68
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Counter-Terrorism: The Risk of Performativity in Big Data-Based Mass Surveillance

ORCID Icon & ORCID Icon
Received 10 Mar 2024, Accepted 24 Mar 2024, Published online: 02 May 2024
 

Abstract

Starting in 2015, the terrorist organization known as the “Islamic State” (IS) experienced a gradual decline in territorial control within Syria and Iraq due to military success on the part of various armies and militias, and it was finally defeated as a political entity in February 2019. As predicted by terrorism experts and announced by the leaders of IS, the gradual fall of the IS led to an increase in terrorist attacks in Europe and the US. To combat these threats, governments and their security services are relying increasingly on big data-based mass surveillance. This paper is concerned with the structure and effectiveness of big data surveillance and strategies in countering Islamist violence. We develop a Bayesian analysis of the effectiveness and performativity of big data-based surveillance and counterterrorism methods, where performativity describes the fact that sometimes the very measures used to prevent terror can themselves contribute to the creation of Islamist violence. Furthermore, we evaluate the ethical dimensions of big data surveillance under the assumption of performativity.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 R. Said, “Islamic State ‘Caliphate’ Defeated, Yet Threat Persists,” Reuters, March 23, 2019, https://www.reuters.com/article/us-mideast-crisis-islamic-state/islamic-state-caliphate-defeated-yet-threat-persists-idUSKCN1R407D.

2 Bethan McKernan, “Isis Will Become ‘Al-Qaeda on steroids’ After Defeat, Warns Top Official,” The Independent, July 17, 2017, http://www.independent.co.uk/news/world/middle-east/isis-al-qaeda-steroids-terrorrism-attacks-islamic-state-warning-lahur-talabany-abu-bakr-al-baghdadi-a7844491.html.

3 J. Ensor, “How Islamic State Called for ‘All-Out War’ on West during Ramadan,” The Telegraph, June 4, 2017, http://www.telegraph.co.uk/news/2017/05/26/islamic-state-calls-all-out-war-west-start-ramadan-manchester/.

4 David A. Lake, “Rational Extremism: Understanding Terrorism in the Twenty-First Century Dialogue,” International Organization 1 (2002): 15–29.

5 Robert A. Pape, “The Strategic Logic of Suicide Terrorism,” American Political Science Review 97 (2003): 343–61.

6 Michael Taarnby, “Recruitment of Islamist Terrorists in Europe: Trends and Perspectives,” Danish Ministry of Justice 14 (2005).

7 L. Ondreka, “Das Terror-Risiko wird überschätzt,” Süddeutsche Zeitung, March 26, 2016, http://www.sueddeutsche.de/politik/terrorgefahr-nach-bruessel-das-terror-risiko-wird-ueberschaetzt-1.2921638.

8 P. M. Haridakis and A. M. Rubin, “Third-Person Effects in the Aftermath of Terrorism,” Mass Communication & Society 8, no. 1 (2005): 39–59.

9 P. Haidet et al., “Associations between the Impact of Terrorism and Health Perceptions of Patients,” International Journal of Psychiatry in Medicine 35, no. 3 (2005): 249–58.

10 Andrew H. Kydd and Barbara F. Walter, “The Strategies of Terrorism,” International Security 31, no. 1 (2006): 49–80.

11 Paul Staniland, Networks of Rebellion: Explaining Insurgent Cohesion and Collapse (Cornell University Press, 2018).

12 Monika Bickert and Brian Fishman, “Hard Questions: How We Counter Terrorism,” Facebook Newsroom, June 15, 2017, https://newsroom.fb.com/news/2017/06/how-we-counter-terrorism/.

13 M. Cayford and W. Pieters, “The Effectiveness of Surveillance Technology: What Intelligence Officials are Saying,” Information Society 34, no. 2 (2018): 88–103. https://doi.org/10.1080/01972243.2017.1414721.

14 Bruce Schneier, “Beyond Security Theater,” New Internationalist 427 (2009): 10–2.

15 O. Putz, “From Non-places to Non-events: The Airport Security Checkpoint,” Journal of Contemporary Ethnography 41, no. 2 (2012): 154–88.

16 A. Perešin, “Mass Media and Terrorism,” IZVORNI ZNANSTVENI RAD. Medij. istraž. (god. 13, br. 1) 2007: 5–22.

17 L. Coleman, The Copycat Effect: How the Media and Popular Culture Trigger Mayhem in Tomorrow’s Headlines (Paraview Pocket Books, 2004).

18 W. O’Neill, “Concept Paper—Beyond the Slogans: How Can the UN Respond to Terrorism?” In Responding to Terrorism: What Role for the United Nations? Report of a conference organized by the International Peace Academy, New York, 25–26 October 2002 (International Peace Academy, 2002).

19 B. Hoffman, Inside Terrorism (Columbia University Press, 1998).

20 A. Chua, World on Fire: How Exporting Free Market Democracy Breeds Ethnic Hatred and Global Instability (New York, NY: Doubleday, 2003).

21 P. R. Ehrlich and J. Liu, “Some Roots of Terrorism,” Population and Environment 24, no. 2 (2002): 183–92.

22 See note 19 above.

23 Jessica Stern, Terror in the Name of God (New York, NY: Ecco, 2003).

24 Peter L. Bergen, Holy War, Inc. Inside the Secret World of Osama Bin Laden (New York, NY: The Free Press, 2001).

25 P. Mullen, “The Role of Psychotic Illnesses in Attacks on Public Figures,” Unpublished manuscript, 2007.

26 D. V. James, “The Role of Mental Disorder in Attacks on European Politicians 1990–2004,” Acta Psychiatrica Scandinavica 116 (2007): 334–44.

27 See note 5 above.

28 See note 6 above.

29 S. Ashworth, J. D. Clinton, A. Meirowitz, and K. W. Ramsay, “Design, Inference, and the Strategic Logic of Suicide Terrorism,” American Political Science Review 102 (2008): 269–73.

30 T. Hegghammer, “Should I Stay or Should I Go? Explaining Variation in Western Jihadists’ Choice between Domestic and Foreign Fighting,” American Political Science Review 107, no. 1 (2013): 1–15. doi:10.1017/S0003055412000615.

31 R. A. Fein and B. Vossekuil, “Assassination in the United States: An Operational Study of Recent Assassins, Attackers, and Near-Lethal Approachers,” Journal of Forensic Sciences 44, no. 2 (1999): 321–33.

32 Ramón Spaaij, “The Enigma of Lone Wolf Terrorism: An Assessment,” Studies in Conflict & Terrorism 33, no. 9 (2010): 854–70.

33 John R. Meloy, “Factors Associated with Escalation and Problematic Approaches Toward Public Figures,” Journal of Forensic Science 56, no. S1 (2011): 128–35.

34 Nathan R. Springer, “Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst” (PhD diss., Naval Postgraduate School, 2009).

35 Jelle Van Buuren, “Performative Violence? The Multitude of Lone Wolf Terrorism,” Terrorism: An Electronic Journal and Knowledge Base 1, no. 1 (2012).

36 Shiraz Maher, “Understanding the Boy who became Islamic State’s Chief Executioner – And His Victims,” New Statesman, April 9, 2016, https://www.newstatesman.com/culture/books/2016/04/understanding-boy-who-became-islamic-state-s-chief-executioner-and-his-victims.

37 Thomas Maurer, “Die Pluralität der Radikalisierung - Eine systemische Analyse der Theorieansätze zur Radikalisierungsforschung,” Journal for Deradicalization 13 (2017): 49–100.

38 Ibid.

39 Charles Kurzman, David Schanzer, and Ebrahim Moosa, “Muslim American Terrorism Since 9/11: Why So Rare?” The Muslim World 101 (2011): 464–83. doi:10.1111/j.1478-1913.2011.01388.x.

40 H. Grassegger & M. Krogerus, “Ich habe nur gezeigt, dass es die Bombe gibt,” Das Magazin, July 12, 2018, https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-gezeigt-dass-es-die-bombe-gibt/.

41 Z. Bauman, D. Bigo, P. Esteves, E. Guild, V. Jabri, D. Lyon, & R.B.J. Walker, “After Snowden: Rethinking the Impact of Surveillance,” International Political Sociology 8, no. 2 (2014): 121–44.

42 Bundeskriminalamt [BKA], “Interview: ‘Die Gefährderzahl hat sich verfünffacht’.” December 19, 2018, https://www.bka.de/DE/Presse/Interviews/2018/181219_InterviewMuenchTagesspiegel.html.

43 Bart Schuurman, “Research on Terrorism, 2007–2016: A Review of Data, Methods, and Authorship,” Terrorism and Political Violence 32, no. 5 (2020): 1011–26.

44 As of 2018 the BKA reported 760 potential terrorists in Germany. See Daniel Kahneman, Thinking, Fast and Slow (New York, NY: Farrah, Straus and Giroux, 2011).

45 It is a well-researched phenomenon that even with rich datasets and high accuracy; predictions on the individual level tend to be faulty, especially when dealing with low base rates. This is a common issue in many areas where statistical predictions are used, e.g., with narrow target groups in digital marketing. See Kahneman for “base rate fallacy”, respectively “base rate neglect”. See Mathias Leese, “Seeing Futures’—Politics of Visuality and Affect,” In Algorithmic Life: Calculative Devices in the Age of Big Data, ed. Louise Amoore and Volha Piotukh (Milton Park; New York, NY: Routledge, 2016), 148–64.

46 David A. Lake, “Rational Extremism: Understanding Terrorism in the Twenty-First Century Dialogue,” International Organization 1 (2002): 15–29.

47 Tobias Matzner, “Why Privacy is not Enough Privacy in the Context of ‘Ubiquitous Computing’ and ‘Big Data’,” Journal of Information, Communication & Ethics in Society 12, no. 2 (2014): 93–106.

48 See note 43 above.

49 C. Amble, “Combating Terrorism in the New Media Environment,” Studies in Conflict & Terrorism 35, no. 5 (2012): 339–53. https://doi.org/10.1080/1057610X.2012.666819.

50 B. Ganor, The Counter-Terrorism Puzzle: A Guide for Decision Makers (Piscataway, NJ: Transaction Publishers, 2005).

51 Nassim Nicholas Taleb, The Black Swan: The Impact of the Highly Improbable (New York, NY: Random House, 2007).

52 See note 50 above.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 358.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.