Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-02T18:50:22.745Z Has data issue: false hasContentIssue false

4 - Balancing Counterterrorism Strategies

Lessons from Evolutionary Ecology

Published online by Cambridge University Press:  04 February 2011

Brian Forst
Affiliation:
American University, Washington DC
Jack R. Greene
Affiliation:
Northeastern University, Boston
James P. Lynch
Affiliation:
John Jay College of Criminal Justice, City University of New York
Get access

Summary

INTRODUCTION

Terrorism often is portrayed as fundamentally different from more mundane types of crime. This distinction is understandable, but unwarranted and counterproductive because it encourages over-reliance on aggressive measures to combat terrorism. We believe that a true understanding of the causes of terrorism can occur only if we apply the same systematic, scientific approach to the problem that is used to study other forms of behavior, and that an understanding of the root causes of terrorism is necessary for the development of effective counterterrorism policies.

In this chapter, we discuss terrorism using the same evolutionary- ecological perspective on human behavior that has proved useful for understanding crime and developing novel approaches to crime control and prevention. Unlike more traditional approaches to these social problems, the evolutionary-ecological perspective deals systematically with biological, social, and cognitive factors that influence human development over the life course at both micro and macro levels. It also explains why effective long-term crime control strategies must strike a balance between opportunity reduction, deterrence, and developmental interventions. The following discussion places terrorism within an evolutionary-ecological framework and proposes a suite of theoretically driven counterterrorism policies. Using a game-theoretic model, we demonstrate that terrorism can best be controlled using the same balanced approach that is most effective for countering other types of crime. We argue that over-dramatizing terrorist threats and over-emphasizing punitive and protective counter-strategies without addressing the root causes of terrorism is counterproductive and cannot succeed in the long run.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ardila, R. (2002). The psychology of the terrorist: Behavioral perspectives. In Stout, C.E. (Ed.), The psychology of terrorism. Volume 1. A public understanding (pp. 9–15). Westport, CT: Praeger.Google Scholar
Arquilla, J. and Ronfeldt, D. (2001). Networks and Netwars. Santa Monica, CA: RAND.Google Scholar
Atran, S. (2003). Genesis of suicide terrorism. Science, 299, 1534–1539.CrossRefGoogle ScholarPubMed
Barak, G. (2004). A reciprocal approach to terrorism and terrorist-like behavior. In Deflem, M. (Ed.), Terrorism and counter-terrorism: Criminological perspectives. Volume 5. Sociology of crime, law and deviance (pp. 33–39). Boston, MA: Elsevier.Google Scholar
Black, D. (2004). Terrorism as social control. In. Deflem, M. (Ed.), Terrorism and counter-terrorism: Criminological perspectives. Volume 5. Sociology of crime, law and deviance (pp. 9–18). Boston, MA: Elsevier.Google Scholar
Boyd, R. and Richerson, P.J. (1985). Culture and the Evolutionary Process. Chicago: University of Chicago Press.Google Scholar
Bueno de Mesquita, E. (2005). The quality of terror. American Journal of Political Science, 49(3), 515–530.CrossRefGoogle Scholar
Chomsky, N. (2003). Power and Terror: Post-9/11 Talks and Interviews (Junkerman, J. and Masakazu, T., Eds.). New York: Seven Stories press.Google Scholar
Clarke, R.V. and Newman, G.R. (2006). Outsmarting the terrorists. Westport, CT:Greenwood.Google Scholar
Cohen, L.E. and Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.CrossRefGoogle Scholar
Cohen, L.E. and Machalek, R. (1988). A general theory of expropriative crime: An evolutionary ecological approach. American Journal of Sociology, 94, 465–501.CrossRefGoogle Scholar
Cohen, L.E. and Machalek, R. (1994). The normalcy of crime: From Durkheim to evolutionary ecology. Rationality and Society, 6, 286–308.CrossRefGoogle Scholar
Cohen, L.E., Vila, B.J. and Machalek, R. (1995). Expropriative crime and crime policy: An evolutionary ecological analysis. Studies on Crime and Crime Prevention, 2:197–219.Google Scholar
Cossa, R.A. (2004). “South Asian Tsunami: U.S. Military Provides ‘Logistical Backbone’ for Relief Operation.” eJournal USA: Foreign Policy Agenda, November 2004 (Update Report March 2005, downloaded April 6, 2007 from http://usinfo.state.gov/journals/itps/1104/ijpe/cossa.htm)
Crocker, R. (2009). Eight Years On: A diplomat's perspective on the post-9/11 world. Newsweek, Sept. 5, downloaded 09 Sept. 2009 from www.newsweek.com/id/214988/output/print.
Davis, P.K. and Jenkins, B.M. (2002). Deterrence and Influence in Counterterrorism: A Component in the War on al Qaeda. Santa Monica, CA: Rand Corporation.Google Scholar
Ehrlich, P.R. and Liu, J. (2002). Some roots of terrorism. Population and Environment, 24(2), 183–192.CrossRefGoogle Scholar
Ekblom, P. (1999). “Can we make crime prevention adaptive by learning from other evolutionary struggles?Studies on Crime and Crime Prevention, 8:27–51.Google Scholar
Fabick, S.D. (2002). Us and them: Reducing the risk of terrorism. In Stout, C.E. (Ed.), The Psychology of Terrorism. Volume 1. A Public Understanding (pp. 225–241). Westport, CT: Praeger.Google Scholar
Fair, C.C. (2004). Militant recruitment in Pakistan: Implications for Al Qaeda and other organizations. Studies in Conflict and Terrorism, 27, 489–504.CrossRefGoogle Scholar
Fields, R.M., Elbedour, S. and Hein, F.A. (2002). The Palestinian suicide bomber. In Stout, C.E. (Ed.), The psychology of terrorism. Volume 1. A public understanding (pp. 193–223). Westport, CT: Praeger.Google Scholar
Fox, J. (2004). Is ethnoreligious conflict a contagious disease?Studies in Conflict and Terrorism, 27, 89–106.CrossRefGoogle Scholar
Gallimore, T. (2002). Unresolved trauma: Fuel for the cycle of violence and terrorism. In Stout, C.E. (Ed.), The psychology of terrorism. Volume 1. A public understanding (pp. 143–164). Westport, CT: Praeger.Google Scholar
Garrison, A.H. (2004). Defining terrorism: Philosophy of the bomb, propaganda by deed and change through fear and violence. Criminal Justice Studies, 17(3), 259–279.CrossRefGoogle Scholar
Goertzel, T.G. (2002). Terrorist beliefs and terrorist lives. In C.E. Stout (Ed.), The psychology of terrorism. Volume 1. A public understanding (pp. 97–111). Westport, CT: Praeger.Google Scholar
Graham, K. (2005). The Security Council and counterterrorism: Global and regional approaches to an elusive public good. Terrorism and Political Violence, 17(1/ 2), 37–65.CrossRefGoogle Scholar
Griset, P.L. and Mahan, S. (2003). Terrorism in Perspective. Newbury Park, CA: Sage.Google Scholar
Haddad, S. (2003). Islam and attitudes toward U.S. policy in the Middle East: Evidence from survey research in Lebanon. Studies in Conflict and Terrorism, 26, 135–154.CrossRefGoogle Scholar
Hastings, T.H. (2004). Nonviolent Response to Terrorism. Jefferson, NC: McFarland and Company.Google Scholar
Hewitt, C. (1984). The Effectiveness of Anti-Terrorism Policies. New York: University Press of America.Google Scholar
Hudson, R.A. (1999). Who Becomes a Terrorist and Why: The 1999 Government Report on Profiling Terrorists. Guilford, CT: Lyons Press.Google Scholar
Johnson, S. (2007). Public Diplomacy, Issues 2006: The Candidate's Briefing Book (downloaded April, 6 2007 from www.heritage.org/research/features/issues/issuearea/ Diplomacy.cfm).
Kfir, N. (2002). Understanding suicidal terror through humanistic and existential psychology. In Stout, C.E. (Ed.), The psychology of terrorism. Volume 1. A public understanding (pp. 143–157). Westport, CT: Praeger.Google Scholar
Kleiman, M.A.R. (1999). Getting deterrence right: Applying tipping models and behavioral economics to the problems of crime control. Perspectives on Crime and Justice: 1998–1999 Lecture Series, 3, 1–21. Washington, DC: National Institute of Justice.Google Scholar
LaFree, G. and Dugan, L. (2004). How does studying terrorism compare to studying crime? In Deflem, M. (Ed.), Terrorism and counter-terrorism: Criminological perspectives. Vol. 5. Sociology of crime, law and deviance (pp. 53–74). Boston, MA: Elsevier.Google Scholar
Lester, D., Yang, B. and Lindsay, M. (2004). Suicide bombers: Are psychological profiles possible?Studies in Conflict and Terrorism, 27, 283–295.CrossRefGoogle Scholar
Looney, R. (2004). Failed economic take-offs and terrorism in Pakistan: Conceptualizing a proper role for U.S. assistance. Asian Survey, 44(6), 771–793.CrossRefGoogle Scholar
May, R.M. (1974). Stability and Complexity in Model Ecosystems. Princeton, NJ: Princeton University Press.Google Scholar
Maynard Smith, J. (1982). Evolution and the Theory of Games. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Nye, J.S. (2004). Soft Power: The Means to Success in World Politics. New York: Public Affairs.Google Scholar
Parker, G.A. (1974). Assessment strategy and the evolution of fighting behaviour. Journal of Theoretical Biology, 47, 223–243.CrossRefGoogle ScholarPubMed
Perrow, C. (1999). Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton University Press.Google Scholar
Reaves, E.J., Schor, K.W. and Burkle, F.M., Jr. (2008). Implementation of Evidence-based Humanitarian Programs in Military-led Missions: Part II. The Impact Assessment ModelDisaster Med Public Health Preparedness, 2(4): 237–244.CrossRefGoogle ScholarPubMed
Richerson, P.J. and Boyd, R. (2005). Not by Genes Alone: How culture Transformed Human Evolution. Chicago: University of Chicago Press.Google Scholar
Rogers, E.M. (2003). Diffusion of Innovations, 5th ed. New York, N.Y: Free Press.Google Scholar
Rosenfeld, R. (2004). Terrorism and criminology. In Deflem, M. (Ed.), Terrorism and counter-terrorism: Criminological perspectives. Vol. 5. Sociology of crime, law and deviance (pp. 19–32). Boston, MA: Elsevier.Google Scholar
Salij, J. (2005). The significance of “ineffective” methods of fighting terrorism. American Behavioral Scientist, 48(6), 700–709.CrossRefGoogle Scholar
Savage, J. and Kanazawa, S. (2004). Social capital and the human psyche: Why is social life ‘capital’?Sociological Theory, 22(3), 504–524.CrossRefGoogle Scholar
Schbley, A. (2003). Defining religious terrorism: A causal and anthological profile. Studies in Conflict and Terrorism, 26, 105–134.CrossRefGoogle Scholar
Silke, A. and Taylor, M. (2000). War without end: Comparing IRA and loyalist vigilantism in Northern Ireland. Howard Journal of Criminal Justice, 39(3), 249–266.CrossRefGoogle Scholar
Simon, J.D. (2001). The endless nature of terrorism. Excerpted in Griset, P.L. and Mahan, S. (Eds.), Terrorism in perspective (pp. 38–44). Thousand Oaks, CA: Sage. (Reprinted from The terrorist trap: America's experience with terrorism, by J.D. Simon, 1994, Bloomington, IN: Indiana University Press.)Google Scholar
Smith, A.G. (2004). From words to action: Exploring the relationship between a group's value references and its likelihood of engaging in terrorism. Studies in Conflict and Terrorism, 27, 409–437.CrossRefGoogle Scholar
Smith, B.L. and Morgan, K.D. (1994). Terrorists right and left: Empirical issues in profiling American terrorists. Studies in Conflict and Terrorism, 17, 39–57.CrossRefGoogle Scholar
Smith, B.L. and Orvis, G.P. (1993). America's response to terrorism: An empirical analysis of federal intervention strategies during the 1980s. Justice Quarterly, 10(4), 661–681.CrossRefGoogle Scholar
Soibelman, M. (2004). Palestinian suicide bombers. Journal of Investigative Psychology and Offender Profiling, 1(3), 175–190.CrossRefGoogle Scholar
Stanton, D. (2009). Horse Soldiers: The Extraordinary Story of a Band of US Soldiers Who Rode to Victory in Afghanistan. New York: Scribner.Google Scholar
Testas, A. (2004). Determinants of terrorism in the Muslim world: An empirical cross-sectional analysis. Terrorism and Political Violence, 16(2), 253–273.CrossRefGoogle Scholar
Thackrah, R. (1989). Terrorism: A definitional problem. In Wilkinson, P. and Stewart, A.M. (Eds.), Contemporary research on terrorism (pp. 24–44). Aberdeen, Scotland: Aberdeen University Press.Google Scholar
Army, U.S. and Corps, U.S. Marine. (2006). Counterinsurgency, Field Manual 3–24 & Marine Corps Warfighting Publication 3–33.5. Washington, DC:U.S. Department of Defense, 15 December.Google Scholar
Office, U.S. General Accountability. (2005). U.S. PUBLIC DIPLOMACY: Interagency Coordination Efforts Hampered by the Lack of a National Communication Strategy. GAO-05–323. Washington, DC: GAO, April.Google Scholar
Vila, B.J. and Cohen, L.E.. (1993). Crime as strategy: Testing an evolutionary ecological theory of expropriative crime. American Journal of Sociology, 98(4), 873–912.CrossRefGoogle Scholar
Vila, B. (1994). A general paradigm for understanding criminal behavior: Extending evolutionary ecological theory. Criminology, 32(3), 501–549.CrossRefGoogle Scholar
Vila, B (1997). Human nature and crime control: Improving the feasibility of nurturant strategies. Politics and the Life Sciences, 16(1), 3–21.CrossRefGoogle Scholar
Vila, B (1997). Motivating and Marketing Nurturant Crime Control Strategies. Politics and the Life Sciences, 16(1), 48–55.CrossRefGoogle Scholar
Weinberg, L., Pedahzur, A. and Hirsch-Hoefler, S. (2004). The challenges of conceptualizing terrorism. Terrorism and Political Violence, 16(4), 777–794.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×