ArticlePDF Available

Abstract

In this short essay, we introduce readers to a special issue of Terrorism and Political Violence on criminological approaches to the study of terrorism. In addition to summarizing the eight articles in the issue, we outline some general points about the relationship between criminological thinking and our understanding of terrorism. Our goal is to place the special issue's contributions in context and highlight under-explored issues that future research could address.
This article was downloaded by: [John Jay College of Criminal Justice]
On: 04 September 2015, At: 07:36
Publisher: Routledge
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered
office: 5 Howick Place, London, SW1P 1WG
Click for updates
Terrorism and Political Violence
Publication details, including instructions for authors and
subscription information:
http://www.tandfonline.com/loi/ftpv20
Criminology Theory and Terrorism:
Introduction to the Special Issue
Joshua D. Freilichabc & Gary LaFreedc
a Doctoral Program in Criminal Justice, City University of New York,
New York, New York,
b Department of Criminal Justice, John Jay College, City University
of New York, New York, New York,
c National Consortium for the Study of Terrorism and Responses to
Terrorism, University of Maryland, College Park, Maryland, USA
d Department of Criminology and Criminal Justice, University of
Maryland, College Park, Maryland, USA
Published online: 09 Dec 2014.
To cite this article: Joshua D. Freilich & Gary LaFree (2015) Criminology Theory and
Terrorism: Introduction to the Special Issue, Terrorism and Political Violence, 27:1, 1-8, DOI:
10.1080/09546553.2014.959405
To link to this article: http://dx.doi.org/10.1080/09546553.2014.959405
PLEASE SCROLL DOWN FOR ARTICLE
Taylor & Francis makes every effort to ensure the accuracy of all the information (the
“Content”) contained in the publications on our platform. However, Taylor & Francis,
our agents, and our licensors make no representations or warranties whatsoever as to
the accuracy, completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of the authors,
and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content
should not be relied upon and should be independently verified with primary sources
of information. Taylor and Francis shall not be liable for any losses, actions, claims,
proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or
howsoever caused arising directly or indirectly in connection with, in relation to or arising
out of the use of the Content.
This article may be used for research, teaching, and private study purposes. Any
substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing,
systematic supply, or distribution in any form to anyone is expressly forbidden. Terms &
Conditions of access and use can be found at http://www.tandfonline.com/page/terms-
and-conditions
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
Criminology Theory and Terrorism: Introduction
to the Special Issue
JOSHUA D. FREILICH
Doctoral Program in Criminal Justice; and Department of Criminal
Justice, John Jay College, City University of New York, New York,
New York; and National Consortium for the Study of Terrorism and
Responses to Terrorism, University of Maryland, College Park,
Maryland, USA
GARY LAFREE
Department of Criminology and Criminal Justice; and National
Consortium for the Study of Terrorism and Responses to Terrorism,
University of Maryland, College Park, Maryland, USA
In this short essay, we introduce readers to a special issue of Terrorism and
Political Violence on criminological approaches to the study of terrorism. In
addition to summarizing the eight articles in the issue, we outline some general
points about the relationship between criminological thinking and our understanding
of terrorism. Our goal is to place the special issue’s contributions in context and
highlight under-explored issues that future research could address.
Keywords criminology theory, etiology of terrorism and radicalization, measure-
ment issues
This special issue of Terrorism and Political Violence focuses on criminological
approaches to the study of terrorism. Although there has been an explosive growth
in research on terrorism across the social and behavioral sciences in the past two
decades, much of this work has originated in political science, psychology, and eco-
nomics. Reviews of criminology and criminal justice research reveal that until recently
there have been few empirical tests of the major criminological theories in a terrorism
context.
1
This is surprising because terrorism clearly falls within the domain of crimi-
nology that has been defined as encompassing research on ‘‘the breaking of laws and
reactions to the breaking of laws.’’
2
As Clarke and Newman put it, ‘‘Terrorism is a
Joshua D. Freilich is affiliated with the Doctoral Program in Criminal Justice and the
Department of Criminal Justice, John Jay College, City University of New York; and the
National Consortium for the Study of Terrorism and Responses to Terrorism, University
of Maryland. Gary LaFree is affiliated with the Department of Criminology and Criminal
Justice, University of Maryland; and the National Consortium for the Study of Terrorism
and Responses to Terrorism, University of Maryland.
Address correspondence to Joshua D. Freilich, Doctoral Program in Criminal Justice,
John Jay College, City University of New York, Suite 2123, North Hall, 524 W. 59th Street,
New York, NY 10019, USA. E-mail: jfreilich@jjay.cuny.edu
Terrorism and Political Violence, 27:1–8, 2015
Copyright #Taylor & Francis Group, LLC
ISSN: 0954-6553 print=1556-1836 online
DOI: 10.1080/09546553.2014.959405
1
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
form of crime in all essential respects.’’
3
This special issue’s focus on criminological
theory and terrorism is unique. We begin by outlining some general points about
the relationship between criminological thinking and our understanding of terrorism.
The goal is to place the special issue’s contributions in context and highlight
under-explored issues that future research could address.
Although recently there has been an increase in studies that apply criminological
theories to terrorism (or test them in a terrorism context), not all of criminology’s
major theories have been equally engaged. Most criminological terrorism studies
to date have focused on neoclassical models like routine activities,
4
rational choice,
5
and situational crime prevention (SCP).
6
For example, past studies have examined
whether target hardening, such as metal detectors and increased inspections at air-
ports, or the use of statutes decrease terrorism through deterrence or incapacitation
or instead lead to increased terrorism through backlash effects.
7
There is thus a need for criminologists to broaden their inquiry to include
criminology’s other major frameworks like social learning, classic strain theories,
social control, life course, and psychological and biological perspectives. This special
issue takes a step in this direction and includes studies that focus on anomie=strain,
social disorganization, and routine activities frameworks that have rarely been
applied to terrorism.
Pisoiu’s qualitative study of seven jihadi and far-right case studies in Germany, for
instance, tests elements of criminology’s strain and sub-cultural perspectives. She finds
little support for the strain-based status frustration hypothesis. But her findings do
support the illegitimate opportunity structure thesis and certain sub-cultural claims
such as resistance, bricolage, homology, agency, and cultural cross-fertilization. Pisoiu
concludes that the violent extremists in her study were assertive and purposive agents
who strategically used the cultural arsenal available in the mainstream and=or other
subcultures, while at the same time being themselves influenced by contemporary style
preferences. She calls for a greater focus on individual agency and the (sub-)cultural to
improve understanding of individual involvement in political violence.
Chermak and Gruenewald use data from the United States Extremist Crime
Database to compare individual and contextual socio-demographic characteristics
across far-right, far-left, and jihadi extremists who committed violent crimes. They
identify similarities, but also many differences across these violent extremists on both
the individual and county levels. Importantly, Chermak and Gruenewald consider
whether these violent extremists, similar to more typical non-extremist offenders,
experience an identity crisis caused by the strain of wanting to achieve the goals of
society but having inadequate means to achieve them. Far-rightists were less educated
and less successful in the labor market, while jihadis may have been unable to inte-
grate fully into American communities. By contrast, Chermak and Gruenewald find
that members of far-left groups have the means to achieve the goals of American
society but conclude that the ‘‘American Dream’’ is dubious and harmful, especially
to the environment and=or other species. Chermak and Gruenewald highlight the
importance of considering the macro contexts in which terrorists choose to act. They
assert that future research would benefit from using criminological theories like social
disorganization to further explain the differences they observed.
Fahey and LaFree’s study addresses Chermak and Gruenewald’s last point by
examining the effects of a measure of country-level social disorganization on levels
of terrorist attacks and fatalities in 101 countries from 1981 to 2010. The authors
conceive of social disorganization as the presence of state instability: revolutionary
2 J. D. Freilich and G. LaFree
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
and ethnic war, adverse regime change, and genocide. The classic social disorganiza-
tion perspective posits that individuals experiencing these types of rapid social changes
will be freed from the institutional and informal restraints that bind them to society
and keep them conforming to social norms and laws. The authors examine the
extent to which this reasoning applies to the number of terrorist attacks and fatalities
occurring in countries. Fahey and LaFree find that controlling for state capacity and a
wide variety of other variables, social disorganization is consistently associated with
increases in terrorist attacks and fatalities.
Meanwhile, Parkin and Freilich provide one of the few empirical studies on
the victims of terrorist attacks.
8
Most prior terrorism studies examine incidents or
perpetrators and ignore victims, assuming that they are a random selection of the
population and that there is no variation to explain. Using data from the Extremist
Crime Database, Parkin and Freilich compare the victims of two sets of homicides
committed by far-rightists: ideologically motivated homicides committed to further
far-right ideology (closely related to terrorism) and homicides committed for personal
reasons by far-rightists (ordinary crime). To explain this variation in victimization,
they apply and test several hypotheses from criminology’s routine activities and
lifestyle perspectives. Parkin and Freilich’s findings support their prediction that
the two victims groups’ routine activities differ, thus varying their exposure to
dangerous places and people.
More in keeping with past research, the other four studies in this special issue
examine aspects of deterrence and rational choice theory and situational crime
prevention perspectives. These studies engage a wide range of issues and also address
important gaps in the literature. Using data on six major initiatives meant to reduce
terrorist attacks by the Euzkadi Ta Askatasuna (ETA) in Spain, Argomaniz and
Vidal-Diez replicate earlier research by LaFree, Dugan, and Korte that tested deter-
rence (based upon a rational choice model) and backlash frameworks applied to
attacks by the IRA in Northern Ireland.
9
Argomaniz and Vidal-Diez used survival
analysis to analyze data from the Global Terrorism Database and the Spanish
Ministry of the Interior. Similar to the LaFree, Dugan, and Korte study, their
findings mostly supported backlash interpretations.
Perry and Hasisi use criminology’s rational choice theory to analyze the motiva-
tions of jihadist suicide attackers. They argue that while suicide attackers engage in
self-destructive behavior, they are mostly driven not by altruistic motivation but by
the anticipation of future self-gratifying benefits. Perry and Hasisi conclude that there
is no fundamental difference between terrorist perpetrators’ motivations and those of
more ordinary criminals. Consistent with rational choice perspectives, both sets of
offenders are committed to maximizing self-gratifying, beneficial behavior.
Hsu and Apel extend the Perry and Hasisi analysis by empirically examining a
common critique of the SCP argument that we can reduce terrorism by manipulating
the opportunities that allow terrorist acts to succeed. The key criticism of SCP inter-
ventions is that they are ineffective because they only displace attacks to other loca-
tions, crime types, or perpetrators. Terrorism researchers refer to this displacement
critique as the ‘‘substitution effect.’’
10
Hsu and Apel investigate various forms of dis-
placement among terrorist groups that had been involved in aviation attacks prior to
the installation of airport metal detectors. Using data from the Global Terrorism
Database, their findings from interrupted time series models partially support SCP
claims and suggest a complex set of displacement and diffusion effects with respect
to alternative attack modes, target types, and weapon usage. Hsu and Apel’s study
Criminology Theory and Terrorism: Introduction to the Special Issue 3
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
has important implications for policy makers as well as the conceptual literature in
criminology and terrorism studies.
Braithwaite and Johnson test three criminological perspectives to shed light on
the observed patterns of the incidence and contagion of recent insurgent attacks in
Baghdad, Iraq. Their analysis shows that risk heterogeneity arguments provide the
most compelling and consistent account of the location of insurgency. In particular,
violence is most likely at locations with higher population levels and density of roads
and more military garrisons.
Collectively the eight studies in this special issue break new ground by empiri-
cally testing criminological perspectives like social disorganization, routine activities,
and classic strain that have rarely been examined in a terrorism context. They also
address gaps in the examination of neo-classical approaches. These are important
steps but more needs to be done. Criminologists should empirically examine other
influential criminological theories like social learning, general strain, life course,
biological, and psychological approaches in a terrorism context.
And indeed some earlier work by criminologists suggests some promising
theoretical possibilities. Akers and Silverman crafted a conceptual piece extending
social learning theory to terrorism;
11
Black applied his theory of social control to
explain terrorism;
12
Hamm used social learning theory (and routine activities theory)
to understand the criminal successes and failures of terrorists;
13
Bouhana and
Wikstrom developed a situational action theory that they apply to both terrorist
attacks and ordinary crimes;
14
and Agnew extended his general strain theory to explain
terrorism.
15
However, with rare exceptions,
16
thus far there have been few efforts to
apply systematic empirical methods to test these theories with data on terrorism.
One reason for this lack of research could be due to data availability. In crimi-
nology, data on illegal behavior come traditionally from three sources, corresponding
to the major social roles connected to criminal events: ‘‘official’’ data collected by
legal agents, especially the police; ‘‘victimization’’ data collected from the general
population of victims and non-victims; and ‘‘self-report’’ data collected from offen-
ders (see also Parkin and Freilich in this issue).
17
All three of these sources are prob-
lematic when it comes to collecting data on terrorism. While police departments and
other criminal justice agencies gather vast amounts of detailed official data on com-
mon crimes in most countries, this is rarely the case for terrorism. Part of the difficulty
is differing definitions of terrorism across countries and even between different
agencies in the same country. Moreover, terrorist acts often cut across several more
common types of criminal categories. Thus, an assassination might be included in
police data as a homicide but not as terrorism while destruction of a building might
be included in a police report as arson but not as terrorism.
Victimization surveys have been of little use in the study of terrorism. Despite
the attention it gets in the media, terrorism is much rarer than more ordinary violent
crime. This means that even with extremely large sample sizes, few individuals in
most countries will have been victimized by terrorists. Frequently, victims of terror-
ism have no direct contact with perpetrators (e.g., in many bombings). And in many
cases, terrorism victims are killed by their attackers.
Self-report data on terrorists have been more important than victimization
data, but they also face serious limitations. Most active terrorists are unwilling to
participate in interviews. And even if willing to participate, getting access to known
terrorists for research purposes raises obvious challenges. Although there has been
important research based on self-reported behavior of terrorists or ex-terrorists,
18
this
4 J. D. Freilich and G. LaFree
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
methodology is unlikely to ever be robust enough to provide global or even national
estimates.
However, as this special issue demonstrates, criminologists have gradually
developed creative new data sources for studying terrorism. Brent Smith
19
was an
early pioneer and his American Terrorism Study (ATS) database
20
provides a detailed
quantitative analysis of federal FBI terrorism cases. Three of the articles in this special
volume are based on the Global Terrorism Database, an open source database on
terrorist attacks drawn from the print and electronic media and originally collected
by criminologists LaFree, Dugan, and Miller.
21
And two of the articles in this special
volume are based on the Extremist Crime Database, an open source database on
extremist crime and terrorism in the United States originally collected by criminolo-
gists Freilich, Chermak, Belli, Gruenewald, and Parkin.
22
The growing availability of
data resources like these make it much more feasible for criminologists to provide
theoretical contributions to the literature on terrorism. Moreover, these efforts will
no doubt be aided by several years of support for research on radicalization to
extremist crime and terrorism by the U.S. National Institute of Justice.
23
As new data
sources are collected and made available, the ability of researchers to apply and test
traditional criminological theories is likely to grow as well.
As the number of empirical tests of criminological theories in a terrorism context
increases, criminologists should consider how to introduce their theories to the wider
audience of terrorism scholars. As noted, scholars from political science, psychology,
and economics have long engaged terrorism issues and have, not surprisingly, relied
upon conceptual models from their home disciplines. Some of the key constructs
in major terrorism and radicalization frameworks also appear in criminological
theories. Criminologists may thus want to begin synthesizing their frameworks with
other well-established radicalization and terrorism perspectives.
For example, McCauley and Moskalenko’s important radicalization theory sets
forth 12 mechanisms of radicalization operating at three levels: individual, small
group, and mass public.
24
They argue that these mechanisms are more likely to be
present in extremists who commit violent acts to further their ideology compared
to non-violent extremists who subscribe to the same ideology but do not engage in
crimes and instead only participate in legal acts. Two of the individual mechanisms
identified by McCauley and Moskalenko are personal and group grievances. Personal
grievances refer to individuals angered by government actions that harmed them or
their loved ones. Group grievances arise when an individual identifies with a group
that has been harmed by the government. Other prominent terrorist scholars argue
that humiliation and similar experiences lead to radicalization and violent acts.
25
Interestingly though, these emotions of anger and humiliation also play a major role
in criminology’s anomie and strain models such as Agnew’s general strain theory
which argues that stressed=strained individuals are more likely to offend.
26
Other mechanisms identified by McCauley and Moskalenko include ‘‘unfreezing,’’
which encompass life changes that cut individuals’ social connections and everyday
routines and leave them open to new connections.
27
Sageman’s study on individuals
who joined the global jihad similarly concludes that these Muslim migrants initially felt
unwelcome and disconnected to European societies.
28
They therefore sought out
mosques for companionship and acceptance. Subsequently, they met others like them
and together they joined the jihad and only then were taught and subscribed to extrem-
ist jihadist ideologies. Criminologists will recognize that some of these arguments
converge with control theories, emphasizing that individuals are more open to commit
Criminology Theory and Terrorism: Introduction to the Special Issue 5
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
crime when they are less integrated into society.
29
Another mechanism highlighted by
McCauley and Moskalenko is thrill-seeking,
30
a concept that also appears in argu-
ments made by criminologist Jack Katz
31
and others
32
to explain more ordinary crime.
This discussion is not meant to be exhaustive and there are other examples of the
same or similar concepts playing a role in both criminological and terrorism or radi-
calization frameworks. To date though, there have been few attempts to integrate
these theories that share concepts into a single model that uses the same measures
and applies them to terrorism. As research increases in this area, it will also be impor-
tant to pay close attention to measurement issues to ensure that these theories are
properly tested. Similar to criminological research on regular crime and delinquency,
efforts must be made to operationalize the concepts from competing theories in
different ways. To take one example, various past terrorism studies (again similar
to prior criminological studies) have used the attribute of divorce as a measure of both
stress and a lack of social integration. Unless distinct measures are used to operatio-
nalize these competing concepts, it will be impossible to draw any conclusions about
which if any of these models are supported.
A separate but related issue is that collectively these models argue that the same
factor—be it strain, thrill, or lack of integration—is associated with both regular
crime and political violence. It is therefore important for future research to begin
clearly specifying why the same condition in some contexts results in terrorism, while
in others it is associated with regular crime. Past research has not entirely ignored this
issue but has only focused on it in passing.
33
In this regard the point resonates with a
classic of criminology history: Robert Merton’s anomie theory. According to Merton,
both deviant and non-deviant behavior can be predicted by examining whether indi-
viduals accept or reject cultural goals and the institutionalized means of achieving
them.
34
These two dimensions can be used to distinguish ordinary criminals (who
accept cultural goals but reject legitimate means to obtaining them) from those
who retreat into drugs (rejecting both cultural goals and legitimate means) and those
who commit terrorism or politically motivated violence (who are highly committed to
both cultural goals and legitimate means but not the goals and means of the existing
society).
A fundamental assumption of this volume is that both terrorism studies and
criminology benefit from a closer association between the two. While we readily
acknowledge important differences between common crime and terrorism, the simila-
rities in theoretical conceptualization, data collection, and research methods suggest
that both fields can advance by examining the theories and methods of the other. In
general, many of the differences between terrorism and common crime are no more
challenging than differences between common crime and more specialized forms of
deviance, such as organized crime, hate crime, or gang violence. Each has distinctive
features that require an investment of time and effort to better understand the sub-
stantive dynamics. By focusing on the obvious connections between terrorism and
crime, we may be able not only to contribute to a better understanding of terrorism,
but also to help formulate more rational policies for combating it.
Notes
1. Richard Rosenfeld, ‘‘Terrorism and Criminology,’’ in M. Deflem, ed., Terrorism and
Counter-Terrorism: Criminological Perspectives (New York: Elsevier, 2004), 19–32; Gary
LaFree and Gary Ackerman, ‘‘The Empirical Study of Terrorism: Social and Legal Research,’’
6 J. D. Freilich and G. LaFree
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
Annual Review of Law and Social Science 5 (2009): 347–374; Brian Forst, Jack R. Greene, and
James P. Lynch, Criminologists on Terrorism and Homeland Security (New York: Cambridge
University Press, 2011); Cynthia Lum and Leslie Kennedy, Evidence-Based Counterterrorism
Policy (New York: Springer-Verlag, 2012).
2. E. H. Sutherland and D. R. Cressey, Criminology, 10th ed. (Philadelphia: Lippincott,
1978), 3.
3. Ronald V. Clarke and Graeme R. Newman, Outsmarting the Terrorists (Westport,
CT: Greenwood, 2006), i.
4. Mark S. Hamm, Terrorism as Crime: From Oklahoma City to Al-Qaeda and Beyond
(New York: New York University Press, 2007).
5. Laura Dugan, Gary LaFree, and Alex R. Piquero, ‘‘Testing a Rational Choice Model of
Airline Hijackings,’’ Criminology 43, no. 4 (2005): 1031–1065; Graeme R. Newman and Henda Y.
Hsu, ‘‘Rational Choice and Terrorist Target Selection,’’ in Updesh Kumar and Manas Mandal,
eds., Countering Terrorism: Psychosocial Strategies (Thousand Oaks, CA: Sage, 2012), 227–249.
6. Rachel Boba, ‘‘EVIL DONE,’’ Crime Prevention Studies 25 (2009): 71–91; Clarke and
Newman, Outsmarting the Terrorists (see note 3 above); Susan Fahey, Gary LaFree, Laura
Dugan, and Alex Piquero, ‘‘A Situational Model for Distinguishing Terrorist and Non-
Terrorist Aerial Hijackings, 1948 to 2007,’’ Justice Quarterly 29, no. 4 (2012): 573–595; Joshua
D. Freilich and Steven M. Chermak, ‘‘Preventing Deadly Encounters Between Law Enforce-
ment and American Far-Rightists,’’ Crime Prevention Studies 25 (2009): 141–172; Joshua D.
Freilich and Graeme R. Newman, ‘‘Introduction,’’ Crime Prevention Studies 25 (2009): 1–7.
7. Walter Enders and Todd Sandler, ‘‘The Effectiveness of Anti-Terrorism Policies:
Vector Autoregression Intervention Analysis,’’ American Political Science Review 87, no. 4
(1993): 829–844; Gary LaFree, Laura Dugan, and Raven Korte, ‘‘The Impact of British
Counterterrorist Strategies on Political Violence in Northern Ireland: Comparing Deterrence
and Backlash Models,’’ Criminology 47 (2009): 501–530; William Alex Pridemore and Joshua
D. Freilich, ‘‘The Impact of State Laws Protecting Abortion Clinics and Reproductive Rights
on Crimes Against Abortion Providers: Deterrence, Backlash, or Neither?,’’ Law and Human
Behavior 31, no. 6 (2007): 611–627.
8. See also Daphna Canetti-Nisim, Gustavo Mesch, and Ami Pedahzur, ‘‘Victimization
from Terrorist Attacks: Randomness or Routine Activities?,’’ Terrorism and Political Violence
18 (2006): 485–501; Yariv Feniger and Ephraim Yuchtman-Yaar, ‘‘Risk Groups in Exposure
to Terror: The Case of Israel’s Citizens,’’ Social Forces 88 (2010): 1451–1462.
9. LaFree, Dugan, and Korte, ‘‘The Impact of British Counterterrorist Strategies on
Political Violence in Northern Ireland’’ (see note 7 above).
10. Walter Enders and Todd Sandler, ‘‘What Do We Know About the Substitution
Effect in Transnational Terrorism?,’’ in Andrew Silke, ed., Research on Terrorism: Trends,
Achievements and Failures (New York: Frank Cass, 2004), 119–137; Rob T. Guerette and Kate
J. Bowers, ‘‘Assessing the Extent of Crime Displacement and Diffusion of Benefits: A Review
of Situational Crime Prevention Evaluations,’’ Criminology 47 (2009): 1331–1368; Rene B. P.
Hesseling, ‘‘Displacement: A Review of the Empirical Literature,’’ Crime Prevention Studies 3
(1994): 197–230; Thomas A. Reppetto, ‘‘Crime Prevention and the Displacement Phenom-
enon,’’ Crime and Delinquency 22 (1976): 166–177.
11. Ron L. Akers and Adam Silverman, ‘‘Toward a Social Learning Model of Violence
and Terrorism,’’ in Margaret A. Zahn, H. H. Brownstein, and S. L. Jackson, eds., Violence:
From Theory to Research (Cincinnati: Lexis-Nexis Anderson, 2004), 19–35.
12. Donald Black, ‘‘The Geometry of Terrorism,’’ Sociological Theory 22, no. 1 (2004):
14–25.
13. Hamm, Terrorism as Crime (see note 4 above).
14. Noemi Bouhana and Per-Olof H. Wikstrom, ‘‘Theorizing Terrorism: A Scoping
Study,’’ Contemporary Readings in Law and Social Justice 2, no. 2 (2010): 9–79.
15. Robert Agnew, ‘‘A General Strain Theory of Terrorism,’’ Theoretical Criminology
14, no. 2 (2010): 131–153; see also Laura Dugan and Joseph K. Young, ‘‘Allow Extremist
Participation in the Policy-Making Process,’’ in Natasha A. Frost, Joshua D. Freilich, and
Todd R. Clear, eds., Contemporary Issues in Criminal Justice Policy: Policy Proposals from
the American Society of Criminology Conference (Belmont, CA: Cengage=Wadsworth, 2009);
Steven Rice and Robert Agnew, ‘‘Emotional Correlates of Radicalization and Terrorism,’’
in Jacqueline Helfgott, ed., Criminal Psychology (Westport, CT: Praeger, 2013): 215–226.
Criminology Theory and Terrorism: Introduction to the Special Issue 7
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
16. Mally Shecory and Avital Laufer, ‘‘Social Control Theory and the Connection
with Ideological Offenders Among Israeli Youth During the Gaza Disengagement Period,’’
International Journal of Offender Therapy and Comparative Criminology 52, no. 4 (2008):
454–473.
17. Gary LaFree, ‘‘Using Open Source Data to Counter Common Myths About
Terrorism,’’ in Brian Forst, Jack Greene, and Jim Lynch, eds., Criminologists on Terrorism
and Homeland Security (Cambridge: Cambridge University Press, 2011), 411–442.
18. John Horgan, ‘‘From Profiles to Pathways and Roots to Routes: Perspectives from
Psychology on Radicalization into Terrorism,’’ The ANNALS of the American Academy of
Political and Social Science 618, no. 1 (2008): 80–94.
19. Brent L. Smith, Terrorism in America: Pipe Bombs and Pipe Dreams (Albany: State
University of New York Press, 1994).
20. Brent L. Smith and Kelly R. Damphousse, ‘‘Punishing Political Offenders: The Effect
of Political Motive on Federal Sentencing Decisions,’’ Criminology 34, no. 3 (1996): 289–321;
Brent L. Smith and Kelly R. Damphousse, ‘‘Terrorism, Politics, and Punishment: A Test of
Structural Contextual Theory and the Liberation Hypothesis,’’ Criminology 36, no. 1
(1998): 67–92.
21. Gary LaFree, Laura Dugan, and Erin Miller, Putting Terrorism in Context: Lessons
Learned from the Global Terrorism Database (London: Routledge, 2015).
22. Joshua D. Freilich, Steven M. Chermak, Roberta Belli, Jeff Gruenewald, and William
S. Parkin, ‘‘Introducing the United States Extremist Crime Database (ECDB),’’ Terrorism and
Political Violence 26, no. 2 (2014): 372–384.
23. National Institute of Justice, Research and Evaluation on Domestic Radicalization to
Violent Extremism (Washington, DC: United States Department of State, 2014).
24. Clark McCauley and Sophia Moskalenko, Friction: How Radicalization Happens to
Them and Us (New York: Oxford University Press, 2011).
25. Mark Juergensmeyer, Terror in the Mind of God: The Global Rise of Religious
Violence (Berkeley: University of California Press, 2003); Jessica Stern, Terror in the Name
of God: Why Religious Militants Kill (New York: Harper Perennial, 2004).
26. Agnew, ‘‘A General Strain Theory of Terrorism’’ (see note 15 above).
27. McCauley and Moskalenko, Friction (see note 24 above).
28. Mark Sageman, Understanding Terrorist Networks (Philadelphia: University of
Pennsylvania Press, 2004).
29. Travis Hirschi, Causes of Delinquency (Berkeley: University of California Press,
1969).
30. McCauley and Moskalenko, Friction (see note 24 above).
31. Jack Katz, Seductions of Crime: Moral and Sensual Attractions of Doing Evil
(New York: Basic Books, 1988).
32. Timothy A. Brezina and Amie A. Aragones, ‘‘Devils in Disguise: The Contribution of
Positive Labeling to ‘Sneaky Thrills’ in Delinquency,’’ Deviant Behavior 25 (2004): 513–525.
33. McCauley and Moskalenko, Friction (see note 24 above).
34. Robert K. Merton, ‘‘Social Structure and Anomie,’’ American Sociological Review 3
(1938): 672–682.
8 J. D. Freilich and G. LaFree
Downloaded by [John Jay College of Criminal Justice] at 07:36 04 September 2015
... Yet, the field is still further challenged by ongoing problems that are researchers are divided in their theoretical and analytical approach in identifying the causes or origin of violent extremism (Freilich & LaFree, 2015;Sageman, 2014;Ranstorp, 2016). This practice could be observed in past research where some researchers focused more towards the macro-level factors such as the political, sociological or economic risk factors (see Berrebi, 2007;Bandyopadhyay & Younas, 2011;Hegghammer, 2006;Enders, Hoover, & Sandler, 2016) while other work emphasised towards microlevel factors such as biological, linguistic or psychological risk factors (see Baele, 2017;Pretus et al., 2018). ...
... In regards to the divisive approach, to overcome this problem, one of the proposed suggestions is to encourage academics from various field to collaborate -an approach endorsed by several other scholars including Sageman himself (Holmer, 2013;Sageman, 2014;Stern, 2014). One of the most prominent suggestions was by Freilich and LaFree (2015). They proposed a multi-disciplinary, multifactorial, and multi-theoretical approach to study what causes individuals to be vulnerable to radicalisation. ...
... There is also a need to gain to employ theories from a wide variety of disciplines to evaluate and identify these factors. Freilich and LaFree's (2015) proposal is a very ambitious method as it assumes that having researchers to cross the path and work together to form a comprehensive image of violent extremism is palpable. In reality, the success of this approach might not always be probable. ...
Article
Statistics have shown that violent extremism was responsible for tens of thousands of deaths, destructions of properties, and billions of economic losses to multiple nations for years. Despite a wide array of research conducted since the early 1940s, some academics in the past decades believe that studies on risk factors of radicalisation towards violent extremism are hindered by many setbacks causing the field to be at infancy stage in research and knowledge compared to other areas of studies. Challenges faced by academics in the field had caused stagnation in reaching a holistic understanding of the risk factors of radicalisation. However, some academics have stressed that it is untrue to refer to the research field as stagnant as it dismisses a multitude of empirical studies which have been published for decades. Some scholars had found that progress has been made, but it is relatively slow due to some research challenges imposed on the field. This paper highlights the challenges that remain true and prevalent to many academics that attempted to study the risk factors of radicalisation towards violent extremism. Also, this paper provides some relevant evidence which shows that the notion regarding the challenges may be true.
... У літературі підкреслюється, що цю загрозу не можна було передбачити під час прийняття Статуту ООН у 1945 р., тому в доктрині і практиці держав повинні з'явитися нові правові механізми ефективної протидії останньому. Ключова роль у цьому питанні належить Раді Безпеки ООН [9]. ...
Article
Full-text available
There is an ongoing need for researchers, practitioners, and policymakers to identify and examine the online posting behaviors of violent extremists prior to their engagement in violence offline, but little is empirically known about their online presence generally or differences in their posting behaviors compared to their non-violent counterparts particularly. Even less is empirically known about their persisting and desisting posting patterns. This study drew from a unique sample of violent and non-violent right-wing extremists to examine online changes in posting patterns during the beginning, middle, and end of their observed posting activity. Here we identified persister and desister posters to create four sample groups: non-violent persisters, non-violent desisters, violent persisters, and violent desisters. We then calculated the average number of posts for each sample group as well as quantified the existence of extremist ideologies and violent extremist mobilization efforts across each observed posting period. Overall, we identified several noteworthy posting patterns that may assist law enforcement and intelligence agencies in identifying credible threats online. We conclude with a discussion of the implications of the analysis, its limitations, and avenues for future research.
Article
Research has shown that being exposed to domestic and community violence significantly contributes to experiencing antisocial behaviors. It has received less attention to consider the possibility that exposure to community and domestic violence could also serve as potential factors for support for extremist violence. Consequently, this study investigated the role of exposure to domestic and community violence, in relation between violent extremism, and the moderating effect of gender. The sample comprised of the 562 participants (n = 289 females; n = 273 males) with age ranged between 16 and 25 years. The data were gathered from colleges, universities, madaaris [religious institutes], and all provinces across Pakistan. This research employed violent extremism scale and the Urdu version of childhood exposure to domestic violence scale and subscale exposure to community violence scale. Results showed a significant positive association among exposure to community, domestic violence, and violent extremism. There exists an argument suggesting that exposure to domestic and community violence has a statistically significant influence on the probability that an individual is susceptible to endorsing violent extremist ideologies. Gender significantly moderated the relation between exposures to community violence violent extremism. The findings indicated that exposure to home and community violence are the key factors in understanding the potential for violent extremism among young adults and suggest pathways for further investigation. The results of this study indicate the necessity for the implementation of policies and programs designed to address violent extremism.
Article
Societal crises, such as COVID-19, produce societal instability and create a fertile ground for radicalization. Extremists exploit such crises by distributing disinformation to amplify uncertainty and distrust. Based on these developments, this study presents a longitudinal analysis across three different non-violent extremist ideologies in the UK (Islamist, far right and eco-radicals). As part of the study, public social media channels Twitter/X, Facebook, and Telegram) of Britain First, 5 Pillars, and Earth First! were analyzed using a computational language classifier of over 36,000 posts between 2016 and 2021. The increasing prevalence of conspiracy narratives, as well as violent, hateful, and threatening language among the corpus indicates that radicalization dynamics were present and heightened, pre-, during, and post-Pandemic.
Article
Full-text available
Despite the ongoing need for practitioners to identify violent extremists online before their engagement in violence offline, little is empirically known about their digital footprints generally or differences in their posting behaviors compared to their non-violent counterparts particularly – especially on high-frequency posting days. Content analysis was used to examine postings from a unique sample of violent and non-violent right-wing extremists as well as from a sample of postings within a sub-forum of the largest white supremacy forum during peak and non-peak posting days for comparison purposes. Several noteworthy posting behaviors were identified that may assist in identifying credible threats online.
Preprint
Full-text available
Terrorist attacks using explosives and CBRN (Chemical, Biological, Radiological and Nuclear) materials have been present throughout history. While the frequency of CBRN terrorist attacks is relatively low compared to those with explosives and other types of weapons, it is crucial to treat the efforts of both terrorist organizations and individuals with appropriate gravity in order to avert catastrophic consequences. Identifying warning signs that indicate criminal behaviour is crucial for preventing planned crimes or terrorist attacks, and there is a need for more precise coverage of potential risk indicators related to CBRN and explosive crimes. This research aimed at examining and scrutinizing possible warning signs associated with planning and conducting terrorist attacks using CBRN and explosive materials. The research was implemented in three phases. First, comprise the systematic literature review. In the second phase, the case studies and CCTV records from past cases from Europe, USA, Australia and Asia were analysed and the aim was to create a list of risk indicators and categories for future reference by developing a methodological tool. The last phase represented a survey in which the practitioners from European Law enforcement and Intelligence Agencies critically assessed the list of risk indicators and their categories created based on the previous two steps of the research. The last goal was to gain the agreement and endorsement of law enforcement officials from different European nations regarding the validity and importance of recognized risk indicators and their categories, as well as their ranking for use in operational tasks, investigations, and training. The majority of the respondents found the identified categories and risk indicators as reliable and relevant for their operational activities and investigations. For the second research question, the survey results prioritized categories of risk indicators that are most suitable for the detection tactics of investigators and intelligence officers. The third research question examined the ease of observing identified risk indicators, with the category of technological detection/air sampling alarm risk indicators ranking as the easiest to detect. Finally, the survey found that the identified risk indicators are useful for training activities of security entities. Several final comments and recommendations from participants were also discussed, emphasizing the importance of considering multiple factors when identifying risk indicators and the value of the comprehensive list of identified risk indicators. The publication also examines some terrorist theories, the advantages, limitations, and the ongoing debate surrounding the use of profiling in protective security.
Article
Full-text available
p>Despite significant measures taken by society, the problem of terrorism remains relevant to the entire global community due to its totality, cruelty, pronounced psychological impact on people, and its anti-human orientation. In this regard, research aimed at identifying the overt and hidden motives of terrorist actions, psychological and social factors shaping the unique personality traits of terrorists, and in particular, motivational and need-based aspects of personality that underlie terrorist activity, is of special value. However, such studies are complicated by objective specific circumstances that prevent many researchers from conducting comprehensive research on target samples of individuals involved in terrorist activity. The aim of the study is to examine the socio-psychological attitudes in the motivational-need sphere of personality in individuals involved in terrorist activity, as well as to analyze the psychosocial factors contributing to the formation of these personality constructs. Methods: individual personal examination using a clinical-demographic card specifically adapted for the purposes of the study, and also the diagnosis of socio-psychological attitudes of personality in the motivational-need sphere (using O.F. Potemkina's method).Two samples participated in the study. The first sample - experimental, included 32 individuals - persons under investigation for committing terrorist-related crimes; the second sample - control, included 31 individuals who had no legal problems. All examined are men in the age range from 19 to 45 years. The study results indicate that in this category of individuals, socio-psychological attitudes aimed at altruism and freedom dominate, with low values of egoism and money orientation indicators. It was found that individuals involved in terrorist activity have lower indicators of the formation of such motivational attitudes as process orientation, result orientation, work, freedom, and power, compared to ordinary citizens.</p
Article
Full-text available
This study extends Clarke and Newman's (2006; Newman and Clarke. 2008) work that applied SCP to terrorism. Their analysis focused on international terrorists, particularly suicide attacks, and only briefly discussed domestic American extremists. The American far-right, however, also poses a significant threat to public safety. This paper applies SCP techniques to two case studies of fatal far-right attacks against law enforcement personnel in the United States. The incidents were purposefully selected from Freilich and Chermak's U.S. Extremist Crime Database (ECDB), a relational database of all crimes committed by far-right extremists in the United States from 1990 to the present reported in an open source. Cornish's "script" analysis is applied to the two cases to devise intervention techniques to prevent such acts. One case illustrates the efficacy of traditional “hard” SCP techniques. Importantly, because some of these attacks were unplanned and occurred during routine incidents that escalated, recent innovations in SCP by Wortley and others are applied to a second case to demonstrate the usefulness of “soft” techniques.
Chapter
Full-text available
This chapter examines the theory and evidence of the rational choice approach of criminology and applies it to our understanding of how terrorists choose their targets and why they choose some targets over others. This chapter also discusses the unintended consequences of displacement of terrorist attacks, or terrorists shifting their attacks elsewhere in response to counterterrorism measures.
Article
Full-text available
This note describes a new and unique, open source, relational database called the United States Extremist Crime Database (ECDB). We first explain how the ECDB was created and outline its distinguishing features in terms of inclusion criteria and assessment of ideological commitment. Second, the article discusses issues related to the evaluation of the ECDB, such as reliability and selectivity. Third, descriptive results are provided to illustrate the contributions that the ECDB can make to research on terrorism and criminology.
Conference Paper
Using data that combines information from the Federal Aviation Administration, the RAND Corporation, and a newly developed database on global terrorist activity, we are able to examine trends in 1,101 attempted aerial hijackings that occurred around the world from 1931 to 2003. We have especially complete information for 828 hijackings that occurred before 1986. Using a rational choice theoretical framework, we employ econometric time-series methods to estimate the impact of several major counter hijacking interventions on the likelihood of differently motivated hijacking events and to model the predictors of successful hijackings. Some of the interventions examined use certainty-based strategies of target hardening to reduce the perceived likelihood of success while others focus on raising the perceived costs of hijacking by increasing the severity of punishment. We also assess which specific intervention strategies were most effective for deterring hijackers whose major purpose was terrorism related. We found support for the conclusion that new hijacking attempts were-less likely to be undertaken when the certainty of apprehension was increased through metal detectors and law enforcement at passenger checkpoints. We also found that fewer hijackers attempted to divert airliners to Cuba once that country made it a crime to hijack flights. Our results support the contagion view that hijacking rates significantly increase after a series of hijackings closely-clustered in time. Finally, we found that policy interventions only significantly decrease the likelihood of nonterrorist-related hijackings.
Article
Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed. This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.
Article
There is a central irony in our approach to global terrorism: Though effective policy against terrorism depends especially on hard data and objective analysis, the study of terrorism has lagged behind many other fields in the social and behavioral sciences. In their encyclopedic review of political terrorism, Schmid and Jongman (1988, p. 177) identified more than 6,000 published works, but point out that much of the research is “impressionistic, superficial [and offers] … far-reaching generalizations on the basis of episodal evidence.” More recently, Silke (2003) concludes that only 3 percent of articles in terrorism journals used inferential analysis compared to 86 percent in forensic psychology and 60 percent in criminology. Similarly, Lum, Kennedy, and Sherley’s (2006, p. 8) systematic review of over 14,000 terrorism articles published between 1971 and 2003 found that only 3 percent were based on quantitative analysis. Thus, as a result of the lack of systematic empirical research, an area that is especially in need of clear-eyed, dispassionate facts is especially susceptible to half truths and myths. The purpose of this review is to use a newly available data set on terrorist attacks around the world since 1970 to challenge ten common myths about terrorism. I use myths here in the everyday sense of fictitious or unscientific conclusions. In fairness to researchers, studying terrorism raises unique challenges. To begin with, terrorism represents a type of behavior that is especially difficult to define and measure.
Chapter
As we approach the tenth anniversary of the terror attacks on September 11th, one fact is clear among the many unknowns about terrorism: there has been an exponential increase in spending on counterterrorism measures. For the United States, this increase in spending is not just reflected in federal homeland security measures or military efforts in Iraq, Afghanistan, and Pakistan, but also among private individuals, corporations, and public entities at the municipal, county, regional, and state levels. Most recently, the killing of Osama Bin Laden by the United States has led to a renewed increase in resource allocation at home by local law enforcement agencies (van Natta, 2011). In the scientific fields, there has also been more funding for a variety of academic and technological research and development related to terrorism and counterterrorism.