Sunteți pe pagina 1din 4

INSIGHTS

P OLICY FORUM

SCIENCE AND SECURITY

Challenges in researching
terrorism from the field
Research must focus on how youth are engaged
By Scott Atran,1,2,3,4 Robert Axelrod,1,3 For example, USG national security
Richard Davis,1,4 Baruch Fischhoff1,5 structure was primarily built to manage
state-to-state interactions during the Cold

D
espite intense efforts by intelligence War and hence is not well-suited to sub- and

Downloaded from http://science.sciencemag.org/ on February 12, 2017


agencies and countless conferences, trans-state threats, such as Al Qaeda and
articles, and books, fundamental as- now the Islamic State. Also, U.S. war-fight-
pects of terrorism remain unclear: ing doctrine has relied on cost-imposition
What identifies terrorists before they as key to any strategy to defeat an enemy,
act; how do they radicalize; what mo- including terrorism and terrorists (1). Yet
tivates their violence; when do they act; what suicide bombers, for example, do not seem
countermeasures are most effective? These to respond to utilitarian cost-benefit strate-
efforts to find answers have fallen short in gies (2). Finally, unlike terrorism, most crimi-
part because of flaws in program design, de- nal activity does not involve low-probability
spite commitment and courage from many high-impact events, deliberate targeting of
people involved. We propose an alternative many anonymous civilians, or active support
design, driven by theoretically informed field and recruitment from noncriminal popula-
research and integrated with policy-making. tions. Whereas criminology has developed
Better progress to inform and test hypotheses somewhat reliable checklists, preincident
is possible by using field data, collected in sci- indicators, and profiles for specific forms of
entifically reliable ways from terrorists, sup- criminal activity and their perpetrators (e.g.,
porters, and host populations. securities fraud or serial killers), little ap-
The U.S. government (USG) has relied al- proaching statistical or clinical reliability ex- spare is federal funding for psychology and
most exclusively on the intelligence commu- ists for terrorism or terrorists (3). social science research at universities ($958
nity, which monitors individuals and groups Academics mobilized from many disci- million of $16 billion, less than 6%, for ba-
that threaten national security and special- plines in natural and social sciences and hu- sic research in 2016) (6), basically flat fund-
izes in clandestinely gathering and analyzing manities, but (apart from the U.S. militarys ing for the last decade (7), which some in
pertinent information. Problems with data war colleges and National Defense Univer- Congress want to cut entirely despite critical
collection and interpretation have limited sity) most had no prior familiarity with the contributions to the national interest in busi-
this effort to understand terrorist groups issues, no access to classified data, and no ness, technology, medicine, and defense.
motivations, recruitment, and capabilities. experience with the field research needed to In 2008, then-U.S. Secretary of Defense,
The intelligence community initially had discipline theories with the reality of sound Robert Gates, instituted Minerva, the most

PHOTO: ARTURAS MOROZOVAS/BARCROFT MEDIA/BARCROFT MEDIA VIA GETTY IMAGES


nearly all existing data on actual, possible, data collected in conflict zones. In this im- sustained and consequential USG basic re-
and potential terrorists; however, such infor- poverished space, overly simple root-cause search effort on global conflict, with a focus
mation has not necessarily been constrained paradigms gained currency, e.g., socioeco- on the spread of violent extremism. Its re-
by scientifically testable theories and meth- nomic causes, psychological processes, or searchers have published broadly and have
ods or systematically cross-examined for ac- political sources. These explanations became provided policy-relevant information in con-
curacy and completeness. The pressing need hammers seeking nails even as more complex gressional testimony and briefings to senior
to protect peoples lives and assets justifies data became available. Recognizing the need military. For example, the Empirical Studies
use of partial information, sometimes to to integrate diverse data, but still limiting ac- of Conflict Project has developed into a grow-
good effect in capturing dangerous terrorists cess to classified data, the USG developed an ing policy-relevant research community that
and preventing terrorist actions; but policy- arms-length strategy, asking researchers to partners the USG with major universities
makers tend to fit such information to pre- develop algorithms for theory-agnostic, big (Princeton; Stanford; University of Chicago;
vailing paradigms in foreign policy, military datadriven exploratory work. and University of California, San Diego). The
doctrine, and criminal justice, each with se- Although the need for broadly informed Climate Change and African Political Stabil-
rious drawbacks when applied to terrorism. field research should be obvious (4), USG ity Program at the University of Texas, Aus-
support has been meager. Department of tin, has analyzed conflict related to climate
1
ARTIS International Scottsdale, AZ 85254, USA. 2CNRS, 75016 Defense (DoD) funding for social science has change, informing the Intergovernmental
Paris, France. 3University of Michigan, Ann Arbor, MI 48109, been no more than 2% of its annual $5 bil- Panel on Climate Change 2014 report. Still,
USA. 4University of Oxford, Oxford OX1 3PA, UK. 5Carnegie
Mellon University, Pittsburgh, PA 15213, USA. lion to $6 billion budget for science and engi- Minerva is understaffed and underfunded,
Email: satran@umich.edu neering research in recent years (5). Similarly with less than 2% of DoDs basic research

352 27 JANUARY 2017 VOL 355 ISSUE 6323 sciencemag.org SCIENCE

Published by AAAS
In Molenbeek-Saint-Jean, Brussels, Belguim, these
young people could go one way or another in
response to terrorist recruitment. How can scientific
research understand and change the outcome?

Consortium for the Study of Terrorism and


Responses to Terrorism (START) program,
Massachusetts Institute of Technologys Se-
curity Studies Program, Yale Universitys pro-
gram in comparative political science, and
the Center on Terrorism at the John Jay Col-
lege of Criminal Justice]. There are, however,
two fundamental improvements required to
transform such research efforts into a na-
tional capability for facing transnational ter-
rorism: (i) given that the Islamic State of Iraq
and Syria (ISIS) alone has managed to recruit
from some 100 countries, systematic field re-

Downloaded from http://science.sciencemag.org/ on February 12, 2017


search (and funding for it) needs to extend
beyond sporadic involvement of researchers
from top Western universities to coordinated,
multinational cooperation; (ii) research needs
to become truly interdisciplinary, so that
field interviews with militants, country sur-
veys, and psychological experiments can be
integrated into theoretically driven research
designs to ensure that big data analyses in-
formed by theory and field experience pay
special attention to meaningful connections.
Approaches such as machine learning (12)
and multilingual text analysis (13) offer pos-
sibilities for mining vast quantities of data
for patterns and indicators that can elude
human observers. Realizing their potential
will require embedding the technology in the
budget ($28 million of $1.7 billion) (8, 9). research, each academic institution is free research environment described here. Theo-
DoD has not allocated a single government to make its own determination, which can retical and field knowledge are needed to cre-
position for management of the Minerva pro- vary from institution to institution and ate culturally sensitive training data that the
gram, and <$10 million annually goes to sci- year to year, but which is usually attuned technology needs: to narrow the search space
entific research that has a field component. to protecting the sensibilities of U.S. col- and find real-world relevance in the patterns
A key challenge facing field research lege students (e.g., avoiding intellectual or revealed (14) and to be alert to adversaries
arises from legal and ethical protocols de- emotional discomfort, such as occurs in dis- adaptive changes in their behavior that can
signed to protect DoD against charges of tressed environments and war zones). undermine the usefulness of archived ob-
spying and interference and against abuse One possible remedy is to move respon- servations. ISISs success can be attributed,
of human subjects. Although such protocols sibility for such cases to a national IRB, in part, to its own fieldwork, when learning
often serve these purposes, in some contexts properly constituted with legal, ethical, and the nuances of words and social connections
they make little sense. For example, host- scientific expertise, including familiarity with needed to enlist followers.
country authorization to conduct research the missions that such research can serve. The potential for research that can over-
is often unobtainable for a country where That national board would need to be pro- come existing constraints can be seen in
government control is too weak (e.g., dur- tected from political and financial pressures. recent advances in understanding violent
ing civil war) or too strong (e.g., prevent- Having an address for concerns might avoid extremism and, partly, in interdiction and
ing research a ruling power does not like). situations like the American Psychological prevention. Most notable is waning interest
Captured fighters cannot be interviewed, Associations now-repudiated involvement in simplistic root-cause explanations of why
whatever protection is accorded them (e.g., with torture. Its jurisdiction would be some- individuals become violent extremists (e.g.,
anonymity and/or consent), because aca- thing like (narrowly defined) research with a poverty, lack of education, marginalization,
demic institutions require prisoners to have National Security Designation. foreign occupation, and religious fervor),
representatives on their Institutional Re- Recent years have seen innovative ef- which cannot accommodate the richness
view Board (IRB). However, having any di- forts to work within these constraints from and diversity of situations that breed terror-
rect representative would violate a Supreme government-funded field research (10) and ism or support meaningful interventions. A
Court Ruling (Holder v. Humanitarian Law theory-driven analyses from university re- more tractable line of inquiry is how people
Project) prohibiting participation of mem- searchers (11). At several top universities, actually become involved in terror networks
bers of any organization on USGs terrorism there is strong commitment to putting the (e.g., how they radicalize and are recruited,
list in any humanitarian endeavor. Even supply of researchers ahead of the demand move to action, or come to abandon cause
if USG grants approval of human subjects [e.g., University of Marylands National and comrades) (15).

SCIENCE sciencemag.org 27 JANUARY 2017 VOL 355 ISSUE 6323 353


Published by AAAS
INSIGHTS | P O L I C Y F O RU M

Reports from the The Soufan Group, In- and private-sector firms to recognize and forming them about the content, strengths,
ternational Center for the Study of Radi- prevent violent extremism. The hope is that and limits to the science. To fulfill these
calisation (Kings College London), and by continuing to convene a wide range of roles, scientists must retain strong indepen-
the Combating Terrorism Center (U.S. disciplines, a community-based approach dence to avoid co-option by bureaucratic or
Military Academy) indicate that approxi- to prevention led by the federal government political interests, while maintaining their
mately three-fourths of those who join the will get it right (18). But accessing, inter- colleagues respect. Unless the sciences are
Islamic State or al-Qaeda do so in groups. preting, and leveraging community-based integrated and independent, government
These groups often involve preexisting so- knowledge requires disciplined, theoretically may get oversimplified views from scien-
cial networks and typically cluster in par- informed field research in and with commu- tists unaware of their subdisciplines limits,
ticular towns and neighborhoods (16). This nities at risk. CVE currently lacks the mecha- or pandering ones from scientists eager for
suggests that much recruitment does not nisms and funding (19). attention and influence. Unless government
need direct personal appeals by organiza- A necessary focus of that research effort maintains proper distance, it will deter sci-
tion agents or individual exposure to social must be youth, who form the bulk of todays entists ready to build knowledge to contain
media (which would entail a more dispersed terrorist recruits and tomorrows most vul- terrorism but who fear wasting time or
recruitment pattern). Fieldwork is needed to nerable populations (20). At present, young compromising their integrity. j
identify the specific conditions under which people, especially young men (but increas-
RE FERENCES AND NOTES
these processes play out. Natural growth ingly young women), are viewed as a prob-
1. DoD, United States Department of Defense fiscal year
models of terrorist networks then might be lem rather than the promise of a solution. To

Downloaded from http://science.sciencemag.org/ on February 12, 2017


2016 budget request (DoD, Washington, DC, 2015), p. 2-2;
based on an epidemiology of radical ideas prevent terrorism, we need prevention re- http://bit.ly/2iG8M42.
in host social networks rather than built in search, fostering positive youth development 2. B. Hoffman, G. McCormick, Stud. Confl. Terror. 27, 243
(2004).
the abstract then fitted to data and would through concrete possibilities for realizing 3. R. Haverkamp, Crime Law Soc. Change 62, 257 (2014).
allow for a public health, rather than strictly young peoples hopes and dreams. 4. J. Horgan, Behav. Sci. Terror. Polit. Aggress. 4, 195 (2012).
criminal, approach to violent extremism. One such success story is the Aware Girls 5. National Science Foundation, in Science & Engineering
Such considerations have implications for program founded by teenagers Gulalai and Indicators 2016 (NSF, Arlington, VA, 2015), chap. 4, appen-
dix tables 4-24 and 5-4; http://bit.ly/2iGcYRj.
countering terrorist recruitment. The pres- Saba Ismail a decade ago in Northwest Paki- 6. NSF, Survey of federal funds for research and develop-
ent USG focus is on counternarratives, in- stan. It provides young women with a plat- ment fiscal years 201416 (NSF, Arlington, VA, 2016),
tended as alternative to the ideologies held form for learning and advocacy, and their table 76; http://bit.ly/2hpZTul.
7. NSF, FY 2017 Budget request to Congress: Social, behav-
interventions have helped hundreds of young ioral, and economic sciences (NSF, Arlington, VA, 2016);
men move away from political and religious http://bit.ly/2hOTv0N.
violence (21). A key feature of such programs 8. DoD, Guide to FY2016 research funding at the
...youthform the bulk of is that they are local, which allows personal Department of Defense (DoD, Washington, DC, 2016),
table 2, p. 9; http://bit.ly/2hxJHMv.
engagement by individuals attuned to culture
todays terrorist recruits and and conditions.
9. For Minerva, $10 million was added to $18 million already
budgeted for FY 2016 (8) but again reduced to $18 million
tomorrows most vulnerable Moving from local successes to global for FY 2017.
10. C. C. Fair, N. Malhorta, J. N. Shapiro, Publ. Opin. Q. 76, 688
achievement requires institutions and pro-
populations. grams that can help weave together gen-
(2012).
11. B. Doosje et al., Curr. Opin. Psychol. 11, 79 (2016).
eral principles and practices that underlie 12. H. Davulcu, M. Woodward, in Illuminating Dark Networks, L.
Gerdes, Ed. (Cambridge Univ. Press, Cambridge, 2015), pp.
to motivate terrorists. This strategy treats local successes, while also encouraging lo-
84102.
ideas as disembodied from the human con- cal initiative, tailoring, and autonomy. The 13. J. Grimer, B. M. Stewart. Polit. Anal. 21, 267 (2013).
ditions in which they are embedded and United Network of Young Peacebuilders is 14. N. F. Johnson et al., Science 352, 1459 (2016).
given life as animators of social groups. In one youth-led organization that follows this 15. S. Atran et al., Theoretical Frames on Pathways to Violent
Radicalization (Report to the Office of Naval Research,
their stead, research and policy might better strategy and uses baseline studies and ex ARTIS Research, Scottsdale, AZ, 2009);
focus on personalized counterengagement, post evaluations, with very limited means http://bit.ly/PDF2is8. .
addressing and harnessing the fellowship, (22). It was instrumental in promoting UN 16. A. Perliger, D. Milton, From Cradle to Grave: The Lifecycle
of the Foreign Fighters in Iraq and Syria (Combating
passion, and purpose of people within spe- Security Council Resolution 2250 that urges
Terrorism Center, West Point, NY, 2016);
cific social contexts, as ISIS and al-Qaeda Member States to give youth a greater voice http://bit.ly/PDF_2is6TE.
often do. This focus stands in sharp contrast in decision-making at the local, regional, 17. J. Norris, H. Grol-Prokopczyk, J. Crim. Law Criminol. 105,
to reliance on negative mass messaging and and international levels in order to better 101 (2015).
18. G. Selim, ISIS online: Countering radicalization and
sting operations to dissuade young people in confront the threat to stability and devel- recruitment on the Internet and social media, state-
doubt through entrapment and punishment opment posed by violent extremism. The ment to Permanent Subcommittee on Investigations
(the most common practice used in U.S. law resolutions implementation requires inde- (U.S. Senate Committee on Homeland Security and
Government Affairs, Washington, DC, 6 July 2016);
enforcement) (17) rather than through posi- pendent scientific research not merely on
http://bit.ly/2hOUm1p.
tive persuasion and channeling into produc- youth, but in the field with youth, to inform 19. S. N. Green, K. Proctor, Turning Point: A New
tive life paths. At the very least, we need field policies of member nations and, perhaps Comprehensive Strategy for Countering Violent Extremism
research in communities that is capable of more important, to create transnational so- (Center for Strategic and International Studies,
Washington, DC, 2016); http://bit.ly/PDF_2iG5e.
capturing evidence to reveal which strategies cial and intellectual channels to allow youth 20. S. Atran, On youth, violent extremism, and promoting
are working, failing, or backfiring. to formulate and choose best practices. peace, address to UN Security Council (United Nations,
In 2015, the White House inaugurated a Providing the scientific foundations for New York, 25 April 2015); http://bit.ly/2iiXGFs.
21. B. Briggs, The Guardian, 13 October 2015; http://bit.
federal program for Countering Violent Ex- that youth work, as well as interdiction ly/2huBmr9.
tremism (CVE) after consulting many experts and other programs for stopping violent 22. C. Del Felice et al., Youth Impact for Peace: Monitoring,
from government, academia, and the private extremism, requires fieldwork deeply inte- Evaluation and Learning in Six European Youth
sector. Although the initiative was not driven grated with basic science. It also requires Organisations (United Network of Young Peacebuilders,
Den Haag, Netherlands, 2015); http://bit.ly/PDF_2huDh.
by scientific evidence, federal agencies began integration with government to address
training staff, mediators, local communities, decision-makers perceived needs, while in- 10.1126/science.aaj2037

354 27 JANUARY 2017 VOL 355 ISSUE 6323 sciencemag.org SCIENCE

Published by AAAS
Challenges in researching terrorism from the field
Scott Atran, Robert Axelrod, Richard Davis and Baruch Fischhoff
(January 26, 2017)
Science 355 (6323), 352-354. [doi: 10.1126/science.aaj2037]

Editor's Summary

Downloaded from http://science.sciencemag.org/ on February 12, 2017


This copy is for your personal, non-commercial use only.

Article Tools Visit the online version of this article to access the personalization and
article tools:
http://science.sciencemag.org/content/355/6323/352

Permissions Obtain information about reproducing this article:


http://www.sciencemag.org/about/permissions.dtl

Science (print ISSN 0036-8075; online ISSN 1095-9203) is published weekly, except the last week
in December, by the American Association for the Advancement of Science, 1200 New York
Avenue NW, Washington, DC 20005. Copyright 2016 by the American Association for the
Advancement of Science; all rights reserved. The title Science is a registered trademark of AAAS.

S-ar putea să vă placă și