Skip to main content
Log in

Space Time Dynamics of Insurgent Activity in Iraq

  • Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

This paper describes analyses to determine whether there is a space-time dependency for insurgent activity. The data used for the research were 3 months of terrorist incidents attributed to the insurgency in Iraq during U.S. occupation and the methods used are based on a body of work well established using police recorded crime data. It was found that events clustered in space and time more than would be expected if the events were unrelated, suggesting communication of risk in space and time and potentially informing next event prediction. The analysis represents a first but important step and suggestions for further analysis addressing prevention or suppression of future incidents are briefly discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1

Similar content being viewed by others

Notes

  1. Interestingly, much of the empirical work on terrorist attacks supports a rational actor thesis but implicitly suggests that displacement of attacks is inevitable. Clarke and Newman (2006, Chapter 4) argue that displacement is far from certain and the data sources used in such studies are not suited to shedding light on this issue.

  2. Although recently the success rate of attacks has roughly halved.

  3. These data come from the Total Number of Insurgents Detained or Killed and Number of Daily Attacks by Insurgents graphs and the Estimated Strength of Insurgency Nationwide table in O'Hanlon and Kamp (2006). The respective footnotes indicate that, unsurprisingly, these data are imprecise to some degree, although we think that they reflect the general perception that the Iraqi insurgency appears resilient to considerable personnel depletion (10 per cent per month) without a corresponding drop in activity.

  4. A minor note is that this is a time period in the U.S. occupation of Iraq after U.S. President George Bush declared “major combat operations in Iraq have ended”.

  5. The idea is that the observed data is just one realisation of the process. Randomly shuffling dates among events allows other realisations to be created. A total of 999 realisations were created to form an expected distribution. The observed distribution is added to make a sample size of 1,000.

References

  • Bowers, K.J., Hirschfield, A. and Johnson, S.D. (1998) Victimisation Revisited: A Case Study of Non-Residential Repeat Burglary on Merseyside. British Journal of Criminology. Vol.38, pp 429–452.

    Article  Google Scholar 

  • Bowers, K.J. and Johnson, S.D. (2005) Domestic Burglary Repeats and Space-Time Clusters: The Dimensions of Risk. European Journal of Criminology. Vol.2, No. 1, pp 67–92.

    Article  Google Scholar 

  • Bowers, K.J., Johnson, S.D. and Pease, K. (2004) Prospective Hotspotting: The Future of Crime Mapping. British Journal of Criminology. Vol. 44, No. 5, pp 641–658.

    Article  Google Scholar 

  • Clarke, R.V. and Newman, G.R. (2006) Outsmarting the Terrorists. Westport, CT: Praeger Security International.

    Google Scholar 

  • Cornish, D. and Clarke, R.V. (eds) (1986) The Reasoning Criminal: Rationale Choice Perspective on Offending. New York: Springer-Verlag.

    Book  Google Scholar 

  • Johnson, S.D. and Bowers, K.J. (2004a) The Burglary as Clue to the Future: The Beginnings of Prospective Hot-Spotting. European Journal of Criminology. Vol. 1, No.2, pp 237–255.

    Article  Google Scholar 

  • Johnson, S.D. and Bowers, K.J. (2004b) The Stability of Space-Time Clusters of Burglary. British Journal of Criminology. Vol. 44, No. 1, pp 55–65.

    Article  Google Scholar 

  • Johnson, S.D., Bowers, K. and Hirschfield, A. (1997) New Insights into the Spatial and Temporal Distribution of Repeat Victimisation. The British Journal of Criminology. Vol. 37, No. 2, pp 224–244.

    Article  Google Scholar 

  • Johnson, S.D., Bernasco, W., Bowers, K.J., Elffers, H., Ratcliffe, J., Rengert, G. and Townsley, M. (2007) Space-Time Patterns of Risk: A Cross National Assessment of Residential Burglary Victimization. Journal of Quantitative Criminology. Vol. 23, No. 3, pp 201–219.

  • O'Hanlon, M.E. and Kamp, N. (2006) Iraq Index: Tracking Variables of Reconstruction and Security in Post-Saddam Iraq. 14 September 2006, Brookings Institution, www.brookings.edu/iraqindex, site accessed 18 September 2006.

  • Ratcliffe, J.H. (2000) Aoristic Analysis: The Spatial Interpretation of Unspecific Temporal Events. International Journal of Geographical Information Science. Vol. 14, No. 7, pp 669–679.

    Article  Google Scholar 

  • Ratcliffe, J.H. (2002) Aoristic Signatures and the Temporal Analysis of High Volume Crime Patterns. Journal of Quantitative Criminology. Vol. 18, No. 1, pp 23–43.

    Article  Google Scholar 

  • Ratcliffe, J.H. (2004) The Hotspot Matrix: A Framework for the Spatio-Temporal Targeting of Crime Reduction. Police Practice and Research. Vol. 5, No. 1, pp 5–23.

    Article  Google Scholar 

  • Ratcliffe, J.H. (2005) Detecting Spatial Movement of Intra-Region Crime Patterns Over Time. Journal of Quantitative Criminology. Vol. 22, No. 1, pp 103–123.

    Article  Google Scholar 

  • Ratcliffe, J.H. and McCullagh, M.J. (1998a) Aoristic Crime Analysis. International Journal of Geographical Information Science. Vol. 12, No. 7, pp 751–764.

    Article  Google Scholar 

  • Ratcliffe, J.H. and McCullagh, M.J. (1998b) Identifying Repeat Victimisation with GIS. British Journal of Criminology. Vol. 38, No. 4, pp 651–662.

    Article  Google Scholar 

  • Ratcliffe, J.H. and Rengert, G.F. (2008) Near-Repeat Patterns in Philadelphia Shootings. Security Journal. Vol. 21, No. 1–2, pp 58–76.

    Article  Google Scholar 

  • Sandler, T. and Arce, M.D.G. (2003) Terrorism & Game Theory. Simulation and Gaming. Vol. 34, No. 3, pp 319–337.

    Article  Google Scholar 

  • Townsley, M., Homel, R. and Chaseling, J. (2000) Repeat Burglary Victimisation: Spatial and Temporal Patterns. Australian and New Zealand Journal of Criminology. Vol. 33, No. 1, pp 37–63.

    Article  Google Scholar 

  • Townsley, M., Homel, R. and Chaseling, J. (2003) Infectious Burglaries: A Test of the Near Repeat Hypothesis. British Journal of Criminology. Vol. 43, No. 3, pp 615–633.

    Article  Google Scholar 

  • Townsley, M. and Pease, K. (2002) How Efficiently Can We Target Prolific Offenders. International Journal of Police Science and Management. Vol. 4, No. 4, pp 323–331.

    Article  Google Scholar 

  • Woo, G. (2007) Terrorism Risk. In Voeller, J.G. (ed.) Wiley Handbook of Science and Technology for Homeland Security. London: Wiley.

    Google Scholar 

  • Zipf, G.K. (1949) Human Behaviour and the Principle of Least Effort: An Introduction to Human Ecology. Cambridge, MA: Addison-Wesley Press, Inc.

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Jeff Reichman and Aiden Sidebottom for comments on an earlier draft of this paper, and two anonymous reviewers for helpful comments. This research was supported by a British Academy International Collaborative Network grant, and additional funding from UCL Futures, NSCR and the Research Incentive Fund at Temple University.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Townsley, M., Johnson, S. & Ratcliffe, J. Space Time Dynamics of Insurgent Activity in Iraq. Secur J 21, 139–146 (2008). https://doi.org/10.1057/palgrave.sj.8350090

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/palgrave.sj.8350090

Keywords

Navigation