Skip to main content
Log in

Testing the prisoners’ dilemma of counterterrorism: an aggregate analysis of counterterrorist efforts from 2001 to 2010

  • Original Article
  • Published:
Journal of International Relations and Development Aims and scope Submit manuscript

Abstract

What compels states to cooperate in the face of a global terrorist threat? On an international scale, the elimination of a common terrorist threat resembles a prisoners’ dilemma, with many states choosing to shore up defences at home rather than bear the costs of cooperative, pre-emptive strikes abroad. Utilising original data, this paper represents an empirical examination of the prisoners’ dilemma of counterterrorism to determine what characteristics drive cooperation and whether that cooperation depends on the institutional characteristics of a state, finding that alliance commitments and state capabilities encourage cooperation, while democracy inhibits the achievement of cooperation. These findings illustrate the argument that, although democracies are generally cooperative with one another in matters of international security, the amorphous nature of terrorism fosters a sense of reluctance among democracies regarding proper counterterrorist action.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

Notes

  1. It has been noted that Al-Qaeda had not become functionally operational as a group until 1998.

  2. Herbert (2009) notes that Western analyses of Islamist identities frequently conflate numerous degrees of Islamic activism at the expense of theoretical rigour. A thorough treatment of the term ‘global militant Islamist organisations’ is beyond the scope of this article and I will refer exclusively to Al-Qaeda, their affiliated organisations, and unaffiliated individuals who use terrorism to attack the United States and other nations of the West (Freeman 2008).

  3. See online appendix. Non-democracies identified by a POLITY IV score of 5 or lower. These data are conservative estimates, excluding attacks in Iraq and Afghanistan, and only including attacks in which the nationality of the primary victim is known.

  4. See online appendix. Source: SIPRI Yearbook 2010 — Military Expenditure, available at http://www.sipri.org/media/pressreleases/2010/pressreleasetranslations/storypackage_milex (accessed 24 February, 2014).

  5. US National Counterterrorism Center, available at http://www.fbi.gov/stats-services/publications/terror_06.pdf (accessed 10 March, 2014).

  6. This implies that the authors are referring to terrorist groups such as Al-Qaeda and affiliated organisations that possess the resources and organisational abilities to launch a global campaign.

  7. Country Reports on Terrorism after 2004.

  8. Non-democracies identified by a POLITY IV score of 5 or lower.

  9. ‘Austria to Send 93 Soldiers to Afghanistan’, People’s Daily Online, available at http://english.people.com.cn/200508/02/eng20050802_199830.html (accessed 31 March, 2014).

  10. Transnational attacks are separated from domestic attacks by means of the method used by Enders et al. (2011).

  11. Martha Crenshaw (2014) ‘Global Al-Qaeda’, available at http://www.stanford.edu/group/mappingmilitants/cgi-bin/maps/view/alqaeda (accessed 9 March, 2014).

  12. http://www.idea.int/vt/viewdata.cfm (accessed 7 June, 2012).

  13. Scores of 0 are assigned to non-democracies, because electoral participation might be voluntary in those states (Li 2005).

  14. This assertion was true even after running models without the POLITY IV measure.

  15. See online appendix. Source: SIPRI Yearbook 2010 — Military Expenditure.

References

  • Abrahms, Max (2006) ‘Al Qaeda’s Scorecard: A Progress Report on Al Qaeda’s Objectives’, Studies in Conflict & Terrorism 29(5): 509–29.

    Article  Google Scholar 

  • Abrahms, Max (2007) ‘Why Democracies Make Superior Counterterrorists’, Security Studies 16(2): 223–53.

    Article  Google Scholar 

  • Arce M., Daniel G. and Todd Sandler (2005a) ‘Counterterrorism: A Game-Theoretic Analysis’, Journal of Conflict Resolution 49(2): 183–200.

    Article  Google Scholar 

  • Arce M., Daniel G. and Todd Sandler (2005b) ‘The Dilemma of the Prisoners’ Dilemmas’, Kyklos 58(1): 3–24.

    Article  Google Scholar 

  • Asal, Victor and Joseph K. Young (2012) ‘Battling Abroad: Why Some Organisations are Likely Targets of Foreign Counterterrorism’, Civil Wars 14(2): 272–87.

    Article  Google Scholar 

  • Balteş, Luciana (2011) ‘NATO, A New Strategic Concept’, Buletin Stiintific 16(1): 14–17.

    Google Scholar 

  • Barbieri, Eliane Tschaen and Jytte Klausen (2012) ‘Al Qaeda’s London Branch: Patterns and Transnational Network Integration’, Studies in Conflict & Terrorism 35(6): 411–31.

    Article  Google Scholar 

  • Brinkley, Joel (2013) ‘Islamic Terror’, World Affairs 176(2): 43–55.

    Google Scholar 

  • Brooks, Risa (2009) ‘Researching Democracy and Terrorism: How Political Access Affects Militant Activity’, Security Studies 18(4): 756–88.

    Article  Google Scholar 

  • Bueno de Mesquita, Bruce and Randolph M. Siverson (1995) ‘War and the Survival of Political Leaders’, American Political Science Review 89(4): 841–55.

    Article  Google Scholar 

  • Bueno de Mesquita, Bruce, Randolph M. Siverson and Gary Woller (1992) ‘War and the Fate of Regimes: A Comparative Analysis’, American Political Science Review 86(3): 638–46.

    Article  Google Scholar 

  • Bueno de Mesquita, Bruce, Smith, Alastair, Randolph M. Siverson and James D. Morrow (2003) The Logic of Political Survival, Cambridge, MA: MIT Press.

    Google Scholar 

  • Byman, Daniel (2005) Deadly Connections: States That Sponsor Terrorism, New York: Cambridge University Press.

    Book  Google Scholar 

  • Charters, David A., ed. (1994) ‘Conclusions: Security and Liberty in Balance: Countering Terrorism in the Democratic Context’, in, The Deadly Sin of Terrorism: Its Effect on Democracy and Civil Liberties in Six Countries, 211–29, Westport, CT: Greenwood Press.

    Google Scholar 

  • Chasdi, Richard J. (2010) Counterterror Offensives for the Ghost War World: The Rudiments of Counterterrorism Policy, Lanham, MD: Rowman & Littlefield Publishers, Inc.

    Google Scholar 

  • Clutterbuck, Richard (1994) Terrorism in an Unstable World, New York: Routledge.

    Google Scholar 

  • Crenshaw, Martha (2014) ‘Global Al-Qaeda’, Stanford: available at http://www.stanford.edu/group/mappingmilitants/cgi-bin/maps/view/alqaeda (accessed 9 March, 2014).

  • Cronin, Audrey Kurth (2006) ‘How Al-Qaida Ends: The Decline and Demise of Terrorist Groups’, International Security 31(1): 7–48.

    Article  Google Scholar 

  • Dahl, Robert A. (1971) Polyarchy: Participation and Opposition, New Haven, CT: Yale University Press.

    Google Scholar 

  • Dahl, Robert A. (1998) On Democracy, New Haven, CT: Yale University Press.

    Google Scholar 

  • Department of State (1983–2001) Patterns of Global Terrorism, Washington: DOS.

  • Doran, Michael Scott (2002) ‘Somebody Else’s Civil War’, Foreign Affairs 81(1): 22–42.

    Article  Google Scholar 

  • Enders, Walter and Todd Sandler (1993) ‘The Effectiveness of Anti-Terrorism Policies: A Vector-Autoregression Intervention Analysis’, American Political Science Review 87(4): 829–44.

    Article  Google Scholar 

  • Enders, Walter and Todd Sandler (2006) The Political Economy of Terrorism, New York: Cambridge University Press.

    Google Scholar 

  • Enders, Walter, Todd Sandler and Khusrav Gaibulloev (2011) ‘Domestic Versus Transnational Terrorism: Data, Decomposition, and Dynamics’, Journal of Peace Research 48(3): 319–37.

    Article  Google Scholar 

  • Engene, Jan Oskar (2004) Terrorism in Western Europe: Explaining the Trends Since 1950, Northampton, MA: Edward Elgar.

    Google Scholar 

  • Eubank, William L. and Leonard B. Weinberg. (1994) ‘Does Democracy Encourage Terrorism?’ Terrorism and Political Violence 6(4): 417–33.

    Article  Google Scholar 

  • Eubank, William L. and Leonard B. Weinberg (1998) ‘Terrorism and Democracy: What Recent Events Disclose’, Terrorism and Political Violence 10(1): 108–18.

    Article  Google Scholar 

  • Eubank, William L. and Leonard B. Weinberg (2001) ‘Terrorism and Democracy: Perpetrators and Victims’, Terrorism and Political Violence 13(1): 155–64.

    Article  Google Scholar 

  • Eyerman, Joe (1998) ‘Terrorism and Democratic States: Soft Targets or Accessible Systems’, International Interactions 24(2): 151–70.

    Article  Google Scholar 

  • Farrall, Leah (2011) ‘How Al Qaeda Works’, Foreign Affairs 90(2): 128–38.

    Google Scholar 

  • Fearon, James (1997) ‘Signaling Foreign Policy Interests: Tying Hands Versus Sinking Costs’, Journal of Conflict Resolution 41(1): 68–90.

    Article  Google Scholar 

  • Finocchiaro, Peter (2013) ‘Peter King: Al Qaeda “In Many Ways Stronger” Than Before 9/11’, The Huffington Post, available at http://www.huffingtonpost.com/2013/08/04/peter-king-al-qaeda_n_3704510.html (accessed 31 March, 2014).

  • Freeman, Michael (2008) ‘Democracy, Al Qaeda, and the Causes of Terrorism: A Strategic Analysis of U.S. Policy’, Studies in Conflict & Terrorism 31(1): 40–59.

    Article  Google Scholar 

  • Ganor, Boaz (1999) ‘Security Council Resolution 1269 — What it Leaves Out’: available at http://www.ict.org.il/Articles/tabid/66/Articlsid/38/currentpage/29/Default.aspx (accessed 31 March, 2014).

  • Gartner, Scott (2008) ‘The Multiple Effects of Casualties on Public Support for War: An Experimental Approach’, American Political Science Review 102(1): 95–106.

    Article  Google Scholar 

  • Gartner, Scott Sigmund and Gary M. Segura (1998) ‘War, Casualties, and Public Opinion’, Journal of Conflict Resolution 42(3): 278–300.

    Article  Google Scholar 

  • Gill, Bates (2010) SIPRI Yearbook — 2010, UK: Oxford University Press.

    Google Scholar 

  • Hamilton, Lawrence C. and James D. Hamilton (1983) ‘Dynamics of Terrorism’, International Studies Quarterly 27(1): 39–54.

    Article  Google Scholar 

  • Helfstein, Scott and Dominick Wright (2011) ‘Covert or Convenient? Evolution of Terror Attack Networks’, Journal of Conflict Resolution 55(5): 785–813.

    Article  Google Scholar 

  • Herbert, Matthew (2009) ‘The Plasticity of the Islamic Activist: Notes from the Counterterrorist Literature’, Studies in Conflict & Terrorism 32(5): 389–405.

    Article  Google Scholar 

  • Hoffman, Bruce (2004) ‘The Changing Face of Al-Qaeda and the Global War on Terrorism’, Studies in Conflict & Terrorism 27(6): 549–60.

    Article  Google Scholar 

  • Hoffman, Bruce (2006) Inside Terrorism, New York: Columbia University Press.

    Google Scholar 

  • Kilcullen, David (2005) ‘Countering Global Insurgency’, Journal of Strategic Studies 28(4): 597–617.

    Article  Google Scholar 

  • Kurtulus, Ersun N. (2012) ‘The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel’, Studies in Conflict & Terrorism 35(1): 37–58.

    Article  Google Scholar 

  • Lacqueur, Walter (1977) Terrorism, Boston, MA: Little, Brown.

    Google Scholar 

  • Larsen, Eric (1996) Casualties and Consensus: The Historical Role of Casualties in Domestic Support for U.S. Military Operations, Santa Monica, CA: Rand Corporation.

    Google Scholar 

  • Leeds, Brett Ashley, Michaela Mattes and Jeremy S. Vogel (2009) ‘Interests, Institutions, and The Reliability of International Commitments’, American Journal of Political Science 53(2): 461–76.

    Article  Google Scholar 

  • Leffler, Melvyn P. (2011) ‘9/11 in Retrospect’, Foreign Affairs 90(5): 33–44.

    Google Scholar 

  • Li, Quan (2005) ‘Does Democracy Promote or Reduce Transnational Terrorist Incidents?’ Journal of Conflict Resolution 49(2): 278–97.

    Article  Google Scholar 

  • Li, Quan and Drew Schaub (2004) ‘Economic Globalisation and Transnational Terrorism’, Journal of Conflict Resolution 48(2): 230–58.

    Article  Google Scholar 

  • Marshall, Monty G. and Keith Jaggers (2010) Polity IV Project: Political Regime Characteristics and Transitions, 1800–2010 Dataset Users’ Manual, Vienna, VA: Center for Systemic Peace.

    Google Scholar 

  • Messmer, William B. and Carlos L. Yordán (2011) ‘A Partnership to Counter International Terrorism: The UN Security Council and the UN Member States’, Studies in Conflict & Terrorism 34(11): 843–61.

    Article  Google Scholar 

  • Mueller, John (1973) War, Presidents and Public Opinion, New York: John Wiley.

    Google Scholar 

  • Mueller, John (2006) ‘Is There Still a Terrorist Threat?: The Myth of the Omnipresent Enemy’, Foreign Affairs 85(5): 2–8.

    Article  Google Scholar 

  • Mueller, John and Mark G. Stewart (2012) ‘The Terrorism Delusion’, International Security 37(1): 81–110.

    Article  Google Scholar 

  • Nagl, John A. (2002) Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam, London: Praeger.

    Google Scholar 

  • National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2011) Global Terrorism Database, College Park, MD: University of Maryland.

  • Neumayer, Eric and Thomas Plümper (2011) ‘Foreign Terror on Americans’, Journal of Peace Research 48(1): 3–17.

    Article  Google Scholar 

  • Omelicheva, Maryia (2007) States’ Responses to Terrorism: Manual for Data Collection. University of Kansas, available at: http://www.terrorismanalysts.com/files/counterterrorismmanual.pdf (accessed 4 November, 2014).

    Google Scholar 

  • Pape, Robert A. (2003) ‘The Strategic Logic of Suicide Terrorism’, American Political Science Review 97(3): 343–61.

    Article  Google Scholar 

  • Pape, Robert A. (2005) Dying to Win: The Strategic Logic of Suicide Terrorism, New York: Random House Inc.

    Google Scholar 

  • Perliger, Arie (2012) ‘How Democracies Respond to Terrorism: Regime Characteristics, Symbolic Power and Counterterrorism’, Security Studies 21(3): 490–528.

    Article  Google Scholar 

  • Peterson, James W. (2007) ‘An Expanded NATO Confronts Terrorism and Instability’, Journal of Slavic Military Studies 20(4): 475–97.

    Article  Google Scholar 

  • Piazza, James A. (2007) ‘Draining the Swamp: Democracy Promotion, State Failure, and Terrorism in 19 Middle Eastern Countries’, Studies in Conflict & Terrorism 30(6): 521–39.

    Article  Google Scholar 

  • Plümper, Thomas and Eric Neumayer (2010) ‘The Friend of My Enemy is My Enemy: International Alliances and International Terrorism’, European Journal of Political Research 49(1): 75–96.

    Article  Google Scholar 

  • Record, Jeffrey (2007) Beating Goliath: Why Insurgencies Win, Washington: Potomac Books, Inc.

    Google Scholar 

  • Rees, Wyn and Richard J. Aldrich (2005) ‘Contending Cultures of Counterterrorism: Transatlantic Divergence or Convergence?’ International Affairs 81(5): 905–23.

    Article  Google Scholar 

  • Reich, Walter, ed. (1990) Origins of Terrorism, New York: Cambridge University Press.

    Google Scholar 

  • Rosendorff, B. Peter and Todd Sandler (2004) ‘Too Much of a Good Thing?: The Proactive Response Dilemma’, Journal of Conflict Resolution 48(5): 657–71.

    Article  Google Scholar 

  • Ross, Jeffrey Ian (1993) ‘Structural Causes of Oppositional Political Terrorism: Towards a Causal Model’, Journal of Peace Research 30(3): 317–29.

    Article  Google Scholar 

  • Rühle, Michael (2011) ‘NATO and Emerging Security Challenges: Beyond the Deterrence Paradigm’, American Foreign Policy Interests 33(6): 278–82.

    Article  Google Scholar 

  • Sandler, Todd (2003) ‘Collective Action and Transnational Terrorism’, World Economy 26(6): 779–802.

    Article  Google Scholar 

  • Savun, Burcu and Brian J. Phillips (2009) ‘Democracy, Foreign Policy, and Terrorism’, Journal of Conflict Resolution 53(6): 878–904.

    Article  Google Scholar 

  • Scheppele, Kim Lane (2006) ‘The Migration of Anti-Constitutional Ideas: The Post-9/11 Globalization of Public Law and the International State of Emergency’, in Sujit Choudhry ed., The Migration of Constitutional Ideas, 347–73, Cambridge and New York: Cambridge University Press.

    Google Scholar 

  • Schmid, Alex P. (1992) ‘Terrorism and Democracy’, Terrorism and Political Violence 4(4): 14–25.

    Article  Google Scholar 

  • Schmid, Alex P. (2005) ‘Terrorism as Psychological Warfare’, Democracy and Security 1(2): 137–46.

    Article  Google Scholar 

  • Schmid, Alex P. and Albert J. Jongman (1988) Political Terrorism, New Brunswick, NJ: Transaction Books.

    Google Scholar 

  • Shahrouri, Nahla (2010) ‘Does a Link Exist Between Democracy and Terrorism?’ International Journal on World Peace 27(4): 41–77.

    Google Scholar 

  • Tellis, Ashley J. (1996) ‘Terminating Intervention: Understanding Exit Strategy and U.S. Involvement in Intrastate Conflicts’, Studies in Conflict and Terrorism 19(2): 117–51.

    Article  Google Scholar 

  • Temple-Raston, Dina (2007) The Jihad Next Door: The Lackawanna Six and Rough Justice in an Age of Terror, New York: Public Affairs.

    Google Scholar 

  • US Department of State (2002) Patterns of Global Terrorism 2001, Washington: available at http://www.state.gov/j/ct/rls/crt/2001/ (accessed 10 March, 2014).

  • US Department of State (2003) Patterns of Global Terrorism 2002, Washington: available at http://www.state.gov/j/ct/rls/crt/2002/ (accessed 10 March, 2014).

  • US Department of State (2004) Patterns of Global Terrorism 2003, Washington: available at http://www.state.gov/j/ct/rls/crt/2003/ (accessed 10 March, 2014).

  • US Department of State (2005) Country Reports on Terrorism 2004, Washington: available at http://www.state.gov/j/ct/rls/crt/c14813.htm (accessed 10 March, 2014).

  • US Department of State (2006) Country Reports on Terrorism 2005, Washington: available at http://www.state.gov/j/ct/rls/crt/c17689.htm (accessed 10 March, 2014).

  • US Department of State (2007) Country Reports on Terrorism 2006, Washington: available at http://www.state.gov/j/ct/rls/crt/2006/index.htm (accessed 10 March, 2014).

  • US Department of State (2008) Country Reports on Terrorism 2007, Washington: available at http://www.state.gov/j/ct/rls/crt/2007/index.htm (accessed 10 March, 2014).

  • US Department of State (2009) Country Reports on Terrorism 2008, Washington: available at http://www.state.gov/j/ct/rls/crt/2008/index.htm (accessed 10 March, 2014).

  • US Department of State (2010) Country Reports on Terrorism 2009, Washington: available at http://www.state.gov/j/ct/rls/crt/2009/index.htm (accessed 10 March, 2014).

  • US Department of State (2011) Country Reports on Terrorism 2010, Washington: available at http://www.state.gov/j/ct/rls/crt/2010/index.htm (accessed 10 March, 2014).

  • US National Counter Terrorism Center (2007) Report on Terrorist Incidents – 2006, Washington: available at http://fbi.gov/statsservices/publications/terror_06.pdf (accessed 4 November, 2014).

  • Valentino, Benjamin A., Paul K. Huth and Sarah E. Croco (2010) ‘Bear Any Burden? How Democracies Minimize the Costs of War’, Journal of Politics 72(2): 528–44.

    Article  Google Scholar 

  • Wade, Sara Jackson and Dan Reiter (2007) ‘Does Democracy Matter? Regime Type and Suicide Terrorism’, Journal of Conflict Resolution 51(2): 329–48.

    Article  Google Scholar 

  • Waltz, Kenneth N. (1979) Theory of International Politics, New York: McGraw-Hill.

    Google Scholar 

  • Weinberg, Leonard B. and William L. Eubank (1998) ‘Terrorism and Democracy: What Recent Events Disclose’, Terrorism and Political Violence 10(1): 108–18.

    Article  Google Scholar 

  • Wilkinson, Paul (2001) Terrorism versus Democracy: The Liberal State Response, Portland: Frank Cass.

    Google Scholar 

Download references

Acknowledgements

The author wishes to thank Amanda Murdie for her helpful and constructive comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyle T Kattelman.

Appendix

Appendix

Coding for state action

The framework for the analysis of events is based on the international and national counterterrorism measures compiled by the UN Security Council Resolution 1269 and Resolution 1373 adopted under Chapter VII of the UN Charter. The topics cover the areas of public and foreign policies in relation to which the states’ counterterrorism actions are observed:

  • Institutional

    • Legislation

    • Creating departments

    • Criminalisation

  • Deterrent

    • Controlling borders and people

    • Seizing assets

    • Target-hardening

    • Facilitating preparation of human and technological resources

    • Arrests

  • Punitive

    • Using military and security forces against terrorists

    • Allowing military bases on sovereign soil

  • Other

    • Humanitarian aid

    • Engaging in diplomacy

    • Introducing proposals

    • Sharing intelligence

From this framework, actions that fall under ‘Deterrent’ will be counted as choosing Deter in Figure 1, and actions that fall under ‘Punitive’ will be counted as choosing Pre-empt. If a state chooses a deterrent and punitive action during the same year, the outcome will be coded as Pre-empt. These two choices of Deter and Pre-empt are chosen because they require a greater amount of effort to execute relative to cooperative or institutional measures. Additionally, these actions entail greater consequences in terms of political backlash and a potential retaliatory attack. For example, it can be argued that promising humanitarian aid does little to influence the risk of terrorist attacks. By contrast, freezing the assets of a terrorist organisation can be seen to carry significant consequences by limiting their amount of available resources and influencing their ability to act. The coding criteria for the different areas of counterterrorist action represent a modified schema taken from Omelicheva’s (2007) coding manual, ‘States’ Responses to Terrorism: Manual for Data Collection’, for collecting data on state responses to terrorism.

Institutional

Legislation

Security Council Resolution 1373 requires states to criminalise the provision or collection of funds, by nationals within their borders or territories, for the purposes, whether direct or indirect, of funding terrorist acts. Additionally, Security Council Resolution 1269 condemns unequivocally all acts of terrorism as criminal, irrespective of the methods or motives of the organisation in question. Thus, all acts of legislation passed to meet these ends, including amending acts to combat different aspects of terrorism, changing legislation in the interest of combating terrorism, and extending authority to existing state agencies, are coded as such.

Creating departments

This code applies to instances in which a state creates a new agency for the purposes of counterterrorism.

Criminalisation

This category represents all efforts of states to pass laws that either establish terrorism as a serious criminal offence, or criminalise terrorist acts (e.g., hijacking, hostage-taking, bombings, and so on) or any explicit actions regarded as terrorist acts per UN Security Council Resolutions 1269 and 1373.

Deterrent

Controlling borders and people

Security Council resolution 1373 requires states to take measures to prevent the movement of terrorists and financial flows to entities and persons related to terrorism, and to identify and bring to justice the perpetrators of terrorist acts. These measures include controls on the issuance of identity papers and travel documents, intensified border controls, and regulations of financial transactions. All actions listed below are coded as ‘Control’.

Control of the movement of people

This code is used when a state establishes, improves, or expands databanks containing information on any of the individual metrics, identity documents or visas, and any other measures for preventing counterfeiting, forgery or fraudulent use of identify papers and travel documents (e.g., increasing the security level of passports). This event type also includes compiling lists of persons responsible for perpetration of terrorist acts.

Border controls

This code is used to record a state’s actions aimed at intensification of border controls by supplying border posts with necessary border control equipment, or increasing the presence of border troops at the most dangerous parts of the state border.

Control of financial flows

This code is used to record a state’s measures to protect its financial system. These measures include defining suspicious operations, listing individuals and groups associated with terrorism for the purpose of freezing their financial assets, instructing banks and other institutions on measures to be taken to prevent the utilisation of finances and other assets for commission of terrorist acts. This event code also covers monitoring the activities of national banks and financial intelligence units.

Ban

This code is assigned when a state establishes a ban on functioning of terrorist groups on its territory, or prohibits the activities of banned organisations. This event type also includes courts’ decision declaring certain groups and organisations illegal.

Seizing assets

Seize

This code is used to record various forms of sanctions imposed on the assets of individuals and groups related to terrorism. It includes freezes of accounts, bans on the flow of funds, and sequestration of assets.

Target hardening

Target hardening entails an increase or upgrade in security surrounding potential targets under threat of terrorist attack. The purpose of this action is to dissuade terrorists sufficiently from engaging in terrorist attacks against the protected target. Any of the following actions listed below will be coded as ‘target hardening’.

Target hardening of high-risk activities

This code is used to record measures that a state implements to ensure protection of people during high-risk mass activities, such as sporting events, shows, and public appearances of celebrities or high-profile politicians.

Target hardening of embassies and internationally protected persons

This code is used to record additional measures of protection of embassies and diplomatic representations of states and international organisations. This event code includes measures of protection of diplomats and other internationally protected persons.

Target hardening of transport and communication systems

This code is used to record measures of protection of the systems of transportation – railway, air and naval transport, as well as the systems of communication, including mailing and internet services.

Target hardening of weapons and explosives storage areas

This code is used to record any additional safety measures in the storage areas of weapons and explosives.

Preparation of human and technical resources

This category represents efforts on behalf of states to improve the technological deterrent and monitoring activities as well as the preparation or training of units or groups of people for the express purpose of counterterrorism. Any of the actions listed below will be coded as ‘Preparation of human and technical resources’.

Train personnel

This code is used to record any of the following measures aimed at improving human resources for combating terrorism: recruiting and training human resources for high-alert counter-terrorist special reaction force teams (including hostage rescue units); training bomb disposal teams or other special units to deal with terrorist threat or offensive; carrying out simulation exercises; or enhancing the capacity of law enforcement officials to handle terrorist threats.

Upgrade technical resources

This code is assigned when a state develops, applies or modifies its technological reserves used to prevent or respond to terrorist attacks. This includes surveillance devices, means for eavesdropping/interception, satellites and detectors.

Arrests

Non-military punitive reactions to terrorist attacks. This includes arrests made on foreign nationals or domestic citizens within a state’s sovereign territory as well as non-military raids on the headquarters of terrorists within the occupied territories in Iraq and Afghanistan (for the purposes of arrest and/or neutralisation).

Pre-empt

Strike

Strike is used to record an instance in which a state contributes armed forces for participation in either Operation Enduring Freedom or Operation Iraqi Freedom. It is measured as two separate-count variables, with each state consisting of a value for the number of troops contributed to Operation Enduring Freedom in Afghanistan and a value for the number of troops contributed to Operation Iraqi Freedom in Iraq.

Basing

Base is used to record instances of a nation sanctioning their land for the usage of troop movement or supplies for the purposes of combat or defence against a terrorist organisation.

Other

Humanitarian aid

This variable is coded when a state provides humanitarian aid for the purposes of emergency relief to other international actors.

Engaging in diplomacy

This variable represents instances of international discussion or negotiation of events related to the purpose of combating terrorism and includes engaging in joint counterterrorist exercises, hosting diplomatic events regarding terrorism, traveling to meet foreign dignitaries for the purpose of discussing counterterrorism, and articulating positions to the international community with regard to counterterrorism.

Offering proposals

This variable represents a state’s attempt to suggest or propose counterterrorism policies or strategies of any kind. This action includes proposing treaties, amendments, and initiatives regarding any reference to fighting terrorism.

Sharing intelligence

This variable is coded to represent the exchange of information between states regarding instances of terrorism, early warning, or assisting in criminal investigations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kattelman, K. Testing the prisoners’ dilemma of counterterrorism: an aggregate analysis of counterterrorist efforts from 2001 to 2010. J Int Relat Dev 19, 583–607 (2016). https://doi.org/10.1057/jird.2014.26

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jird.2014.26

Keywords

Navigation