Good Researchers Copy; Great Researchers “Steal” (sort of…)

by Neil Shortland

 

Last Thursday I took part in an Author v. Critic panel at the American Society for Criminology’s 41st Annual Conference in Atlanta. The book for which I leniently adopted the title of ‘critic’ was Tore Bjorgo’s “Strategies for Preventing Terrorism”.

 

The premise the book is that terrorist violence is a form of crime and should be treated as such, applying the full repertoires of crime prevention mechanisms and measures. Taking ‘special’ approaches to terrorism frequently just results in creating more problems than they claim to resolve.

 

This is a principle with which I wholeheartedly agreed. After all, the questions we often ask regarding terrorism are the same questions that are axiomatic to those studying crime, specifically those, like myself, who have a background in forensic psychology: who are the offenders, what motivates them, how do they undertake their criminal activity, how can we prevent these behaviors from occurring and, if unsuccessful in doing so, how can we rehabilitate offenders to reduce the risk of recidivism?

 

Picasso and Steve Jobs alike felt that the mark of a great artist was not merely to copy but to outright steal – what follows are three things I propose ‘stealing’ from forensic psychology to apply directly to our understanding of terrorism studies.

 

1. Taxonomic linkage analysis: a method of determining likely perpetrators of a terrorist attack (Woodhams, Grant & Price, 2007)

 

Marine Ecology judges the similarity of two sites based on not only the co-occurrence of species, but higher taxons of relatedness (e.g. genus, family, etc.). By applying this principle to the linking criminal cases (i.e. that they are not merely compared by the presence of behaviors, but the themes of behaviors they may represent) accurate judgments of the likelihood that 2 crimes share the same perpetrator.

 

So what can we take from this? Well, in the aftermath of any terrorist event a proportion of the discussion is inevitably aimed at determining ‘whodunnit’, and whilst claims are often made based on tactic, target and (sometimes) the ability to make (evidence-based) decisions about the likely perpetrators based on attack information, is of significant operational benefit, especially in places populated by multiple terrorist groups (e.g. Syria).

 

Basing such decisions on behaviors at the attack site itself may suffice, but can also lead to erroneous conclusions (e.g. that Anders Breivik’s first attack was ‘jihadist’ due to its similarities with attacks in wider Europe) but by constructing taxonomic linkage models, which are known to be more robust to situational variability, it may be possible to provide an avenue to more concretely link Modus Operandi to a designated set of perpetrators.

 

Furthermore, police decision-making, especially in the immediate aftermath of a attack often depends upon incomplete data. Taxonomic similarity models of criminal behavior were able to discriminate between linked and unlinked crimes even with up to 50% of the specific behaviors removed.

 

2. Extended Social Identity Model and Crown Policing: a method of understanding the escalation of violence from civil protests (Stott et al., 2008)

We have increasingly seen non-violent civil protest deteriorate into violence, and in some cases, civil instability. The Extended Social-Identity Model (ESIM) emerged from the research for policing crowds as a theoretical model to describe how a non-violent crowd can become violent.

Within crowd psychology, violence emerges as a result of a dyadic inter-group interaction between three factions – the police; the largely un-violent crowd; and the small extremist faction of the crowd attempting to instigate disruption. Whichever collective identify the crowd adopts (either in line with the police, or the extremist faction) determines the normative boundaries for action, and crucially, whether violence will emerge. It is the social relations between these multiple groups that can create the conditions in which extreme ‘hooligan’ action becomes normalized.

However, what is important is that it is the actions of both the extremist faction and the police that dictate which side the wider crowd falls on.  In these cases, it is the illegitimate police behavior that legitimizes the use of force against them, empowering individuals to engage in physical confrontation.

When this happens, the originally neglected ‘out-group’ (the violent, extremist faction within crowd) becomes part of the accepted in-group, dictating the group identify and legitimizing violence.

What can we steal from this? We know that the implementation of counter-terrorism strategies may often have had a detrimental effect upon countering-terrorism (CT).  One only need consider the influx of IRA recruits after the indiscriminate violence of “Bloody Sunday” in 1972. What ESIM provides is a theoretical construct to better understand the interactions between our CT policies, the psychological mindset of the target audience (whose “hearts and minds” we are often trying to win) and the violent extremists who are equally operating with the equivalent goal. This provides a theoretical backbone to explore how this mindset (and a populations acceptance for both a extremist faction and violence writ large) is shaped and framed by their interactions with us.

It also provides a series of case studies where pro-active responses have been implanted, mitigating the emergence of violence (e.g. the policing of football crowds in England, which, if anyone has seen “Green Street”, can actually look like a war zone).

 

3. Toulmin’s Philosophy of Argument as a model of evaluating scientific support to counter-terrorism operations (Alison et al., 2001)

The final item on my ‘steal-able’ list was first stolen from 20th century British Philosopher Steven Toulmin.

One of the most pervasive parallels between forensic psychology and terrorism research is that both have, unfortunately, had to overcome a negative stigma regarding their early scientific credibility. Early psychological ‘assistance’ to the police often constituted of nothing more that unscientific, unsupported musings, often bound in seductive abstract psychological rhetoric with no investigative utility.  But forensic psychology has been able to overcome this stigma of being ‘unscientific’ (thanks in part to the work of Laurence Alison, and Lee Rainbow) and offender profiling is again viewed as an integral part of serious crime investigations.

One of the vanguards of this transition was the integration of Toulmin’s philosophy of argument to construct and evaluate expert claims. In fact prior to the 2003, when evaluating 4000 claims that had been used to inform major criminal investigations, nearly 80% were unsubstantiated and less than 31% of the claims were falsifiable.

Consider, for example, the murder of a 23 year old female with an accompanying  ‘expert’ claim that “the murderer is under 30 years of age’’. Following Toulmin’s philosophy a concrete argument is one that is warranted and backed by evidence (research by X), provides a ground (why their warrant is applicable to the claim in this case), a modality (degree of confidence we have in our claim) and finally a rebuttal (allowing us to consider the conditions under which the claim ceases to be probable). A complete claim about the offender in this case is depicted in figure 1.

1

Figure 1: Toulmin’s arguments for both providing scientific support in a murder investigation

So what can we ‘steal’ from this? Well, Andrew Silke highlighted in 2001 how little evidence was originally used in terrorism research, and whilst significant data-driven efforts have occurred since then, unfounded speculation does still occur (especially as we have seen in the aftermath of a terrorist event).

In the aftermath of the Boston Bombing for example speculation abound, by incorporating Toulmin’s philosophy of argument we can see clearly how a series of complete claims could have been made in the early aftermath of the Boston Bombings that articulate the backing or a claim, its evidence, and crucially contain a rebuttal to allow its dismissal in light of new evidence (an example of one such claim is presented below).

Borrowing from Toulmin we are able to construct both an approach to evaluate scientific claims regarding terrorism, but also an approach to deliver claims going forward.

2

Figure 2: Toulmin’s arguments for providing scientific support following a possible terrorist event

These are just a few of the many possible theories and approaches that I could have stolen from forensic psychology and I hope to rediscover and re-apply other theories from this field over a series of future blogs.

But in the meantime: if you had your wish list of theories to steal from other areas for terrorism studies what would they be?

[Finally – my thanks to Tore Bjorgo for allowing me to partake in his Author v. Critic panel which served as the basis for this blog]

Neil Shortland is a Senior Research Associate at the Center for Terrorism and Security Studies (CTSS) at UMass Lowell. You can find out more about his research here.

Terrorist Psychology: Getting Started

by John Horgan

We all know the negative stereotypes about terrorism experts. The gripes are nothing if not predictable – terrorism experts are deemed to be self-proclaimed, delivering opinion as expertise, and never shy to offer a view on just about every national security topic imaginable, let alone terrorism. Much of that commentary presents either a simplistic characterization of a broader community of enquirers (Exhibit A) or throws the baby out with the bathwater. Perhaps one challenge is an internal effort within our “industry” to do a better job of distinguishing nat-sec entrepreneurialism and insta-punditry from research expertise. Easier said than done, of course, though at least two of my colleagues are currently working on a project to explore this.

But I do have one recurring gripe. I especially wince when I hear psychological concepts misused in discussions about terrorists.

Setting aside efforts suggesting confusion about psychological and psychiatric concepts (Exhibit B), our collective tendency towards amateur psychology casts a pall over efforts to develop a psychological understanding of terrorism and the terrorist. Rather than exploit insight derived from systematic enquiry, we are often left with what Max Taylor recently characterized as “folk psychology” – a preponderance of commonsense tendencies to explain terrorist behavior in generic jargon that…umm…doesn’t really explain anything. It seems right, sounds plausible, and we don’t question it because it has the veneer of psychology, and thus, the veneer of understanding. We see this in several efforts at understanding radicalization processes where several folk psychology concepts are used in attempts to understand “intentionality”. Instead, they obscure, confuse and invariably disappoint. Longer-term, they result in an unrealized sense of what scientific psychological analysis has to offer an understanding of (and thereby control over) terrorist behavior.

The fight for a Science of Terrorist Behavior is for another day – and that day is coming – but a question I’m regularly asked whenever issues of terrorist psychology arise, is what readings can be recommended for someone who wants to get started in the area?

Here’s a quick, non-scientific list of what I have personally found to be 11 essential readings. It should go without saying that there are dozens of additional quality examples that will feature in any comprehensive effort to understand terrorist psychology. This is the limitation of all lists. But if you are engaged in, or plan to engage in, research on terrorist psychology, you have to track down and devour every one of these texts.

1. W. Reich (Ed.) (1990). Origins of terrorism: Psychologies, ideologies, theologies, states of mind. Cambridge: Cambridge University Press. Once the singular text in this area, this volume is finally starting to show its age. Despite this, the opening and closing chapters (by Reich himself) still represent some of the most insightful observations about the nature of psychological explanations of terrorism.

2. Borum, R. (2004). Psychology of terrorism. Tampa, FL: University of South Florida. From a pioneer in the area, this book is now just a little dated in terms of the literature count (unsurprisingly given how much has emerged in the past decade). Fortunately, Borum has provided an erstwhile update via three excellent papers in the 2011 vol. 4 edition of the Journal of Strategic Security – namely:

Borum, R. (2011a). Radicalization into violent extremism I: A review of social science theories. Journal of Strategic Security, 4, 7-36.

Borum, R. (2011b). Radicalization into violent extremism II: A review of conceptual models and empirical research. Journal of Strategic Security, 4, 37-62.

Borum, R. (2011c). Rethinking radicalization. Journal of Strategic Security, 4, 1-6.

Best of all, the Journal of Strategic Security is free (disclaimer: I sit on its editorial board) so no excuses.

3. Victoroff, J. (2005). The Mind of a Terrorist: A Review and Critique of Psychological Approaches. Journal of Conflict Resolution. 49:1. 3-42. Jeff Victoroff turned to terrorism research on the morning of 9/11. Four years later, he produced what remains the single best review of the psychological literature. A long, comprehensive and brilliant read. A gold standard.

4. Arena, M.P. and Arrigo, B.A. (2006). The Terrorist Identity: Explaining the Terrorist Threat. NYU Press. A critically acclaimed yet strangely overlooked book. Rich in theory, grounded in the authors’ disciplines, and a solid conceptual framework for future researchers.

5. Bongar, B., Brown, L.M., Beutler, L.E. and Breckenridge, J.N., Zimbardo, P.G. (Eds.) (2006). Psychology of Terrorism. Oxford University Press. A beast of a collection, with contributions from some real heavyweights in psychology. Some technical chapters here that contain blueprints for tough questions about terrorism that are still being asked in 2013.

6. Stout, C.E. (Ed.). (2002). The Psychology of Terrorism Vol 1-4. Westport, CT: Praeger. Probably the most expensive item on this list, this multi-volume set covers a huge range of issues.

7. Merari, A. (2010). Driven to Death: Psychological and Social Aspects of Suicide Terrorism. Oxford University Press. From another giant in the field, this is Merari’s major work. One of the handful of studies not just involving interviews with failed suicide bombers, but a study in which the investigators actually engage in personality assessment.

8. McCauley, C. and Moskalenko, S. (2011). Friction: How Radicalization Happens to Them and Us. Oxford University Press. Despite its newness, a hugely influential book, largely focusing on individual-level processes. Probably the single best effort to date to conceptualize radicalization as something far bigger and broader than just related to terrorism.

9. Ballen, K. (2011). Terrorists in Love: the Real Lives of Islamic Radicals. New York: Free Press. Don’t let the title fool you (no reality show here). I met Ken Ballen in 2008 on a trip to meet with ‘reformed’ Al Qaeda members in Saudi Arabia. This very accessible book offers deep insights into the narratives of leaders and followers alike.

10. Silke, A. (1998). ‘Cheshire-Cat Logic: The Recurring Theme of Terrorist Abnormality in Psychological Resesarch’. Psychology, Crime and Law 4, 51-69. An oldie but a goodie, Silke uses the famous Alice in Wonderland metaphor to frame the persistent effort to psycho-pathologize terrorists.

11. Taylor, M. (1991). The Fanatics: A Behavioral Approach to Political Violence. London: Brassey’s. This is it for me – the pinnacle of psychological analyses of the terrorist. A deeply technical book (intentionally so) explaining via behavioral psychology terrorism, Millenarianism, suicide terrorism and much more besides. Unfortunately almost impossible to find as it’s been out of print for a long time.

Additions, suggestions, recommendations? Feel free to add!

Recent Cybersecurity Resources

For those studying cybersecurity threats and responses, here are few new recommended resources.

1)   A terrific expose by David Berlind, of Programmable Web, on new API vulnerabilities as demonstrated by the recent hacking of social posting and scheduling service Buffer.
http://blog.programmableweb.com/2013/11/04/why-the-attack-on-buffer-was-a-serious-wake-up-call-for-the-web/

2)   A new Inspector General report revealing that the Departments of Homeland Security and Defense, including the National Security Agency, have no way of sharing current alerts about computer breaches with each other or industry.
http://www.oig.dhs.gov/assets/Mgmt/2014/OIG_14-02_Oct13.pdf

3)   The US-CERT current activity report
https://www.us-cert.gov/ncas/current-activity