0.05% per year for an average country in their worldwide sample (also see Gaibulloev & Sandler, 2011). Fifth, even though terrorism-prone sectors may sustain substantial economic losses, these losses are small relative to the entire economy. This follows because the tourism or FDI-sector is generally small relative to overall GDP. Sixth, the immediate costs of most terrorist attacks are localized, like crime, which can be ameliorated through the transference of economic activities to safer locations. Seventh, major stock markets have shown little reaction to large-scale terrorist incidents, with the exception of 9/11 when world stock indices fell greatly but recovered lost value in 30–40 days (Chen & Siems, 2004). Typically, terrorist attacks affect the stock value of specific companies for a relatively short period of time. For example, Drakos (2004: Table 3) estimated that airline stocks had recovered their full value in less than a year after 9/11, which had an unprecedented effect on these stocks (also see Chen & Siems, 2004).
Effectiveness of counterterrorism policies
Since the Landes (1978) study, there has been a research interest in measuring the effectiveness of specific counterterrorism policies. Even though technological barriers can inhibit a specific type of terrorist incident, such barriers may have unintended consequences as they cause transference of attacks. Transference is an unintended policy-induced change in terrorist behavior, which includes displacement of the mode or venue of attack owing to target hardening. For instance, metal detectors made skyjackings more costly, while they made other kinds of hostage taking relatively less costly. As a consequence, the number of skyjackings fell as kidnappings became more frequent (Enders & Sandler, 1993). In fact, the 1973 installation of metal detectors was associated with an increase in terrorist incidents with casualties (Enders & Sandler, 2012). To truly investigate the effectiveness of such barriers, a researcher must ascertain the impact of the intervention on substitute and complementary modes of attack. In the case of metal detectors, embassy incursions later went down as barriers were installed to protect the compounds (Enders & Sandler, 2012: 166). Landes (1978) did not allow for these other impacts. To judge the effectiveness of an intervention, one would need to know the costs of the action
Transference is a key consideration for evaluating most counterterrorism actions. For example, enhancing embassy security induced terrorists to assassinate officials outside the compound (Enders & Sandler, 1993). Actions to secure, say, Americans on US soil through homeland security resulted in more attacks against Americans on foreign soil (Enders & Sandler, 2006). Before
Another counterterrorism disappointment is the apparent lack of effectiveness of UN resolutions and conventions. Some researchers saw great promise in these treaties (Wilkinson, 1986). Intervention vector autoregression studies showed that past UN resolutions and conventions had no measurable effect on particular outlawed modes of attack (e.g. bombings, skyjackings, or blowing up planes) (Enders & Sandler, 1993, 2012). That is, the pre-intervention mean of the particular outlawed attack mode did not differ from the post-intervention mean after the treaty was ratified. This is not surprising because these treaties have no enforcement mechanism and only a few noncompliant states can undo the gains from compliant states.
Time-series studies also investigated the counterterrorism effectiveness of retaliatory raids, such as the US bombing raid in 1986 on Libya, following the La Belle discotheque bombing in Berlin. Enders & Sandler (1993) found an intertemporal substitution, where terrorists moved attacks planned for the future to the present to protest the raid. As a consequence, terrorist attacks went up following the raid and declined months later as terrorists had to replenish spent resources. The overall level of terrorist attacks did not change in the near term. Brophy-Baermann & Conybeare (1994) discovered the same pattern for Israeli retaliatory raids on the Palestinian terrorists.
Using Palestinian–Israeli data, Dugan & Chenoweth (2012) provided a comparison between the use of repressive deterrence and conciliatory actions against terrorists. The latter actions reward would-be terrorists for refraining from violence. Dugan & Chenoweth’s (2012) parametric and nonparametric empirical analyses showed that indiscriminate repressive actions resulted in more terrorist attacks, whereas indiscriminate conciliatory actions resulted in fewer terrorist attacks. These results are in agreement with past studies about repression-induced backlash attacks (see e.g. Bloom, 2005; Rosendorff & Sandler, 2004; Siqueira & Sandler, 2007).
Theoretical work indicated that governments have more success addressing domestic than transnational terrorism, because a national government can internalize all externalities for potential domestic targets (Enders & Sandler, 2012; Sandler, 2005). Moreover, other nations cannot free ride on its proactive efforts to eradicate a domestic terrorist group. When the French eradicated Action Directe, no other countries derived benefits because the group did not attack the interests of other countries. For a common transnational terrorist threat, sovereign governments generally overspend on defensive measures to shift attacks abroad, while these governments underspend on proactive (offensive) measures in order to free ride on the efforts of other governments (Arce & Sandler, 2005; Sandler & Siqueira, 2006). Thus, defensive measures result in negative transnational externalities, 4 while proactive measures lead to positive transnational externalities. This overspending on defense may be offset for countries having significant assets abroad. If US homeland security shifts terrorist attacks to the Middle East or Asia where US citizens are killed, the incentive to shift attacks overseas is curtailed. Instead, the USA may be induced to take actions to eliminate the particular terrorist threat altogether. Proactive responses against a terrorist threat may unleash backlash if terrorist supporters view such actions as excessive, thereby resulting in new recruits. When this occurs, the positive benefits conveyed to other countries from the actions are reduced by the backlash costs, so that underspending is curtailed.
Causes and roots of terrorism
Insofar as terrorism has myriad root causes, it is not surprising that the empirical literature has come to little consensus on the root cause of domestic and transnational terrorism for various sample countries. Economic discrimination, religious persecution, nationalist/separatist motives, religious fundamentalism, political ideologies, and other grounds may erupt in terrorism by marginalized groups (Wilkinson, 1986). After 9/11, there was a popular belief that poverty led to transnational terrorism; however, Krueger & Maleckova (2003) uncovered little relationship between the lack of market opportunities and terrorism (also see Piazza, 2006). Opinion polls of Palestinians in the West Bank and the Gaza Strip showed that support for terrorist attacks did not decrease with income or educational level. For a cross-section sample of countries, Krueger & Maleckova (2003) found that low income was not associated with more terrorism when civil and political liberties were controlled. These authors concluded that it is the lack of these liberties, not poverty, that caused terrorism. In a provocative study, Enders & Hoover (2012) argued for a nonlinear relationship between income and terrorism in which middle income is more conducive to terrorism (also see de la Calle & Sánchez-Cuenca, 2012). In poor countries, the population is more focused on day-to-day survival, while in rich countries there are fewer grievances to fuel terrorism.
Given the myriad contradictory findings on the root causes of terrorism, there was a need for an article that tried to sort out the drivers of these differences. To do so, Gassebner & Luechinger (2011) applied extreme bound analysis to identify robust determinants or causes of terrorism. They used ITERATE, GTD, and RAND event datasets. In addition, these authors performed different panel runs for the victim, venue, and perpetrator countries. Key determinants of the number of terrorist attacks differed by the dataset and country identifier. There is more commonality among robust variables for the victim and venue countries than for the perpetrator countries. For the victim country, GDP per capita, population, wars, and religious and ethnic tensions are positive determinants of terrorist attacks, while economic freedoms and physical integrity rights (i.e. absence of human rights abuse) are negative determinants of these attacks. For the venue country, these authors found that economic freedom, physical integrity rights, and law and order are negative influences on terrorism, while population, military spending, involvement in wars, foreign portfolio investment, and political proximity to the United States (in terms of the UN General Assembly voting) are positive influences on terrorism. For panel runs based on the perpetrators’ country of origin, inhibitors of terrorism include economic freedom, physical integrity rights, and the number of telephone mainlines, whereas promoters of terrorism include civil wars and centrist governments. This study is noteworthy because it showed that the data source and the country viewpoint can influence which determinants of terrorism are significant. This realization is consistent with the bewildering number of articles that claimed to find different root causes for terrorism.
Surely, the causes of domestic and transnational terrorism will differ. The roots of domestic terrorism will naturally be country specific, so that large-N cross-sectional or panel studies will provide an average picture that may be a poor indicator for individual countries. In contrast, such an average view may be more appropriate for the cause of transnational terrorism where terrorist groups may be dominated by common grievances, such as left-wing ideologies during the 1970s and 1980s or religious fundamentalism after the start of the 1990s.
Dilemma of liberal democracies
Wilkinson (1986) raised an important terrorism dilemma that plagues some liberal democracies, whose legitimacy rests on the protection of their citizens’ lives and property. His concern is that terrorists can force these liberal democracies into a double blind. If a liberal democracy responds too passively to the terrorist threat and appears unable to guarantee its citizens’ safety, then the government loses its legitimacy and may be voted out of office. If, instead, the government reacts too harshly to the terrorist threat, then the government’s overreaction may compromise democratic principles, thereby making the government less popular. In the process, the terrorists may gain supporters. This dilemma and its dynamics may induce terrorists to locate attacks in liberal democracies rather than in autocracies. Moreover, these democracies may unwittingly facilitate terrorism through executive constraints on power, freedom of association, freedom of speech, right to privacy, press freedoms, a target-rich environment, and other considerations (Hoffman, 2006; Wilkinson, 1986). Starting with Eubank & Weinberg (1994), empirical researchers have been concerned whether democracies are more likely to host terrorist groups than autocracies. Based on an odds ratio test, Eubank & Weinberg (1994) found that terrorist groups are more likely present in a democracy as compared to an autocracy. These authors also discovered that fledgling and transition democracies are vulnerable to terrorism.
In a follow-up article, Li (2005) applied negative binomial regressions to account for the count nature of the dependent variable – i.e. the number of transnational terrorist events. For a sample of 119 countries during 1975–97, Li (2005) found that democratic participation reduced transnational terrorist attacks (also see Eyerman, 1998), while democratic governments’ executive constraints increased transnational terrorist attacks. Numerous subsequent studies investigated the relationship between democracy and terrorism. Based on RAND data, Savun & Phillips (2009) demonstrated that democratic principles positively affected the amount of transnational terrorism, but did not affect the amount of domestic terrorism. As these authors delved further into the cause of transnational terrorism, they found that democracies that engaged in foreign policy crises with other countries attracted more transnational terrorism. Moreover, alliance ties with the United States and interventions in foreign civil wars also resulted in the country experiencing more transnational terrorist attacks. Thus, democratic principles per se did not generate such attacks.
The relationship between democracy and terrorism remains an active area of research. For example, Chenoweth (2010) argued that intergroup competition is a driver of transnational terrorist incidents in democracies as terrorist groups vie for supporters. Chenoweth’s unit of analysis was a cross-national longitudinal study of 119 countries for 1975–97, based on ITERATE data. She did not investigate whether intergroup competition was also more conducive to domestic terrorism. Chenoweth (2010) also presented evidence that political competition resulted in more terrorist groups in the country. In a recent panel analysis, Young & Dugan (2011) showed that the presence of veto players (i.e. entities that can block policy changes) was positively related to homegrown and all fatal attacks based on GTD event data.
Major new developments in the study of terrorism
Reasons for distinguishing between domestic and transnational terrorism
Articles testing the hypotheses are indicated.
Following 9/11, there has been a large interest in applying game theory to the study of terrorism. Game theory – or the study of strategic rational choice – is an appropriate tool to capture the strategic interactions among various agent pairings – e.g. two governments targeted by the same terrorist group; a government and its adversarial terrorist group; rival terrorist groups; the government, the terrorists, and the media; or the government and factions within a terrorist group. Table II presents a few novel findings from this literature. I favor findings that are either provocative or counter-intuitive. Most game-theoretic treatments involved counterterrorism applications, as implied by Table II. To date, there are not many tests of these propositions, primarily because there are limited data on counterterrorism actions of governments – e.g. we do not have data on how governments allocate defensive resources. Thus, empirical support in articles relies on a few specific examples. There are a few exceptions, where the propositions are empirically tested. For example, Benmelech, Berrebi & Klor (2012) presented empirical support for Bueno de Mesquita’s (2005) quality of terrorism hypothesis. Based on Jones & Libicki (2008) data on terrorist groups, Bapat (2011) provided cross-sectional support for his moral hazard argument about US military aid to host countries.
Some novel game-theoretic results
In addition, game theory articles investigated bargaining between hostage-taking terrorists and governments (see Sandler, Tschirhart & Cauley, 1983). For example, Lapan & Sandler (1988) studied the practicality of a policy that commits governments never to concede to hostage takers’ demands. The conventional support of the no-concession policy hinges on the notion that if terrorists know beforehand that they have nothing to gain, then they will never abduct hostages. The empirical record shows that governments do offer concessions in violation of their pledge – e.g. the Irangate scandal involving the Reagan administration. Lapan & Sandler (1988) showed that these failures to abide by a stated no-concession policy hinge on a time-inconsistency concern, when the perceived short-run gain from concessions appears to be greater than the long-run consequences owing to the value of a given hostage – e.g. CIA agent William Buckley kidnapped on 16 March 1984 in Beirut, who precipitated the Irangate scandal. Many game-theoretic bargaining propositions have been tested by Atkinson, Sandler & Tschirhart (1987) and Gaibulloev & Sandler (2009). The latter article showed that governments have abided by their no-concession pledge more often in recent years.
Many of the original empirical studies of terrorism involved time-series analysis (see e.g. Enders, 2007). As count models, such as Poisson and zero-inflated negative binomial, were developed, these models replaced those based on a normal distribution. After 9/11, there are many more cross-sectional and panel studies on such topics as suicide terrorism (Benmelech, Berrebi & Klor, 2012), the causes of terrorism (Piazza, 2011), effectiveness of counterterrorism (Dugan & Chenoweth, 2012), and economic consequences of terrorism (Gaibulloev & Sandler, 2008, 2011).
Another recent research development concerned the study of networked terrorists. In the late 1960s and the 1970s, terrorist networks cooperated on many levels, including training, intelligence, safe haven, financial support, logistical help, weapon acquisition, and the exchange of personnel (Hoffman, 2006). The European left-wing terrorists maintained ties with the Palestinian groups (Alexander & Pluchinsky, 1992). In recent times, the Al-Qaeda network operates in upward of 60 countries and stages its attacks worldwide. These terrorist networks allow tied groups to increase their effectiveness in utilizing limited resources compared to their powerful government adversaries.
One approach to the study of terrorist networks is to design counterterrorist policies to do the most damage to compromise linkages between the terrorists (Farley, 2003). This approach relies on graph theory and assumes that policy designers have knowledge about the network’s configuration. Moreover, it assumes a static configuration, where the terrorists do not alter links in anticipation of policymakers’ goal to disrupt the network. The focus on networks teaches us that terrorists must trade off connectivity against vulnerability (Enders & Jindapon, 2010). In an all-channel network, every terrorist is linked to every other terrorist, which facilitates complex operations as information can be exchanged readily. In such a network, a single compromised terrorist can provide devastating intelligence on the rest of the network. To avoid this vulnerability, terrorist networks rely on rather small chains of terrorists who are loosely linked to the rest of the network (Enders & Sandler, 2012: 249–256). The resulting downside is that planned attacks must be rather simple.
Networks are also relevant in a game-theoretic setting to investigate how a global terrorist organization (GTO) delegates local terrorist groups in the field (Siqueira & Sandler, 2010). This delegation decision is based on the GTO’s perceived orientation of the targeted government and the fervor of the local supporters for the terrorist group’s goals. If, for example, the targeted government is weak with no stomach to fight the terrorists (i.e. it does not increase counterterrorism as attacks increase), and if the local supporters appear steadfast, then the GTO would delegate to a local group, whose views are more extreme than its own. If the targeted government and/or local supporters later changed their orientation, then the GTO may come to regret its delegation decision with little chance to recall the deployed group. This was the case with Al-Qaeda’s deployment of al-Zarqawi to Iraq after he bombed three Jordanian hotels with high Muslim death tolls.
Because many terrorist groups reside in developing countries with limited means to eradicate them, the use of foreign aid to calm grievances and to bolster proactive counterterrorism efforts against a resident group is now an important research question (e.g. Azam & Thelan, 2010). Relevant issues include the interplay between a donor country, which is focused on defensive measures at home against an attack launched from abroad, and the recipient country, which is focused on proactive measures to eliminate the resident terrorist group (Bandyopadhyay, Sandler & Younas, 2011). This interplay is strategically tied to the donor’s aid package, which is used not only to bolster the recipient country’s well-being, but also to finance its proactive efforts. Other germane considerations involve the form of the foreign assistance and its influence on the regime stability of the aid recipient. Too much aid tied to counterterrorism may lose the recipient regime its popular support (Bandyopadhyay, Sandler & Younas, 2011). In a recent empirical study, Young & Findley (2011) showed that foreign aid reduced transnational terrorism when targeted toward education, health, civil society, and conflict prevention. Based on panel analyses of 22 donor countries, Dreher & Fuchs (2011) showed that foreign aid increased after 9/11; however, this aid did not necessarily flow to the countries with the most terrorist attacks. Surprisingly, these authors did not find that aid flowed to the perpetrators’ host countries. Many other aid-related issues for the study of terrorism remain.
Directions for future research and concluding remarks
What is the true impact of terrorism on growth? For regional aggregates, the literature’s consensus is that terrorism has a small, but significant, negative impact on per capita GDP growth (see e.g. Blomberg, Hess & Orphanides, 2004). There are, however, grounds for believing that terrorism typically has no effect on economic growth – e.g. most countries experience few attacks with little loss of life or property; much of terrorism’s impact is localized; and transference of economic activities can limit economic consequences. To date, the studies of this growth impact ignores biases – e.g. Nickell bias stemming from lagged per capita income on the right-hand side of the growth equation. Another crucial bias comes from cross-country dependence which causes an endogeneity bias. When accounting for these biases, Gaibulloev, Sandler & Sul (2013) found no influence of terrorism on economic growth for a host of regional samples. More work is needed because losses in economic growth are used to gauge offsetting fiscal and monetary policies.
There is also a need for more spatial analysis of terrorist incidents and civil wars. Recently, geo-referenced GTD data were used by Findley & Young (2012) to investigate the spatial and temporal relationship between terrorist incidents and civil wars. Spatial analysis can indicate the spread of terrorist campaigns across countries and regions. The analysis can also identify where vulnerabilities are the greatest within countries, and how terrorist attacks respond spatially to counterterrorism measures.
There are additional issues concerning counterterrorism spending that require investigation. How much is enough in terms of defensive spending? That is, have past counterterrorism measures been effective and worth the cost? Since its inception, the budget of US DHS has risen by 9% annually (Enders & Sandler, 2012: 328). To address such questions requires an unobservable counterfactual, in which benefits in terms of inhibited attacks are ascertained. The cost side of counterterrorism is readily observable. There is only a single study that attempts to compute a counterfactual for post-9/11 counterterrorism spending (Sandler, Arce & Enders, 2011). Though this study is imperfect, these authors found only about a ten cents return on a dollar from post-9/11 defensive spending.
Datasets, such as ITERATE, GTD, and RAND, attribute attacks to terrorist groups for the last 40 years. Even though less than half of the recorded attacks are tied to specific groups, there are now sufficient data to investigate the determinants of terrorist group survival. The pioneering article using survival (hazard) analysis is by Blomberg, Engel & Sawyer (2010), with its focus on ‘one hit wonders’ or groups that struck just once. Their study investigated how economic, political, and geographical considerations in the venue country influenced terrorist group longevity. A follow-up study by Blomberg, Gaibulloev & Sandler (2011) included terrorist groups’ ideologies and tactics (e.g. attack diversity and share of transnational attacks). This second study relied on economic, political, and geographical variables but in the terrorist group’s base country. Future analyses need to go a step further to condition the groups’ failure to a cause – i.e. loss of a leader, dissent within the group, accomplishment of its political goal, or defeat by the authorities. Data in a study by Jones & Libicki (2008) can be used to explain specific causes of group failure (Carter, 2012).
Suicide terrorism requires further analysis. Benmelech, Berrebi & Klor (2012) established that poor economic conditions may result in terrorist groups recruiting more capable and better educated suicide bombers to attack Israeli targets. As a result, the ‘quality’ of attacks increased in terms of carnage because more qualified suicide bombers can wreak more casualties. This important work should be extended to a global sample.
Yet another issue for future research is the study of the factors that promote international cooperation in the fight against international terrorism. For example, INTERPOL can coordinate arrest efforts among countries. The aftermath of 9/11 showed that, under dire threat, nations can cooperate against a common terrorist enemy. For counterterrorism, the role of partial cooperation needs to be investigated.
A final direction for future research involves the development of efforts to counter the growing threat of cyberterrorism in an increasingly electronic-dependent world.
This article demonstrates that the analytical study of terrorism is a very active research area that has much policy relevance. Event datasets facilitated empirical tests of theoretical propositions, but underscored a real deficiency – i.e. the need for data on governments’ counterterrorism actions. There are a few country-specific counterterrorism datasets (see e.g. Dugan & Chenoweth, 2012), but no global counterterrorism dataset. This article also highlights select areas of major new developments, as well as future directions for research.
Footnotes
References
Supplementary Material
Please find the following supplemental material available below.
For Open Access articles published under a Creative Commons License, all supplemental material carries the same license as the article it is associated with.
For non-Open Access articles published, all supplemental material carries a non-exclusive license, and permission requests for re-use of supplemental material or any part of supplemental material shall be sent directly to the copyright owner as specified in the copyright notice associated with the article.
