Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-94fs2 Total loading time: 0 Render date: 2024-11-19T14:46:43.585Z Has data issue: false hasContentIssue false

5 - Reducing the opportunities for terrorism: applying the principles of situational crime prevention

Published online by Cambridge University Press:  15 September 2009

Werner G. K. Stritzke
Affiliation:
University of Western Australia, Perth
Stephan Lewandowsky
Affiliation:
University of Western Australia, Perth
David Denemark
Affiliation:
University of Western Australia, Perth
Joseph Clare
Affiliation:
University of Western Australia, Perth
Frank Morgan
Affiliation:
University of Western Australia, Perth
Get access

Summary

Societies threatened by terrorism pursue many different strategies to protect themselves from attack. These include: “taking out” terrorists, sometimes through conventional warfare; strengthening laws and legal action to bring terrorists to justice; winning the “hearts and minds” of foreign and local communities that might otherwise support terrorism; persuading certain regimes to abandon their support for terrorists; and strengthening the confidence of home populations, including detailed plans for minimizing harm when attacks are made.

These strategies have been widely discussed in the academic literature, but in this chapter we discuss an approach that has received less attention – that of reducing the opportunities for terrorism. By this we mean protecting the most vulnerable targets from attack, controlling the tools and weapons used by terrorists, and altering specific aspects of other social and physical systems – what we call facilitating conditions – to make it harder for terrorists to operate. This approach is an application of situational crime prevention, the science of reducing opportunities for crime (Clarke, 1980). This means that we treat terrorism as simply another form of crime – crime with a political motive (Clarke and Newman, 2006). Situational prevention has no difficulty handling the many different motives that drive crime. For example, sexual abuse is a very differently motivated offense from, say, homicide or burglary or robbery, but examples of the successful application of situational prevention exist for all these and many other crimes (e.g., see Clarke, 2005).

Type
Chapter
Information
Terrorism and Torture
An Interdisciplinary Perspective
, pp. 86 - 105
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Brantingham, P. L., and Brantingham, P. J. (1993). Environment, routine and situation: toward a pattern theory of crime. In Clarke, R.V. and Felson, M. (eds.), Routine Activity and Rational Choice (pp. 259–294). New Brunswick, NJ: Transaction Press.Google Scholar
Cauley, J., and Im, E. I. (1988). Intervention policy analysis of skyjackings and other terrorist incidents. American Economic Review, 78, 27–31.Google Scholar
Chauncey, R. (1975). Deterrence: certainty, severity, and skyjacking. Criminology, 12, 447–473.CrossRefGoogle Scholar
Clarke, R. V. (1980). Situational crime prevention: theory and practice. British Journal of Criminology, 20, 136–147.CrossRefGoogle Scholar
Clarke, R. V. (1999). Hot Products: Understanding, Anticipating and Reducing the Demand for Stolen Goods. Police Research Series, 112. London: Home Office.Google Scholar
Clarke, R. V. (2005). Seven misconceptions of situational crime prevention. In Tilley, N. (ed.), Handbook of Crime Prevention and Community Safety (pp. 39–70). Cullompton: Willan Publishing.Google Scholar
Clarke, R. V., and Eck, J. (2003). Become a problem solving crime analyst. Cullompton: Willan Publishing.Google Scholar
Clarke, R. V., and Eck, J. (2005). Crime Analysis for Problem Solvers: In 60 Small Steps. Office of Community Oriented Policing Services. Washington, DC: US Department of Justice.Google Scholar
Clarke, R. V., Kemper, R., and Wyckoff, L. (2001). Controlling cell phone fraud in the US. Security Journal, 14, 7–22.CrossRefGoogle Scholar
Clarke, R. V., and Mayhew, P. (1988). The British Gas suicide story and its criminological implications. In Tonry, M. and Morris, N. (eds.), Crime and Justice, Volume 10: An Annual Review of Research, Crime and Justice, 10 (pp. 79–116). Chicago: University of Chicago Press.Google Scholar
Clarke, R. V., and Newman, G. (eds.) (2005). Designing Out Crime from Products and Systems. Crime Prevention Studies, 18. Monsey, NY: Criminal Justice Press.
Clarke, R. V., and Newman, G. (2006). Outsmarting the Terrorists. Westport, CT: Praeger Security International.Google Scholar
Cohen, L. E., and Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608.CrossRefGoogle Scholar
Cornish, D. B., and Clarke, R. V. (eds.) (1986). The Reasoning Criminal: Rational Choice Perspectives on Offending. New York: Springer-Verlag.CrossRef
Cornish, D. B., and Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: a reply to Wortley's critique of situational crime prevention. In Smith, M. and Cornish, D. (eds.), Theory for Practice in Situational Crime Prevention. Crime Prevention Studies, 16 (pp. 151–196). Monsey, NY: Criminal Justice Press.Google Scholar
Dugan, L., LaFree, G., and Piquero, A. (2005). Testing a rational choice model of airline hijackings. Criminology, 43, 1031–1066.CrossRefGoogle Scholar
Ekblom, P. (1995). Less crime, by design. Annals of the American Academy of Political and Social Science, 539, 114–129.CrossRefGoogle Scholar
Enders, W., and Sandler, T. (1993). The effectiveness of antiterrorism policies: a vector-autoregression-intervention analysis. American Political Science Review, 87, 829–844.CrossRefGoogle Scholar
Enders, W., and Sandler, T. (2000). Is transnational terrorism becoming more threatening?Journal of Conflict Resolution, 44, 307–332.CrossRefGoogle Scholar
Enders, W., and Sandler, T. (2006). The Political Economy of Terrorism. Cambridge: Cambridge University Press.Google Scholar
Enders, W., Sandler, T., and Cauley, J. (1990). UN conventions, technology and retaliation in the fight against terrorism: an econometric evaluation. Terrorism and Political Violence, 2, 83–105.CrossRefGoogle Scholar
Hardie, J., and Hobbs, B. (2005). Partners against crime: the role of the corporate sector in tackling crime. In Clarke, R. V. and Newman, G. (eds.), Designing Out Crime from Products and Systems. Crime Prevention Studies, 18 (pp. 85–140). Monsey, NY: Criminal Justice Press.Google Scholar
Hesseling, R.B.P. (1994). Displacement: a review of the empirical literature. In Clarke, R. V. (ed.), Crime Prevention Studies, 3 (pp. 197–230). Monsey, NY: Criminal Justice Press.Google Scholar
Kaplan, E. (2006). Q&A: the UAE purchase of American port facilities. February 23. New York Times. Retrieved February 7, 2007, from www.nytimes.com/cfr/international/slot1_022306.html.
Langan, P. A., and Farrington, D. P. (1998). Crime and Justice in the United States and in England and Wales, 1981–96. Washington, DC: US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.Google Scholar
Levi, M. (2008). Combating identity and other forms of payment fraud in the UK: an analytical history. In McNally, M. and Newman, G. R. (eds.), Identity Theft and Opportunity (pp. 111–132). Crime Prevention Studies, 23. Monsey, NY: Criminal Justice Press.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×