Space-Time Modeling of Insurgency and Counterinsurgency in Iraq

被引:60
作者
Braithwaite, Alex [1 ]
Johnson, Shane D. [2 ]
机构
[1] UCL, Dept Polit Sci, London, England
[2] UCL, Dept Secur & Crime Sci, London, England
基金
英国工程与自然科学研究理事会;
关键词
Insurgency; Counterinsurgency; Iraq; Improvised Explosive Device (IED); SIGACTS; Space-time modeling; TERRORISM; COUNTERTERRORISM; VICTIMIZATION; STRATEGIES; PATTERNS; BACKLASH; VIOLENCE; SUPPORT; IMPACT;
D O I
10.1007/s10940-011-9152-8
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The US and its Coalition partners concluded combat operations in Iraq in August 2010. Rather surprisingly, little empirical evidence exists as to the factors that contributed to the ebb and flow in levels of violence and the emergence and disappearance of hot spots of hostilities during the campaign. Building upon a tradition of criminology scholarship, recent work demonstrates that Improvised Explosive Device (IED) attacks are clustered in space and time and that these trends decay in a manner similar to that observed in the spread of disease and crime. The current study extends this work by addressing a key potential correlate of these observed patterns across Iraq-namely, the timing and location of a variety of Coalition counterinsurgency (COIN) operations. This is achieved by assessing the co-evolving space-time distributions of insurgency and counterinsurgency in the first 6 months of 2005. To do so, we employ a novel analytic technique that helps us to assess the sequential relationship between these two event types. Our analyses suggest that the number of COIN operations that follow insurgent IED attacks (moderately) exceeds expectation (assuming that events are independent) for localities in the vicinity of an attack. This pattern is more consistent than is observed for the relationship in the opposite direction. The findings also suggest that less discriminatory COIN operations are associated with an elevated occurrence of subsequent insurgency in the vicinity of COIN operations in the medium to long term, whilst for more discriminatory and capacity-reducing COIN operations the reverse appears to be true.
引用
收藏
页码:31 / 48
页数:18
相关论文
共 34 条
[1]  
[Anonymous], 2012, Inside Terrorism
[2]  
[Anonymous], COMB ARMS IMPR EXPL
[3]  
[Anonymous], 2006, LOGIC VIOLENCE CIVIL
[4]   Counterterrorism - A game-theoretic analysis [J].
Arce, DG ;
Sandler, T .
JOURNAL OF CONFLICT RESOLUTION, 2005, 49 (02) :183-200
[5]  
Axelrod R., 1984, EVOLUTION COOPERATIO
[6]   Palestinian suicide bombing: public support, market share, and outbidding [J].
Bloom, MM .
POLITICAL SCIENCE QUARTERLY, 2004, 119 (01) :61-88
[7]   Transnational terrorism hot spots: Identification and impact evaluation [J].
Braithwaite, Alex ;
Li, Quan .
CONFLICT MANAGEMENT AND PEACE SCIENCE, 2007, 24 (04) :281-296
[8]  
Braithwaite Alex., 2010, Conflict Hot Spots: Emergence, Causes, Consequences
[9]   Politics and the suboptimal provision of counterterror [J].
Bueno de Mesquita, Ethan .
INTERNATIONAL ORGANIZATION, 2007, 61 (01) :9-36
[10]   Local determinants of African civil wars, 1970-2001 [J].
Buhaug, Halvard ;
Rod, Jan Ketil .
POLITICAL GEOGRAPHY, 2006, 25 (03) :315-335