Skip to main content Accessibility help
×
Home
Hostname: page-component-59b7f5684b-n9lxd Total loading time: 0.89 Render date: 2022-09-25T11:47:33.597Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "useRatesEcommerce": false, "displayNetworkTab": true, "displayNetworkMapGraph": false, "useSa": true } hasContentIssue true

9 - Can Blacklisting Reduce Terrorist Attacks?

The Case of the US Foreign Terrorist Organization (FTO) List

from Part III - Beyond and Within State

Published online by Cambridge University Press:  28 February 2020

Judith G. Kelley
Affiliation:
Duke University, North Carolina
Beth A. Simmons
Affiliation:
University of Pennsylvania
Get access

Summary

Within global security governance, a number of governments monitor and label certain organizations as “terrorist groups” with the aim of curtailing their capacity. The most prominent example of this is the U.S. Foreign Terrorist Organization (FTO) list. Under what conditions is FTO listing an effective counterterrorism tool? We develop a theory of blacklisting in the context of FTOs, arguing that the impact of FTO designation depends on the types of support terrorist organizations rely on. We theorize that FTO blacklisting has capacity-curtailing effects on terrorist groups when funding sources are vulnerable to detection, sanctions, and stigmatization. Specifically, we hypothesize that groups with private funding (e.g. charities, diaspora networks) are more likely to reduce attacks after FTO designation, compared to groups with other funding sources such as criminal activities. Analysis of data on terrorist organizations between 1970 and 2014 takes into account the political processes of listing and provides support for the argument. The findings highlight the importance of understanding the nature of the target in evaluating the performance of global indicators.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Asal, Victor, and Rethemeyer, R. Karl. 2008. The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks. Journal of Politics 70 (2):437–49.CrossRefGoogle Scholar
Bacon, Tricia. 2018. Why Terrorist Groups Form International Alliances. Philadelphia, PA: University of Pennsylvania Press.CrossRefGoogle Scholar
Baker, Peter. 2017. White House Weighs Terrorist Designation for Muslim Brotherhood. New York Times. February 7. Available at https://www.nytimes.com/2017/02/07/world/middleeast/muslim-brotherhood-terrorism-trump.html?_r=0.Google Scholar
Bapat, Navin. 2011. Transnational Terrorism, US Military Aid, and the Incentive to Misrepresent. Journal of Peace Research 48 (3):303–18.CrossRefGoogle Scholar
Beck, Colin, and Miner, Emily. 2013. Who Gets Designated a Terrorist and Why? Social Forces 91(3):837–72.CrossRefGoogle Scholar
Becker, Howard. 1997. Outsiders: Studies in the Sociology of Deviance. London: Free Press.Google Scholar
Bernburg, Jon Gunnar, Krohn, Marvin, and Rivera, Craig. 2006. Official Labeling, Criminal Embeddedness, and Subsequent Delinquency: A Longitudinal Test of Labeling Theory. Journal of Research in Crime and Delinquency 43(1):67–88.CrossRefGoogle Scholar
Bisbee, James H., Hollyer, James R., Rosendorff, B. Peter, and James, Raymond Vreeland. this volume. The Millennium Development Goals and Education: Accountability and Substitution in Global Indicators. In The Power of Global Performance Indicators, edited by Judith Kelley and Beth A. Simmons. New York: Cambridge University Press.Google Scholar
Blomberg, S. Brock, Gaibulloev, Khusrav, and Sandler, Todd. 2011. Terrorist Group Survival: Ideology, Tactics, and Base of Operations. Public Choice 149: 441–463.CrossRefGoogle Scholar
Boutton, Andrew, and Carter, David. 2014. Fair Weather Allies: Terrorism and the Allocation of United States Foreign Aid. Journal of Conflict Resolution 58(7):1144–73.CrossRefGoogle Scholar
Braun, Stephen. 2011. Al-Qaida Turns to Kidnappings as Donations Drop. NBC News. Available at http://www.nbcnews.com/id/43457579/ns/world_news-south_and_central_asia/t/al-qaida-turns-kidnappings-donations-drop/. Accessed March 20, 2016.Google Scholar
Burr, Millard, and Collins, Robert. 2006. Alms for Jihad: Charity and Terrorism in the Islamic World. Cambridge: Cambridge University Press.Google Scholar
Byman, Daniel. 2005. Deadly Connections: States That Sponsor Terrorism. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Cameron, Colin, and Trivedi, Prvain. 2013. Regression Analysis of Count Data. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Carter, David. 2012. A Blessing or a Curse? State Support for Terrorist Groups. International Organization 66(1):129–51.CrossRefGoogle Scholar
Chenoweth, Erica. 2013. Terrorism and Democracy. Annual Review of Political Science 16:355–78.CrossRefGoogle Scholar
Crenshaw, Martha and LaFree, Gary. 2017. Countering Terrorism. Washington, DC: Brookings Institution.Google Scholar
Cronin, Audrey. 2009. How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. Princeton, NJ: Princeton University Press.Google Scholar
Cronin, Audrey. 2011. Why the Haqqani Network Is Not on the Foreign Terrorist Organizations List: The Politics of Naming and Shaming. Foreign Affairs, December 21, 2011. Available at https://www.foreignaffairs.com/articles/2011-12-21/why-haqqani-network-not-foreign-terrorist-organizations-list. Accessed December 27, 2015.Google Scholar
Cronin, Audrey. 2012. Politics, Strategy, and the Haqqani Network. Small Wars Journal, September 6. Available at http://smallwarsjournal.com/author/audrey-kurth-cronin.Google Scholar
Cronin, Audrey Kurth. 2003. The “FTO List” and Congress: Sanctioning Designated Foreign Terrorist Organizations, Congressional Research Service (CRS) Report RL32120. Available at http://fas.org/irp/crs/RL32120.pdf. Accessed December 27, 2015.Google Scholar
Cronin, Audrey Kurth, Aden, Huda, Frost, Adam, and Jones, Benjamin. 2004. Foreign Terrorist Organizations. Congressional Research Service (CRS) Report RL32223. Available at https://fas.org/irp/crs/RL32223.pdf. Accessed December 27, 2015.Google Scholar
Curtis, Lisa. 2012. Combating the Haqqani Terrorist Network. Testimony before the Committee on Foreign Affairs, Subcommittee on Terrorism, Nonproliferation, and Trade, United States House of Representatives, September 13, 2012.Google Scholar
Dahlberg, Stefan, Holmberg, Sören, Rothstein, Bo, Khomenko, Anna, and Svensson, Richard. 2017. The Quality of Government Basic Dataset, version Jan17. University of Gothenburg: The Quality of Government Institute. Available at http://www.qog.pol.gu.se.Google Scholar
Decker, Eileen. 2014. The Enemies List: The Foreign Terrorist Organization List and Its Role in Defining Terrorism. Master’s Thesis in Security Studies (Homeland Defense and Security). Naval Postgraduate School. Available at https://www.hsdl.org/?view&did=753810. Accessed December 29, 2015.Google Scholar
DeMeritt, Jacqueline. 2012. International Organizations and Government Killing: Does Naming and Shaming Save Lives? International Interactions 38 (5):597–621.CrossRefGoogle Scholar
DeYoung, Karen. 2012. Haqqani Network to be Designated a Terrorist Group. Washington Post, September 7, 2012. Available at https://www.washingtonpost.com/world/national-security/haqqani-network-to-be-designated-a-terrorist-group-obama-officials-say/2012/09/07/e6576ac0-f8f6-11e1-a073-78d05495927c_story.html. Accessed February 4, 2016.Google Scholar
Early, Brian. 2015. Busted Sanctions: Explaining Why Economic Sanctions Fail. Stanford, CA: Stanford University Press.Google Scholar
Feldman, Philip. 1977. Criminal Behavior: A Psychological Analysis. London: John Wiley & Sons.Google Scholar
Financial Action Task Force. 2008. Terrorist Financing. FATF/OECD, February 29, 2008.Google Scholar
Finnström, Sverker. 2008. Living with Bad Surroundings: War, History, and Everyday Moments in Northern Uganda. Durham, NC: Duke University Press.CrossRefGoogle Scholar
Freedman, Benjamin. 2010. Officially Blacklisted Extremist/Terrorist (Support) Organizations: A Comparison of Lists from Six Countries and Two International Organizations. Perspectives on Terrorism 4 (2):46–52.Google Scholar
Gaibulloev, Khusrav, and Sandler, Todd. 2013. Determinants of the Demise of Terrorist Organizations. Southern Economic Journal 79 (4):774–92.CrossRefGoogle Scholar
Gaibulloev, Khusrav, and Sandler, Todd. 2014. An Empirical Analysis of Alternative Ways that Terrorist Groups End. Public Choice 160 (1–2):25–44.CrossRefGoogle Scholar
Gagalac, Ron. 2017. CPP-NPA Is Still a Terrorist Group, US Says. ABS-CBN News, February 3, 2017. Available at http://news.abs-cbn.com/news/02/02/17/cpp-npa-is-still-a-terrorist-group-us-says.Google Scholar
GAO. 2015. Combating Terrorism: Foreign Terrorist Organization Designation Process and U.S. Agency Enforcement Actions. United States Government Accountability Office. June 2015. GAO-15-629. Available at http://www.gao.gov/assets/680/671028.pdf. Accessed January 21, 2016.Google Scholar
Gibler, Douglas. 2009. International Military Alliances, 1648–2008. Washington, DC: CQ Press.CrossRefGoogle Scholar
Hafner-Burton, Emilie M. 2008. Sticks and Stones: Naming and Shaming the Human Rights Enforcement Problem. International Organization 62 (4):689–716.CrossRefGoogle Scholar
Head, Michael. 2016. Global Governance Implications of Terrorism: Using UN Resolutions to Justify Abuse of Basic Rights. In Transnational Governance: Emerging Models of Global Legal Regulation, edited by Scott, Mann, 179–212. London: Routledge.Google Scholar
Hess, Michel. 2007. Substantiating the Nexus between Diaspora Groups and the Financing of Terrorism. In Terronomics, edited by Costigan, Sean and Gold, David, 49–63. Aldershot: Ashgate.Google Scholar
Hoffman, Bruce. 2006. Inside Terrorism. New York: Columbia University Press.Google Scholar
Hufbauer, Gary, and Moll, Thomas. 2007. Using Sanctions to Fight Terrorism. In Terronomics, edited by Costigan, Sean and Gold, David, 179–94. Aldershot: Ashgate.Google Scholar
Iacus, Stefano, King, Gary, and Porro, Giuseppe. 2012. Causal Inference without Balance Checking: Coarsened Exact Matching. Political Analysis 20 (1):1–24.CrossRefGoogle Scholar
International Crisis Group. 2010. The Sri Lankan Tamil Diaspora after the LTTE. Crisis Group Asia Report N°186, February 23, 2010.Google Scholar
Jarvis, Lee, and Legrand, Tim. 2018. The Proscription or Listing of Terrorist Organizations: Understanding, Assessment, and International Comparisons. Terrorism and Political Violence 30 (2):199–215.CrossRefGoogle Scholar
Johnston, Patrick, Shapiro, Jacob, Shatz, Howard J, Bahney, Benjamin, Jung, Danielle F, Ryan, Patrick, and Wallace, Jonathan. 2016. Foundations of the Islamic State: Management, Money, and Terror in Iraq, 2005–2010. Santa Monica, CA: RAND Corporation.CrossRefGoogle Scholar
Jones, Seth, and Libicki, Martin. 2008. How Terrorist Groups End: Lessons for Countering al Qaida. Santa Monica, CA: RAND Corporation.Google Scholar
Karmon, Eli. 2005. Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists. Leiden: Brill Academic Publishers.Google Scholar
Koliev, Faraj, Thomas, Sommerer, and Jonas, Tallberg. this volume. Reporting Matters: Performance Assessment and Compliance in the ILO. The Power of Global Performance Indicators. New York: Cambridge University Press.Google Scholar
Krain, Matthew. 2012. J’accuse! Does Naming and Shaming Perpetrators Reduce the Severity of Genocides or Politicides? International Studies Quarterly 56 (3):574–89.CrossRefGoogle Scholar
Lake, Eli. 2016. US Stopped Blacklisting Domestic Terror Charities under Obama. Bloomberg, May 12, 2016. Available at https://www.bloomberg.com/view/articles/2016-05-12/u-s-stopped-blacklisting-domestic-terror-charities-under-obama.Google Scholar
Lee, Melissa M., and Aila, M. Matanock. this volume. Third Party Policymakers and the Limits of the Influence of Indicators. Chapter 11 in The Power of Global Performance Indicators. Cambridge: Cambridge University Press.Google Scholar
Legrand, Tim. 2018. More Symbolic—More Political—Than Substantive: An Interview with James R. Clapper on the U.S. Designation of Foreign Terrorist Organizations. Terrorism and Political Violence 30:356–72.CrossRefGoogle Scholar
Leuprecht, Christian, Walther, Olivier, Skillicorn, David B, and Ryde-Collins, Hillary. 2015. Hezbollah’s Global Tentacles: A Relational Approach to Convergence with Transnational Organised Crime. Terrorism and Political Violence. doi:10.1080/09546553.2015.1089863.CrossRefGoogle Scholar
Levitt, Matthew. 2002. Designating the al-Aqsa Martyrs Brigades. PolicyWatch 371. Washington Institute, March 25, 2002. Available at http://www.washingtoninstitute.org/policy-analysis/view/designating-the-al-aqsa-martyrs-brigades.Google Scholar
Levitt, Matthew. 2004. Charitable Organizations and Terrorist Financing: A War on Terror Status-Check. Washington Institute for Near East Policy, March 19. Available at http://www.washingtoninstitute.org/policy-analysis/view/charitable-organizations-and-terrorist-financing-a-war-on-terror-status-che.Google Scholar
Li, Quan. 2005. Does Democracy Promote or Reduce Transnational Terrorist Incidents? Journal of Conflict Resolution 49 (2):278–97.CrossRefGoogle Scholar
Link, Bruce, Cullen, Francis, Struening, Elmer, Shrout, Patrick, and Dohernwend, Bruce. 1989. A Modified Labeling Theory Approach to Mental Disorders: An Empirical Assessment. American Sociological Review 54 (3):400–23.CrossRefGoogle Scholar
Lobe, Jim, and Ramsey, Jasmin. 2012. U.S. to Take Iran Anti-Regime Group Off Terrorism List. Inter Press Service News Agency, September 22. Available at http://www.ipsnews.net/2012/09/u-s-to-take-iran-anti-regime-group-off-terrorism-list/.Google Scholar
Long, Scott, and Freese, Jeremy. 2014. Regression Models for Categorical Dependent Variables Using Stata. College Station, TX: Stata Press.Google Scholar
Mills, Kurt. 2015. International Responses to Mass Atrocities in Africa. Philadelphia, PA: Pennsylvania University Press.CrossRefGoogle Scholar
Modirzadeh, Naz, Lewis, Dustin, and Bruderlein, Claude. 2011. Humanitarian Engagement under Counter-Terrorism: A Conflict of Norms and the Emerging Policy Landscape. International Review of the Red Cross 93 (883):623–47.CrossRefGoogle Scholar
Morse, Julia C. this volume. Blacklists, Market Enforcement, and the Global Regime to Combat Terrorist Financing. Annual Meeting of the American Political Science Association.Google Scholar
Murphy, Sean. 2003. United States Practice in International Law: Volume 1, 1999–2001. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
National Consortium for the Study of Terrorism and Responses to Terrorism. 2009. Global Terrorism Database (GTD) (CD-ROM). College Park, MD: University of Maryland.Google Scholar
Nemeth, Stephen, Mauslein, Jacob, and Stapley, Craig. 2014. The Primacy of the Local: Identifying Terrorist Hot Spots Using Geographic Information Systems. Journal of Politics 76 (2): 304–17.CrossRefGoogle Scholar
Paternoster, Raymond, and Bachman, Ronet. 2012. Labeling Theory. In Oxford Bibliographies in Criminology, edited by Wright, Richard. Oxford: Oxford University Press.Google Scholar
Phillips, Brian J. 2014. Terrorist Group Cooperation and Longevity. International Studies Quarterly 58 (2):336–47.CrossRefGoogle Scholar
Phillips, Brian J. 2015. What Is a Terrorist Group? Conceptual Issues and Empirical Implications. Terrorism and Political Violence 27 (2):225–42.CrossRefGoogle Scholar
Phillips, Brian J. 2019. Foreign Terrorist Organization Designation, International Cooperation, and Terrorism. International Interactions 45 (2): 316–43.CrossRefGoogle Scholar
Piazza, James A., and Piazza, Scott. 2017. Crime Pays: Terrorist Group Engagement in Crime and Survival. Terrorism and Political Violence, OnlineFirst.CrossRefGoogle Scholar
Radtke, Mitchell, and Jo, Hyeran. 2018. Fighting the Hydra: United Nations Sanctions and Rebel Groups. Journal of Peace Research 55 (6):759–73.CrossRefGoogle Scholar
RAND. 2012. RAND Database of Worldwide Terrorism Incidents. Available at http://www.rand.org/nsrd/projects/terrorism-incidents.html. Accessed August 3, 2012.Google Scholar
Ranstorp, Magnus and Wilkinson, Paul. 2013. Terrorism and Human Rights. London: Routledge.CrossRefGoogle Scholar
Roberts, Adam. 2012. Democracy, Sovereignty and Terror. London: I.B.Tauris.Google Scholar
Said, Wadie. 2015. Crimes of Terror: The Legal and Political Implications of Federal Terrorism Prosecutions. New York: Oxford University Press.CrossRefGoogle Scholar
Salehyan, Idean, Sirosky, David, and Wood, Reed. 2014. Delegation and Civilian Abuse: A Principle-Agent Analysis of Wartime Atrocities. International Organization 68 (3):633–61.CrossRefGoogle Scholar
Shapiro, Jacob. 2013. The Terrorist’s Dilemma: Managing Violent Covert Organizations. Princeton, NJ: Princeton University Press.Google Scholar
Shapiro, Jacob, Johnston, Patrick, Shatz, Howard J, Bahney, Benjamin, Jung, Danielle F, Ryan, Patrick K, and Wallace, Jonathan. 2016. Foundations of the Islamic State: Management, Money, and Terror in Iraq. Santa Monica, CA: RAND Corporation.Google Scholar
Shelley, Louise I. 2014. Dirty Entanglements: Corruption, Crime, and Terrorism. New York: Cambridge University Press.Google Scholar
State Department. 1997. Designation of Foreign Terrorist Organizations. Office of the Coordinator for Counterterrorism. Federal Register. 52650. Vol. 62, No. 195. Wednesday October 8.Google Scholar
State Department. 2014. Amendments to, and Maintenance of, the Terrorist Designations of Harakat ul-Mujahidin. Media Note, Office of the Spokesperson, Washington, DC, August 7. Available at http://www.state.gov/r/pa/prs/ps/2014/230373.htm.Google Scholar
Stern, Jessica, and Modi, Amit. 2008. Producing Terror: Organizational Dynamics of Survival. In Countering the Financing of Terrorism, edited by Biersteker, Thomas and Eckert, Sue. London: Routledge.Google Scholar
Treasury Department. 2014. Terrorist Assets Report. Twenty-second Annual Report to the Congress on Assets in the United States Relating to Terrorist Countries and International Terrorism Program Designees. Office of Foreign Assets Control. US Department of the Treasury. Available at https://www.treasury.gov/resource-center/sanctions/Programs/Documents/tar2013.pdf. Accessed January 21, 2016.Google Scholar
Treasury Department. 2016. US Department of the Treasury. “Designated Charities and Potential Fundraising Front Organizations for FTOs” Protecting Charitable Organizations under Terrorism and Illicit Finance, Treasury Department Resource Center. Available at https://www.treasury.gov/resource-center/terrorist-illicit-finance/Pages/protecting-fto.aspx. Accessed May 4, 2016.Google Scholar
Vittori, Jodi. 2011. Terrorist Financing and Resourcing. New York: Palgrave MacMillan.CrossRefGoogle Scholar
Wellens, Karel. 2015. International Law in Silver Perspective: Challenges Ahead. Leiden: Brill.CrossRefGoogle Scholar
Zahid, Farhan. 2015. Islamist Charity Organizations: Avenues of Terrorism Financing in Pakistan. Foreign Analysis No. 30. Centre Francais de Recherche sur le Renseignement.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×