Business
Authors
News Type
News
Date
Paragraphs

Martha Crenshaw, a senior fellow at the Center for International Security and Cooperation (CISAC), has been awarded $500,000 by the National Science Foundation to identify patterns in the evolution of terrorist organizations and to analyze their comparative development.

The three-year grant is part of the Department of Defense's Minerva Initiative launched in 2008, which focuses on "supporting research related to basic social and behavioral science of strategic importance to U.S. national security policy."

Crenshaw's interdisciplinary project, "Mapping Terrorist Organizations," will analyze terrorist groups and trace their relationships over time. It will be the first worldwide, comprehensive study of its kind-extending back to the Russian revolutionary movement up to Al Qaeda today.

"We want to understand how groups affiliate with Al Qaeda and analyze their relationships," Crenshaw said. "Evolutionary mapping can enhance our understanding of how terrorist groups develop and interact with each other and with the government, how strategies of violence and non-violence are related, why groups persist or disappear, and how opportunities and constraints in the environment change organizational behavior over time."

According to Crenshaw, it is critical to understand the organization and evolution of terrorism in multiple contexts. "To craft effective counter-terrorism strategies, governments need to know not only what type of adversary they are confronting but its stage of organizational development and relationship to other groups," Crenshaw wrote in the project summary. "The timing of a government policy initiative may be as important as its substance."

"Mapping Terrorist Organizations" will incorporate research in economics, sociology, business, biology, political science and history. It will include existing research to build a new database using original language sources rather than secondary analyses. The goal is to produce an online database and series of interactive maps that will generate new observations and research questions, Crenshaw said.

The results, for example, could reveal the structure of violent and non-violent opposition groups within the same movements or conflicts, and identify patterns that explain how these groups evolve over time. Such findings could be used to analyze the development of Al Qaeda and its Islamist or jihadist affiliates, including the Taliban in Afghanistan and Pakistan, she said.

The findings may also shed light on what happens when a group splits due to leadership quarrels or when a government is overturned, Crenshaw said. "Analysis that links levels of terrorist violence to changes in organizational structures and explains the complex relationships among actors in protracted conflicts will break new ground," the summary noted.

Extensive information on terrorist groups already exists, but it has been difficult to compile and analyze. Despite such obstacles, Crenshaw said, violent organizations can be understood in the same terms as other political or economic groups. "Terrorist groups are not anomalous or unique," she wrote. "In fact, they can be compared to transnational activist networks."

Crenshaw should know. Widely respected as a pioneer in terrorism studies, the political scientist was one of a handful of scholars who followed the subject decades before the attacks of Sept. 11, 2001. She joined CISAC in 2007, following a long career at Wesleyan University, where she was the Colin and Nancy Campbell Professor of Global Issues and Democratic Thought. In addition to her research at Stanford, Crenshaw is a lead investigator at START, the Consortium for the Study of Terrorism and the Response to Terrorism at the University of Maryland.

End goal

Crenshaw wants to use the findings to better analyze how threats to U.S. security evolve over time. "Terrorist attacks on the United States and its allies abroad often appear to come without warning, but they are the result of a long process of organizational development," she wrote. "Terrorist organizations do not operate in isolation from a wider social environment. Without understanding processes of development and interaction, governments may miss signals along the way and be vulnerable to surprise attack. They may also respond ineffectively because they cannot anticipate the consequences of their actions." The project seeks to find patterns in the evolution of terrorism and to explain their causes and consequences. This, in turn, should contribute to developing more effective counter-terrorism policy, Crenshaw said.

Conflicts to be mapped

  • Russian revolutionary organizations, 1860s-1914.
  • Anarchist groups in Europe and the United States, 1880s-1914. (Note: although the anarchist movement is typically regarded as completely unstructured, there was more organization than an initial survey might suppose, and the transnational dispersion of the movement is frequently cited as a precedent for Al Qaeda.)
  • Ireland and Northern Ireland, 1860s-present.
  • Algeria, 1945-1962 and 1992-present
  • Palestinian resistance groups, 1967-present.
  • Colombia, 1960s-present.
  • El Salvador, 1970s-1990s
  • Argentina, 1960s-1980s
  • Chile, 1973-1990
  • Peru, 1970-1990s
  • Brazil, 1967-1971
  • Sri Lanka, 1980s-present
  • India (Punjab), 1980-present
  • Philippines, 1960s-present
  • Indonesia, 1998-present
  • Italy, 1970s-1990s
  • Germany, 1970s-1990s
  • France/Belgium, 1980-1990s
  • Kashmir, 1988-present
  • Pakistan, 1980-present
  • United States, 1960s-present (especially far right movement)
  • Spain, 1960s-present
  • Egypt, 1950s-present
  • Turkey, 1960s-present
  • Lebanon, 1975-present
  • Al Qaeda, 1987-present
All News button
1
-

Abstract
Technology can be a positive force for decentralization, but in extreme cases this can lead to chaos.  Technology can also be a positive force for centralization, creating huge value.  However, in extreme cases the potential for centralization could play into the hands of governments with totalitarian aspirations.  I will explore examples of each, and also of how technology companies can create systems and processes that prevent this kind of abuse.  I will bring up some of the most difficult decisions I have faced in my career and give the class a chance to tell me what they would have done in my shoes.

Kim Scott is the Director of Online Sales and Operations for AdSense and YouTube at Google. In that role, she is responsible for managing Google's worldwide network of partner publishers and building the YouTube community and YPP program.

 Prior to joining Google, Kim was the CEO and co-founder of Juice Software, a business intelligence start-up based in New York City. Kim was VP of Business Development at two other technology start-ups: CapitalThinking, a commercial mortgage ASP and Delta Three, an Internet telephony service provider.  Earlier in her career, Kim managed a pediatric clinic in Kosovo, served as senior policy adviser to Reed Hundt at the FCC, and worked in Moscow from 1990-1994.

Kim is the author of three unpublished novels, The Measurement Problem, The
Househusband
, and Virtual Love.  Kim currently sits on the advisory board for Sunlight Foundation and is a member of the Council on Foreign Relations.  

Summary of the Seminar
Kim Scott, Director AdSense Online Sales & Operations at Google, explored the potential of new technology for both increasing decentralization and centralization. Decentralization refers to the capacity of the internet to disperse power and influence to many more people. In the political context, this has (arguably) enabled greater citizen activism. In business, online advertising enables start-ups to get going without relying on venture capitalist funding. Individuals have greater capacity for personal expression now that they can bypass publishing power houses and distribute their own work at virtually no cost. Corresponding to these benefits are a number of negative impacts. The same technology that allows pro-democracy groups to come together also enables terrorists and pedophile groups to organize and perpetrate harm on a greater scale.

Technology also allows for increasing centralization. The Internet provides a place for the world's information to be easily organized and accessed. But with this comes the risk that certain groups (particularly authoritarian governments) could deliberately misinform citizens.  

Kim raised a number of dilemmas for discussion, including:

  • How should technology companies respond to requests from governments to hand over data?
  • How should Internet companies respond to different countries' understanding of what content is acceptable? Google's policy to date has been to allow different access in different countries but it has stopped short of allowing any one country to dictate what others countries see.

Wallenberg Theater

Kim Scott Director AdSense Online Sales & Operations Speaker Google
Seminars
Subscribe to Business