Skip to main content

Profiling Terrorists—Using Statistics to Fight Terrorism

  • Chapter
  • First Online:
Netherlands Annual Review of Military Studies 2017

Part of the book series: NL ARMS ((NLARMS))

Abstract

The financial war on terror necessitates authorities and governments to search for novel methods and tools to identify, prosecute and round up (members of) terrorist networks and, preferably, preventively thwart their activities. Terrorist profiling, originating in offender profiling, provides one such method. It aims to derive information from seemingly relevant and coherent sets of attributes. Grounded in counter threat finance, and geared towards incapacitating terrorist business models and underpinning financial resources, the toolkit used is derived from another area of misuse of financial services, namely money laundering. This chapter, based on practice and scarce research, thus far, renders an account of developments in terrorist profiling in the financial economic realm. Specifically, it is discussed whether statistical profiling based on retail banking behaviour can be considered effective in the financial fight against terrorism. We conclude that, to date, similar to the effectiveness of FATF’s financial measures to fight terrorism, the effectiveness of statistical profiling in this respect remains limited.

Some families produce baseball players. Others produce terrorists.

(Levitt and Dubner 2009, p. 62)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Coleman 2011, p. 4091.

  2. 2.

    Blalock et al. 2009, p. 1717.

  3. 3.

    Beeres and Bollen 2012, p. 149; Brück 2005, p. 380; Krugman 2004; Müller 2011, p. 131.

  4. 4.

    Levitt 2012, p. 1.

  5. 5.

    McCulloch and Pickering 2005, p. 470.

  6. 6.

    Ayers 2001, pp. 458–459.

  7. 7.

    McCulloch and Pickering 2005, p. 470.

  8. 8.

    Raphaeli 2003, p. 80.

  9. 9.

    Beeres and Bollen 2011, p. 99.

  10. 10.

    Napoleoni 2010, p. 29.

  11. 11.

    Donohue 2008, pp. 175–176.

  12. 12.

    Levitt 2012, p. 1.

  13. 13.

    Paulson 2007.

  14. 14.

    van Fenema et al. 2015; Leese 2014; Stielkowski and Lisin 2013.

  15. 15.

    Levitt and Dubner 2009, pp. 87–96; Levitt 2012; Levitt and Dubner 2009, pp. 161–165.

  16. 16.

    Levitt and Dubner 2014, p.164.

  17. 17.

    Keene 2014, p. 4.

  18. 18.

    Schmid and Jongman 1988, p. 28.

  19. 19.

    See for instance Sinai 2008, p. 11; Fitzgerald 2004, p. 387.

  20. 20.

    Rae 2012, p. 64.

  21. 21.

    Attran 2006; Charlesworth 2003; Clarke 2015; Davis et al. 2004; Krueger 2007; Rae 2012; Sageman 2004.

  22. 22.

    Philips and Pohl 2012, p. 151.

  23. 23.

    Alison et al. 2010, p. 115.

  24. 24.

    Alison et al. 2010, pp. 116–117; Philips and Pohl 2012, p. 155.

  25. 25.

    Alison et al. 2010, p. 117.

  26. 26.

    Phillips and Pohl 2012, p. 155.

  27. 27.

    Alison et al. 2010, p. 118.

  28. 28.

    Also see Dean 2007, p. 176; Phillips and Pohl 2012, p. 151.

  29. 29.

    Leese 2014, p. 496.

  30. 30.

    Levitt and Dubner 2009, pp. 91–92 and pp. 162–163.

  31. 31.

    Clarke 2015, p. 7; Johnson 2008, p. 7.

  32. 32.

    Zarate 2013, p. 8 ff.

  33. 33.

    Beeres and Bollen 2011, p. 99.

  34. 34.

    Bogers and Beeres 2013, p. 2993; Johnson 2008, p. 8.

  35. 35.

    Zarate 2013, p. 21.

  36. 36.

    See FATF 2014.

  37. 37.

    Beeres and Bollen 2011, p. 100.

  38. 38.

    Donohue 2008, p. 347.

  39. 39.

    Levitt and Dubner 2014, pp. 161–162; Levitt and Dubner 2009, pp. 90–91 note eight of such banking behaviours.

  40. 40.

    Levitt and Dubner 2009, p. 91; Levitt and Dubner 2014, p. 163.

  41. 41.

    Levitt and Dubner 2009, p. 93.

  42. 42.

    Levitt and Dubner 2009, p. 93.

  43. 43.

    Levitt and Dubner 2009, pp. 94–95.

  44. 44.

    Levitt 2012, p. 17.

  45. 45.

    Levitt 2012, p. 2.

  46. 46.

    Levitt and Dubner 2014, pp. 164–165.

References

  • Alison L, Goodwill A, Almond L, van den Heuvel C, Winter J (2010) Pragmatic solutions to offender profiling and behavioural investigative advice. Legal and Criminological Psychology 15(1):115–132

    Google Scholar 

  • Atran S (2006) The moral logic and growth of suicide terrorism. The Washington Quarterly 29(2):127–147

    Google Scholar 

  • Ayers A (2001) Financial Action Task Force: The war on terrorism will not be fought on the battlefield. The New York Law School Journal of Human Rights 18:449–459

    Google Scholar 

  • Beeres R, Bollen M (2011) ‘The global financial war on terror’: analyse en cijfers. In: Osinga F, Soeters J, van Rossum W (eds) Nine eleven tien jaar later. Boom, Amsterdam, pp 92–106

    Google Scholar 

  • Beeres R, Bollen M (2012) An economic analysis of cyber attacks. In: Ducheine P, Osinga F, Soeters J (eds) Cyber warfare critical perspectives. TMC Asser Press, The Hague, pp 147–164

    Google Scholar 

  • Blalock G, Kadiyali V, Simon DH (2009) Driving fatalities after 9/11: a hidden cost of terrorism. Applied Economics 41(14):1717–1729

    Google Scholar 

  • Bogers M, Beeres R (2013) Burden Sharing in Combating Terrorist Financing. World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering 7(12):2992–2998

    Google Scholar 

  • Brück T (2005) An economic analysis of security policies. Defence and peace economics 16(5):375–389

    Google Scholar 

  • Charlesworth W (2003) Profiling terrorists: A taxonomy of evolutionary, developmental and situational causes of a terrorist act. Defense & Security Analysis 19(3):241–264

    Google Scholar 

  • Clarke CP (2015) Terrorism, Inc. - The financing of Terrorism, Insurgency, and Irregular Warfare. Praeger Security International, Santa Barbara CA

    Google Scholar 

  • Coleman L (2012) Testing equity market efficiency around terrorist attacks. Applied Economics 44(31):4087–4099

    Google Scholar 

  • Davis LM, Riley KJ, Ridgeway G, Pace J, Cotton SK, Steinberg PS, Damphousse K, Smith B (2004) When terrorism hits home. How prepared are state and local law enforcement? RAND Corporation, Santa Monica

    Google Scholar 

  • Dean G (2007) Criminal profiling in a terrorism context. In: Kocsis RN (ed) Criminal Profiling. International Theory, Research and Practice. Humana Press, Totowa NJ, pp 169–188

    Google Scholar 

  • Donohue LK (2008) The cost of counterterrorism: Power, politics, and liberty. Cambridge University Press, Cambridge

    Google Scholar 

  • FATF (2014) Guidance for a risk-based approach the banking sector. FATF, Paris (October 2014) http://www.fatf-gafi.org/media/fatf/documents/reports/Risk-Based-Approach-Banking-Sector.pdf Accessed 2 March 2017

  • Fitzgerald V (2004) Global financial information, compliance incentives and terrorist funding. European Journal of Political Economy 20(2):387–401

    Google Scholar 

  • Johnson J (2008) Is the global financial system AML/CFT prepared? Journal of Financial Crime 15(1):7–21

    Google Scholar 

  • Keene SD (2014) Operationalizing Counter Threat Finance Strategies. Strategic Studies Institute and US Army War College Press, Carlisle PA

    Google Scholar 

  • Krueger AB (2007) What makes a terrorist - Economics and the roots of terrorism. Princeton University Press, Princeton NJ

    Google Scholar 

  • Krugman P (2004) The costs of terrorism: What do we know? Nexus of terrorism and WMDs: Developing a consensus, Princeton University. http://www.uvic.ca/research/centres/globalstudies/assets/docs/publications/l20/the-costs-of-terrorist.pdf Accessed 26 Feb 2017

  • Leese M (2014) The new profiling: Algorithms, black boxes, and the failure of anti-discriminatory safeguards in the European Union. Security Dialogue 45(5):494–511

    Google Scholar 

  • Levitt SD (2012) Identifying terrorists using banking data. The B.E. Journal of Economic Analysis & Policy 12(3) DOI:10.1515/1935-1682.3282

  • Levitt SD, Dubner SJ (2009) Superfreakonomics - Global cooling, patriotic prostitutes, and why suicide bombers should buy life insurance. William Morrow, New York

    Google Scholar 

  • Levitt SD, Dubner SJ (2014) Think like a freak. William Morrow, New York

    Google Scholar 

  • Lister T, Sanchez R, Bixler M, O’Key S, Hogenmiller M, Tawfeeq M (2017) ISIS goes global: 143 attacks in 29 countries have killed 2,043. CNN (updated 17 Feb 2017) edition.cnn.com/2015/12/17/world/mapping-isis-attacks-around-the-world/ Accessed 26 Feb 2017

  • McCulloch J, Pickering S (2005) Suppressing the financing of terrorism: Proliferating state crime, eroding censure and extending neo-colonialism. British Journal of Criminology 45(4):470–486

    Google Scholar 

  • Müller C (2011) The economics of terrorism from a policy-maker’s perspective. Defence and Peace Economics 22(2):125–134

    Google Scholar 

  • Napoleoni L (2010) Terrorism and the Economy. Seven Stories Press, New York

    Google Scholar 

  • Paulson H (2007) Remarks by treasury secretary Paulson on targeted financial measures to protect our national security (14 June 2007) http://www.treasury.gov/press-center/press-releases/Pages/hp457.aspx. Accessed 26 Feb 2017

  • Phillips PJ, Pohl G (2012) Economic profiling of the lone wolf terrorist: can economics provide behavioral investigative advice? Journal of Applied Security Research 7(2):151–177

    Google Scholar 

  • Rae J (2012) Will it ever be possible to profile the terrorist? Journal of Terrorism Research 3(2):64–74

    Google Scholar 

  • Raphaeli N (2003) Financing of terrorism: sources, methods, and channels. Terrorism and Political Violence 15(4):59–82

    Google Scholar 

  • Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Pennsylvania

    Google Scholar 

  • Schmid AP, Jongman AJ (1988) Political terrorism: A new guide to actors, authors, concepts, data bases, theories, and literature. North Holland Publishing, Amsterdam

    Google Scholar 

  • Sinai J (2008) How to define terrorism. Perspectives on Terrorism 2(4):9–11

    Google Scholar 

  • Strielkowski W, Lisin E (2013) International migration, remittances and intelligent analysis of semi-structured data from the open sources. International Economics Letters 2(2):6–11

    Google Scholar 

  • van Fenema PC, Rietjens SJH, Kalden J, van der Sluis W, Schimmel R (2015) Big data analytics en Defensie: visie en aanpak. Militaire Spectator 184(9):347–387

    Google Scholar 

  • Zarate JC (2013) Treasury’s war. The Unleashing of a new era of financial warfare. Public Affairs, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Beeres .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

Beeres, R., Bertrand, R., Bollen, M. (2017). Profiling Terrorists—Using Statistics to Fight Terrorism. In: Ducheine, P., Osinga, F. (eds) Netherlands Annual Review of Military Studies 2017. NL ARMS. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-189-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-189-0_12

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-188-3

  • Online ISBN: 978-94-6265-189-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics