-
1
-
-
46749131667
-
-
This research was performed while on appointment as a U.S. Department of Homeland Security (DHS) Fellow under the DHS Scholarship and Fellowship Program, a program administered by the Oak Ridge Institute for Science and Education (ORISE) for DHS through an interagency agreement with the U.S. Department of Energy DOE, I would like to thank Robert Axelrod, Scott Atran, Ashu Varshney, Stephen Kaplan, Jim Morrow, Mark Tessler, Joel Simmons, Megan Reif, David Rapoport, and Lawrence Rubin for helpful comments and critiques
-
This research was performed while on appointment as a U.S. Department of Homeland Security (DHS) Fellow under the DHS Scholarship and Fellowship Program, a program administered by the Oak Ridge Institute for Science and Education (ORISE) for DHS through an interagency agreement with the U.S. Department of Energy (DOE). I would like to thank Robert Axelrod, Scott Atran, Ashu Varshney, Stephen Kaplan, Jim Morrow, Mark Tessler, Joel Simmons, Megan Reif, David Rapoport, and Lawrence Rubin for helpful comments and critiques.
-
-
-
-
2
-
-
46749158456
-
-
The Report of the High-level Panel on Threats, Challenges and Change (New York: United Nations, 2004) defined terrorism as any action... that is intended to cause death or serious bodily harm to civilians or non-combatants, when the purpose of such an act, by its nature or context, is to intimidate a population, or to compel a Government or an international organization to do or to abstain from doing any act.
-
The Report of the High-level Panel on Threats, Challenges and Change (New York: United Nations, 2004) defined terrorism as "any action... that is intended to cause death or serious bodily harm to civilians or non-combatants, when the purpose of such an act, by its nature or context, is to intimidate a population, or to compel a Government or an international organization to do or to abstain from doing any act."
-
-
-
-
3
-
-
46749155234
-
-
An extremist group is any group that espouses, utilizes, or is linked to violence (through funding mechanisms or media) at the national or international level
-
An extremist group is any group that espouses, utilizes, or is linked to violence (through funding mechanisms or media) at the national or international level.
-
-
-
-
4
-
-
12144271983
-
Mishandling Suicide Terrorism
-
for other examples of soft strategies. See
-
See S. Atran, "Mishandling Suicide Terrorism," The Washington Quarterly 27 (2004): 67-90 for other examples of soft strategies.
-
(2004)
The Washington Quarterly
, vol.27
, pp. 67-90
-
-
Atran, S.1
-
5
-
-
18444391985
-
-
Social goods are public goods (non-rival and non-excludable), club goods (impure public goods for which some exclusion is possible), and private goods (completely excludable) provided to population members in the realm of health care, education, busing services, basic welfare services, job services, garbage collection, water services, natural and war-related disaster relief, and other social services. For a discussion of social goods, see S. Berman, Islamism, Revolution, and Civil Society, Perspectives on Politics 1 (2003): 257-273.
-
Social goods are public goods (non-rival and non-excludable), club goods (impure public goods for which some exclusion is possible), and private goods (completely excludable) provided to population members in the realm of health care, education, busing services, basic welfare services, job services, garbage collection, water services, natural and war-related disaster relief, and other social services. For a discussion of social goods, see S. Berman, "Islamism, Revolution, and Civil Society," Perspectives on Politics 1 (2003): 257-273.
-
-
-
-
6
-
-
46749134076
-
-
Anti-corruption campaigns are programs that attempt to identify and eliminate the use of public office or other positions of power (public, private, and social) for illegitimate private gain. See Anti-Corruption Activities section for operationalization
-
Anti-corruption campaigns are programs that attempt to identify and eliminate the use of public office or other positions of power (public, private, and social) for illegitimate private gain. See "Anti-Corruption Activities" section for operationalization.
-
-
-
-
7
-
-
46749113607
-
-
Social service provision is more common among groups who operate within defined territorial boundaries (i.e, Hamas, Hizballah) than among global groups like Al-Qaeda
-
Social service provision is more common among groups who operate within defined territorial boundaries (i.e., Hamas, Hizballah) than among global groups like Al-Qaeda.
-
-
-
-
8
-
-
46749135794
-
-
Cheap talk is communication without cost. For example, a person can make a promise, but if there is no mechanism to ensure that the promise is carried out, then there is no cost associated with the assurance
-
Cheap talk is communication without cost. For example, a person can make a promise, but if there is no mechanism to ensure that the promise is carried out, then there is no cost associated with the assurance.
-
-
-
-
9
-
-
46749159447
-
-
Anti-corruption campaigns must involve costly action, not just accusations
-
Anti-corruption campaigns must involve costly action, not just accusations.
-
-
-
-
10
-
-
46749084434
-
-
See David C. Rapoport, Modern Terror: The Four Waves, in Audrey Cronin and J. Ludes, eds, Attacking Terrorism: Elements of a Grand Strategy Washington, D.C, Georgetown University Press, 2004, 46-73 for a discussion of the four waves of terrorism. The four waves refer to the Anarchist Wave, the Anti-Colonial Wave, the New Left Wave, and the Religious Wave. The fourth wave discussed in this paper refers to the recent Religious Wave of terrorism
-
See David C. Rapoport, "Modern Terror: The Four Waves," in Audrey Cronin and J. Ludes, eds., Attacking Terrorism: Elements of a Grand Strategy (Washington, D.C.: Georgetown University Press, 2004), 46-73 for a discussion of the four waves of terrorism. The four waves refer to the "Anarchist Wave," the "Anti-Colonial Wave," the "New Left Wave," and the "Religious Wave." The "fourth wave" discussed in this paper refers to the recent "Religious Wave" of terrorism.
-
-
-
-
15
-
-
0010496817
-
-
Princeton, NJ: Princeton University Press, Harik's work is controversial
-
R. Hefner, Civil Islam (Princeton, NJ: Princeton University Press, 2000). Harik's work is controversial.
-
(2000)
Civil Islam
-
-
Hefner, R.1
-
16
-
-
46749136581
-
-
For alternative takes on Hizbollah, see, Endurable Syncretism: Hizballah in the 'Space Between, and, eds, New York: Palgrave Macmillan
-
For alternative takes on Hizbollah, see S. P. Yadav, "(En)durable Syncretism: Hizballah in the 'Space Between,'" In Dennis Galvan and Rudra Sil, eds., Reconfiguring Institutions Across Space and Time: Syncretic Responses to Challenges of Political and Economic Transformation (New York: Palgrave Macmillan, 2007), 114-136;
-
(2007)
Reconfiguring Institutions Across Space and Time: Syncretic Responses to Challenges of Political and Economic Transformation
, pp. 114-136
-
-
Yadav, S.P.1
-
25
-
-
46749117344
-
-
M. Levitt, 2006 (see endnote 12).
-
M. Levitt, 2006 (see endnote 12).
-
-
-
-
27
-
-
0035085345
-
Protest Cycle, Political Violence and Social Movements in the Basque Country
-
See, ETA operates on the basis of coercion today and no longer maintains support among the population
-
See B. Tejerina, "Protest Cycle, Political Violence and Social Movements in the Basque Country," Nations and Nationalism 7 (2002): 39-57. ETA operates on the basis of coercion today and no longer maintains support among the population.
-
(2002)
Nations and Nationalism
, vol.7
, pp. 39-57
-
-
Tejerina, B.1
-
28
-
-
46749146291
-
-
D. Rapoport, 2004 (endnote 10).
-
D. Rapoport, 2004 (endnote 10).
-
-
-
-
29
-
-
22944437143
-
Resources and the Information Problem in Rebel Recruitment
-
See
-
See J. Weinstein, "Resources and the Information Problem in Rebel Recruitment," Journal of Conflict Resolution 49 (2005): 598-624.
-
(2005)
Journal of Conflict Resolution
, vol.49
, pp. 598-624
-
-
Weinstein, J.1
-
30
-
-
46749127161
-
-
I do not demonstrate in a large-N, empirical way that those terrorist groups utilizing social service provision strategies utilize less coercion against the population than groups that refrain from providing social service activities. I leave this for future research
-
I do not demonstrate in a large-N, empirical way that those terrorist groups utilizing social service provision strategies utilize less coercion against the population than groups that refrain from providing social service activities. I leave this for future research.
-
-
-
-
31
-
-
46749135368
-
-
See J. Esposito, 1995 (endnote 11), 147.
-
See J. Esposito, 1995 (endnote 11), 147.
-
-
-
-
32
-
-
33750732356
-
In a Ruined Country
-
See
-
See D. Samuels, "In a Ruined Country," The Atlantic Monthly 296 (2005): 60-91.
-
(2005)
The Atlantic Monthly
, vol.296
, pp. 60-91
-
-
Samuels, D.1
-
33
-
-
46749101885
-
-
See Palestinian Center for Policy and Survey Research Press Release, 2005 for Hamas (endnote 14). See Harik 2004, 86-87 (endnote 11) for Hizballah.
-
See Palestinian Center for Policy and Survey Research Press Release, 2005 for Hamas (endnote 14). See Harik 2004, 86-87 (endnote 11) for Hizballah.
-
-
-
-
34
-
-
46749109779
-
-
See See D. Samuels, 2004 (endnote 20): 60-91.
-
See See D. Samuels, 2004 (endnote 20): 60-91.
-
-
-
-
35
-
-
46749128707
-
-
Israel Ministry of Foreign Affairs Press Release, Hamas's Use of Charitable societies to Fund and Support Terror, September 22, 2003, http://www.mfa.gov.il/MFA/MFAArchive/2000_2009/2003/9/Hamas- s%20use%20of%20charitable%20societies%20to%20fund%20and%20su. Harik, 2004 (endnote 11); Esposito, 1995 (endnote 11): 140-142, 147.
-
Israel Ministry of Foreign Affairs Press Release, "Hamas's Use of Charitable societies to Fund and Support Terror," September 22, 2003, http://www.mfa.gov.il/MFA/MFAArchive/2000_2009/2003/9/Hamas- s%20use%20of%20charitable%20societies%20to%20fund%20and%20su. Harik, 2004 (endnote 11); Esposito, 1995 (endnote 11): 140-142, 147.
-
-
-
-
36
-
-
46749152381
-
-
For the anti-corruption argument, the model assumes that the existing government is corrupt.
-
For the anti-corruption argument, the model assumes that the existing government is corrupt.
-
-
-
-
37
-
-
46749139257
-
-
An important caveat to this argument is that a certain minimum threshold of social provision that would invoke a response from the population would probably have to be met to provide a credible, costly signal
-
An important caveat to this argument is that a certain minimum threshold of social provision that would invoke a response from the population would probably have to be met to provide a credible, costly signal.
-
-
-
-
39
-
-
46749140054
-
-
See Harik, 2004 (endnote 11).
-
See Harik, 2004 (endnote 11).
-
-
-
-
40
-
-
46749102660
-
-
See Human Rights Watch 2002, Section VI, Financial and Logistical Support. See also Israel Ministry of Foreign Affairs Press Release 2003 (endnote 23), which claims that Hamas maintains a budget of $25-30 million for its dawa (or preaching) activities (which include education and social services). The Israeli Ministry of Foreign Affairs reports that this takes up the lion's share of Hamas's Budget.
-
See Human Rights Watch 2002, Section VI, Financial and Logistical Support. See also Israel Ministry of Foreign Affairs Press Release 2003 (endnote 23), which claims that Hamas maintains a budget of $25-30 million for its dawa (or preaching) activities (which include education and social services). The Israeli Ministry of Foreign Affairs reports that this takes up the "lion's share of Hamas's Budget."
-
-
-
-
41
-
-
46749091450
-
-
See J. Weinstein, 2003 (endnote 26).
-
See J. Weinstein, 2003 (endnote 26).
-
-
-
-
42
-
-
46749122423
-
-
I would like to thank Bob Axelrod for pointing out this example
-
I would like to thank Bob Axelrod for pointing out this example.
-
-
-
-
43
-
-
46749120391
-
-
Previous statements by the Muslim Brotherhood on their website alluded to this
-
Previous statements by the Muslim Brotherhood on their website alluded to this.
-
-
-
-
44
-
-
46649106463
-
-
See T. Sandler and D. Arce M., Terrorism and Game Theory, Simulation & Gaming 34 (2003): 319-337 for a nice overview of the literature through 2003.
-
See T. Sandler and D. Arce M., "Terrorism and Game Theory," Simulation & Gaming 34 (2003): 319-337 for a nice overview of the literature through 2003.
-
-
-
-
45
-
-
84881732303
-
The Scale of Terrorist Attacks as a Signal of Resources
-
See
-
See B. Overgaard, "The Scale of Terrorist Attacks as a Signal of Resources," Journal of Conflict Resolution 38 (1994), 452-478
-
(1994)
Journal of Conflict Resolution
, vol.38
, pp. 452-478
-
-
Overgaard, B.1
-
46
-
-
38249003095
-
Terrorism and Signaling
-
for an examination of how terrorist groups can signal their capabilities to the government via terrorist attacks
-
and H. Lapan and T. Sandler, "Terrorism and Signaling," European Journal of Political Economy 9 (1993): 383-397 for an examination of how terrorist groups can signal their capabilities to the government via terrorist attacks.
-
(1993)
European Journal of Political Economy
, vol.9
, pp. 383-397
-
-
Lapan, H.1
Sandler, T.2
-
47
-
-
12144249371
-
Terrorism Signaling andSuicide Attacks
-
for an example of suicide bombing as a signal of group character and objectives. See
-
See B. Hoffman and G. McCormick, "Terrorism Signaling andSuicide Attacks," Studies in Conflict & Terrorism 27 (2004): 243-281 for an example of suicide bombing as a signal of group character and objectives.
-
(2004)
Studies in Conflict & Terrorism
, vol.27
, pp. 243-281
-
-
Hoffman, B.1
McCormick, G.2
-
48
-
-
46749111230
-
-
See D. Arce M. and T. Sandler, Terrorist Signaling and the Value ofIntelligence, British Journal of Political Science, forthcoming, for examples of terrorist attacks as signals which governments can utilize to discern whether a group is politically motivated or militant.
-
See D. Arce M. and T. Sandler, "Terrorist Signaling and the Value ofIntelligence," British Journal of Political Science, forthcoming, for examples of terrorist attacks as signals which governments can utilize to discern whether a group is politically motivated or militant.
-
-
-
-
49
-
-
77953193628
-
Sabotaging the Peace: The Politics of Extremist Violence
-
for a signaling model dealing with peace negotiations involving three actors, a terrorist group, a government, and a potential peace partner. See also
-
See also A. Kydd and B. Walter, "Sabotaging the Peace: The Politics of Extremist Violence," International Organization 55: 263-296 for a signaling model dealing with peace negotiations involving three actors - a terrorist group, a government, and a potential peace partner.
-
International Organization
, vol.55
, pp. 263-296
-
-
Kydd, A.1
Walter, B.2
-
50
-
-
33750558925
-
Terrorists versus the Government: Strategic Interaction, Support, and Sponsorship
-
See
-
See K. Siqueira and T. Sandler, "Terrorists versus the Government: Strategic Interaction, Support, and Sponsorship," Journal of Conflict Resolution 50 (2006): 878-898.
-
(2006)
Journal of Conflict Resolution
, vol.50
, pp. 878-898
-
-
Siqueira, K.1
Sandler, T.2
-
51
-
-
46749150235
-
-
The alternative modeling explanation is that groups must decide whether or not to carry out anti-corruption programs within their organizational ranks
-
The alternative modeling explanation is that groups must decide whether or not to carry out anti-corruption programs within their organizational ranks.
-
-
-
-
52
-
-
46749090635
-
-
Jeremy Weinstein also focuses on the importance of informational asymmetries. He seeks to explain how rebels attempt to attract the right type of potential recruit given uncertainty about the commitment level of potential volunteers. See J. Weinstein, 2003 (endnote 26). Weinstein utilizes a signaling model to understand how potential volunteers from the population signal their commitment to the rebel organization. In contrast, I utilize a signaling model to understand how terrorist organizations signal their commitment to the population (the inverse of Weinstein's model).
-
Jeremy Weinstein also focuses on the importance of informational asymmetries. He seeks to explain how rebels attempt to attract "the right type of potential recruit" given uncertainty about the commitment level of potential volunteers. See J. Weinstein, 2003 (endnote 26). Weinstein utilizes a signaling model to understand how potential volunteers from the population signal their commitment to the rebel organization. In contrast, I utilize a signaling model to understand how terrorist organizations signal their commitment to the population (the inverse of Weinstein's model).
-
-
-
-
53
-
-
0001139863
-
Signaling Games and Stable Equilibria
-
See
-
See I. Cho and D. Kreps, "Signaling Games and Stable Equilibria," The Quarterly Journal of Economics 102 (1987): 179-221.
-
(1987)
The Quarterly Journal of Economics
, vol.102
, pp. 179-221
-
-
Cho, I.1
Kreps, D.2
-
54
-
-
34047166092
-
Fighting Terrorism: Lessons from the Front Line
-
R. B. Satloff, ed, Washington, D.C, The Washington Institute for Near East Policy
-
A. Ayalon, "Fighting Terrorism: Lessons from the Front Line" in R. B. Satloff, ed., War on Terror: The Middle East Dimension (Washington, D.C.: The Washington Institute for Near East Policy, 2002).
-
(2002)
War on Terror: The Middle East Dimension
-
-
Ayalon, A.1
-
55
-
-
46749117734
-
-
It is assumed that the Social group also has a non-instrumental benefit in providing for the population
-
It is assumed that the Social group also has a non-instrumental benefit in providing for the population.
-
-
-
-
56
-
-
46749134964
-
-
In the model, the cost of provision for the Social group is normalized to 0 and the difference in cost between the Social and Resource group, z, is assigned to the Resource group. This has no effect on the results
-
In the model, the cost of provision for the Social group is normalized to 0 and the difference in cost between the Social and Resource group, z, is assigned to the Resource group. This has no effect on the results.
-
-
-
-
58
-
-
46749157272
-
-
Here I am assuming that infrastructure does not entail indirect instrumental benefits such as road construction or creation of markets
-
Here I am assuming that infrastructure does not entail indirect instrumental benefits such as road construction or creation of markets.
-
-
-
-
59
-
-
46749126346
-
-
This scenario should be less likely given the constraints on the Resource group. See the appendix for the explicit requirements
-
This scenario should be less likely given the constraints on the Resource group. See the appendix for the explicit requirements.
-
-
-
-
60
-
-
46749104250
-
-
This follows from the fact that organizations have difficulty surviving without ongoing support
-
This follows from the fact that organizations have difficulty surviving without ongoing support.
-
-
-
-
61
-
-
46749108204
-
In Gaza, New Hamas-Dominated Council Attends to Basics: Public Services Win Praise of Residents
-
See, May 16
-
See M. Moore, "In Gaza, New Hamas-Dominated Council Attends to Basics: Public Services Win Praise of Residents," Washington Post Foreign Service, May 16, 2005.
-
(2005)
Washington Post Foreign Service
-
-
Moore, M.1
-
63
-
-
46749086400
-
-
Hamas also obtains support due to the fact that it is a successful national resistance organization
-
Hamas also obtains support due to the fact that it is a successful national "resistance" organization.
-
-
-
-
64
-
-
46749093534
-
-
See PSR Press Release, December 11, 2005 (endnote 14).
-
See PSR Press Release, December 11, 2005 (endnote 14).
-
-
-
|