Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-p9bg8 Total loading time: 0 Render date: 2024-12-25T04:39:55.244Z Has data issue: false hasContentIssue false

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

Published online by Cambridge University Press:  09 August 2023

Anne R. Bradley
Affiliation:
The Fund for American Studies, Washington
Christopher J. Coyne
Affiliation:
George Mason University, Virginia
Abigail R. Hall
Affiliation:
University of Tampa, Florida

Summary

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.
Get access
Type
Element
Information
Online ISBN: 9781108682534
Publisher: Cambridge University Press
Print publication: 31 August 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abadie, A. (2006). Poverty, political freedom, and the roots of terrorism. American Economic Review, 96(2), 5056.Google Scholar
Abrahms, M. (2008). What terrorists really want: terrorist motives and counterterrorism strategy. International Security, 32(4), 78105.Google Scholar
Ackerman, G., Abhayaratne, P., Bale, J. et al. (2006). Assessing Terrorist Motivations for Attacking Critical Infrastructure. Report No. UCRL-TR-227068. Livermore, CA: Lawrence Livermore National Lab. https://doi.org/10.2172/902328.Google Scholar
Alchian, A. A., and Allen, W. R. (1983). Exchange and Production: Competition, Coordination, and Control. Belmont, CA: Wadsworth.Google Scholar
Aligica, P. D. (2015). Addressing limits to mainstream economic activity of voluntary and nonprofit organizations: the “Austrian” alternative. Nonprofit and Voluntary Sector Quarterly, 44(5), 10261040.Google Scholar
Aligica, P. D. (2018). Public Entrepreneurship, Citizenship, and Self-Governance. Cambridge: Cambridge University Press.Google Scholar
Aligica, P. D., Boettke, P. J., and Tarko, V. (2019). Public Governance and the Classical-Liberal Perspective. New York: Oxford University Press.Google Scholar
Al-Salhy, S., and Arango, T. (2014). “Sunni militants drive Iraqi army out of Mosul.” New York Times, June 10. www.nytimes.com/2014/06/11/world/middleeast/militants-in-mosul.html.Google Scholar
Anderton, C. H., and Carter, J. R. (2005). On rational choice theory and the study of terrorism. Defence and Peace Economics, 16(4), 275282.CrossRefGoogle Scholar
Anderton, C. H., and Carter, J. R. (2006). Applying intermediate microeconomics to terrorism. Journal of Economic Education, 37(4), 442458.Google Scholar
Balko, R. (2014). Rise of the Warrior Cop: The Militarization of America’s Police Forces. New York: Public Affairs.Google Scholar
Basuchdoudhary, A., and Shughart, W. F. (2010). On ethnic conflict and the origins of transnational terrorism. Defence and Peace Economics, 21(1), 6587.Google Scholar
Beccaro, A. (2020). ISIS in Libya and beyond, 2014–2016.Journal of North African Studies, 27(1), 160179.Google Scholar
Bennett, J. T. (2017). Homeland Security Scams. New Brunswick, NJ: Transaction Publishers.Google Scholar
Bergen, P. N. D. (n.d.). “September 11 attacks.” Encyclopedia Britannica. https://bit.ly/3LHMCPj.Google Scholar
Berman, E. (2003). Hamas, Taliban, and the Jewish underground: an economist’s view of radical religious militias. NBER Working Paper No. 10004. www.nber.org/papers/w10004.CrossRefGoogle Scholar
Berman, E., and Iannaccone, L. R. (2006). Religious extremism: the good, the bad, and the deadly. Public Choice, 128(1), 109129.Google Scholar
Berman, E., and Laitin, D. (2005). Hard targets: theory and evidence on the tactical use of suicide attacks. NBER Working Paper No. 11740. www.nber.org/papers/w11740.Google Scholar
Berniker, M. (2002). “Afghanistan: back to bad opium habits.” Asia Times, December 25. www.latimes.com/atimes/Central_Asia/DL25Ag01.html.Google Scholar
Bhui, K., James, A., and Wessely, S. (2016). Mental illness and terrorism. British Medical Journal, 354(i4869), 12.Google Scholar
Boettke, P. J. (2018). Economics and public administration. Southern Economic Journal, 84(4), 938959.CrossRefGoogle Scholar
Boettke, P. J. (2021). The Struggle for a Better World. Arlington, VA: Mercatus Center at George Mason University.Google Scholar
Boettke, P. J., and Coyne, C. J. (2007). Liberalism in the post-9/11 world. Indian Journal of Economics & Business, Special Issue, 3553.Google Scholar
Boettke, P. J., Coyne, C. J., and Leeson, P. T. (2008). Institutional stickiness and the new development economics. American Journal of Economics and Sociology, 67(2), 331358.Google Scholar
Boettke, P. J., and Prychitko, D. L. (2004). Is an independent nonprofit sector prone to failure? Toward an Austrian school interpretation of nonprofit and voluntary action. Conversations on Philanthropy, 1, 140.Google Scholar
Boettke, P. J., and Storr, V. H. (2002). Post-classical political economy: polity, society and economy in Weber, Mises, and Hayek. American Journal of Economics and Sociology, 61(1), 161191.Google Scholar
Bohanon, C., and Van Cott, T. N. (2002). Now more than ever, your vote doesn’t matter. Independent Review, 6(4), 591595.Google Scholar
Boudreaux, D. J. (1996). Was your high school civics teacher right after all? Donald Wittman’s The Myth of Democratic Failure. Independent Review, 1(1), 111128.Google Scholar
Brenan, M. (2021). “Cyberterrorism tops list of 11 potential threats to the U.S.” Gallup, March 22. https://bit.ly/3Hp95hc.Google Scholar
Brennan, J. (2016). Against Democracy. Princeton, NJ: Princeton University Press.Google Scholar
Brumfield, C. (2021). “US Congress tees up ambitious cybersecurity agenda in the wake of supply chain, ransomware attacks.” CSO, June 14. https://bit.ly/3Hr1OgZ.Google Scholar
Buchanan, J. M. (1949). The pure theory of government finance. Journal of Political Economy, 57(6), 496505.Google Scholar
Buchanan, J. M. (1954). Social choice, democracy, and free markets. Journal of Political Economy, 62(2), 114123.Google Scholar
Buchanan, J. M. (1959). Positive economics, welfare economics, and political economy. Journal of Law and Economics, 2, 124138.Google Scholar
Buchanan, J. M. (1969). Cost and Choice: An Inquiry Into Economic Theory. Chicago, IL: University of Chicago Press.Google Scholar
Buchanan, J. M. (1979). Natural and artificial man. In What Should Economists Do? Indianapolis, IN: Liberty Fund Books, pp. 93114.Google Scholar
Bueno de Mesquita, E. (2008). The political economy of terrorism: a selective overview of recent work. Political Economist, 10(1), 112.Google Scholar
Bush, G. W. (2001a). “Remarks by the President upon arrival: the South Lawn.” September 16. https://bit.ly/3oO4krb.Google Scholar
Bush, G. W. (2001b). “Address to a joint session of [the 107th] Congress and the American people.” September 20. https://bit.ly/3ngukeu.Google Scholar
Capellan, J. A. (2015). Lone wolf terrorist or deranged shooter? A study of ideological active shooter events in the United States, 1970–2014. Studies in Conflict & Terrorism, 38(6), 395413.Google Scholar
Caplan, B. (2006). Terrorism: The relevance of the rational choice model. Public Choice, 128(1–2), 91107.Google Scholar
Chaliand, G., and Blin, A. (eds.). (2016). The History of Terrorism: From Antiquity to ISIS. Oakland: University of California Press.Google Scholar
Chamlee-Wright, E. (2010). The Cultural and Political Economy of Recovery: Social Learning in a Post-Disaster Environment. New York: Routledge.Google Scholar
Chamlee-Wright, E., and Myers, J. A. (2008). Discovery and social learning in non-priced environments: an Austrian view of social network theory. Review of Austrian Economics, 21(2), 151166.Google Scholar
Chenoweth, E. (2010). Democratic pieces: democratization and the origins of terrorism. In Reuveny, R. and Thompson, W. R. (eds.) Coping with Terrorism: Origins, Escalation, Counterstrategies, and Responses. Albany: State University of New York Press, pp. 97123.Google Scholar
Chenoweth, E. (2013). Terrorism and democracy. Annual Review of Political Science, 16, 355378.Google Scholar
Coggins, B. L. (2015). Does state failure cause terrorism? An empirical analysis (1999–2008). Journal of Conflict Resolution, 59(3), 455483.Google Scholar
Cooley, J. (1999). Unholy Wars: Afghanistan, American, and International Terrorism. London: Pluto Press.Google Scholar
Cordesman, A. H., Loi, C., and Kocharlakota, V. (2010). “IED metrics for Iraq: June 2003–September 2010.” Center for Strategic and International Studies, November 11. www.csis.org/analysis/afghan-and-iraqi-metrics-and-ied-threat.Google Scholar
Corwin, E. S. (1947). Total War and the Constitution. New York: Alfred Knopf.Google Scholar
Council of State Governments, and Eastern Kentucky University. (2006). “The impact of terrorism on state law enforcement: adjusting to new roles and changing conditions.” December. www.ncjrs.gov/pdffiles1/nij/grants/216642.pdf.Google Scholar
Coyne, C. J. (2008). After War: The Political Economy of Exporting Democracy. Stanford, CA: Stanford University Press.Google Scholar
Coyne, C. J. (2013). Doing Bad by Doing Good: Why Humanitarian Action Fails. Stanford, CA: Stanford University Press.Google Scholar
Coyne, C. J. (2015). Lobotomizing the defense brain. Review of Austrian Economics, 28(4), 371396.Google Scholar
Coyne, C. J. (2018). The protective state. In Boettke, P. J. and Stein, S. (eds.) Buchanan’s Tensions: Reexamining the Political Economy and Philosophy of James M. Buchanan. Arlington, VA: Mercatus Center at George Mason University, pp. 149169.Google Scholar
Coyne, C. J. (2020a). Defense, Peace, and War Economics (Elements in Austrian Economics). Cambridge: Cambridge University Press.Google Scholar
Coyne, C. J. (2020b). Introduction: symposium on polycentric systems in a free society. Independent Review, 25(2), 229233.Google Scholar
Coyne, C. J. (2021). Introduction: symposium on the war on terror at twenty. Independent Review, 26(2), 165172.Google Scholar
Coyne, C. J. (2022). In Search of Monsters to Destroy: The Folly of American Empire and the Paths to Peace. Oakland, CA: Independent Institute.Google Scholar
Coyne, C. J., and Boettke, P. J. (2009). The problem of credible commitment in reconstruction. Journal of Institutional Economics, 5(1), 123.Google Scholar
Coyne, C. J., and Bradley, A. R. (2019). Ludwig von Mises on war and the economy. Review of Austrian Economics, 32(3), 215228.Google Scholar
Coyne, C. J., and Goodman, N. P. (2020). Polycentric defense. Independent Review, 25(2), 279292.Google Scholar
Coyne, C. J., Goodman, N. P., and Hall, A. R. (2019). Sounding the alarm: the political economy of whistleblowing in the US security state. Peace Economics, Peace Science, and Public Policy, 25(1), 111.Google Scholar
Coyne, C. J., and Hall, A. R. (2016a). Empire state of mind: the illiberal foundations of liberal hegemony. Independent Review, 21(2), 237250.Google Scholar
Coyne, C. J., and Hall, A. R. (2016b). Foreign intervention, police militarization, and minorities. Peace Review: A Journal of Social Justice, 28(2), 165170.Google Scholar
Coyne, C. J., and Hall, A. R. (2016c). Perfecting tyranny: foreign intervention and experimentation in state control. Independent Review, 19(2), 165189.Google Scholar
Coyne, C. J., and Hall, A. R. (2018). Tyranny Comes Home: The Domestic Fate of U.S. Militarism. Stanford, CA: Stanford University Press.Google Scholar
Coyne, C. J., and Hall, A. R. (2019). State-provided defense as non-comprehensive planning. Journal of Private Enterprise, 34(1), 75109.Google Scholar
Coyne, C. J., and Hall, A. R. (2021). Manufacturing Materialism: U.S. Government Propaganda in the War on Terror. Stanford, CA: Stanford University Press.Google Scholar
Coyne, C. J., Hall, A. R., and Burns, S. (2016). The war on drugs in Afghanistan: another failed experiment with interdiction. Independent Review, 21(1), 95119.Google Scholar
Coyne, C. J., and Lucas, D. S. (2016). Economists have no defense: a critical review of national defense in economics textbooks. Journal of Private Enterprise, 31(4), 6583.Google Scholar
Coyne, C. J., and Mathers, R. L. (2010). The fatal conceit of foreign intervention. Advances in Austrian Economics, 14, 227252.Google Scholar
Coyne, C. J., and Pellillo, A. (2011). Economic reconstruction amidst conflict: insights from Afghanistan and Iraq. Defence and Peace Economics, 22(6), 627643.Google Scholar
Coyne, C. J., and Yatsyshina, Y. (2021). Police state, U.S.A. Independent Review, 26(2), 189204.Google Scholar
Crenshaw, M. (1981). The causes of terrorism. Comparative Politics, 14(4), 379399.Google Scholar
Crenshaw, M. (1995). Introduction. In Crenshaw, M. (ed.) Terrorism in Context. University Park: Pennsylvania State University Press, pp. 324.Google Scholar
Deane, C., Duggan, M., and Morin, R. (2016). “Americans name the 10 most significant historic events of their lifetimes.” Pew Research Center, December 15.https://bit.ly/3NwhWBA.Google Scholar
De la Calle, L., and Sánchez-Cuenca, I. (2012). Rebels without a territory: an analysis of nonterritorial conflicts in the world, 1970–1997. Journal of Conflict Resolution, 56(4), 580603.Google Scholar
DiLorenzo, T. J. (1990). The subjectivist roots of James Buchanan’s economics. Review of Austrian Economics, 4, 180195.CrossRefGoogle Scholar
Donohue, L. K. (2008). The Cost of Counterterrorism: Power, Politics, and Liberty. New York: Cambridge University Press.Google Scholar
Dorsen, N. (1989). Foreign affairs and civil liberties. American Journal of International Law, 83(4), 840850.Google Scholar
Downs, Anthony. (1957). An Economic Theory of Democracy. New York: Harper.Google Scholar
Duncan, T. K., and Coyne, C. J. (2013a). The overlooked costs of the permanent war economy: a market process approach. Review of Austrian Economics, 26(4), 413431.Google Scholar
Duncan, T. K., and Coyne, C. J. (2013b). The origins of the permanent war economy. Independent Review, 18(2), 219240.Google Scholar
Duncan, T. K., and Coyne, C. J. (2015). The political economy of foreign intervention. In Boettke, P. J. and Coyne, C. J. (eds.) The Oxford Handbook of Austrian Economics. New York: Oxford University Press, pp. 678697.Google Scholar
Electronic Privacy Information Center. (2021). “Total ‘Terrorism’ Information Awareness (TIA).” https://epic.org/privacy/profiling/tia/#introduction.Google Scholar
El Taraboulsi-McCarthy, S., Al-Bayati, G., Metcalfe-Hough, V., and Adamczyk, S. (2019). Protection of displaced Libyans. Humanitarian Policy Group Working Paper. https://odi.org/en/publications/protection-of-displaced-libyans-risks-responses-and-border-dynamics/.Google Scholar
Enders, W., and Sandler, T. (2000). Is transnational terrorism becoming more threatening? A time-series investigation. Journal of Conflict Resolution, 44(3), 307332.Google Scholar
Enders, W., and Sandler, T. (2004). What do we know about the substitution effect in transnational terrorism? In Silke, A. (eds.) Research on Terrorism. London: Routledge, pp. 119137.Google Scholar
Enders, W., and Sandler, T. (2012). The Political Economy of Terrorism. New York: Cambridge University Press.Google Scholar
Eubank, W. L., and Weinberg, L. (1994). Does democracy encourage terrorism? Terrorism and Political Violence, 6(4), 417435.Google Scholar
Executive Order 13228. (2001). “Establishing the Office of Homeland Security and the Homeland Security Council.” Federal Register: The Daily Journal of the United States Government. October 8. https://bit.ly/3HkhzGD.Google Scholar
Eyerman, J. (1998). Terrorism and democratic states: soft targets or accessible systems. International Interactions, 24(2), 151170.Google Scholar
Fair, E. (2016). Consequence: A Memoir. New York: Henry Holt & Company.Google Scholar
Fallon, M. (2017). Unjustifiable Means: The Inside Story of How the CIA, Pentagon, and US Government Conspired to Torture. New York: Regan Arts.Google Scholar
Fawaz, G. A. (2016). ISIS: A History. Princeton, NJ: Princeton University Press.Google Scholar
Fearon, J. D., and Laitin, D. D. (1996). Explaining interethnic cooperation. American Political Science Review, 90(4), 715735.Google Scholar
Felbab-Brown, V. (2009). Shooting Up: Counterinsurgency and the War on Drugs. Washington, DC: Brookings Institute Press.Google Scholar
Fishstein, P., and Wilder, A. (2012). “Winning hearts and minds? Examining the relationship between aid and security.” Tufts Security: Feinstein International Center. https://bit.ly/42391eY.Google Scholar
Foreign Broadcast Information Service. (2004). “Compilation of Usama Bin Ladin statements: 1994–January 2004.” https://irp.fas.org/world/para/ubl-fbis.pdf.Google Scholar
Fraenkel, O. K. (1946). War, civil liberties, and the supreme court. Yale Law Journal, 55(4), 715734.Google Scholar
Frankovic, K. (2021). “Americans support decision to withdraw U.S. force from Afghanistan.” YouGov America, April 23. https://bit.ly/3LCZ9Dy.Google Scholar
Frey, B. (2004). Dealing with Terrorism – Stick or Carrot? Cheltenham: Edward Elgar.Google Scholar
Frey, B., and Luechinger, S. (2004). Decentralization as a disincentive for terrorism. European Journal of Political Economy, 20(2), 509515.Google Scholar
Fustos, K. (2011). “The Global Muslim Population.” Population Reference Bureau, June 3. www.prb.org/resources/the-global-muslim-population/.Google Scholar
Gadarian, S. K. (2010). The politics of threat: how terrorism news shapes foreign policy attitudes. Journal of Politics, 72(2), 469483.Google Scholar
Gaibulloev, K., and Sandler, T. (2019). What we have learned about terrorism since 9/11. Journal of Economic Literature, 57(2), 275328.Google Scholar
Ganor, B. (2002). Defining terrorism: is one man’s terrorist another man’s freedom fighter? Police Practice and Research, 3(4), 287304.Google Scholar
Gates, R. (2014). “The quiet fury of Robert Gates.” Wall Street Journal, January 7. www.wsj.com/articles/SB10001424052702304617404579306851526222552.Google Scholar
Gelman, A., Silver, N., and Edlin, A. (2012). What is the probability your vote will make a difference? Economic Inquiry, 50(2), 321326.Google Scholar
Gjoza, E. (2019). De-risking and the knowledge problem: the unseen consequences of financial sanctions. In Haeffele, S., Hall, A. R., and Millsap, A. (eds.) Informing Public Policy: Analyzing Contemporary U.S. and International Policy Issues Through the Lens of Market Process Economics. New York: Rowman & Littlefield International, pp. 171192.Google Scholar
Glennon, M. J. (2015). National Security and Double Government. New York: Oxford University Press.Google Scholar
Glenza, J., and Woolf, N. (2015). “Stingray spying: FBI’s secret deal with police hides phone dragnet with courts.” Guardian, April 10. https://bit.ly/3oTrCvW.Google Scholar
Global Terrorism Database. (2021). “Global Terrorism Database.” University of Maryland National Consortium for the Study of Terrorism and Responses to Terrorism. https://bit.ly/44equmH.Google Scholar
Goepner, E. (2016). Measuring the effectiveness of America’s war on terror. US Army War College Quarterly: Parameters, 46(1), 107120.Google Scholar
Goodhand, J. (2005). Frontiers and wars: the opium economy in Afghanistan. Journal of Agrarian Change, 5(2), 191216.Google Scholar
Goodman, N. P., and Coyne, C. J. (2022). U.S. border militarization and foreign policy: a symbiotic relationship. Economics of Peace and Security Journal, 17(1), 516.Google Scholar
Hall, A. R., and Coyne, C. J. (2013). The militarization of U.S. domestic policy. Independent Review, 17(4), 485504.Google Scholar
Hall, A. R., Hassell, J. T., and Fitch, C. H. (2021). Militarized extremism: the radical right and the war on terror. Independent Review, 26(2), 225242.Google Scholar
Hammond, R. A., and Axelrod, R. (2006). The evolution of ethnocentrism. Journal of Conflict Resolution, 50(6), 926936.Google Scholar
Hampton, T. (2006). “Health effects from 9/11.” JAMA Network, May 24. https://jamanetwork.com/journals/jama/fullarticle/202894.Google Scholar
Hassan, N. (2001). “An arsenal of believers: talking to the ‘human bombs.’” The New Yorker, November 19. www.newyorker.com/magazine/2001/11/19/an-arsenal-of-believers.Google Scholar
Hayek, F. A. (1945). The use of knowledge in society. American Economic Review, 4(35), 519530.Google Scholar
Hayek, F. A. (1979). The Political Order of a Free People. Vol. III of Law Legislation and Liberty. Chicago, IL: University of Chicago Press.Google Scholar
Heckelman, J. C. (2003). Now more than ever, your vote doesn’t count: a reconsideration. Independent Review, 7(4), 599601.Google Scholar
Henderson, D. (2016). An economist’s case for a noninterventionist foreign policy. Independent Review, 21(2), 199217.Google Scholar
Higgs, R. (1987). Crisis and Leviathan: Critical Episodes in the Growth of American Government. New York: Oxford University Press.Google Scholar
Higgs, R. (2004). Against Leviathan: Government Power and a Free Society. Oakland, CA: Independent Institute.Google Scholar
Higgs, R. (2006). Depression, War, and Cold War: Studies in Political Economy. New York: Oxford University Press.Google Scholar
Higgs, R. (2007). Neither Liberty nor Safety: Fear, Ideology, and the Growth of Government. Oakland, CA: Independent Institute.Google Scholar
Higgs, R. (2008). The complex course of ideological change. American Journal of Economics and Sociology, 67(4), 547565.Google Scholar
Higgs, R. (2012). Delusions of Power: New Explorations of the State, War, and the Economy. Oakland, CA: Independent Institute.Google Scholar
Hoffman, B. (2017). Inside Terrorism. 3rd ed. New York: Columbia University Press.Google Scholar
Hoffman, B., and McCormick, G. (2004). Terrorism, signaling, and suicide attack. Studies in Conflict and Terrorism, 27, 243281.Google Scholar
Holmes, A. (2020). “The NSA phone-spying program exposed by Edward Snowden didn’t stop a single terrorist attack, federal judge finds.” Insider, September 2. www.businessinsider.com/nsa-phone-snooping-illegal-court-finds-2020-9.Google Scholar
Horton, S. (2017). Fool’s Errand: Time to End the War in Afghanistan. Austin, TX: Libertarian Institute.Google Scholar
H.R. 3162. (2001). “Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA PATRIOT ACT) act of 2001.” www.congress.gov/bill/107th-congress/house-bill/3162.Google Scholar
Iannaccone, L. B. (2006). The market for martyrs. International Journal of Research and Religion, 2(4), 128.Google Scholar
Institute for Economics and Peace. (2020). “Global terrorism index 2020: measuring the impact of terrorism.” Vision of Humanity. Sydney, November. http://visionofhumanity.org/reports.Google Scholar
Johnson, J. (2016). “Statement by Secretary Jeh Johnson according first round of DHS’s countering violent extremism grants.” U.S. Department of Homeland Security, January 13. https://bit.ly/3Nna2uz.Google Scholar
Joint Chiefs of Staff. (2014). “Counterterrorism.” Joint Publication 3-26, October 24. www.hsdl.org/?view&did=759133.Google Scholar
Jones, J. M. (2020). “Record high say U.S. defense spending is ‘about right.’” Gallup, March 16. https://news.gallup.com/poll/288761/record-high-say-defense-spending-right.aspx.Google Scholar
Jordan, H. T., Osahan, S., Li, J. et al. (2019). Persistent mental and physical health impact of exposure to the September 11, 2001 world trade center terror attacks. Environmental Health, 18(12), 116.Google Scholar
Karuri, K. (2016). “Obama: aftermath of Gaddafi overthrow, ‘worst mistake as president.’” Africa News, November 4. https://bit.ly/3Hjdnac.Google Scholar
Katzman, K., and Thomas, C. (2017). “Afghanistan: post-Taliban governance, security, and U.S. policy.” Congressional Research Service, December 13. https://sgp.fas.org/crs/row/RL30588.pdf.Google Scholar
Kennedy, R. (1999). Is one person’s terrorist another’s freedom fighter? Western and Islamic approaches to “just war” compared. Terrorism and Political Violence, 11(1), 121.Google Scholar
Kenyon, J., Baker-Beall, C., and Binder, J. (2021). Lone-actor terrorism – a systematic literature review. Studies in Conflict & Terrorism. https://doi.org/10.1080/1057610X.2021.1892635.Google Scholar
Kirzner, I. M. (1973). Competition and Entrepreneurship. Chicago, IL: University of Chicago Press.Google Scholar
Kirzner, I. M. (1985). Discover and the Capitalist Process. Chicago, IL: University of Chicago Press.Google Scholar
Kirzner, I. M. (1997). Entrepreneurial discovery and the competitive market process. Journal of Economic Literature, 35(1), 6085.Google Scholar
Kirzner, I. M. (2000). The Driving Force of the Market: Essays in Austrian Economics. London: Routledge.Google Scholar
Koppl, R. (2018). Expert Failure. New York: Cambridge University Press.Google Scholar
Krieger, T., and Meierrieks, D. (2011). What causes terrorism? Public Choice, 147, 327.Google Scholar
Krueger, A., and Malečková, J. (2003). Education, poverty and terrorism: is there a causal connection? Journal of Economic Perspectives, 17(4), 119144.Google Scholar
Kurrild-Klitgaard, P., Justesen, M. K., and Klemmensen, R. (2006). The political economy of freedom, democracy, and transnational terrorism. Public Choice, 128(1), 289315.Google Scholar
Kydd, A., and Walter, B. F. (2002). Sabotaging the peace: The politics of extremist violence. International Organization, 56(2), 263296.Google Scholar
Landes, W. M. (1978). An economic study of US aircraft hijackings, 1961–1976. Journal of Law and Economics, 2(1), 131.Google Scholar
Laqueur, W. (1987). The Age of Terrorism. Boston, MA: Little, Brown & Company.Google Scholar
Laqueur, W. (1999). The New Terrorism: Fanaticism and the Arms of Mass Destruction. New York: Oxford University Press.Google Scholar
Larémont, R. R. (2013). After the fall of Qaddafi: political, economic, and security consequences for Libya, Mali, Niger, and Algeria. Stability: International Journal of Security Development, 2(2), 18.Google Scholar
Law, R. D. (2009). Terrorism: A History. Cambridge: Polity Press.Google Scholar
Law, R. D. (ed.). (2015). The Routledge History of Terrorism. New York: Routledge.Google Scholar
Law, R. D. (2016). Terrorism: A History. 2nd ed. Cambridge: Polity Press.Google Scholar
Law, R. D. (2020). The evolution of terrorism: historical underpinnings and the development of group terrorism. In Ireland, C. A., Lewis, M., Lopez, A. C., and Ireland, J. L. (eds.) The Handbook of Collective Violence: Current Developments and Understanding. Abingdon: Routledge, pp. 8599.Google Scholar
Lee, A. (2011). Who becomes a terrorist? Poverty, education, and the origins of political violence. World Politics, 63(2), 203245a.Google Scholar
Levy, D. M., and Peart, S. J. (2017). Escape from Democracy: The Role of Experts and the Public in Economic Policy. New York: Cambridge University Press.Google Scholar
Lichbach, M. (1994). Rethinking rationality and rebellion: theories of collective action and problems of collective dissent. Rationality and Society, 6(1), 839.Google Scholar
Lichbach, M. (1996). The Cooperator’s Dilemma. Ann Arbor: University of Michigan Press.Google Scholar
Lichtblau, E., and Risen, J. (2009a). “Officials say U.S. wiretaps exceed law.” New York Times, April 16. www.nytimes.com/2009/04/16/us/16nsa.html.Google Scholar
Lichtblau, E., and Risen, J. (2009b). “U.S. wiretapping of limited value, officials report.” New York Times, July 10. www.nytimes.com/2009/07/11/us/11nsa.html.Google Scholar
Lum, C., Kennedy, L. W., and Sherley, A. (2006). Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology, 2, 489516.Google Scholar
Lutz, J. M., and Lutz, B. J. (2005). Definitions, classifications, and causes. In Terrorism: Origins and Evolutions. New York: Palgrave Macmillan, pp. 618.Google Scholar
Mansfield, D. (2020). Trying to be all things to all people: alternative development in Afghanistan. In Buxton, J., Chinery-Hesse, M., and Tinaste, K. (eds.) International Development Policy, Vol. 12. Geneva: Geneva Graduate Institute.Google Scholar
McCartney, J., and McCartney, S. (2015). America’s War Machine: Vested Interests, Endless Conflict. New York: Thomas Dunne Books.Google Scholar
McCloskey, D. N. (2019). Why Liberalism Works: How True Liberal Values Produce a Freer, More Equal, Prosperous World for All. New Haven, CT: Yale University Press.Google Scholar
McCloskey, D. N., and Carden, A. (2020). Leave Me Alone and I’ll Make You Rich: How the Bourgeois Deal Enriched the World. Chicago, IL: University of Chicago Press.Google Scholar
McCoy, A. (2007). A Question of Torture: CIA Interrogation, from the Cold War to the War on Terror. New York: Henry Holt & Company.Google Scholar
Melman, S. (1970). Pentagon Capitalism: The Political Economy of War. New York: McGraw-Hill.Google Scholar
Melman, S. (1974). The Permanent War Economy: American Capitalism in Decline. New York: Simon & Schuster.Google Scholar
Mises, L. (1996). Liberalism: The Classical Tradition. Irvington-on-Hudson, NY: Foundation for Economic Education.Google Scholar
Mises, L. (1998). Human Action: A Treatise on Economics. Auburn, AL: Ludwig von Mises Institute.Google Scholar
Mueller, D. C. (2003). Public Choice III. Cambridge: Cambridge University Press.Google Scholar
Mueller, J. (2006). Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: Free Press.Google Scholar
Mueller, J. (2021). The Stupidity of War: American Foreign Policy and the Case for Complacency. New York: Cambridge University Press.Google Scholar
Mueller, J., and Stewart, M. G. (2011). Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security. New York: Oxford University Press.Google Scholar
Mueller, J., and Stewart, M. G. (2018). Public Opinion and Counterterrorism Policy. Washington, DC: Cato Institute. https://bit.ly/3Wndtnh.Google Scholar
Mueller, J., and Stewart, M. G. (2021). Terrorism and bathtubs: comparing and assessing the risk. Terrorism and Political Violence, 1, 138163.CrossRefGoogle Scholar
Murtazashvili, I., and Murtazashvili, J. B. (2019). The political economy of state building. Journal of Public Finance and Public Choice, 34(2), 189207.Google Scholar
Murtazashvili, J. B. (2016). Informal Order and the State in Afghanistan. New York: Cambridge University Press.Google Scholar
Murtazashvili, J. B., and Murtazashvili, I. (2020). Wealth-destroying states. Public Choice, 182(3), 353371.Google Scholar
Murtazashvili, J. B., and Murtazashvili, I. (2021). Land, the State, and War: Property Institutions and Political Order in Afghanistan. New York: Cambridge University Press.Google Scholar
National Commission on Terrorist Attacks. (2004). The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. Authorized ed. New York: W.W. Norton & Company.Google Scholar
Neily, C. (2021). “Are a disproportionate number of federal judges former government advocates?” CATO Institute. https://bit.ly/41OVVCq.Google Scholar
Niskanen, W. A. (1971). Bureaucracy and Representative Government. Chicago, IL: Aldine-Atherton.Google Scholar
Niskanen, W. A. (1975). Bureaucrats and politicians. Journal of Law and Economics, 18(3), 617643.Google Scholar
Niskanen, W. A. (2001). Bureaucracy. In Shughart, W. F. II and Razzolini, L. (eds.) The Elgar Companion to Public Choice. Cheltenham: Edward Elgar, pp. 258270.Google Scholar
Oberschall, A. (2006). Explaining terrorism: the contribution of collective action theory. Sociological Theory, 22(4), 2637.Google Scholar
Olson, M. (1965). The Logic of Collective Action: Public Goods and the Theory of Groups. Cambridge, MA: Harvard University Press.Google Scholar
Palagashvili, L., Piano, E., and Skarbek, D. (2017). The Decline and Rise of Institutions: A Modern Survey of the Austrian Contributions to the Economic Analysis of Institutions (Elements in Austrian Economics). Cambridge: Cambridge University Press.Google Scholar
Pape, R. A. (2003). The strategic logic of suicide terrorism. American Political Science Review, 97(3), 119.Google Scholar
Pape, R. A. (2005). Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.Google Scholar
Perl, R. (2007). “Combating terrorism: the challenge of measuring effectiveness.” Congressional Research Service. https://sgp.fas.org/crs/terror/RL33160.pdf.Google Scholar
Piazza, J. A. (2013). Regime age and terrorism: are new democracies prone to terrorism? International Interactions, 39(2), 246263.Google Scholar
Posner, E. A., and Vermeule, A. (2007). Terror in the Balance: Security, Liberty, and the Courts. New York: Oxford University Press.Google Scholar
Prados, A. B., and Blanchard, C. M. (2004). “Saudi Arabia: terrorist financing issues.” Congressional Research Service Report to Congress. https://fas.org/irp/crs/RL32499.pdf.Google Scholar
Priest, D., and Arkin, W. M. (2011). Top Secret America: The Rise of the New American Security State. New York: Little, Brown, & Company.Google Scholar
Psaki, J. (2021). “Press briefing by press secretary Jen Psaki and national economic director Brian Deese.” White House, January 22. https://bit.ly/41KnUTO.Google Scholar
Law, Public 107-40. (2001). “Authorization for use of military force.” September 18. www.congress.gov/107/plaws/publ40/PLAW-107publ40.pdf.Google Scholar
Law, Public 107-243. (2002). “Authorization for use of military force.” October 16. www.congress.gov/107/plaws/publ243/PLAW-107publ243.pdf.Google Scholar
Rathbone, A., and Rowley, C. K. (2002). Terrorism. Public Choice, 111(1–2), 918.Google Scholar
Rehnquist, W. H. (1998). All the Laws but One: Civil Liberties in Wartime. New York: Vintage Books.Google Scholar
Rejali, D. (2007). Torture and Democracy. Princeton, NJ: Princeton University Press.Google Scholar
Reksulak, M., Razzolini, L., and Shughart, W. F. II (2014). The Elgar Companion to Public Choice. 2nd ed. Northampton: Edward Elgar.Google Scholar
Risen, J., and Lichtblau, E. (2005). “Bush lets U.S. spy on callers without courts: secret order to widen domestic monitoring.” New York Times, December 16. www.pulitzer.org/winners/james-risen-and-eric-lichtblau.Google Scholar
Ritchie, H., Hasell, J., Appel, C., and Roser, M. (2019). “Terrorism.” Our World in Data. https://ourworldindata.org/terrorism.Google Scholar
Rossiter, C. (2009 [1948]). Constitutional Dictatorship: Crisis Government in the Modern Democracies. New Brunswick, NJ: Transaction Publishers.Google Scholar
Roth, J., Greenburg, D., and Wille, S. (n.d.). “Monograph on terrorist financing.” National Commission on Terrorist Attacks Upon the United States. https://bit.ly/3NiPIKN.Google Scholar
Roos, D. (2020). “5 ways September 11 changed America.” History.com, March 10. www.history.com/news/september-11-changes-america.Google Scholar
Rowley, C. K., and Schneider, F. (2004). The Encyclopedia of Public Choice (2 vols.). New York: Springer.Google Scholar
Sageman, M. (2008). How to study terrorism in the twenty-first century. In Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, pp. 1328.Google Scholar
Sandler, T. (2015). Terrorism and counterterrorism: an overview. Oxford Economic Papers, 67(1), 120.Google Scholar
Sandler, T., and Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301316.Google Scholar
Savage, C. (2020). “U.S. seizes bitcoin said to be used to finance terrorist groups.” New York Times, August 13. www.nytimes.com/2020/08/13/us/politics/bitcoin-terrorism.html.Google Scholar
Savell, S. (2021). “United States counterterrorism operations 2018–2020.” Cost of War Project, Brown University, February. https://bit.ly/3AVVElD.Google Scholar
Schiemann, J. W. (2012). Interrogational torture: or how good guys get bad information with ugly methods. Political Research Quarterly, 65(1), 319.Google Scholar
Schiemann, J. W. (2015). Does Torture Work? New York: Oxford University Press.Google Scholar
Schmid, A. P. (1983). Political Terrorism: A Research Guide to Concepts, Theories, Data Bases, and Literature. New Brunswick, NJ: Transaction Books.Google Scholar
Schmid, A. P. (1992). Terrorism and democracy. Terrorism and Political Violence, 4(4), 1425.Google Scholar
Schneider, F., Brück, T., and Meierrieks, D. (2014). The economics of counterterrorism: a survey. Journal of Economic Surveys, 29(1), 131157.Google Scholar
Schweich, T. (2006). “Is Afghanistan a narco-state?” New York Times, July 27. www.nytimes.com/2008/07/27/magazine/27AFGHAN-t.html?_r&_r=0.Google Scholar
Shughart, W. (2006). An analytical history of terrorism. Public Choice, 128(1), 739.Google Scholar
Shughart, W. (2011). Terrorism in rational choice perspective. In Coyne, C. J. and Mathers, R. L. (eds.) The Handbook on the Political Economy of War. Cheltenham: Edward Elgar, pp. 126154.Google Scholar
Simpson, G. R. (2003). “List of early al Qaeda doners points to Saudi elite, charities.” Wall Street Journal, March 18. www.wsj.com/articles/SB104794563734573400.Google Scholar
Sidner, S., Rappard, A.-M., and Cohen, M. (2021). “Disproportionate number of current and former military personnel arrested in capitol attack, CNN analysis shows.” CNN, February 4. www.cnn.com/2021/01/31/us/capitol-riot-arrests-active-military-veterans-soh/index.html.Google Scholar
Slahi, M. O. (2015). Guantanamo Diary. New York: Back Bay Books.Google Scholar
Somin, I. (2013). Democracy and Political Ignorance: Why Smaller Government Is Smarter. Stanford, CA: Stanford University Press.Google Scholar
Sopko, J. F. (2014). “Future U.S. counternarcotics efforts in Afghanistan.” Testimony before the Caucus on International Narcotics Control, U.S. Senate, 113th Congress, 2nd session, January. https://bit.ly/3Myreew.Google Scholar
Sprinzak, E. (2009). “Rational fanatics.” Foreign Policy, November 20. https://foreignpolicy.com/2009/11/20/rational-fanatics/.Google Scholar
Steinhauer, J. (2015). “With chairmanship, McCain seizes chance to reshape Pentagon agenda.” New York Times, June 8. https://bit.ly/3ngDqIb.Google Scholar
Stephen, C. (2016). “Libya faces influx of migrants seeking new routes to Europe.” Guardian, April 9. www.theguardian.com/world/2016/apr/09/libya-influx-migrants-europe.Google Scholar
Storr, V. H. (2008). The market as a social space: on the meaningful extraeconomic conversations that can occur in markets. Review of Austrian Economics, 21(2), 135150.Google Scholar
Storr, V. H., and Choi, G. S. (2019). Do Markets Corrupt Our Morals? New York: Palgrave Macmillan.Google Scholar
Storr, V. H., Haeffele-Balch, S., and Grube, L. E. (2015). Community Revival in the Wake of Disaster: Lessons in Local Entrepreneurship. New York: Palgrave Macmillan.Google Scholar
Storr, V. H., Haeffele-Balch, S., and Grube, L. E. (2017). Social capital and social learning after Hurricane Sandy. Review of Austrian Economics, 30(4), 447467.Google Scholar
Straits Times. (2017). “Once promised paradise, ISIS fighters end up in mass graves.” October 15. https://bit.ly/3LBpyBF.Google Scholar
Sufizada, H. (2020). “The Taliban are megarich – here’s where they get the money they use to wage war in Afghanistan.” The Conversation, December 8. https://bit.ly/3Vi4K5x.Google Scholar
Tarnoff, C. (2012). “Afghanistan: U.S. foreign assistance.” Congressional Research Service, Washington, DC. www.hsdl.org/?view&did=723512.Google Scholar
Thrall, A. T., and Cramer, J. K. (eds.). (2009). American Foreign Policy and the Politics of Fear: Threat Inflation since 9/11. New York: Routledge.Google Scholar
Tocqueville, A. de (1969). Democracy in America, ed. Mayer, J. P., trans. G. Lawrence. New York: Doubleday.Google Scholar
Tullock, G. (1965). The Politics of Bureaucracy. Washington, DC: Public Affairs Press.Google Scholar
Twining, D. (2009). “Don’t move the goalposts on Afghanistan.” Foreign Policy, January 28. https://foreignpolicy.com/2009/01/28/dont-move-the-goalposts-on-afghanistan/.Google Scholar
United Nations Office on Drugs and Crime. (2014). “World Drug Report 2014.” www.unodc.org/wdr2014/.Google Scholar
United Nations Office on Drugs and Crime. (2020). “World Drug Report 2020.” https://wdr.unodc.org/wdr2020/.Google Scholar
United Nations Office on Drugs and Crime. (2021). “Afghanistan Opium Survey 2019.” https://bit.ly/3Hj9imo.Google Scholar
United States Court of Appeals for the Ninth Circuit. (2020). United States v. Moalin, September 2. https://cdn.ca9.uscourts.gov/datastore/opinions/2020/09/02/13-50572.pdf.Google Scholar
United States Department of Homeland Security. (2003). “Securing the homeland, strengthening the nation.” www.dhs.gov/publication/securing-homeland-strengthening-nation.Google Scholar
United States Department of Homeland Security. (2004). “DHS budget in brief – fiscal year 2004.” https://bit.ly/3nemMsE.Google Scholar
United States Department of Homeland Security. (2021). “About DHS.” www.dhs.gov/about-dhs.Google Scholar
United States Department of State. (2021). “Terrorist designations and state sponsors of terrorism.” www.state.gov/terrorist-designations-and-state-sponsors-of-terrorism/.Google Scholar
United States Senate Committee on Appropriations. (2020). “Summary: the department of homeland security fiscal year 2021 appropriations bill.” December 21. https://bit.ly/3HnCfgU.Google Scholar
US House Subcommittee on Africa, Global Health, and Human Rights. (2012). “The Tuareg Revolt and the Mali Coup.” June 29. www.govinfo.gov/content/pkg/CHRG-112hhrg74863/html/CHRG-112hhrg74863.htm.Google Scholar
Vásquez, I., and McMahon, F. (2020). “The Human Freedom Index 2020: a global measurement of personal, civil and economic freedom.” Cato Institute and Fraser Institute. www.cato.org/sites/cato.org/files/2020-12/human-freedom-index-2020.pdf.Google Scholar
Volz, D. (2017). “Most Americans unwilling to give up privacy to thwart attacks: Reuters/Ipsos poll.” Reuters, April 4. https://bit.ly/3LBVNAK.Google Scholar
Wagner, R. E. (2007). Fiscal Sociology and the Theory of Public Finance: An Exploratory Essay. Cheltenham: Edward Elgar.Google Scholar
Wagner, R. E. (2017). Politics as a Peculiar Business: Insights from a Theory of Entangled Political Economy. Cheltenham: Edward Elgar.Google Scholar
Wagner, R. E., and Yazigi, D. (2014). Form vs. substance in selection through competition: elections, markets, and political economy. Public Choice, 159(3), 503514.Google Scholar
Watson Institute for International and Public Affairs at Brown University. (2021). “Costs of war: U.S. costs to date for the war in Afghanistan, in $ billions, 2001–2021.” https://bit.ly/449THiK.Google Scholar
Weinberg, L., Pedahzur, A., and Hirsch-Hoefler, S. (2004). The challenges of conceptualizing terrorism. Terrorism and Political Violence, 16(4), 777794.Google Scholar
Whitlock, C., and Woodward, B. (2016). “Pentagon buries evidence of $125 billion in bureaucratic waste.” Washington Post, December 5. https://bit.ly/3LDzpa9.Google Scholar
Wintrobe, R. (2006). Can suicide bombers be rational? In Rational Extremism: The Political Economy of Radicalism. Cambridge: Cambridge University Press, pp. 108143.Google Scholar
Wood, G. (2018). The enemy votes: bargaining failure and weapons improvisation. Economics of Peace and Security Journal, 13(1), 2532.Google Scholar
World Bank. (2020). “Ease of doing business: comparing business regulation in 190 economies.” https://bit.ly/3LBVEgG.Google Scholar
World Bank. (2022). “GDP per capita (constant 2015 US$).” https://data.worldbank.org/indicator/NY.GDP.PCAP.KD.Google Scholar
Zakaria, F. (2003). The Future of Freedom: Illiberal Democracies at Home and Abroad. New York: W.W. Norton & Company.Google Scholar
Zavadski, K. (2014). “ISIS now has a network of military affiliates in 11 countries around the world.” New York Magazine, November 23. https://bit.ly/42bRPEt.Google Scholar
Zetter, K. (2020). “How cops can secretly track your phone.” Intercept, July 31. https://bit.ly/3oUFVAa.Google Scholar

Save element to Kindle

To save this element to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror
Available formats
×

Save element to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror
Available formats
×

Save element to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror
Available formats
×