Countering Terrorism by Martha Crenshaw & Gary LaFree
Author:Martha Crenshaw & Gary LaFree
Language: eng
Format: epub
Publisher: Brookings Institution Press
Source: Authors’ compilation, based on Global Terrorism Database.
Attributed Attacks and Location (Region and Country)
Figure 5-2 shows the proportion of attributed attacks in terms of the region in which they occurred. For this exercise we have divided the world into twelve different regions (see appendix 5-1 for the countries included in each region). There is tremendous variation in the proportion of attributed attacks by region of the world. We find the largest percentage of attributed attacks in South America (67 percent), Western Europe (62 percent), and Central America and the Caribbean (59 percent) and the smallest percentage in Eastern Europe (5 percent) and Central Asia (6 percent). In other words, in the first set of regions it is easiest to identify group perpetrators and in the second set it is the most difficult.
The high level of attributed attacks in South and Central America and Western Europe may reflect the dominance of a handful of very prominent terrorist organizations in these regions. For example, over time, the most active terrorist organizations in South America were the Shining Path, the Revolutionary Armed Forces of Colombia (FARC), the National Liberation Army of Colombia (ELN), the Manuel Rodriguez Patriotic Front (FPMR) in Chile, and the Tupac Amaru Revolutionary Movement (MRTA) in Peru. These five organizations operating in South America accounted for nearly 10,000 terrorist attacks from 1970 to 2015—over half of all terrorist attacks in South America during this period. In situations where there is only one major group responsible for most of the violence it is likely that both the media and policymakers are more likely to assume that any unclaimed attacks are in reality the work of the dominant group—whether or not this can be demonstrated to be true.
FIGURE 5-2. Attributed and Unattributed Attacks by Region, 1970–2015
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Secret History by Donna Tartt(18069)
The Social Justice Warrior Handbook by Lisa De Pasquale(11936)
Thirteen Reasons Why by Jay Asher(8410)
This Is How You Lose Her by Junot Diaz(6406)
Weapons of Math Destruction by Cathy O'Neil(5792)
Zero to One by Peter Thiel(5452)
Beartown by Fredrik Backman(5299)
The Myth of the Strong Leader by Archie Brown(5209)
The Fire Next Time by James Baldwin(4995)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(4939)
Promise Me, Dad by Joe Biden(4896)
Stone's Rules by Roger Stone(4825)
100 Deadly Skills by Clint Emerson(4656)
Rise and Kill First by Ronen Bergman(4533)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4527)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4357)
Secrecy World by Jake Bernstein(4351)
The Farm by Tom Rob Smith(4298)
The Doomsday Machine by Daniel Ellsberg(4226)
