Skip to main content

Advertisement

Log in

Terrorism Risk Forecasting by Ideology

  • Published:
European Journal on Criminal Policy and Research Aims and scope Submit manuscript

Abstract

The purpose of the present study is to produce foresights on terrorism. For the first time in the literature, we test the predictive validity of risk terrain modeling to forecast terrorism. Because the relevant literature suggests that target selection and the places where terrorist attacks occur are related to a group’s strategies, we also investigate whether and how violent terrorist acts vary with respect to their surroundings in the same jurisdiction when the ideology is the point of comparison. Separatist and leftist terrorist groups committed 1152 violent terrorist acts between 2008 and 2012 in Istanbul, Turkey. Our analysis begins with a comparison of targets and risk factors by the ideology of the perpetrators for 857 separatist and 295 leftist terrorist incidents. After identifying high-risk locations, we test the predictive validity of risk terrain modeling. The study results showed that context and spatial influence—the risky areas of terrorism—vary by the nature of the ideology in the jurisdiction. Practical implications also are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. Also, the symbolic value of the targets has been important for terrorists, and one of the well-known rating methods was proposed by Clarke and Newman (2006) to predict what terrorists can target. Several studies benefited from Clarke and Newman’s method to rate a number of physical features for the likelihood of being targeted in the city. The RTM analysis, on the other hand, is applicable to all places in a study area, though the symbolic nature of a particular feature is not weighted.

  2. Police are responsible for the safety of urban and suburban cities of Turkey while the gendarmerie serves in the rural areas. The current study examined the terrorist incidents within the boundaries of the IPD area of responsibility.

  3. According to the Article 1 of Law No: 3713 (Anti-Terror Law in Turkey 1991), the definition of terror is described as follows: “The terror is an act, by using force and violence, perpetrated by any of the methods of extortion, intimidation, discouragement, menace and threat by a person or by persons belonging to an organization with a view of changing the nature of the Republic as defined in its Constitution and its political, legal, social, secular and economic order, impairing the indispensable integrity of the State with its country and nation, endangering the existence of the Turkish State and Republic, weakening or annihilating or overtaking the state authority, eliminating the basic rights and freedoms and damaging the internal and external safety, public order or general health of the country.” For an act to be considered as a terrorist incident, the crimes stated in Article 4 of the Turkish Anti-Terror Act have to be committed with the intentions cited in Article 1. Accordingly, Article 4 of the Turkish Anti-Terror Act articulates that the offenses described in the different articles of Turkish Penal Code “shall be considered as terrorist offenses if they have been committed for the purposes described in Article 1 under the scope of the activities of a terrorist organization established with the purpose of committing crimes.” For example, a defendant would be accused of violating the Anti-Terror Act if the person committed a burglary to provide monetary support to the operations of a terrorist group.

  4. Most recent empirical research on the spatial aspect of terrorism have used different specific acts together to construct a dependent variable of terrorism (Baudains et al. 2012; Cothren et al. 2008; LaFree et al. 2012; LaFree and Bersani, 2014; Nemeth et al. 2014). For example, Nemeth et al. (2014) based their construct on five criteria: “the attacks are intentional; involve the use, or threatened use, of violence; and the perpetrating actors are subnational; the act must be directed towards a political, economic, religious, or social goal; there must be evidence of intent to coerce; and the action must be outside the realm of legitimate military activities.” (p.308). To explore spatial and temporal patterns of terrorism, Lafree et al. 2012 used 1993 terrorist attacks attributed to the ETA from 1970 to 2007, and the data from GTD also include unarmed assaults and attacks to facilities or infrastructure. The spatio-temporal patterns were also examined with terrorist incidents that were designated by a law enforcement agency (see Cothren et al. 2008).

  5. A sample incident summary is as follows: “On January 1st, 2008 at around 18.00, a bomb detonated in a waste container that was in front of the building at Inonu Street 122 in Cumhuriyet Neighborhood of the district of Kucukcekmece. Two persons were wounded, and some buildings around the address were damaged. An investigation was initiated to identify suspect(s).” In practice, counterterrorism units intervene in any investigation with the suspicion of terrorism. If the incident is not a terrorist act, then it is cleared from the database of the Counter Terrorism Department.

  6. The addresses of the incidents were entered into a Microsoft Excel file and then geocoded using the ESRI’s World Geocoding Service that requires an authorization by the producer. The matching scores in geocoding were quite high. Ninety-eight percent, or 1272 incident addresses, were matched successfully. Two percent, or 22 addresses, had more than one candidate with the same best match in different locations, and they were rematched to the correct addresses. The raw data included 1294 incidents over the study period. Some instances were nonviolent acts (e.g., unlawful demonstrations to propagandize a terrorist organization). The addresses of violent terrorist incidents provided by TNP were used to probe the spatial aspects of the activity.

  7. Of all 1152 terrorist incidents, only one was invasion, seven were robberies, 28 armed assaults, 214 violent demonstrations, 280 explosives, and 622 arsons. The study area was very wide, and the number of incidents in the other types was not large enough to conduct statistical tests. Using the same variables and parameters (i.e., 110-m by 110-m cells within a two-block area), a separate model could only be tested for all terrorist arson incidents without an ideological dichotomy.

  8. Religious facilities included mosques, synagogues, and churches. The bakery variable was constructed from the point locations of bakeries and patisseries where bread and cakes are made and sold. Franchises were convenience stores selling basic food items and consumer goods and included the locations of all branches of five franchise convenience stores (BIM, Kiler, HakMar, A101, and Carrefour) whose branches were targeted multiple times. Educational facilities were elementary schools, high schools, and universities. Eateries included cafés, coffeehouses, fast food establishments, and restaurants, where people can spend time on the premises. The government variable included police, military, and correctional facilities; courthouses; city hall; other municipal buildings; consulates; and post offices.

  9. The models generated 44 variables from 17 risk factors to test for statistical significance. The testing process involved first using an elastic net penalized regression model assuming a Poisson distribution of events. Next, 21 variables were selected in the overall and separatist models and 23 variables in the leftist model through cross validation. The variables were then used in a bidirectional stepwise regression process starting with a null model to build an optimal model by optimizing the Bayesian information criteria (BIC). A BIC score balances how well the model fits the data against the complexity of the model. The stepwise regression process was conducted for both Poisson and negative binomial distributions with the best BIC score used to select between the distributions. The best risk terrain model was a negative binomial with eight risk factors for all incidents (BIC score = 10,265.0), seven risk factors for separatist incidents (BIC score = 8265.4), and six risk factors for leftist incidents (BIC = 3293.8). The models also included an intercept term that represents the background rate of events and an intercept term that represented overdispersion of the event counts.

  10. The underlying correlation among the 44 variables generated from 17 risk factors may be a limitation. A potential intercorrelation of independent variables may make parameter estimates unreliable since it may produce large standard errors in the denominator, which could make a predictor insignificant in a model. On the other hand, our results could be only minimally-biased since the models include independent variables that had the strongest correlation with dependent variables.

  11. The predictive validity could not be tested by the current ideological dichotomy since the separatist groups committed around 480 incidents in the first period, and this number was around 190 for the leftist group. The RTMDx could not find any significant risk factor across 108,471 units with the two samples of incidents.

  12. Initially, 10.8% percent of all 110-m by 110-m cells had highest values of risk in the first period, ranging from 62 to 184. The number of cells (11,618) with a risk value of 62 exceeded the number of cells (10,847) needed for the validity test. In total, 6529 cells had a risk value 62; however, 5758 cells needed to be included in the first-tier places. Therefore, 5758 cells with a risk value of 62 were randomly selected to ensure that every cell had an equal chance of being sorted into the pool of the top 10% of cells with the highest values of risk.

  13. The total number of incidents in the second period was 94 in all cells with a risk value of 62 in the first period. The random sampling excluded three incidents in the process of designating high-risk places.

  14. At the outset, the IPD jurisdiction contained 149,137 places; however, 108,471 were examined after excluding the places beyond two blocks from the street. Those 108,471 places under examination covered 72.7% of the entire jurisdiction.

References

  • Anarumo, M., Kennedy, L., & McGarrell, E. (2011). The practitioner’s view of the terrorist threat. Crime and Terrorism risk: Studies in Criminology and Criminal Justice, 56–79.

  • Anti-Terror Law in Turkey, Law No: 3713. (1991). http://www.justice.gov.tr/basiclaws/Law_on_Figh.pdf

  • Bahgat, K., & Medina, R. M. (2013). An overview of geographical perspectives and approaches in terrorism research. Perspectives on Terrorism, 7(1), 38–72.

    Google Scholar 

  • Bal, I., & Laciner, S. (2001). The challenge of revolutionary terrorism to Turkish democracy 1960-80. Terrorism and Political Violence, 13(4), 90–115.

    Article  Google Scholar 

  • Baudains, P., Braithwaite, A., & Johnson, S. D. (2012). Spatial patterns in the 2011 London riots. Policing: A Journal of Policy and Practice, 7(1), 21–31.

    Article  Google Scholar 

  • Behlendorf, B., LaFree, G., & Legault, R. (2012). Predicting microcycles of terrorist violence: Evidence from FMLN and ETA. Journal of Quantitative Criminology, 28, 49–75.

    Article  Google Scholar 

  • Berrebi, C., & Lakdawalla, D. (2007). How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Defence and Peace Economics, 18(2), 113–131.

    Article  Google Scholar 

  • Blomberg, S. B., Gaibulloev, K., & Sandler, T. (2011). Terrorist group survival: Ideology, tactics, and base of operations. Public Choice, 149(3-4), 441.

    Article  Google Scholar 

  • Braithwaite, A., & Li, Q. (2007). Transnational terrorism hot spots: Identification and impact evaluation. Conflict Management and Peace Science, 24(4), 281–296.

    Article  Google Scholar 

  • Braithwaite, A., & Johnson, S. D. (2012). Space–time modeling of insurgency and counterinsurgency in Iraq. Journal of Quantitative Criminology, 28(1), 31–48.

  • Brandt, P. T., & Sandler, T. (2010). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution, 54(2), 214–236.

    Article  Google Scholar 

  • Brantingham, P. L., Brantingham, P. J., Vajihollahi, M., & Wuschke, K. (2009). Crime analysis at multiple scales of aggregation: A topological approach. In D. Weisburd, W. Bernasco, & G. Bruinsma (Eds.), Putting crime in its place (pp. 87–107). New York: Springer.

    Chapter  Google Scholar 

  • Brown, D., Dalton, J., & Hoyle, H. (2004). Spatial forecast methods for terrorist events in urban environments. Intelligence and Security Informatics. https://doi.org/10.1007/b98042.

  • Caplan, J. M. (2011). Mapping the spatial influence of crime correlates: A comparison of operationalization schemes and implications for crime analysis and criminal justice practice. Cityscape, 13(3), 57–83.

    Google Scholar 

  • Caplan, J. M., Kennedy, L. W., & Miller, J. (2011). Risk terrain modeling: Brokering criminological theory and GIS methods for crime forecasting. Justice Quarterly, 28(2), 360–381.

    Article  Google Scholar 

  • Caplan, J. M., Kennedy, L. W., & Piza, E. L. (2013). Joint utility of event-dependent and environmental crime analysis techniques for violent crime forecasting. Crime & Delinquency, 59(2), 243–270.

    Article  Google Scholar 

  • Clarke, R. V., & Newman, G. (2006). Outsmarting the terrorists. Westport, CT: Praeger.

    Google Scholar 

  • Clauset, A., & Gleditsch, K. S. (2012). The developmental dynamics of terrorist organizations. PLoS One, 7(11), e48633.

    Article  Google Scholar 

  • Cothren, J., Smith, B. L., Roberts, P., & Damphousse, K. R. (2008). Geospatial and temporal patterns of preparatory conduct among American terrorists. International Journal of Comparative and Applied Criminal Justice, 32(1), 23–41.

    Article  Google Scholar 

  • Drake, C. J. (1998). The role of ideology in terrorists’ target selection. Terrorism and Political Violence, 10(2), 53–85.

    Article  Google Scholar 

  • Ekici, N., Ozkan, M., Celik, A., & Maxfield, M. G. (2008). Outsmarting terrorists in Turkey. Crime Prevention & Community Safety, 10(2), 126–139.

    Article  Google Scholar 

  • Findley, M. G., Braithwaite, A., Young, J. K., Marineau, J. F., & Pascoe, H. (2015). The local geography of transnational terrorism. In International Studies Association Annual Meeting, New Orleans, Louisiana.

  • Gaibulloev, K., Sandler, T., & Santifort, C. (2012). Assessing the evolving threat of terrorism. Global Policy, 3(2), 135–144.

    Article  Google Scholar 

  • Gruenewald, J., Allison-Gruenewald, K., & Klein, B. R. (2015). Assessing the attractiveness and vulnerability of eco-terrorism targets: A situational crime prevention approach. Studies in Conflict & Terrorism, 38(6), 433–455.

    Article  Google Scholar 

  • Johnson, S. D., & Braithwaite, A. (2009). Spatio-temporal modelling of insurgency in Iraq. In J. D. Frielich & G. Newman (Eds.), Reducing terrorism through situational crime prevention (pp. 9–32). New York: Criminal Justice Press.

    Google Scholar 

  • Jones, S. G., & Libicki, M. C. (2008). How terrorist groups end: Lessons for countering al Qa'ida. Rand Corporation.

  • Kennedy, L. W., Caplan, J. M., & Piza, E. (2011). Risk clusters, hotspots, and spatial intelligence: Risk terrain modeling as an algorithm for police resource allocation strategies. Journal of Quantitative Criminology, 27(3), 339–362.

    Article  Google Scholar 

  • Kliot, N., & Charney, I. (2006). The geography of suicide terrorism in Israel. GeoJournal, 66(4), 353–373.

    Article  Google Scholar 

  • LaFree, G., & Bersani, B. E. (2014). County-level correlates of terrorist attacks in the United States. Criminology & Public Policy, 13, 455–481.

    Article  Google Scholar 

  • LaFree, G., Dugan, L., Xie, M., & Singh, P. (2012). Spatial and temporal patterns of terrorist attacks by ETA, 1970 to 2007. Journal of Quantitative Criminology, 28(1), 7–29.

    Article  Google Scholar 

  • Libicki, M. C., Chalk, P., & Sisson, M. (2007). Exploring terrorist targeting preferences (Vol. 483). Santa Monica: Rand Corporation.

    Google Scholar 

  • Madensen, T., & Eck, J. E. (2008). Spectator violence in stadium settings. Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice.

    Google Scholar 

  • Nemeth, S. C., Mauslein, J. A., & Stapley, C. (2014). The primacy of the local: Identifying terrorist hot spots using geographic information systems. The Journal of Politics, 76(2), 304–317.

    Article  Google Scholar 

  • Nunn, S. (2007). Incidents of terrorism in the United States, 1997-2005. Geographical Review, 97(1), 89–111.

    Article  Google Scholar 

  • Onat, I. (2016). An analysis of spatial correlates of terrorism using risk terrain modeling. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2016.1215309.

  • Ozer, M., & Akbas, H. (2011). The application of situational crime prevention to terrorism. Turkish Journal of Police Studies, 13(2), 179–194.

    Google Scholar 

  • Patterson, S. A., & Apostolakis, G. E. (2007). Identification of critical locations across multiple infrastructures for terrorist actions. Reliability Engineering & System Safety, 92(9), 1183–1203.

    Article  Google Scholar 

  • Piazza, J. A. (2009). Is Islamist terrorism more dangerous?: An empirical study of group ideology, organization, and goal structure. Terrorism and Political Violence, 21(1), 62–88.

    Article  Google Scholar 

  • Riffe, D., Lacy, S., & Fico, F. G. (2014). Analyzing media messages: Using quantitative content analysis in research. New York: Routledge.

    Book  Google Scholar 

  • Rossmo, D. K., & Harries, K. (2011). The geospatial structure of terrorist cells. Justice Quarterly, 28(2), 221–248.

    Article  Google Scholar 

  • Rusnak, D. M., Kennedy, L. W., Eldivan, I. S., & Caplan, J. M. (2012). Analyzing terrorism using spatial analysis techniques: A case study of Turkish cities. In C. Lum & L. W. Kennedy (Eds.), Evidence-based counterterrorism policy (pp. 167–185). New York: Springer.

    Chapter  Google Scholar 

  • Santifort, C., Sandler, T., & Brandt, P. T. (2013). Terrorist attack and target diversity: Changepoints and their drivers. Journal of Peace Research, 50(1), 75–90.

    Article  Google Scholar 

  • Savitch, H. V. (2014). Cities in a time of terror: Space, territory, and local resilience. New York: Routledge.

    Google Scholar 

  • Savitch, H. V., & Ardashev, G. (2001). Does terror have an urban future? Urban Studies, 38(13), 2515–2533.

    Article  Google Scholar 

  • Schmidt, G., Goffeney, J., & Willis, R. (2007). Impact of uncertainty on terror forecasting. Washington, DC: Naval Research Lab, Information Technology Division.

    Google Scholar 

  • Townsley, M., Johnson, S. D., & Ratcliffe, J. H. (2008). Space time dynamics of insurgent activity in Iraq. Security Journal, 21(3), 139–146.

    Article  Google Scholar 

  • Webb, J. J., & Cutter, S. L. (2009). The geography of US terrorist incidents, 1970-2004. Terrorism and Political Violence, 21(3), 428–449.

    Article  Google Scholar 

  • Wormeli, P. (2014). Developing policies for countering terrorism. Criminology & Public Policy, 13, 493–497.

    Article  Google Scholar 

  • Wright, A. L. (2013). Terrorism, Ideology and Target Selection. Retrieved June 28, 2017, from Princeton University: https://www.princeton.edu/politics/about/file-repository/public/Wright_on_Terrorism.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ismail Onat.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Onat, I., Gul, Z. Terrorism Risk Forecasting by Ideology. Eur J Crim Policy Res 24, 433–449 (2018). https://doi.org/10.1007/s10610-017-9368-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10610-017-9368-8

Keywords

Navigation