econintersect.com
       
  

FREE NEWSLETTER: Econintersect sends a nightly newsletter highlighting news events of the day, and providing a summary of new articles posted on the website. Econintersect will not sell or pass your email address to others per our privacy policy. You can cancel this subscription at any time by selecting the unsubscribing link in the footer of each email.



posted on 21 April 2016

Does Heightened Security Really Matter After Terrorists Strike?

from STRATFOR

-- this post authored by Scott Stewart

Brian Michael Jenkins and his team at the RAND Corp. recently released the results of a statistical analysis of terrorist attacks. Designed to determine whether terrorist attacks occur in clusters, the study examined terrorist activity in the United States and Western Europe from 1970 to 2013.

In conducting their analysis, Jenkins and his team divided data on attacks from the Global Terrorism Database into three eras: 1970-1993, 1994-2002, and 2003-2013. The statistics showed that in the first two time periods, additional attacks were more likely to follow in the wake of a "triggering event" such as a significant attack. During these eras, the study found that domestic terrorist organizations in the United Kingdom (Provisional Irish Republican Army) and Spain (Basque ETA) accounted for 75 percent of the clustering. In the most recent era, however, there was no evidence of clustering.

The study's conclusion has serious implications for authorities and citizens. Although clustering was not detected in the 2003-2013 period, the researchers noted that the incidence of terrorist attacks in the United States and Western Europe has dramatically fallen since 9/11 because of increased security. And even though Jenkins and his team noted that their findings do not imply that locally increased security is unwarranted after an attack, this is the conclusion many have drawn. It's dangerous to base security policy merely on historical statistics - especially if one attempts to apply it universally.

The Limits of the Study

Universal conclusions should not be drawn from the study because it accounts only for terrorist attacks in the United States and Western Europe. Despite an increase in the number of terrorist attacks worldwide, attacks in the United States and Western Europe have declined.

The nature of jihadist terrorism often requires transnational groups to send operatives from abroad to attack hostile territory. Conducting terrorist attacks from a distance is cumbersome for operations security purposes, and the attack cycle for long-range attacks can be quite protracted. For example, both the 9/11 and 2008 Mumbai hotel attacks took years to plan and execute. Coordinating consecutive long-range, long-distance attacks can be all the more difficult because a cell's logistical channels are often discovered and cut off after the first incident. Al Qaeda's failure to conduct its oft-threatened follow-up attack to 9/11 is good evidence of this complication. Jihadist groups have therefore shifted their operational model to include leaderless resistance initiatives for equipping grassroots operatives. Groups such as al Qaeda in the Arabian Peninsula adopted a strategy to attack the United States by targeting American aircraft with bombs sent from abroad.

To conduct attacks from a distance requires a model different from that used by domestic or regional terrorist groups such as the Provisional Irish Republican Army or jihadists in Libya or Pakistan. Operating in or near areas where they have significant support, such groups are often able to employ a much quicker attack cycle or even manage several attacks in different stages of the attack cycle concurrently. For example, because Kurdish militants and the Marxist Revolutionary People's Liberation Party-Front both work from their home turf in Turkey, near the jihadist theater in Syria and Iraq, it is little wonder we are seeing clusters of attacks there.

Accordingly, people must not interpret the RAND study to mean that terrorist attacks never cluster anywhere or that elevating security after an attack is unnecessary in every location. When authorities see an attack that could trigger a broader campaign, such as the terrorist offensive in Turkey or the "knife intifada" in Israel, increasing security is prudent. But this does not apply only in places outside of Europe and the United States.

Application in the U.S. and Europe

It is important to recognize that the RAND study is based only on statistics, and those statistics count attacks only. Since I have not seen RAND's raw data, I am unsure, for example, whether they included the failed copycat plot in London on July 21, 2005, as a clustered attack. Coming two weeks after the deadly July 7 bombings in London, the July 21 attacks defy the study's statistical trend.

Moreover, RAND's focus on clustered attacks in a single city may be misleading in today's threat environment. The jihadist terrorist threat is transnational, and so are its campaigns. Recent attacks by al Qaeda in the Islamic Maghreb (AQIM) in Bamako, Mali; Ouagadougou, Burkina Faso; and Grand-Bassam, Ivory Coast, represent a cluster of related attacks, but they were spread across several nations. Though AQIM's attacks occurred outside the areas examined in the study, we have seen similar transnational clusters inside Europe. Though they happened in different countries, the Paris and Brussels attacks were clearly related, having been planned and executed by the same transnational cell.

Furthermore, law enforcement operations in the wake of the attacks disrupted other plots that were near the end of the attack planning cycle. If security had not been increased and if aggressive investigations had not resulted in more leads and raids, more attacks would have followed in both cities. In fact, reports indicate that investigative leads from the Brussels and Paris attacks helped thwart attacks in other parts of Europe.

Some may argue that the large, complex network behind the Paris and Brussels attacks is a product of Europe's location and historical links to the Muslim world, and I would agree. But the jihadist threat is more widespread, and the emergence of the leaderless resistance phenomenon has turned the traditional understanding of the terrorist attack planning cycle and operational tempo on its head.

Unlike a hierarchical group that has to plan operations with the resources at its disposal - a factor that can affect the tempo of its operational cycle - leaderless resistance enables several individuals or small cells to concurrently and independently plan operations using the resources available to each actor. Such attacks tend to be smaller than those conducted by professional terrorists. But as the unprecedented rash of jihadist leaderless resistance attacks in late 2014 and early 2015 illustrated, even small attacks can generate a great deal of publicity. And again, even though those attacks occurred across a range of locations, from Canada to Australia, they were clustered.

And leaderless resistance is intentionally amorphous. Anyone can become radicalized and decide to act as a lone assailant or cooperate with friends and relatives to form a small operational cell. This means actors who present a threat can be widely spread, or even live in the same area unbeknownst to each other. This seems to have been the case with the 7/7 and 7/21 London cells. The second cell appears to have been unconnected to the first one. Inspired by first attack, the second cell dispatched the same number of suicide bombers armed with bombs of similar size, but, fortunately, it lacked a competent bombmaker. If the devices had detonated as designed, the 7/21 attack could have been every bit as deadly as its inspiration.

Certainly, I have long been critical of authorities who, in the wake of an attack, engage in "security theater." Highly visible, knee-jerk measures targeting the methods and tactics used in a previous attack have little ability to prevent attacks using different techniques. This included the practice of making passengers remove their shoes for security screenings before allowing them to board a commercial airliner.

At the same time, not every security increase has to be smoke and mirrors. Balanced, sensible and cost-effective security measures can and should be instituted. Such measures will not only go further to assure the public that government security services are competent, but they can also help ensure that attacks are isolated rather than clustered. Notwithstanding RAND's statistics, there is an argument for heightening prudent and logical security measures following a terrorist attack - and not only in the targeted locale.

"Does Heightened Security Really Matter After Terrorists Strike?" is republished with permission of Stratfor.

>>>>> Scroll down to view and make comments <<<<<<

Click here for Historical News Post Listing










Make a Comment

Econintersect wants your comments, data and opinion on the articles posted.  As the internet is a "war zone" of trolls, hackers and spammers - Econintersect must balance its defences against ease of commenting.  We have joined with Livefyre to manage our comment streams.

To comment, using Livefyre just click the "Sign In" button at the top-left corner of the comment box below. You can create a commenting account using your favorite social network such as Twitter, Facebook, Google+, LinkedIn or Open ID - or open a Livefyre account using your email address.



You can also comment using Facebook directly using he comment block below.





Econintersect Contributors


search_box

Print this page or create a PDF file of this page
Print Friendly and PDF


The growing use of ad blocking software is creating a shortfall in covering our fixed expenses. Please consider a donation to Econintersect to allow continuing output of quality and balanced financial and economic news and analysis.


Take a look at what is going on inside of Econintersect.com
Main Home
Analysis Blog
The Problem With Obamacare Is That It Did Little To Reduce Overall Healthcare Spending
Joan Robinson’s Critique of Marginal Utility Theory
News Blog
Earnings And Economic Reports: Week Starting 12 December 2016
The U.S. Is Home To The Most Unicorns
Why Britain's Public Finances Will Suffer If Brexit Reduces Migration
Working From Home Is Still Rare In The United States
What We Read Today 10 December 2016
The Last Bucket Catch
Joe Sixpack's Situation in 3Q2016: The Average Joe Is Better Off
Why Are Some People More Delinquent On Loans Than Others? - Part 1
Gravity Returns To San Francisco Housing Market
Violent Bond Selloff: An Eye-Opening Perspective
Infographic Of The Day: Identity Theft: You Should Be Worried
Early Headlines: Russia Hacked GOP, Trump To Drain Energy 'Swamp'?, New Sec'y Of State Candidate, India IP Shrinks, India Has World's New Largest Solar Plant , China GDP Hides Volatility And More
Most Coup Attempts In Recent Years Have Failed
Investing Blog
Natural Gas Prices Are Headed Higher In 2017
The New Art Of Utility Investing
Opinion Blog
The US Has A Regime-Uncertainty Problem
Trickle-down Economics, Trump Edition
Precious Metals Blog
Silver Prices Rebounded Today: Where They Are Headed
Live Markets
09Dec2016 Market Close: Wall Street Closes On A New High, Trump Sugar High, Crude Prices Testing Resistance, US Dollar Melts Higher
Amazon Books & More






.... and keep up with economic news using our dynamic economic newspapers with the largest international coverage on the internet
Asia / Pacific
Europe
Middle East / Africa
Americas
USA Government



Crowdfunding ....






























 navigate econintersect.com

Blogs

Analysis Blog
News Blog
Investing Blog
Opinion Blog
Precious Metals Blog
Markets Blog
Video of the Day
Weather

Newspapers

Asia / Pacific
Europe
Middle East / Africa
Americas
USA Government
     

RSS Feeds / Social Media

Combined Econintersect Feed
Google+
Facebook
Twitter
Digg

Free Newsletter

Marketplace - Books & More

Economic Forecast

Content Contribution

Contact

About

  Top Economics Site

Investing.com Contributor TalkMarkets Contributor Finance Blogs Free PageRank Checker Active Search Results Google+

This Web Page by Steven Hansen ---- Copyright 2010 - 2016 Econintersect LLC - all rights reserved