How Do Terrorists Make Decisions?

Choice of Target
The types of targets attracting terrorist attention are typically highly guarded.

Anders Breivik considered assassinating a member of government but decided not to because such individuals are often well protected. From an operational perspective, he saw Utøya Island as ideal because it was “isolated” and “police would have problems” accessing the site.

Whether or not to attack sometimes depends on perceptions of the effectiveness of security. Eric Rudolph described the security in the Atlanta Olympics Park:

“Hundreds of security guards and cops patrolled the park. They eyeballed me going through the entrances. But there were no metal detectors, and bags were searched selectively. After sundown the crowds grew enormous … Security at the park became overwhelmed. They stopped searching bags altogether, and the entrances flew wide open. I knew then that I could smuggle in a bomb.”

Although variable, other criminals report assessing informal/natural surveillance, formal surveillance, CCTVs and alarm systems. They also may be more affected by how the security is deployed than whether or not is it present. Third parties not involved in the actual crime sometimes spot opportunities and pass this information to an eventual offender. This has been noted for captive takers, burglars, robbers, and drug dealers.

Risk assessment
What distinguishes terrorism from other criminal acts is that it is deployed for its impact not just on the victims of an attack but on the general public; it is considered an effective political strategy. Public impact therefore is part of the cost/benefit analysis.According to Ann Hansen, of Direct Action, there was ambivalence about whether or not to attack the Cheekye-Dunsmuir electrical line in Canada.

We did not want to sabotage the project after it went on-line, because we wanted to avoid causing power blackouts to residential areas. Ordinary people would feel the brunt of the action if hospitals, traffic lights, or other essential services were shut down, and we didn’t want that.

Perceived consequences matter, and perceptions that there is greater risk sometimes leads to both reconnaissance (which increases vulnerability) and attempting larger attacks. Multiple targets may be considered.

Ann Hansen of Direct Action noted that the group “decided to keep the actions small and simple so that people could get involved without having to fear serious prison time as a consequence.”

The Atlantic City bomber, Eric Rudolph, said, I had spent a week earlier that month casing [the target] … There was no hideout near the target, no place of concealment where I could sit and scope it out, so I did my scouting on the move. After parking a mile away, I made three passes … each day. I strolled past it at different times of the day, approaching from a different angle and wearing a slightly different disguise on each pass.

An IRA member reported that operations were becoming increasingly difficult and dangerous, with … forensics, surveillance, ubiquitous helicopters, the security forces’ more sophisticated understanding of IRA methods, quicker reaction by police and army, fewer opportunities because of better field craft by the security forces. There[fore], while operations became less frequent, they tended to become larger set-pieces …

A member of the Weather Underground reported that we agreed to investigate other targets as well … One team went to each of the possible sites to do reconnaissance … [once completed] … The conversation focused on which of the targets we had investigated were feasible. Then we discussed the logistical details required for each action.

Cost-benefit analyses also differ among other criminals. For example, inexperienced commercial robbers pay more attention to potential benefits at the expense of focusing upon risks. There may be a general unawareness or blindness to risk amongst some offenders due to intoxication or because co-offenders actively downplay the risk. Previous successes leads to downplaying immediate situational risks. Sometimes risk is accepted and circumvented by predetermined plans to display an illusion of normalcy.

Does Fear Deter?
In their own words, men and women who have committed acts of terrorism report fear and anxiety:

“For days beforehand, the nerves would burn the inside of your stomach. There would be plenty of sleepless nights spent tossing and turning as you went over and over what was going to happen.”

“There was nothing to show I had been rumbled, but some inborn sense of danger was whispering warnings in my ear. I forced myself to go on, repeating silently to myself ‘Don’t panic!’”

Fear sometimes is ameliorated by drugs. Upon being apprehended, Breivik announced that he had taken a combination of ephedrine, caffeine, and aspirin in order to enhance his performance.

Feelings of fear, nerves, stress, tension, worries, apprehension, anxiety, physical sickness and uncertainty are also reported among various kinds of criminals, including street robbers, first-time sex offenders, card fraudsters, thieves, muggers, and armed robbers. These individuals also self-report substance abuse during the crime commission in order to help overcome fear and nervousness.

Implications for Law Enforcement
The successful conduct of a terrorist attack requires not only a motivated offender, but also a lack of capable guardianship and the presence of an appropriate victim. In other words, it needs opportunity.As can be seen, terrorists make cost-benefit decisions in much the same way as other criminals. The field of crime prevention evaluation shows that we should focus on the settings in which offences take place rather than underlying motivation or criminal disposition of the individual actor. Reducing the opportunities for terrorism via environmental design is therefore a valid and worthwhile pursuit.

Each type of terrorist attack, be it a vehicular assault or a bombing, depends on a crystallisation of multiple opportunities. In turn, each specific attack type offers its own set of particular opportunities that can be manipulated with the intention of impacting the terrorist cost-benefit calculus. Such endeavours are target hardening, controlling access to facilities, and controlling access to the necessary weapons. Such actions include extending guardianship, assisting with natural surveillance, reducing anonymity, utilising place management, strengthening formal surveillance, and concealing or removing potential targets.

·  Fear is a factor in all phases of a terrorist attack, just as it is a factor in other kinds of crimes. Interventions that aim to increase such fear therefore should be beneficial.

·  The sources of fear include fear of detection by police/security and fear of detection by conscientious bystanders. Making these more obvious should increase this fear.

Interventions that hide the security details from the general public should increase uncertainty and either lead to full disruption or the planner taking ever greater risks to minimise their uncertainty. Fear of the ‘unknown’ is also paramount. Such feelings can be multiplied if the would-be offender believes the ability of security to detect suspicious behaviour is high. Interventions that highlight, embellish and evidence the ability of security, staff, and/or bystanders to detect suspicious behaviour should have a positive net benefit.

Read more:

·  Gill, P., Marchment, Z., Corner, E. and Bouhana, N. (2020). “Terrorist decision making in the context of risk, attack planning, and attack commission.” Studies in Conflict & Terrorism, 43(2), 145–160.

·  Marchment, Z. and Gill, P. (2019). “Modelling the spatial decision making of terrorists: The discrete choice approach.” Applied geography, 104, 21–31.

·  Gill, P., Corner, E., McKee, A., Hitchen, P. and Betley, P. (2019). “What do closed source data tell us about lone actor terrorist behavior? A research note.” Terrorism and Political Violence, 1–18.

·  Robinson, A., Marchment, Z. and Gill, P. (2019). “Domestic extremist criminal damage events: behaving like criminals or terrorists?” Security Journal, 32(2), 153–167.

·  Marchment, Z. and Gill, P. (2020). “Spatial Decision Making of Terrorist Target Selection: Introducing the TRACK Framework.” Studies in Conflict & Terrorism, 1–19