Armed to Kill: A Cross-Sectional Analysis Examining the Links between Firearms Availability, Gun Control, and Terrorism Using the Global Terrorism Database and the Small Arms Survey

恐怖主义 枪支管制 毒物控制 计算机安全 犯罪学 伤害预防 政治学 法学 环境卫生 心理学 医学 计算机科学
作者
Oldřich Bureš,Alexandr Burilkov
出处
期刊:Terrorism and Political Violence [Taylor & Francis]
卷期号:: 1-15 被引量:1
标识
DOI:10.1080/09546553.2023.2259506
摘要

ABSTRACTAccording to the Global Terrorism Database, the use of firearms in terrorist attacks has been on the rise, and firearms-based attacks are the most lethal. In the aftermath of mass-casualty attacks perpetrated with firearms, policymakers across the world advocate tightened gun control to restrict terrorists’ access to both licit and illicit guns. However, academic research on the linkages between firearms availability, gun control legislation, and terrorism is scarce. This study fills this research gap by conducting a systematic cross-sectional analysis of the linkage between gun control, licit and illicit stocks of firearms, and terrorist attacks in 2015–2019, based on a novel dataset incorporating the Global Terrorism Database and the Small Arms Survey. Our estimation using OLS regression shows a strong relationship between the availability of firearms and the incidence of gun-based terrorism, especially for lone wolf attacks. Furthermore, terrorists in stable, democratic countries are comparatively more likely to select firearms as their weapon of choice. Conversely, strict gun control only slightly alleviates the overall risk of terrorism in stable countries but does not impact weapon selection. In unstable countries in the grip of intrastate conflict, gun control significantly reduces lone wolf-style attacks, while organized multi-perpetrator attacks are not deterred.KEYWORDS: Firearmsgunsterrorismlone wolfmass-casualtylegislationcontrolregulationpolitical violencesecuritypublic policyquantitativeregression Disclosure statementNo potential conflict of interest was reported by the author(s).Supplementary materialSupplemental data for this article can be accessed online at https://doi.org/10.1080/09546553.2023.2259506.Correction StatementThis article has been corrected with minor changes. These changes do not impact the academic content of the article.Notes1. Includes all incidents regardless of doubt perpetrated between September 1, 2001 and December 31, 2019. More recent data was not available at the time of the search (June 2022). A lower casualty threshold of at least ten people killed or injured per attack adds 3068 more attacks involving use of firearms in this time period.2. According to the U.K.’s most senior counter-terrorism police officer, “Half of the terrorist plots that have been disrupted in recent years have involved terrorist plotters who tried to get hold of guns.” May Bulman, “Police Fear Terrorists Buying Guns for Paris-Style Attack on UK,” The Independent, October 31, 2016, http://www.independent.co.uk/news/uk/home-news/mi5-chief-andrew-parker-foiled-terror-plots-guns-attack-latest-firearms-extremist-paris-attack-a7389891.html. While most of these foiled plots are naturally undocumented, some have been covered in the press and policy reports, e.g. the terrorist attack with firearms that was foiled on the Thalys train between Brussels and Paris in August 2015. Nils Duquet and Kevin Goris, “Firearms Acquisition by Terrorists in Europe,” Findings and Policy Recommendations of Project SAFTE (Brussels: Flemish Peace Institute, April 18, 2018), 53.3. According to the data in Global Terrorism Database, firearms, along with various types of explosives have been the dominant weapon types employed in terrorist attacks worldwide. To give one specific example, following the 1998 Good Friday Peace Agreement, the IRA decommissioned approximately ninety handguns, 1000 mainly Kalashnikov-type assault rifles, and twenty to thirty heavy machine guns, two tons of Semtex, seven surface-to-air missiles, seven flame throwers, 1200 detonators, eleven rocket-propelled grenade launchers, and 100+ grenades. BBC News, “IRA Guns: The List of Weapons,” September 26, 2005, http://news.bbc.co.uk/2/hi/uk_news/northern_ireland/4284048.stm.4. Duquet and Goris, “Firearms Acquisition by Terrorists in Europe.”5. Robert A. Tessler, Stephen J. Mooney, Cordelie E. Witt, Kathleen O’Connell, Jessica Jenness, Monica S. Vavilala, and Frederick P. Rivara, “Use of Firearms in Terrorist Attacks: Differences Between the United States, Canada, Europe, Australia, and New Zealand,” JAMA Internal Medicine 177, no. 12 (2017): 1865–68, https://doi.org/10.1001/jamainternmed.2017.5723.6. “TE-SAT 2013: EU Terrorism Situation and Trend Report” (Hague: Europol, April 25, 2013), https://www.europol.europa.eu/activities-services/main-reports/te-sat-2013-eu-terrorism-situation-and-trend-report; “TE-SAT 2015: EU Terrorism Situation and Trend Report” (Hague: Europol, July 6, 2015), https://www.europol.europa.eu/activities-services/main-reports/european-union-terrorism-situation-and-trend-report-2015.7. Carl Bialik, “Terrorists Are Turning to Guns More Often in U.S. Attacks,” FiveThirtyEight (blog), June 12, 2016, https://fivethirtyeight.com/features/terrorists-are-turning-to-guns-more-often-in-u-s-attacks/.8. Brian Michael Jenkins, “The New Age of Terrorism,” in The McGraw-Hill Homeland Security Handbook, ed. David Kamien, 1st ed. (McGraw-Hill Education, 2005), 119.9. Jeffrey D. Simon, Lone Wolf Terrorism: Understanding the Growing Threat. Reprint (Amherst, NY: Prometheus, 2016).10. Duquet and Goris, “Firearms Acquisition by Terrorists in Europe.”11. Eran Shor, “Counterterrorist Legislation and Subsequent Terrorism: Does It Work?” Social Forces 95, no. 2 (2016): 525–57, https://doi.org/10.1093/sf/sow052.12. For useful literature reviews See Harvard Injury Control Research Center, “Homicide,” August 27, 2012, https://www.hsph.harvard.edu/hicrc/firearms-research/guns-and-death/; RAND, “What Science Tells Us About the Effects of Gun Policies,” April 22, 2020, https://www.rand.org/research/gun-policy/key-findings/what-science-tells-us-about-the-effects-of-gun-policies.html.13. D. Hemenway and M. Miller, “Firearm Availability and Homicide Rates Across 26 High-Income Countries,” The Journal of Trauma 49, no. 6 (2000): 985–88, https://doi.org/10.1097/00005373-200012000-00001.14. United Nations Office on Drugs and Crime, “Global Study on Homicide: Understanding Homicide,” Vienna, July 2019, https://www.unodc.org/documents/data-and-analysis/gsh/Booklet_3.pdf.15. For many less-developed countries, UNODC data is available for a single year for the 2015-2019 period, if at all. This is particularly acute for unstable countries. For example, out of forty-two countries undergoing one or more intrastate conflicts, only twenty-four have any homicide data available.16. This shortage of peer reviewed academic studies contracts with the plethora of newspaper articles and various on-line publications on the topic, which tend to mushroom in the aftermath of major terrorist attacks perpetrated with guns.17. Michael Levi, “Lessons for Countering Terrorist Financing from the War on Serious and Organized Crime,” in Countering the Financing of Terrorism, ed. Thomas J. Biersteker and Sue E. Eckert (London: Routledge, 2007), 260–88.18. Shor, “Counterterrorist Legislation and Subsequent Terrorism” claims to have compiled an overarching global counterterrorist legislation database (GCLD) but it is not publicly accessible.19. Martin Gassebner and Simon Luechinger, “Lock, Stock, and Barrel: A Comprehensive Assessment of the Determinants of Terror,” Public Choice 149, no. 3 (2011): 235–61, https://doi.org/10.1007/s11127-011-9873-0.20. National Consortium for the Study of Terrorism and Responses to Terrorism, “Global Terrorism Database,” 2019, https://www.start.umd.edu/gtd/.21. Brian Burgoon, “On Welfare and Terror: Social Welfare Policies and Political-Economic Roots of Terrorism,” Journal of Conflict Resolution 50, no. 2 (2006): 176–203, https://doi.org/10.1177/0022002705284829; Brian Lai, “‘Draining the Swamp’: An Empirical Examination of the Production of International Terrorism, 1968–1998,” Conflict Management and Peace Science 24, no. 4 (2007): 297–310, https://doi.org/10.1080/07388940701643649; James A. Piazza, “Rooted in Poverty? Terrorism, Poor Economic Development and Social Change,” Terrorism & Political Violence 18, no. 1 (2006): 159–77; Kristopher K. Robison, Edward M. Crenshaw, and J. Craig Jenkins, “Ideologies of Violence: The Social Origins of Islamist and Leftist Transnational Terrorism,” Social Forces 84, no. 4 (2006): 2009–26, https://doi.org/10.1353/sof.2006.0106.22. Graduate Institute of International and Development Studies, “Small Arms Survey” (Geneva, 2022), http://www.smallarmssurvey.org/about-us/mission.html.23. Graduate Institute of International and Development Studies, “Small Arms Survey—Global Firearms Holdings” (Geneva, June 18, 2018), http://www.smallarmssurvey.org/weapons-and-markets/tools/global-firearms-holdings.html.24. Alan B. Krueger and Jitka Maleckova, “Education, Poverty and Terrorism: Is There a Causal Connection?” Journal of Economic Perspectives 17, no. 4 (2003): 119–44; Alan B. Krueger, What Makes a Terrorist: Economics and the Roots of Terrorism (Princeton, NJ: Princeton University Press, 2007); Lai, “‘Draining the Swamp’”; Piazza, “Rooted in Poverty?”; Robison et al., “Ideologies of Violence.”25. Quan Li and Drew Schaub, “Economic Globalization and Transnational Terrorism: A Pooled Time-Series Analysis,” Journal of Conflict Resolution 48, no. 2 (2004): 230–58, https://doi.org/10.1177/0022002703262869; Gassebner and Luechinger, “Lock, Stock, and Barrel.”26. Gassebner and Luechinger, “Lock, Stock, and Barrel.”27. Stockholm International Peace Research Institute (SIPRI), “SIPRI Military Expenditure Database,” 2022, https://www.sipri.org/databases/milex.28. Erica Chenoweth, “Terrorism and Democracy,” Annual Review of Political Science 16, no. 1 (2013): 355–78, https://doi.org/10.1146/annurev-polisci-032211-221825; Lai, “‘Draining the Swamp’”; James A. Piazza, “Repression and Terrorism: A Cross-National Empirical Analysis of Types of Repression and Domestic Terrorism,” Terrorism and Political Violence 29, no. 1 (2017): 102–18, https://doi.org/10.1080/09546553.2014.994061; James I. Walsh and James A. Piazza, “Why Respecting Physical Integrity Rights Reduces Terrorism,” Comparative Political Studies 43, no. 5 (2010): 551–77, https://doi.org/10.1177/0010414009356176.29. Michael Coppedge, John Gerring, Staffan Lindberg, Svend Skaaning, Jan Teorell, David Altman, and Michael Bernhard, “The V-Dem Dataset 2021,” 2021, https://www.v-dem.net/vdemds.html.30. Burgoon, “On Welfare and Terror”; Michael G. Findley and Joseph K. Young, “Terrorism and Civil War: A Spatial and Temporal Approach to a Conceptual Problem,” Perspectives on Politics 10, no. 2 (2012): 285–305, https://doi.org/10.1017/S1537592712000679; Gassebner and Luechinger, “Lock, Stock, and Barrel”; Lai, “‘Draining the Swamp’”; Piazza, “Repression and Terrorism”; Walsh and Piazza, “Why Respecting Physical Integrity.”31. Nils Peter Gleditsch, Peter Wallensteen, Mikael Eriksson, Margareta Sollenberg, and Havard Strand, “Armed Conflict 1946–2001: A New Dataset,” Journal of Peace Research 39, no. 5 (2002): 615–37, https://doi.org/10.1177/0022343302039005007.32. Ralph Sundberg, Kristine Eck, and Joakim Kreutz, “Introducing the UCDP Non-State Conflict Dataset,” Journal of Peace Research 49, no. 2 (2012): 351–62, https://doi.org/10.1177/0022343311431598.33. United Nations Office on Drugs and Crime, “Global Study on Homicide.”34. Mark Galeotti and Anna Arutunyan, “Peace and Proliferation: The Russo-Ukrainian War and the Illegal Arms Trade” (Geneva: Global Initiative Against Transnational Organized Crime, March 2023), https://globalinitiative.net/analysis/russia-ukraine-war-illegal-arms-trade/.Additional informationFundingThis publication is the result of Metropolitan University Prague research project no. 100-4 “Centre for Security Studies,” which was conducted under a grant from the Institutional Fund for the Long-term Strategic Development of Research Organisations, Ministry of Education, Youth and Sports, Czech Republic.Notes on contributorsOldrich BuresOldrich Bures is the founding director of the Center for Security Studies and Professor of International Political Relations at Metropolitan University Prague and Visiting Professor at University of South Wales.Alexandr BurilkovAlexander Burilkov is a research associate at Leuphana University of Lüneburg and External Research Fellow at the Center for Security Studies, Metropolitan University Prague.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
半半发布了新的文献求助10
刚刚
刚刚
李健应助双双采纳,获得10
刚刚
2秒前
李萌萌发布了新的文献求助10
2秒前
2秒前
完美世界应助张静怡采纳,获得10
3秒前
wanci应助DXXX采纳,获得10
3秒前
未晞完成签到,获得积分10
4秒前
5秒前
5秒前
韩思语发布了新的文献求助10
6秒前
乔乔发布了新的文献求助10
6秒前
8秒前
8秒前
zheng2001发布了新的文献求助10
9秒前
今后应助SpineLY采纳,获得10
10秒前
10秒前
刘丰铭发布了新的文献求助10
10秒前
Owen应助满意的柏柳采纳,获得10
11秒前
Lucas应助高青青采纳,获得10
11秒前
完美不惜完成签到,获得积分10
12秒前
yyl发布了新的文献求助10
12秒前
太清发布了新的文献求助10
13秒前
13秒前
16秒前
lovexy发布了新的文献求助10
16秒前
三七四十三完成签到,获得积分10
16秒前
大个应助Hopeful采纳,获得10
18秒前
个性的小笼包完成签到,获得积分10
19秒前
20秒前
20秒前
DXXX发布了新的文献求助10
20秒前
21秒前
21秒前
跳跃的洋葱完成签到 ,获得积分10
23秒前
23秒前
willie完成签到,获得积分10
23秒前
24秒前
24秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
An overview of orchard cover crop management 1000
二维材料在应力作用下的力学行为和层间耦合特性研究 600
Progress and Regression 400
A review of Order Plesiosauria, and the description of a new, opalised pliosauroid, Leptocleidus demoscyllus, from the early cretaceous of Coober Pedy, South Australia 400
National standards & grade-level outcomes for K-12 physical education 400
ACI SPEC 351.4 : 2024 Cementitious Grout Installation between Foundations and Equipment Bases—Specification 350
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 内科学 生物化学 物理 计算机科学 纳米技术 遗传学 基因 复合材料 化学工程 物理化学 病理 催化作用 免疫学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 4821181
求助须知:如何正确求助?哪些是违规求助? 4129540
关于积分的说明 12779494
捐赠科研通 3869407
什么是DOI,文献DOI怎么找? 2129111
邀请新用户注册赠送积分活动 1149727
关于科研通互助平台的介绍 1045973