Abstract
What compels states to cooperate in the face of a global terrorist threat? On an international scale, the elimination of a common terrorist threat resembles a prisoners’ dilemma, with many states choosing to shore up defences at home rather than bear the costs of cooperative, pre-emptive strikes abroad. Utilising original data, this paper represents an empirical examination of the prisoners’ dilemma of counterterrorism to determine what characteristics drive cooperation and whether that cooperation depends on the institutional characteristics of a state, finding that alliance commitments and state capabilities encourage cooperation, while democracy inhibits the achievement of cooperation. These findings illustrate the argument that, although democracies are generally cooperative with one another in matters of international security, the amorphous nature of terrorism fosters a sense of reluctance among democracies regarding proper counterterrorist action.
Similar content being viewed by others
Notes
It has been noted that Al-Qaeda had not become functionally operational as a group until 1998.
Herbert (2009) notes that Western analyses of Islamist identities frequently conflate numerous degrees of Islamic activism at the expense of theoretical rigour. A thorough treatment of the term ‘global militant Islamist organisations’ is beyond the scope of this article and I will refer exclusively to Al-Qaeda, their affiliated organisations, and unaffiliated individuals who use terrorism to attack the United States and other nations of the West (Freeman 2008).
See online appendix. Non-democracies identified by a POLITY IV score of 5 or lower. These data are conservative estimates, excluding attacks in Iraq and Afghanistan, and only including attacks in which the nationality of the primary victim is known.
See online appendix. Source: SIPRI Yearbook 2010 — Military Expenditure, available at http://www.sipri.org/media/pressreleases/2010/pressreleasetranslations/storypackage_milex (accessed 24 February, 2014).
US National Counterterrorism Center, available at http://www.fbi.gov/stats-services/publications/terror_06.pdf (accessed 10 March, 2014).
This implies that the authors are referring to terrorist groups such as Al-Qaeda and affiliated organisations that possess the resources and organisational abilities to launch a global campaign.
Country Reports on Terrorism after 2004.
Non-democracies identified by a POLITY IV score of 5 or lower.
‘Austria to Send 93 Soldiers to Afghanistan’, People’s Daily Online, available at http://english.people.com.cn/200508/02/eng20050802_199830.html (accessed 31 March, 2014).
Transnational attacks are separated from domestic attacks by means of the method used by Enders et al. (2011).
Martha Crenshaw (2014) ‘Global Al-Qaeda’, available at http://www.stanford.edu/group/mappingmilitants/cgi-bin/maps/view/alqaeda (accessed 9 March, 2014).
http://www.idea.int/vt/viewdata.cfm (accessed 7 June, 2012).
Scores of 0 are assigned to non-democracies, because electoral participation might be voluntary in those states (Li 2005).
This assertion was true even after running models without the POLITY IV measure.
See online appendix. Source: SIPRI Yearbook 2010 — Military Expenditure.
References
Abrahms, Max (2006) ‘Al Qaeda’s Scorecard: A Progress Report on Al Qaeda’s Objectives’, Studies in Conflict & Terrorism 29(5): 509–29.
Abrahms, Max (2007) ‘Why Democracies Make Superior Counterterrorists’, Security Studies 16(2): 223–53.
Arce M., Daniel G. and Todd Sandler (2005a) ‘Counterterrorism: A Game-Theoretic Analysis’, Journal of Conflict Resolution 49(2): 183–200.
Arce M., Daniel G. and Todd Sandler (2005b) ‘The Dilemma of the Prisoners’ Dilemmas’, Kyklos 58(1): 3–24.
Asal, Victor and Joseph K. Young (2012) ‘Battling Abroad: Why Some Organisations are Likely Targets of Foreign Counterterrorism’, Civil Wars 14(2): 272–87.
Balteş, Luciana (2011) ‘NATO, A New Strategic Concept’, Buletin Stiintific 16(1): 14–17.
Barbieri, Eliane Tschaen and Jytte Klausen (2012) ‘Al Qaeda’s London Branch: Patterns and Transnational Network Integration’, Studies in Conflict & Terrorism 35(6): 411–31.
Brinkley, Joel (2013) ‘Islamic Terror’, World Affairs 176(2): 43–55.
Brooks, Risa (2009) ‘Researching Democracy and Terrorism: How Political Access Affects Militant Activity’, Security Studies 18(4): 756–88.
Bueno de Mesquita, Bruce and Randolph M. Siverson (1995) ‘War and the Survival of Political Leaders’, American Political Science Review 89(4): 841–55.
Bueno de Mesquita, Bruce, Randolph M. Siverson and Gary Woller (1992) ‘War and the Fate of Regimes: A Comparative Analysis’, American Political Science Review 86(3): 638–46.
Bueno de Mesquita, Bruce, Smith, Alastair, Randolph M. Siverson and James D. Morrow (2003) The Logic of Political Survival, Cambridge, MA: MIT Press.
Byman, Daniel (2005) Deadly Connections: States That Sponsor Terrorism, New York: Cambridge University Press.
Charters, David A., ed. (1994) ‘Conclusions: Security and Liberty in Balance: Countering Terrorism in the Democratic Context’, in, The Deadly Sin of Terrorism: Its Effect on Democracy and Civil Liberties in Six Countries, 211–29, Westport, CT: Greenwood Press.
Chasdi, Richard J. (2010) Counterterror Offensives for the Ghost War World: The Rudiments of Counterterrorism Policy, Lanham, MD: Rowman & Littlefield Publishers, Inc.
Clutterbuck, Richard (1994) Terrorism in an Unstable World, New York: Routledge.
Crenshaw, Martha (2014) ‘Global Al-Qaeda’, Stanford: available at http://www.stanford.edu/group/mappingmilitants/cgi-bin/maps/view/alqaeda (accessed 9 March, 2014).
Cronin, Audrey Kurth (2006) ‘How Al-Qaida Ends: The Decline and Demise of Terrorist Groups’, International Security 31(1): 7–48.
Dahl, Robert A. (1971) Polyarchy: Participation and Opposition, New Haven, CT: Yale University Press.
Dahl, Robert A. (1998) On Democracy, New Haven, CT: Yale University Press.
Department of State (1983–2001) Patterns of Global Terrorism, Washington: DOS.
Doran, Michael Scott (2002) ‘Somebody Else’s Civil War’, Foreign Affairs 81(1): 22–42.
Enders, Walter and Todd Sandler (1993) ‘The Effectiveness of Anti-Terrorism Policies: A Vector-Autoregression Intervention Analysis’, American Political Science Review 87(4): 829–44.
Enders, Walter and Todd Sandler (2006) The Political Economy of Terrorism, New York: Cambridge University Press.
Enders, Walter, Todd Sandler and Khusrav Gaibulloev (2011) ‘Domestic Versus Transnational Terrorism: Data, Decomposition, and Dynamics’, Journal of Peace Research 48(3): 319–37.
Engene, Jan Oskar (2004) Terrorism in Western Europe: Explaining the Trends Since 1950, Northampton, MA: Edward Elgar.
Eubank, William L. and Leonard B. Weinberg. (1994) ‘Does Democracy Encourage Terrorism?’ Terrorism and Political Violence 6(4): 417–33.
Eubank, William L. and Leonard B. Weinberg (1998) ‘Terrorism and Democracy: What Recent Events Disclose’, Terrorism and Political Violence 10(1): 108–18.
Eubank, William L. and Leonard B. Weinberg (2001) ‘Terrorism and Democracy: Perpetrators and Victims’, Terrorism and Political Violence 13(1): 155–64.
Eyerman, Joe (1998) ‘Terrorism and Democratic States: Soft Targets or Accessible Systems’, International Interactions 24(2): 151–70.
Farrall, Leah (2011) ‘How Al Qaeda Works’, Foreign Affairs 90(2): 128–38.
Fearon, James (1997) ‘Signaling Foreign Policy Interests: Tying Hands Versus Sinking Costs’, Journal of Conflict Resolution 41(1): 68–90.
Finocchiaro, Peter (2013) ‘Peter King: Al Qaeda “In Many Ways Stronger” Than Before 9/11’, The Huffington Post, available at http://www.huffingtonpost.com/2013/08/04/peter-king-al-qaeda_n_3704510.html (accessed 31 March, 2014).
Freeman, Michael (2008) ‘Democracy, Al Qaeda, and the Causes of Terrorism: A Strategic Analysis of U.S. Policy’, Studies in Conflict & Terrorism 31(1): 40–59.
Ganor, Boaz (1999) ‘Security Council Resolution 1269 — What it Leaves Out’: available at http://www.ict.org.il/Articles/tabid/66/Articlsid/38/currentpage/29/Default.aspx (accessed 31 March, 2014).
Gartner, Scott (2008) ‘The Multiple Effects of Casualties on Public Support for War: An Experimental Approach’, American Political Science Review 102(1): 95–106.
Gartner, Scott Sigmund and Gary M. Segura (1998) ‘War, Casualties, and Public Opinion’, Journal of Conflict Resolution 42(3): 278–300.
Gill, Bates (2010) SIPRI Yearbook — 2010, UK: Oxford University Press.
Hamilton, Lawrence C. and James D. Hamilton (1983) ‘Dynamics of Terrorism’, International Studies Quarterly 27(1): 39–54.
Helfstein, Scott and Dominick Wright (2011) ‘Covert or Convenient? Evolution of Terror Attack Networks’, Journal of Conflict Resolution 55(5): 785–813.
Herbert, Matthew (2009) ‘The Plasticity of the Islamic Activist: Notes from the Counterterrorist Literature’, Studies in Conflict & Terrorism 32(5): 389–405.
Hoffman, Bruce (2004) ‘The Changing Face of Al-Qaeda and the Global War on Terrorism’, Studies in Conflict & Terrorism 27(6): 549–60.
Hoffman, Bruce (2006) Inside Terrorism, New York: Columbia University Press.
Kilcullen, David (2005) ‘Countering Global Insurgency’, Journal of Strategic Studies 28(4): 597–617.
Kurtulus, Ersun N. (2012) ‘The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel’, Studies in Conflict & Terrorism 35(1): 37–58.
Lacqueur, Walter (1977) Terrorism, Boston, MA: Little, Brown.
Larsen, Eric (1996) Casualties and Consensus: The Historical Role of Casualties in Domestic Support for U.S. Military Operations, Santa Monica, CA: Rand Corporation.
Leeds, Brett Ashley, Michaela Mattes and Jeremy S. Vogel (2009) ‘Interests, Institutions, and The Reliability of International Commitments’, American Journal of Political Science 53(2): 461–76.
Leffler, Melvyn P. (2011) ‘9/11 in Retrospect’, Foreign Affairs 90(5): 33–44.
Li, Quan (2005) ‘Does Democracy Promote or Reduce Transnational Terrorist Incidents?’ Journal of Conflict Resolution 49(2): 278–97.
Li, Quan and Drew Schaub (2004) ‘Economic Globalisation and Transnational Terrorism’, Journal of Conflict Resolution 48(2): 230–58.
Marshall, Monty G. and Keith Jaggers (2010) Polity IV Project: Political Regime Characteristics and Transitions, 1800–2010 Dataset Users’ Manual, Vienna, VA: Center for Systemic Peace.
Messmer, William B. and Carlos L. Yordán (2011) ‘A Partnership to Counter International Terrorism: The UN Security Council and the UN Member States’, Studies in Conflict & Terrorism 34(11): 843–61.
Mueller, John (1973) War, Presidents and Public Opinion, New York: John Wiley.
Mueller, John (2006) ‘Is There Still a Terrorist Threat?: The Myth of the Omnipresent Enemy’, Foreign Affairs 85(5): 2–8.
Mueller, John and Mark G. Stewart (2012) ‘The Terrorism Delusion’, International Security 37(1): 81–110.
Nagl, John A. (2002) Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam, London: Praeger.
National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2011) Global Terrorism Database, College Park, MD: University of Maryland.
Neumayer, Eric and Thomas Plümper (2011) ‘Foreign Terror on Americans’, Journal of Peace Research 48(1): 3–17.
Omelicheva, Maryia (2007) States’ Responses to Terrorism: Manual for Data Collection. University of Kansas, available at: http://www.terrorismanalysts.com/files/counterterrorismmanual.pdf (accessed 4 November, 2014).
Pape, Robert A. (2003) ‘The Strategic Logic of Suicide Terrorism’, American Political Science Review 97(3): 343–61.
Pape, Robert A. (2005) Dying to Win: The Strategic Logic of Suicide Terrorism, New York: Random House Inc.
Perliger, Arie (2012) ‘How Democracies Respond to Terrorism: Regime Characteristics, Symbolic Power and Counterterrorism’, Security Studies 21(3): 490–528.
Peterson, James W. (2007) ‘An Expanded NATO Confronts Terrorism and Instability’, Journal of Slavic Military Studies 20(4): 475–97.
Piazza, James A. (2007) ‘Draining the Swamp: Democracy Promotion, State Failure, and Terrorism in 19 Middle Eastern Countries’, Studies in Conflict & Terrorism 30(6): 521–39.
Plümper, Thomas and Eric Neumayer (2010) ‘The Friend of My Enemy is My Enemy: International Alliances and International Terrorism’, European Journal of Political Research 49(1): 75–96.
Record, Jeffrey (2007) Beating Goliath: Why Insurgencies Win, Washington: Potomac Books, Inc.
Rees, Wyn and Richard J. Aldrich (2005) ‘Contending Cultures of Counterterrorism: Transatlantic Divergence or Convergence?’ International Affairs 81(5): 905–23.
Reich, Walter, ed. (1990) Origins of Terrorism, New York: Cambridge University Press.
Rosendorff, B. Peter and Todd Sandler (2004) ‘Too Much of a Good Thing?: The Proactive Response Dilemma’, Journal of Conflict Resolution 48(5): 657–71.
Ross, Jeffrey Ian (1993) ‘Structural Causes of Oppositional Political Terrorism: Towards a Causal Model’, Journal of Peace Research 30(3): 317–29.
Rühle, Michael (2011) ‘NATO and Emerging Security Challenges: Beyond the Deterrence Paradigm’, American Foreign Policy Interests 33(6): 278–82.
Sandler, Todd (2003) ‘Collective Action and Transnational Terrorism’, World Economy 26(6): 779–802.
Savun, Burcu and Brian J. Phillips (2009) ‘Democracy, Foreign Policy, and Terrorism’, Journal of Conflict Resolution 53(6): 878–904.
Scheppele, Kim Lane (2006) ‘The Migration of Anti-Constitutional Ideas: The Post-9/11 Globalization of Public Law and the International State of Emergency’, in Sujit Choudhry ed., The Migration of Constitutional Ideas, 347–73, Cambridge and New York: Cambridge University Press.
Schmid, Alex P. (1992) ‘Terrorism and Democracy’, Terrorism and Political Violence 4(4): 14–25.
Schmid, Alex P. (2005) ‘Terrorism as Psychological Warfare’, Democracy and Security 1(2): 137–46.
Schmid, Alex P. and Albert J. Jongman (1988) Political Terrorism, New Brunswick, NJ: Transaction Books.
Shahrouri, Nahla (2010) ‘Does a Link Exist Between Democracy and Terrorism?’ International Journal on World Peace 27(4): 41–77.
Tellis, Ashley J. (1996) ‘Terminating Intervention: Understanding Exit Strategy and U.S. Involvement in Intrastate Conflicts’, Studies in Conflict and Terrorism 19(2): 117–51.
Temple-Raston, Dina (2007) The Jihad Next Door: The Lackawanna Six and Rough Justice in an Age of Terror, New York: Public Affairs.
US Department of State (2002) Patterns of Global Terrorism 2001, Washington: available at http://www.state.gov/j/ct/rls/crt/2001/ (accessed 10 March, 2014).
US Department of State (2003) Patterns of Global Terrorism 2002, Washington: available at http://www.state.gov/j/ct/rls/crt/2002/ (accessed 10 March, 2014).
US Department of State (2004) Patterns of Global Terrorism 2003, Washington: available at http://www.state.gov/j/ct/rls/crt/2003/ (accessed 10 March, 2014).
US Department of State (2005) Country Reports on Terrorism 2004, Washington: available at http://www.state.gov/j/ct/rls/crt/c14813.htm (accessed 10 March, 2014).
US Department of State (2006) Country Reports on Terrorism 2005, Washington: available at http://www.state.gov/j/ct/rls/crt/c17689.htm (accessed 10 March, 2014).
US Department of State (2007) Country Reports on Terrorism 2006, Washington: available at http://www.state.gov/j/ct/rls/crt/2006/index.htm (accessed 10 March, 2014).
US Department of State (2008) Country Reports on Terrorism 2007, Washington: available at http://www.state.gov/j/ct/rls/crt/2007/index.htm (accessed 10 March, 2014).
US Department of State (2009) Country Reports on Terrorism 2008, Washington: available at http://www.state.gov/j/ct/rls/crt/2008/index.htm (accessed 10 March, 2014).
US Department of State (2010) Country Reports on Terrorism 2009, Washington: available at http://www.state.gov/j/ct/rls/crt/2009/index.htm (accessed 10 March, 2014).
US Department of State (2011) Country Reports on Terrorism 2010, Washington: available at http://www.state.gov/j/ct/rls/crt/2010/index.htm (accessed 10 March, 2014).
US National Counter Terrorism Center (2007) Report on Terrorist Incidents – 2006, Washington: available at http://fbi.gov/statsservices/publications/terror_06.pdf (accessed 4 November, 2014).
Valentino, Benjamin A., Paul K. Huth and Sarah E. Croco (2010) ‘Bear Any Burden? How Democracies Minimize the Costs of War’, Journal of Politics 72(2): 528–44.
Wade, Sara Jackson and Dan Reiter (2007) ‘Does Democracy Matter? Regime Type and Suicide Terrorism’, Journal of Conflict Resolution 51(2): 329–48.
Waltz, Kenneth N. (1979) Theory of International Politics, New York: McGraw-Hill.
Weinberg, Leonard B. and William L. Eubank (1998) ‘Terrorism and Democracy: What Recent Events Disclose’, Terrorism and Political Violence 10(1): 108–18.
Wilkinson, Paul (2001) Terrorism versus Democracy: The Liberal State Response, Portland: Frank Cass.
Acknowledgements
The author wishes to thank Amanda Murdie for her helpful and constructive comments.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Coding for state action
The framework for the analysis of events is based on the international and national counterterrorism measures compiled by the UN Security Council Resolution 1269 and Resolution 1373 adopted under Chapter VII of the UN Charter. The topics cover the areas of public and foreign policies in relation to which the states’ counterterrorism actions are observed:
-
Institutional
-
Legislation
-
Creating departments
-
Criminalisation
-
-
Deterrent
-
Controlling borders and people
-
Seizing assets
-
Target-hardening
-
Facilitating preparation of human and technological resources
-
Arrests
-
-
Punitive
-
Using military and security forces against terrorists
-
Allowing military bases on sovereign soil
-
-
Other
-
Humanitarian aid
-
Engaging in diplomacy
-
Introducing proposals
-
Sharing intelligence
-
From this framework, actions that fall under ‘Deterrent’ will be counted as choosing Deter in Figure 1, and actions that fall under ‘Punitive’ will be counted as choosing Pre-empt. If a state chooses a deterrent and punitive action during the same year, the outcome will be coded as Pre-empt. These two choices of Deter and Pre-empt are chosen because they require a greater amount of effort to execute relative to cooperative or institutional measures. Additionally, these actions entail greater consequences in terms of political backlash and a potential retaliatory attack. For example, it can be argued that promising humanitarian aid does little to influence the risk of terrorist attacks. By contrast, freezing the assets of a terrorist organisation can be seen to carry significant consequences by limiting their amount of available resources and influencing their ability to act. The coding criteria for the different areas of counterterrorist action represent a modified schema taken from Omelicheva’s (2007) coding manual, ‘States’ Responses to Terrorism: Manual for Data Collection’, for collecting data on state responses to terrorism.
Institutional
Legislation
Security Council Resolution 1373 requires states to criminalise the provision or collection of funds, by nationals within their borders or territories, for the purposes, whether direct or indirect, of funding terrorist acts. Additionally, Security Council Resolution 1269 condemns unequivocally all acts of terrorism as criminal, irrespective of the methods or motives of the organisation in question. Thus, all acts of legislation passed to meet these ends, including amending acts to combat different aspects of terrorism, changing legislation in the interest of combating terrorism, and extending authority to existing state agencies, are coded as such.
Creating departments
This code applies to instances in which a state creates a new agency for the purposes of counterterrorism.
Criminalisation
This category represents all efforts of states to pass laws that either establish terrorism as a serious criminal offence, or criminalise terrorist acts (e.g., hijacking, hostage-taking, bombings, and so on) or any explicit actions regarded as terrorist acts per UN Security Council Resolutions 1269 and 1373.
Deterrent
Controlling borders and people
Security Council resolution 1373 requires states to take measures to prevent the movement of terrorists and financial flows to entities and persons related to terrorism, and to identify and bring to justice the perpetrators of terrorist acts. These measures include controls on the issuance of identity papers and travel documents, intensified border controls, and regulations of financial transactions. All actions listed below are coded as ‘Control’.
Control of the movement of people
This code is used when a state establishes, improves, or expands databanks containing information on any of the individual metrics, identity documents or visas, and any other measures for preventing counterfeiting, forgery or fraudulent use of identify papers and travel documents (e.g., increasing the security level of passports). This event type also includes compiling lists of persons responsible for perpetration of terrorist acts.
Border controls
This code is used to record a state’s actions aimed at intensification of border controls by supplying border posts with necessary border control equipment, or increasing the presence of border troops at the most dangerous parts of the state border.
Control of financial flows
This code is used to record a state’s measures to protect its financial system. These measures include defining suspicious operations, listing individuals and groups associated with terrorism for the purpose of freezing their financial assets, instructing banks and other institutions on measures to be taken to prevent the utilisation of finances and other assets for commission of terrorist acts. This event code also covers monitoring the activities of national banks and financial intelligence units.
Ban
This code is assigned when a state establishes a ban on functioning of terrorist groups on its territory, or prohibits the activities of banned organisations. This event type also includes courts’ decision declaring certain groups and organisations illegal.
Seizing assets
Seize
This code is used to record various forms of sanctions imposed on the assets of individuals and groups related to terrorism. It includes freezes of accounts, bans on the flow of funds, and sequestration of assets.
Target hardening
Target hardening entails an increase or upgrade in security surrounding potential targets under threat of terrorist attack. The purpose of this action is to dissuade terrorists sufficiently from engaging in terrorist attacks against the protected target. Any of the following actions listed below will be coded as ‘target hardening’.
Target hardening of high-risk activities
This code is used to record measures that a state implements to ensure protection of people during high-risk mass activities, such as sporting events, shows, and public appearances of celebrities or high-profile politicians.
Target hardening of embassies and internationally protected persons
This code is used to record additional measures of protection of embassies and diplomatic representations of states and international organisations. This event code includes measures of protection of diplomats and other internationally protected persons.
Target hardening of transport and communication systems
This code is used to record measures of protection of the systems of transportation – railway, air and naval transport, as well as the systems of communication, including mailing and internet services.
Target hardening of weapons and explosives storage areas
This code is used to record any additional safety measures in the storage areas of weapons and explosives.
Preparation of human and technical resources
This category represents efforts on behalf of states to improve the technological deterrent and monitoring activities as well as the preparation or training of units or groups of people for the express purpose of counterterrorism. Any of the actions listed below will be coded as ‘Preparation of human and technical resources’.
Train personnel
This code is used to record any of the following measures aimed at improving human resources for combating terrorism: recruiting and training human resources for high-alert counter-terrorist special reaction force teams (including hostage rescue units); training bomb disposal teams or other special units to deal with terrorist threat or offensive; carrying out simulation exercises; or enhancing the capacity of law enforcement officials to handle terrorist threats.
Upgrade technical resources
This code is assigned when a state develops, applies or modifies its technological reserves used to prevent or respond to terrorist attacks. This includes surveillance devices, means for eavesdropping/interception, satellites and detectors.
Arrests
Non-military punitive reactions to terrorist attacks. This includes arrests made on foreign nationals or domestic citizens within a state’s sovereign territory as well as non-military raids on the headquarters of terrorists within the occupied territories in Iraq and Afghanistan (for the purposes of arrest and/or neutralisation).
Pre-empt
Strike
Strike is used to record an instance in which a state contributes armed forces for participation in either Operation Enduring Freedom or Operation Iraqi Freedom. It is measured as two separate-count variables, with each state consisting of a value for the number of troops contributed to Operation Enduring Freedom in Afghanistan and a value for the number of troops contributed to Operation Iraqi Freedom in Iraq.
Basing
Base is used to record instances of a nation sanctioning their land for the usage of troop movement or supplies for the purposes of combat or defence against a terrorist organisation.
Other
Humanitarian aid
This variable is coded when a state provides humanitarian aid for the purposes of emergency relief to other international actors.
Engaging in diplomacy
This variable represents instances of international discussion or negotiation of events related to the purpose of combating terrorism and includes engaging in joint counterterrorist exercises, hosting diplomatic events regarding terrorism, traveling to meet foreign dignitaries for the purpose of discussing counterterrorism, and articulating positions to the international community with regard to counterterrorism.
Offering proposals
This variable represents a state’s attempt to suggest or propose counterterrorism policies or strategies of any kind. This action includes proposing treaties, amendments, and initiatives regarding any reference to fighting terrorism.
Sharing intelligence
This variable is coded to represent the exchange of information between states regarding instances of terrorism, early warning, or assisting in criminal investigations.
Rights and permissions
About this article
Cite this article
Kattelman, K. Testing the prisoners’ dilemma of counterterrorism: an aggregate analysis of counterterrorist efforts from 2001 to 2010. J Int Relat Dev 19, 583–607 (2016). https://doi.org/10.1057/jird.2014.26
Published:
Issue Date:
DOI: https://doi.org/10.1057/jird.2014.26