Skip to main content

Advertisement

Log in

Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007

  • Original Paper
  • Published:
Journal of Quantitative Criminology Aims and scope Submit manuscript

Abstract

Rational choice perspectives maintain that seemingly irrational behavior on the part of terrorist organizations may nevertheless reflect strategic planning. In this paper we examine spatial and temporal patterns of terrorist attacks by the Spanish group ETA between 1970 and 2007. Our analysis is guided by a public announcement by ETA in 1978 that the group would shift from emphasizing attacks in the Basque territory to instead launch attacks more widely in the hopes of exhausting the Spanish government and forcing it to abandon the Basque territory. This announcement suggests that prior to the end of 1978 ETA attacks were based mostly on controlling territory in the Basque region that they hoped to rule; and after 1978 the organization decided to instead undertake a prolonged war of attrition. Accordingly, we argue that before the end of 1978 ETA was mostly perpetrating control attacks (attacking only within the Basque territories) and that the diffusion of attacks between provinces was mostly contagious (spreading contiguously). After the 1978 proclamation, we argue that the attack strategy shifted toward attrition (attacking in areas outside of the Basque territories) and that the attacks were more likely to diffuse hierarchically (spreading to more distant locations). As predicted, we find that after ETA moved toward a more attrition based attack strategy, subsequent attacks were significantly more likely to occur outside the Basque region and to target non-adjacent regions (consistent with hierarchical diffusion). We also find that hierarchical diffusion was more common when a longer time elapsed between attacks (a likely consequence of the fact that more distant attacks require more resources and planning) and that attacks against Madrid were unlikely to be followed immediately by more attacks on Madrid or surrounding provinces. After ETA announced a shift in policy, they maintained a highly dispersed attack strategy even during their period of decline. Using information about where and when prior attacks occurred could provide useful information for policy makers countering groups like ETA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. Data from 1993 were lost by PGIS in an office move and we have never been able to successfully restore them. We, therefore, treat 1993 as missing.

  2. The current analyses are based on GTD data downloaded on May 1, 2009.

  3. Sanchez-Cuenca (2009, p. 613) reports only three ETA-related casualties between 1968 and 1970, the year when our analysis begins.

  4. On the eve of Franco’s death in 1975, ETA split into two organizations, the political-military ETA (ETApm) and the military ETA (ETAm). ETApm, the larger and more powerful of the two, favored political participation and in 1981, renounced the use of terrorism and began full participation in electoral politics. Most of the attacks and fatalities attributed to ETA in our data base were actually carried out by ETAm.

  5. Including the ETA cases, GTD recorded a total of 2,958 terrorist attacks against Spain during the study period. Other major groups responsible for these attacks included the First of October Antifascist Resistance Group (or GRAPO; 207 attacks; 7.0%); Terra Lliure (or TL; 61 attacks; 2.0%); and the Revolutionary Anti-Fascist Patriotic Front (or FRAP; 47 attacks; 1.6%).

  6. The proportion of attributed terrorist attacks in Spain from the GTD is relatively high compared to the data base as a whole. Of the 3,235 attacks in the GTD from 1970 to 2007, no terrorist group is attributed in only 594 (18.4%) of the cases.

  7. The match rate exceeds the minimum threshold of 85% suggested by Ratcliffe (2004). We were unable to geocode the remaining attacks either because the GTD data did not include city-level information or because the city listed in the database was matched to multiple locations.

  8. In supplementary analysis, we also tested for structural changes in the time series of ETA attacks by using Andrews’ (1993) and Bai and Perron’s (1998, 2003) methods for identifying structural breaks in time series (data outputs available upon request). The analysis used quarterly counts of ETA attacks from 1970 to 2007. The goal of the analysis was to test the null hypothesis that the level of ETA attacks remained constant over the study period, and a rejection of the null hypothesis would indicate potential break points in the series. Before conducting the structural change test, diagnostic checks were conducted on the series for stationarity and autocorrelation. The analysis identified an autoregressive model with 4 lags and a constant term as the best fitting model for the series, in which the residuals were white noise. Thus, using this autoregressive model, we projected the break points with the R package strucchange function breakpoints using the standard trimming value of 15% at each end of the series (Zeileis et al. 2002). Based on this analysis, we detected only one break in the third quarter of 1979, which is consistent with the fact that this is the high point of ETA attacks over the nearly four decades spanned by the data (for similar methods, see McDowall and Loftin 2005). We note in passing that a break point in the series based purely on a statistical test closely resembles the break point we expected, based on ETA’s stated policy shift.

  9. This table is adapted from tables A1 and A2 in Cohen and Tita (1999).

  10. There were a total of 416 transitions in period 1 of which 388 transitions were stationary. The 416 transitions are based on a total of 52 provinces (47 in Spain and 5 in France) where each province has 8 year-to-year transitions (1970–1971, 1971–1972, so on). In each year, for each province, we calculated a LISA statistic. Then, we compare the LISA statistic in year t to the LISA statistic in year t + 1 and classify the change as either stationary or change using the rules specified in Table 1. Using this information, we counted the number of provinces that had zero attacks in each year and its transition was classified as stationary. This results in a total of 373 transitions. So the percentage reported in the text is 373/388 = 96.1%. We used the same procedure for period 2 and found that out of the 1,230 stationary transitions, there were 1,039 transitions involving a count of 0 attacks in a given year. So the percentage is 1,039/1,230 = 84.5%.

  11. We determined statistical significance by first using binomial distributions—B (n, 0.5)—to calculate the exact probabilities of obtaining the observed sample. For example, in period 1, there were 12 decreases: 7 from adjacent units and 5 from non-adjacent units. Thus, using B (12, 0.5) and assuming that the probability of decrease from adjacent units is equal to the probability of decrease from non-adjacent units, we get p = 0.16 (decreases from adjacent units = 7)—which is within the range of chance variation. To verify our conclusions, we also used significance tests for a single proportion. The null hypothesis is H0: p = 0.5. The z statistics are calculated as \( Z = {\frac{{\hat{p} - 0.5}}{{\sqrt {{\raise0.7ex\hbox{${\left( {0.5 \times 0.5} \right)}$} \!\mathord{\left/ {\vphantom {{\left( {0.5 \times 0.5} \right)} n}}\right.\kern-\nulldelimiterspace} \!\lower0.7ex\hbox{$n$}}} }}} \). This method produced the same results as the first method and all of the statistically significant cells have a Z-value larger than 1.96.

  12. Of the 16 increases in attacks originating in period 1, 4 adjacent increases and 0 non-adjacent increases can be attributed to one of the provinces in the BAC (4/15 = 25%). For the 86 increases in attacks in period 2, 4 adjacent increases and 0 non-adjacent increases can be attributed to the BAC (4/86 = 4.7%). Thus, in support of our arguments, increases in attacks in non-BAC provinces were more likely to occur in the second than in the first period.

References

  • Andrews DWK (1993) Test for parameter instability and structural change with unknown change point. Econometrica 61:821–856

    Article  Google Scholar 

  • Anselin LJ, Cohen J, Cook D, Gorr W, Tita G (2000) Spatial analyses of crime. In: Duffee D (ed) Criminal justice 2000: volume 4, measurement and analysis of crime and justice. National Institute of Justice, Washington, DC, pp 213–262

    Google Scholar 

  • Bai J, Perron P (1998) Estimating and testing linear models with multiple structural changes. Econometrica 66:47–78

    Article  Google Scholar 

  • Bai J, Perron P (2003) Computation and analysis of multiple structural change models. J Appl Econ 18:1–22

    Article  Google Scholar 

  • Berrebi C, Lakdawalla D (2007) How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Def Peace Econ 18:113–131

    Article  Google Scholar 

  • Clark RP (1980) The Basques: the Franco years and beyond. University of Nevada Press, Reno

    Google Scholar 

  • Clarke RV, Newman GR (2006) Outsmarting the terrorists. Praeger, New York

    Google Scholar 

  • Cohen J, Tita G (1999) Diffusion in homicide: exploring a general method for detecting spatial diffusion processes. J Quant Criminol 15:451–493

    Article  Google Scholar 

  • Cothren J, Smith BL, Roberts P, Damphousse KR (2008) Geospatial and temporal patterns of preparatory conduct among American terrorists. Int J Comp Appl Crim Justice 32:23–41

    Article  Google Scholar 

  • Crenshaw M (1998) The logic of terrorism: terrorist behavior as a product of strategic choice. In: Reich W (ed) Origins of terrorism, psychologies, ideologies, theologies, states of mind. Woodrow Wilson International Center for Scholars, Johns Hopkins University, pp 7–24

  • Cromwell P, Olson J, Avary D (1991) Breaking and entering: an ethnographic analysis of burglary. Sage, Newbury Park

    Google Scholar 

  • De la Calle L, Sanchez-Cuenca I (2006) The production of terrorist violence: analyzing target selection with the IRA and ETA. Juan March Institute: Working paper 2006/230

  • DeNardo J (1985) The amateur strategist: intuitive deterrence theories and the politics of the nuclear arms race. Cambridge University Press, Cambridge

    Google Scholar 

  • Dugan L, LaFree G, Piquero AR (2005) Testing a rational choice model of airline hijackings. Criminology 43:1031–1065

    Article  Google Scholar 

  • Eck JE, Gersh JS, Taylor C (2000) Finding crime hot spots through repeat address mapping. In: Goldsmith V, Maguire PG, Mollenkopf JH, Ross TA (eds) Analyzing crime patterns: frontiers of practice. Sage, Thousand Oaks

    Google Scholar 

  • Enders W, Sandler T (2006) The political economy of terrorism. Cambridge University Press, New York

    Google Scholar 

  • Ericsson U (1995) Straight from the horse’s mouth. Forensic Update 43:23–25

    Google Scholar 

  • Everson S (2003) Repeat victimization and profile offending: chance or choice? Int J Police Sci Manage 5:180–194

    Article  Google Scholar 

  • Hoffman B (1998) Recent trends and future prospects of terrorism in the United States. Rand, Santa Monica

    Google Scholar 

  • Jacobs B (1996) Crack dealers and restrictive deterrence: identifying NARCS. Criminology 34:409–431

    Article  Google Scholar 

  • Jenkins BM (1975) Will terrorists go nuclear?. Rand, Santa Monica

    Google Scholar 

  • Johnson SD, Bowers KJ (2004) The burglary as clue to the future: the beginnings of prospective hotspotting. Eur J Criminol 1:237–255

    Article  Google Scholar 

  • Johnson SD, Braithwaite A (2009) Spatio-temporal modeling of insurgency in Iraq. University College London (Unpublished manuscript)

  • Johnson SD, Bernasco W, Bowers KJ, Effers H, Ratcliffe J, Rengert G, Townsley MT (2007) Space-time patterns of risk: a cross national assessment of residential burglary victimization. J Quant Criminol 23:201–219

    Article  Google Scholar 

  • Klepper S, Nagin DS (1989) Tax compliance and perceptions of the risk of detection and criminal prosecution. Law Soc Rev 23:209–240

    Article  Google Scholar 

  • Kydd AH, Walter BF (2006) The strategies of terrorism. Int Secur 31:49–80

    Article  Google Scholar 

  • LaFree G, Dugan L (2007) Introducing the global terrorism database. Terror Political Violence 19:181–204

    Article  Google Scholar 

  • LaFree G, Dugan L (2009a) Tracking global terrorism trends, 1970–2004. In: Weisburd D, Feucht TE, Hakimi I, Mock LF, Perry S (eds) To protect and to serve: police and policing in an age of terrorism. Springer, New York, pp 43–80

    Google Scholar 

  • LaFree G, Dugan L (2009b) Research on terrorism and countering terrorism. Crime Justice 38:413–477

    Google Scholar 

  • Letamendia F (1994) Historia del Nacionalismo Vasco y de ETA, vol II. R and B Editores, San Sebastian

  • Maguire M (1982) Burglary in a dwelling. Heinemann, London

    Google Scholar 

  • McCormick GH (2003) Terrorist decision making. Annu Rev Polit Sci 6:473–507

    Article  Google Scholar 

  • McDowall D, Loftin C (2005) Are U.S. crime rate trends historically contingent? J Res Crime Delinquency 42:359–383

    Article  Google Scholar 

  • Messner SF, Anselin L, Baller RD, Hawkins DF, Deane G, Tolnay SE (1999) The spatial patterning of county homicide rates: an application of exploratory spatial data analysis. J Quant Criminol 15:423–450

    Article  Google Scholar 

  • Morenoff JD, Sampson RJ (1997) Violent crime and the spatial dynamics of neighborhood transition: Chicago, 1970–1990. Social Forces 76:31–64

    Google Scholar 

  • Morenoff JD, Sampson RJ, Raudenbush SW (2001) Neighborhood inequality, collective efficacy and the spatial dynamics of urban violence. Criminology 39:517–559

    Article  Google Scholar 

  • Nagin DS, Paternoster R (1993) Enduring individual differences and rational choice theories of crime. Law Soc Rev 27:467–496

    Article  Google Scholar 

  • Pape RA (2005) Dying to win. Random House, New York

    Google Scholar 

  • Paternoster R, Simpson SS (1996) Sanction threats and appeals to morality: testing a rational choice model of corporate crime. Law Soc Rev 30:549–583

    Article  Google Scholar 

  • Pease K (1998) Repeat victimization: taking stock. The Home Office, Police Research Group, Crime Detection and Prevention Series Paper 90

  • Piquero AR, Tibbetts SG (1996) Specifying the direct and indirect effects of low self-control and situational factors in offenders’ decision making: toward a more complete model of rational offending. Justice Q 13:481–510

    Article  Google Scholar 

  • Quetelet A (1831/1984) Research on the propensity for crime at different ages (trans: Sawyer F). Anderson, Cincinnati

  • Ratcliffe JH (2004) Geocoding crime and a first estimate of a minimum acceptable hit rate. Int J Geogr Inf Sci 18:61–72

    Article  Google Scholar 

  • Ratcliffe JH, Rengert GF (2008) Near-repeat patterns in Philadelphia shootings. Secur J 21:58–76

    Article  Google Scholar 

  • Reinares F (2004) Who are the terrorists? Analyzing changes in sociological profile among members of ETA. Stud Confl Terror 27:465–488

    Article  Google Scholar 

  • Reinares F (2005) National separatism and terrorism in comparative perspective. In: Bjorgo T (ed) Root causes of terrorism. Routledge, London, pp 119–130

    Chapter  Google Scholar 

  • Rengert G, Wasilchick J (2000) Suburban Burglary: a tale of two suburbs. Charles Thomas, Springfield

    Google Scholar 

  • Roncek D (2000) Schools and crime. In: McGuire P, Mollenkopf J, Ross T, Goldsmith V (eds) Analyzing crime patterns frontiers of practice. Sage, Thousand Oaks

    Google Scholar 

  • Roncek D, Bell R (1981) Bars, blocks and crimes. J Environ Syst 11:35–47

    Google Scholar 

  • Roncek D, Maier PA (1991) Bars, blocks and crimes revisited: linking the theory of routine activities to the empiricism of “hot spots”. Criminology 29:725–753

    Article  Google Scholar 

  • Rossmo DK (2000) Geographic profiling. CRC Press, Boca Raton

    Google Scholar 

  • Sanchez-Cuenca I (2007) The dynamics of nationalist terrorism: ETA and the IRA. Terror Political Violence 19:289–306

    Article  Google Scholar 

  • Sanchez-Cuenca I (2009) The persistence of nationalist terrorism: the case of ETA. In: Mulaj K (ed) Violent non-state actors in contemporary world politics. Columbia University Press, New York

    Google Scholar 

  • Sandler T, Arce MDG (2003) Terrorism and game theory. Simul Gaming 34:319–337

    Article  Google Scholar 

  • Shaw CR (1929) Delinquency areas: a study of the geographic distribution of school Truants, Juvenile Delinquents, and adult offenders in Chicago. University of Chicago Press, Chicago

    Google Scholar 

  • Sherman LW (1995) Hot spots of crime and criminal careers of places. In: Clarke RV (ed) Crime and place: crime prevention studies 4. Willow Tree Press, Monsey

    Google Scholar 

  • Sherman LW, Weisburd D (1995) General deterrent effects of police patrol in crime “hot spots:” a randomized controlled trial. Justice Q 12:625–648

    Article  Google Scholar 

  • Sherman LW, Gartin PR, Buerger ME (1989) Hot spots of predatory crime: routine activities and the criminology of place. Criminology 27:27–56

    Article  Google Scholar 

  • Simpson SS, Piquero NL, Paternoster R (1998) Exploring the micro-macro link in corporate crime research. In: Bamberger P, Sonnenstuhl WJ (eds) Research in the sociology of organizations. JAI Press, Greenwich

    Google Scholar 

  • Smith BL (2008) A look at terrorist behavior: how they prepare, where they strike. NIJ J. Issue 260, Washington, DC: U.S. Department of Justice

  • Smith BL, Damphousse KR (2006) Pre-incident indicators of terrorist incidents: the identification of behavioral, geographic and temporal patterns of preparatory conduct. Final Report (March). Washington DC: Department of Justice

  • Tolnay SE, Deane GD, Beck EM (1996) Vicarious violence: spatial effects on southern lynchings, 1890–1919. Am J Sociol 102:788–815

    Article  Google Scholar 

  • Townsley M, Homel R, Chaseling J (2003) Infectious burglaries: a test of the near repeat hypothesis. Br J Criminol 43:615–633

    Google Scholar 

  • Townsley M, Johnson SD, Ratcliffe JH (2008) Space time dynamics of insurgent activity in Iraq. Secur J 21:139–146

    Article  Google Scholar 

  • Unzueta P (1988) Los Nietos de la ira. Nacionalismo y violencia en el Pais Vasco. El Pais-Aguilar, Madrid

    Google Scholar 

  • Weisburd D, Green L (1994) Defining the drug market: the case of the Jersey City DMA system. In: MacKenzie DL, Uchida CD (eds) Drugs and crime: evaluating public policy initiatives. Sage, Newbury Park

    Google Scholar 

  • Weisburd D, Maher L, Sherman LW (1992) Contrasting crime general and crime specific theory: the case of hot-spots of crime. Adv Criminol Theory 4:45–70

    Google Scholar 

  • Wiles P, Costello A (2000) The ‘road to nowhere’: the evidence for traveling criminals. Home Office Research Study 207. Home Office, London

    Google Scholar 

  • Wilkinson P (1986) Terrorism and the liberal state (rev. ed). Macmillan, London

    Google Scholar 

  • Wright RT, Decker SH (1994) Burglars on the job: streetlife and residential breakins. Northeastern University Press, Boston

    Google Scholar 

  • Wright RT, Decker SH (1997) Armed robbers in action: stickups and street culture. Northeastern University Press, Boston

    Google Scholar 

  • Zeileis A, Leisch F, Hornik K, Kleiber C (2002) Strucchange: an R package for testing for structural change in linear regression models. J Stat Softw 7:1–38

    Google Scholar 

Download references

Acknowledgments

Support for this research was provided by the Department of Homeland Security through the National Consortium for the Study of Terrorism and Responses to Terrorism (START), grant number N00140510629. Any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the Department of Homeland Security. We want to thank David McDowall for his assistance with the analysis and Erin Miller and Brandon Behlendorf for database support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gary LaFree.

Rights and permissions

Reprints and permissions

About this article

Cite this article

LaFree, G., Dugan, L., Xie, M. et al. Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007. J Quant Criminol 28, 7–29 (2012). https://doi.org/10.1007/s10940-011-9133-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10940-011-9133-y

Keywords

Navigation