Terrorism
Paragraphs

What are the signature features of the reactions of mass publics to terrorist attacks? We argue that the available empirical evidence suggests a general pattern of reactions: The peaks of mass reactions to terrorist attacks are limited in size and duration and their end states marked by a return to baselines values of tolerance. We label this perturbation effects. In this article, we review the available evidence for perturbation effects, build a heuristic model of such effects and provide an explanation of their characteristic pattern, combing theories of emotional arousal and opinion leadership. Finally, we relate the overlooked existence of perturbation effects to widespread fears about the frailty of democratic norms in the face of mass terrorism.

 
 
 
All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Political Psychology
Authors
Paul Sniderman
et. al
Paragraphs

Abstract: This chapter reviews the evolution of Martha Crenshaw’s interests in and approaches to researching terrorism, a trajectory that begins in the 1960s and extends to the present. The story is necessarily partial and incomplete as well as personal. Her first research project concentrated on the use of terrorism by the FLN during the Algerian War, and her current research deals with patterns of cooperation and competition among militant groups and with the relationship between jihadist-oriented transnational terrorism and civil war. Along the way she has analyzed the causes of terrorism as well as its endings, individual motivations for terrorism, group strategies, organizational dynamics, political contexts for terrorism, state responses, and the consequences of counterterrorist policies. Terrorism remains a challenging topic for research as well as a persistent policy problem for decision-makers. We still struggle to explain both the “why” and the “how” of terrorism.

 

Click here to view full chapter

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Oxford University Press
Authors
Authors
Asfandyar Mir
News Type
Commentary
Date
Paragraphs

Many analystspractitioners, and scholars are skeptical of the efficacy of drone strikes for counterterrorism, suggesting that they provide short-term gains at best and are counterproductive at worst. However, despite how widespread these views are, reliable evidence on the consequences of drone strikes remains limited. My research on drone warfare and U.S. counterterrorism—some of which was recently published in International Security—addresses this issue by examining the U.S. drone war in Pakistan from 2004 to 2014. Contrary to the skeptics, I find that drone strikes in Pakistan were effective in degrading the targeted armed groups. And, troublingly, they succeeded in doing so even though they harmed civilians.

 

Three Key Findings

I have conducted research in Pakistan and the United States over the last few years, gathering new qualitative data on the politics of the war and its effects on the two main targets, al-Qaeda and the Pakistan Taliban. I have also evaluated detailed quantitative data on drone strikes and violence by al-Qaeda and the Pakistan Taliban. This research offers three important findings.

First, the U.S. drone war was damaging for the organizational trajectories of al-Qaeda and the Pakistan Taliban. I found that after the United States surged its surveillance and targeting capabilities in 2008, both groups suffered increasing setbacks; they lost bases, their operational capabilities were reduced, their ranks were checked by growing numbers of desertions, and the organizations fractured politically. These effects appear to have persisted until 2014. In a related paper, my University of Michigan colleague Dylan Moore and I show that during the drone program in the Waziristan region, violence by the two groups fell substantially.

Second, the U.S. drone war disrupted al-Qaeda and the Pakistan Taliban not just by killing their leaders and specialized rank-and-file members, but also by heightening the perceived risk of being targeted. Across a variety of empirical materials, including some collected through fieldwork, I found that both groups were direly constrained by the fear—a constant sense of anticipation—of drone strikes, which crippled routine movement and communication. In addition, leaders and rank-and-file jihadis regularly viewed each other with the suspicion of being spies for the drone program, which contributed to their organizational fragmentation.

Third, the notion of increased recruitment for al-Qaeda and the Pakistan Taliban due to civilian harm in drone strikes is questionable. In the local battlefield, I did not find evidence of any tangible increase in recruitment. Interviews with some surviving mid-level members of al-Qaeda and the Pakistan Taliban negated the impression that the groups benefited from a stream of angry recruits. Instead, a recurring theme was that they experienced desertions and manpower shortages because of the stress of operating under drones. To the extent that new recruits were available, both groups struggled to integrate them in their organizations because of the fear that they might be spies for the drone program.

 

Beyond Pakistan?

The U.S. drone war in Pakistan is a crucial case of U.S. counterterrorism policy, but it is one of many other campaigns. The U.S. government is waging such campaigns in Yemen and Somalia, and considering an expansion in the Sahara. In my work, I identify two factors which are important for the dynamics evident in Pakistan to hold generally.

First, the United States must have extensive knowledge of the civilian population where the armed group is based. The counterterrorism force needs such knowledge to generate intelligence leads on their targets, who are often hiding within the civilian population. This comes from detailed population data sharing by local partners, large-scale communication interception, and pattern-of-life analysis of target regions from sophisticated drones.

Second, the United States must be able to exploit available intelligence leads in a timely manner. As members of targeted armed groups consistently try to escape detection, most intelligence has a limited shelf life. The capability to act quickly depends on the bureaucratic capacity to process intelligence, decentralized decision-making for targeting, and rapid-strike capabilities like armed drones.

In Pakistan, the United States met these criteria with an abundance of technology and high-quality local partner cooperation. Starting in 2008, the United States mobilized a large fleet of drones and surveillance technologies to develop granular knowledge of the civilian population in the targeted regions. Despite deep political rifts on the conflict in Afghanistan, the Central Intelligence Agency obtained extensive covert support from Pakistani intelligence against al-Qaeda and the Pakistan Taliban, which enabled it to regularly locate targets. With ample targeting authority and armed drones operating from nearby bases, U.S. forces were able to exploit available leads.

In Yemen, however, the United States has struggled to develop knowledge of the civilian population and act on available intelligence. My interviews with U.S. officials and a leaked government document suggest that, until 2013, U.S. forces did not sustain aerial surveillance of targeted regions, the Yemeni state’s capacity in support of operations remained poor, and the targeting rules were stringent.

 

Implications for U.S. Counterterrorism Policy

The U.S. government’s preference for drone strikes is motivated by the desire to prevent attacks against the American homeland. My research suggests that the drone program has the potential to inflict enough damage on the targeted armed groups to upset their ability to plot and organize attacks in the United States.

The United States also deploys drone strikes to manage jihadi threats to allied regimes. In such cases, the political value of strikes depends, in part, on the capability of the local partner. An effective drone deployment can go a long way in providing a necessary condition for restoring order. But the local partner must ultimately step up to consolidate state control.

For example, President Obama’s drone policy degraded al-Qaeda and the Pakistan Taliban, securing the American homeland and substantially reducing the threat to the nuclear-armed Pakistani state. The Obama administration’s policy was sufficient because the Pakistani state was relatively capable and could build on the gains made by U.S. counterterrorism strikes. Indeed, Pakistan’s ground operations, although contentiously timed, consolidated those gains.

In contrast, in today’s Afghanistan, the U.S. government cannot rely on instruments of counterterrorism alone. U.S. officials realize that just degrading the Afghan Taliban and the Islamic State is unlikely to stabilize the country. The Afghan government remains so weak that it will struggle to consolidate territorial control even after substantial degradation of its armed foes.

Finally, a key limitation of counterterrorism strikes is that they cannot alleviate the ideological appeal of jihadi actors like al-Qaeda and the Islamic State. Strikes cannot substitute for efforts at countering online jihadi propaganda and de-radicalization. Thus, they should not be seen as a silver bullet that can defeat armed groups operating from safe havens and weak states.

 

Civilian Protection and Drone Strikes

Civilian harm in U.S. counterterrorism remains a vital challenge. While moral objections to civilian casualties are a powerful reason to reconsider drone operations, my research suggests that strategic concerns, like a surge in local violence or increased recruitment of targeted organizations, are not. In Pakistan, for example, drone strikes harmed civilians while also undermining al-Qaeda and Pakistan Taliban. Similarly, the U.S.-led counter-ISIL campaign in Iraq and Syria was very difficult for the civilian population, and yet also inflicted losses on the Islamic State.

If civilian casualties do not affect the strategic outcomes of counterterrorism campaigns, then the U.S. government must be convinced to protect civilians for purely moral reasons. How responsive might the U.S. government be to such appeals? It is unclear. The Obama administration was not transparent about the use of drone strikes. Under President Trump, the lack of transparency has worsened. Concerned policymakers and human rights activists must continue to push the U.S. government to be more transparent and to protect civilians caught up in counterterrorism campaigns.

 

Hero Image
All News button
1
Authors
Amy Zegart
News Type
Q&As
Date
Paragraphs

In a world complicated by terrorism, cyber threats and political instability, the private sector has to prepare for the unexpected. Amy Zegart, CISAC co-director, the Hoover Institution’s Davies Family Senior Fellow, and co-author (along with Condoleezza Rice) of Political Risk: How Businesses And Organizations Can Anticipate Global Insecurity, explains lessons learned in keeping cargo planes moving, hotel guests protected – and possibly coffee customers better served.  

Hero Image
All News button
1
Authors
News Type
News
Date
Paragraphs

Evolving drone technology will enable countries to make low-cost but highly credible threats against states and groups that do not possess drones, Stanford political scientist Amy Zegart found in new research.

Could the mere threat of using an armed drone ever coerce an enemy to change their behavior – without attacking them?

Yes, says Stanford political scientist Amy Zegart, who argues in a new research paper that countries that simply possess deadly, armed drones could change an adversary’s behavior without even striking them. Zegart is the Davies Family Senior Fellow at the Hoover Institution and co-director of Stanford’s Center for International Security and Cooperation.

“Armed drones are likely to offer coercion ‘windows of opportunity’ in at least one important circumstance: states that have armed drones confronting states that do not,” she said. “As wars grow longer and less conclusive, armed drones enable states to sustain combat operations, making threats to ‘stay the course’ more believable.”

Zegart believes that drone technology is becoming a more effective instrument to change a state’s behavior than yesteryear’s more costly option of using ground troops or large-scale military movements in war or conflict.

“Drones may be turning deterrence theory on its head,” said Zegart, referring to the cost-benefit calculation a potential aggressor makes when assessing an attack.

Zegart’s focus is on next-generation drones, which are essentially unmanned fighter jets and are currently in development. She is not examining the use of existing drones like quadcopters and Reaper and Predator unmanned aerial vehicles.

 

Foreign military officers surveyed

Zegart’s research is based on surveys of 259 foreign military officers conducted between 2015 and 2017. Participants were highly experienced foreign military officers who were attending classes at the National Defense University and Naval War College.

A drone is an unmanned aircraft that can be piloted remotely to deliver a lethal payload to a specific target.

Today, Zegart said, many scholars are studying whether drone proliferation across the world could change the future of warfare.

“But even here the focus has been the implications for the use of force, not the threat of force,” she said.

 

New drones are more lethal than ever, offering greater speeds, ranges, stealth and agility, according to Zegart. The U.S. is ahead, but not alone, in using drones. Nine countries have already used armed drones in combat, and at least 20 more are developing lethal drone programs – including Russia and China.

“It is time for a rethink” about drones, Zegart said. Technological advances will soon enable drones to function in hostile environments better than ever before.

“Drones offer three unique coercion advantages that theorists did not foresee: sustainability in long duration conflicts; certainty of precision punishment, which can change the psychology of adversaries; and changes in the relative costs of war,” she said.

Threats involving a high cost may be actually less credible than assumed, said Zegart. Her findings challenge the belief of “cost signals,” a military strategy where a country threatens another with a high-cost option, such as ground troops, which is intended to show resolve.

Drones may actually signal a nation’s resolve more effectively because – as a low-cost option – they can be part of an enduring offensive campaign against an enemy.

“The advent of armed drones suggests that costly signals may no longer be the best or only path to threat credibility,” she said. As wars grow longer and less conclusive, a particular country’s test of resolve becomes “more about sustaining than initiating action.”

“In situations where a coercing state has armed drones but a target state does not, drones make it possible to implement threats in ways that impose vanishingly low costs on the coercer but disproportionately high costs on the target,” Zegart said.

 

Combat, coercion

Zegart said that throughout history, whenever a new military technology emerges, adversaries have basically faced two choices – either concede or innovate to overcome the other side’s advantage.

 

“There is no reason to expect drones will be any different. The more that drones are used for combat and coercion, the more likely it will be that others will develop drone countermeasures,” she said.

New weapons often evolve technologically before “game-changing ideas” occur about how to use them, Zegart added. This was true of submarines before World War I, tanks after World War I, airplanes (which originally replaced surveillance balloons and were not used to drop bombs until 1911), and nuclear weapons during the Cold War.

“While physicists in the Manhattan Project developed the first atom bomb in just three years, it took much longer to develop the conceptual underpinnings of deterrence that kept the Cold War cold,” she said.

Drones raise important questions about the role of machines in decision-making during conflict, Zegart said. For example, much has been debated and written about the ethical and legal issues raised by U.S. drone strikes, the usefulness of drone operations against terrorist groups and whether the Pentagon or CIA should control and operate the drones.

Such questions are likely to grow more “numerous and knotty” as drones and other technologies evolve, she said.

 

Media Contacts

Amy Zegart, Hoover Institution and Center for International Security and Cooperation: zegart@stanford.edu

Clifton B. Parker, Hoover Institution: (650) 498-5205, cbparker@stanford.edu

 

 

All News button
1
Paragraphs

Research brief: How plots come to fail or to be foiled is of great importance to the study of terrorism and to the development of counterterrorism policy. There can be no comprehensive picture of the threat without analyzing what adversaries planned to do as well as what they actually managed to accomplish. Examining failed and foiled plots is essential to understanding their intentions as well as their capabilities. This specific project, “Comparing Failed, Foiled, Completed and Successful Terrorist Attacks,” examines jihadist plots in the United States (121 plots) and selected allied countries (314 plots) occurring between 1993 and 2017. The full report can be found here: 

.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
National Consortium for the Study of Terrorism and Responses to Terrorism
Authors
Martha Crenshaw
Erik Dahl
Margaret Wilson
-

Abstract: It has been more than a decade since the UN Security Council enacted Resolution 1540—the most far-reaching of international instruments to counter Weapons of Mass Destruction (WMD) terrorism. It requires states to adopt and enforce effective laws to keep WMD materials outside the reach of terrorists. Scholars and policy makers compliment 1540 for making WMD trafficking illegal, for raising awareness of threats and increasing states’ capacity to reduce them. In 2017, one hundred and seventy-six states reported to the UN on domestic measures they took to comply with 1540. These numbers may produce a false sense of confidence in universal implementation of 1540. The threat of WMD terrorism remains potent. Allegations of ISIS using mustard agents against the Kurds, North Korea shipping chemicals to Syria or middlemen trafficking nuclear materials via Moldova suggest that the international response to WMD smuggling has not achieved its desired results. It is, therefore, important to evaluate the UN’s role in preventing WMD terrorism, and explore ways to further strengthen it. Drawing on interviews, fieldwork and observation data, this talk will examine the 1540 regime’s setup and its performance. It will outline policy options to improve the international counter-proliferation and counter-terrorism regime.

Speaker  bio:  Sarah Shirazyan is a Nuclear Security Postdoctoral Fellow at CISAC. Her research is funded by the MacArthur Foundation. She received her Doctor of Juridical Sciences Degree from Stanford Law School. Her dissertation empirically analyzes the effectiveness of the UN Security Council Resolution 1540 in preventing terrorists from accessing Weapons of Mass Destruction. Sarah designed Interpol-Stanford policy lab and serves as a Lecturer in Law at Stanford Law School. For her outstanding research, teaching and community service, Stanford named Ms. Shirazyan as one of the recipients of Gerald J. Lieberman Award.

In addition to her academic experience, Sarah has held multiple posts with leading tech companies and international organizations. Sarah worked at Facebook’s Global Policy Team, where she developed company’s engagement strategies with inter-governmental organizations. Ms. Shirazyan also designed the data protection and privacy curricula for legal professionals at the Council of Europe. Prior to that, Ms. Shirazyan was a Drafting Lawyer for the European Court of Human Rights; worked on nuclear security issues at the U.N. Office for Disarmament Affairs; and handled international drug cartel investigation cases at the INTERPOL Secretariat. 

0
sarahshirazianrsd17_076_0298a.jpg
J.S.D.

Sarah Shirazyan is a leading expert in technology law and policy, misinformation, and responsible AI development. She is a Lecturer in Law at Stanford Law School, where she teaches a course on combating misinformation online. She also serves as a Director and Head of Meta's GenAI Product Policy work, overseeing the development and implementation of company-wide policies governing the responsible use of generative AI technologies. In this role, Dr. Shirazyan advises product and engineering teams to ensure trust, safety, and ethical innovation across Meta's platforms. Previously, she led the company’s efforts to inform its misinformation and algorithmic ranking policies through engaging with experts across the globe.

Prior to joining tech industry, Dr. Shirazyan held multiple posts with leading international organizations—she was a data protection consultant for the Council of Europe; served as human right lawyer for the European Court of Human Rights; worked on nuclear security issues at the U.N.; and handled international drug cartel investigation cases at INTERPOL.

From 2017-2020, she designed and ran Interpol-Stanford Policy Lab at Stanford Law. From 2017-2018, Dr. Shirazyan was a Nuclear Security Postdoctoral Fellow at CISAC. Her research was funded by the MacArthur Foundation. She received her Doctor of Juridical Sciences Degree from Stanford Law School. Her dissertation empirically analyzes the effectiveness of the UN Security Council’s response to WMD terrorism. For her outstanding research, teaching and community service, Stanford named Ms. Shirazyan as one of the recipients of the Gerald J. Lieberman Award.

Her work has been published in Journal for National Security Law and Policy, Lawfare, Just Security, Stanford Journal of Online Trust and Safety, Arms Control Today, and Project on Nuclear Issues by Center for Strategic and International Studies (CSIS).

Publications

CISAC Affiliate
Date Label
Sarah Shirazyan CISAC
Seminars
-

Abstract: Why do moderate majorities often fail to coordinate opposition to extremist minorities? This paper offers an explanation for the microfoundations of moderate mobilization in the face of extremist minorities using the case of Islamist extremism in Indonesia. In particular, I show that moderates and extremists face asymmetric costs in the decision to voice their true preferences resulting in a coordination dilemma for moderates, which I call the “Moderates’ Dilemma.” An original survey experiment and observational data of participant behavior during two additional surveys demonstrate that moderates hide anti-violent views for fear of reputation costs and that these effects vary by individuals’ sensitivity to reputation costs and degree of uncertainty of others’ attitudes. These findings suggest that over 16 million Indonesians may be hiding moderate preferences and have significant implications for countering violent extremism policies globally. 

Speaker Bio: Kerry Ann Carter Persen is a Carnegie Predoctoral Fellow at CISAC for the 2017-2018 academic year and a Ph.D. Candidate in the Department of Political Science at Stanford University. Her research focuses on the impact of violent extremism on political behavior in the Islamic World.

In her dissertation, she develops a theory of the microfoundations of moderate mobilization against extremist groups using the case of Islamist extremism in Indonesia.  Employing fieldwork, survey data, and observational data, she shows that moderates and extremists face asymmetric costs in the decision to voice their private preferences publicly. This asymmetry results in a failure of moderates to act collectively in line with their individual beliefs, a coordination dilemma called the “Moderates Dilemma.”
 
Kerry’s research has been supported by the National Science Foundation, the U.S. Institute for Peace, the Horowitz Foundation, the National Consortium for the Study of Terrorism and Responses to Terrorism (START), and the Vice Provost for Graduate Education at Stanford University, among others.
 
Prior to graduate school, Kerry spent a Fulbright year in Indonesia and worked at the U.S-Indonesia Society in Washington, D.C. She graduated summa cum laude from Bowdoin College with a double major in Government and Economics.
Predoctoral Fellow CISAC
Seminars
Paragraphs

Fifteen years after September 11, the United States still faces terror threats—both domestic and foreign. After years of wars, ever more intensive and pervasive surveillance, enhanced security measures at major transportation centers, and many attempts to explain who we are fighting and why and how to fight them, the threats continue to multiply.

So, too, do our attempts to understand just what terrorism is and how to counter it.

Two leaders in the field of terrorism studies, Martha Crenshaw and Gary LaFree, provide a critical look at how we have dealt with the terror threat over the years. They make clear why it is so difficult to create policy to counter terrorism. The foes are multiple and often amorphous, the study of the field dogged by disagreement on basic definitional and methodological issues, and the creation of policy hobbled by an exacting standard: the counterterrorist must succeed all the time, the terrorist only once. As Countering Terrorism shows, there are no simple solutions to this threat.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Brookings Institution Press
Authors
Gary LaFree
Subscribe to Terrorism