Improvised Explosive Devices: Assessing the Global Risk for Use in Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Improvised Explosive Devices: Assessing the Global Risk for Use in Terrorism Improvised Explosive Devices: Assessing the Global Risk For Use In Terrorism by Michael A. Santaspirt A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey In partial fulfillment of the requirements for the degree of Doctor of Philosophy in Global Affairs Written under the direction of Dr. Leslie W. Kennedy and approved by ________________________ ________________________ ________________________ ________________________ Newark, New Jersey May 2020 © 2020 MICHAEL A. SANTASPIRT ALL RIGHTS RESERVED ABSTRACT Improvised Explosive Devices: Assessing the Global Risk For Use in Terrorism By MICHAEL A. SANTASPIRT Dissertation Director: Leslie W. Kennedy Purpose: The purpose of this study is to investigate the risk of Improvised Explosive Device (IED) employment at the national level, the subnational level, and the street level, and to investigate innovative applications of Risk Terrain Modeling for IED risk analyses across these different levels of study. Methods: This study utilizes three separate applications of the Risk Terrain Modeling technique to determine the risk of IED emplacement at three separate analysis extents. Each level of analysis utilizes Geographic Information Systems to build composite risk maps from different types of risk factors that are associated with IED emplacement. Multivariate regression analysis is used to determine the association and significance of the risk factors as they relate to the outcome events. Results: Composited global level risk factors associated with permissive environments are positively associated with increased IED emplacements. Countries at highest risk of IED emplacements, as determined by the global level model, can be composited with areas of operation for terrorist groups and densely populated areas to identify microplaces for further study. Those microplaces can be assessed for risk using RTMDx. Conclusions: The present study established a link between country level risk factors related to permissive environments enabled by state fragility and IED emplacements at the street level. As such, there are policy implications for strategic action to reduce state fragility and the establishment of permissive environments to curtail explosive violence. Furthermore, the identification of risky areas for IED emplacement can drive risk reduction techniques at all three levels of analysis. Keywords: Improvised Explosive Devices, Crime, Terrorism, Risk, Risk Terrain Modeling ii ACKNOWLDEGMENTS I am grateful to all that assisted in the creation of this work for the support that they provided along the way. I am especially thankful for my committee for the genuine interest that they showed in this work and for the many, many insightful suggestions that they made. In particular, I am thankful for the advice and guidance of Les Kennedy, my advisor, for his patience, understanding, and critical eye. I am thankful for the assistance of Joel Caplan, Norm Samuels, and Grant Drawve, my committee members, who were always available and willing to read another draft, or to look at another map, or to provide another article that I may not have seen yet. The work that they have done in support of the techniques used in this study is exciting and novel, and I’m very much looking forward to its continued evolution and adoption. I would also like to thank Alex Giménez-Santana, who provided excellent support with RTMDx and its many features. I am further thankful for the guidance of Tim Carey, my mentor, for insisting that I take on this challenge, and for the support of my friends and colleagues at the US Army who provided emotional and material backing. I am finally thankful for my family. For my parents who conditioned me to continue to work through adversity, for my brothers who always challenged me to be better, and especially for my wife, Christina, and for my children, Alyssa and Chase, for enduring this with me and never wavering in their support – thank you all. iii TABLE OF CONTENTS ABSTRACT ........................................................................................................................ ii ACKNOWLDEGMENTS ................................................................................................. iii TABLE OF CONTENTS ................................................................................................... iv LIST OF TABLES .............................................................................................................. v LIST OF FIGURES ........................................................................................................... vi CHAPTER 1: INTRODUCTION ....................................................................................... 1 CHAPTER 2: LITERATURE REVIEW ............................................................................ 8 CHAPTER 3: METHODOLOGY .................................................................................... 60 CHAPTER 4: RESULTS .................................................................................................. 85 CHAPTER 5: SUMMARY AND CONCLUSIONS ...................................................... 127 REFERENCES ............................................................................................................... 140 iv LIST OF TABLES Table 1: Descriptive Statistics for IED Events in 2015 .................................................... 87 Table 2: Correlation of Risk Factors to Outcome Events ............................................... 104 Table 3: Ordinary Least Square Regression for Risk Score and IED Events, 2015 ....... 105 Table 4: F-Test Two Sample for Variances for Risk Score and IED Events, 2015 ....... 105 Table 5: t-Test: Two-Sample Assuming Unequal Variances for Risk Score and IED Events, 2015 .................................................................................................................... 106 Table 6: JMP Prediction Profiler for Risk Score, 2015 .................................................. 107 Table 7: Ordinary Least Squares Regression for 2015 Risk Score and 2016 IED Events to Determine Predictive Validity ........................................................................................ 107 Table 8: RTMDx Output for Relative Risk Factor Value in Kabul, 2015 ...................... 119 v LIST OF FIGURES Figure 1: IEDs made from military grade munitions (source: Wikipedia) ....................... 15 Figure 2: IEDs utilizing homemade explosives in plastic containers (source: SPC Ian Schell, US Army) .............................................................................................................. 17 Figure 3: Bomb Threat Stand-off Card (source: National Counterterrorism Center) ....... 77 Figure 4: PAI Formula ...................................................................................................... 81 Figure 5: IED Events, 2015 .............................................................................................. 86 Figure 6: Global Base Map ............................................................................................... 88 Figure 7: Global Base Map without Internal Boundaries ................................................. 90 Figure 8: Kabul Base Map ................................................................................................ 91 Figure 9: Casablanca Base Map ........................................................................................ 92 Figure 10: Countries with Terrorist Organizations Operating Within Their Borders, 2015 ........................................................................................................................................... 94 Figure 11: Countries with Interstate Violence, 2015 ........................................................ 96 Figure 12: Countries with Non-State Violence, 2015 ....................................................... 97 Figure 13: Countries with One-Sided Violence, 2015 ...................................................... 98 Figure 14: Countries Scoring More Than 90 Points in the Fragile States Index, 2015 .. 100 Figure 15: The Global Risk of IEDs, 2015 ..................................................................... 101 Figure 16: Highest Risk Countries, 2015 ........................................................................ 102 Figure 17: Highest Risk Countries (Detail), 2015 .......................................................... 103 Figure 18: Population Density, 2015 .............................................................................. 109 Figure 19: Example of Terrorist Operational Area Map for Al-Qa’ida (source: National Counterterrorism Center) ................................................................................................ 110 Figure 20: Example of Terrorist Operational Area Map for Lord’s Resistance Army (source: National Counterterrorism Center) ................................................................... 111 Figure 21: Terrorist Group Operational Areas, 2015...................................................... 112 Figure 22: Terrorist Group Operational Areas (Detail), 2015 ........................................ 113 Figure 23: Composite Risk Map of Terrorist Operational Areas and Densely Populated Areas in Highest Risk Countries, 2015 ........................................................................... 114 Figure 24: Composite Risk Map of Terrorist Operational Areas and Densely Populated Areas in Highest Risk Countries (Detail), 2015 ............................................................
Recommended publications
  • Bombing! Incidents by Target 1978-1987 10-YEAR TARGET % YEARLY GRAND TOTALIRANI{ 1978 1979 1980 1981 1982 1983 1984 1985 I 1986 1987 TOTAL TOTAL Residential
    If you have issues viewing or accessing this file contact us at NCJRS.gov. ..• I .....-. • - ... --. 8 i i II' .- , ,. ... • .,1 ,. '. ~ I .,...-.., .. ·.i~1~~ D ... IIJ • I • -e '"• "';:.~ 111 .. -- - ;.,;; '(', ' .. ~. '1'. .. ~ ;~'E·~"~';""">·'\.':;··"'~:""',*"f~·'1~.";' ~'I:{~~~ 121008 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from ·the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official pOl'ition or policies of the National Institute of Justice. Permission to reproduce this c~g~qmaterial has been granted by ". Public Domain/Bur. of Alcohol, Tobacco & Firearms/US Dept. of llh~ffam,};1fc¥iminal Justice Reference Service (NCJRS). Further rep=~utslde of the NCJRS system requires permis- sion of the . wner. Cover: On January 12, 1987, an explosive device detonated between the front and rear seats of a Beechcraft aircraft while it was parked at the Osceola Municipal Allport, Osceola,'Arkansas. A TF assistance was requested by the Osceola Police Department. ATF responded to the scene and conducted a crime scene search. A joint investigation by ATF, the Arkansas State Police, and the Osceola Police Department ensued. A preliminary investigation revealed that a destructive device consisting of suspected dynamite had been placed inside the aircraft. The explosion caused damages estimated at $10,000 but no injuries. On February 12, 1987, a second explosive device.detonated inside the passenger compartment of another private aircraft at the Osceola airport. There were no deaths or ~uries, but damages were estimated at $15,000.
    [Show full text]
  • Explosive Device Response Operations
    EXPLOSIVE DEVICE RESPONSE OPERATIONS Capability Definition Explosive Device Response Operations is the capability to coordinate, direct, and conduct improvised explosive device (IED) response after initial alert and notification. Coordinate intelligence fusion and RESPOND MISSION: EXPLOSIVE DE analysis, information collection, and threat recognition, assess the situation and conduct appropriate Render Safe Procedures (RSP). Conduct searches for additional devices and coordinate overall efforts to mitigate chemical, biological, radiological, nuclear, and explosive (CBRNE) threat to the incident site. Outcome Threat assessments are conducted, the explosive and/or hazardous devices are rendered safe, and the area is cleared of hazards. Measures are implemented in the following priority order: ensure public safety; safeguard the officers on the scene (including the bomb technician); collect and preserve evidence; protect and preserve public and private property; and restore public services. Relationship to National Response Plan Emergency Support Function (ESF)/Annex This capability supports the following Emergency Support Functions (ESFs): Terrorism Incident Law Enforcement and Investigation Annex ESF #10: Oil and Hazardous Materials Response ESF #13: Public Safety and Security VICE RESPONSE OPERATIONS Preparedness Tasks and Measures/Metrics Activity: Develop and Maintain Plans, Procedures, Programs, and Systems Critical Tasks Res.B2c 1.1 Develop, distribute, and maintain National Guidelines for Bomb Technicians Develop effective procedures
    [Show full text]
  • Bombs and Terrorism for Patrol Course Outline
    Bombs and Terrorism for Patrol San Bernardino County Sheriff’s Department Expanded Course Outline I. Orientation and Overview A. Paperwork 1. Distribute POST roster 2. Distribute networking or regional attendance roster B. Housekeeping 1. Facility review and identify restrooms and emergency exits 2. Review breaks including breakroom and/or vending machines C. Introductions 1. Instructor and staff introductions 2. Student introductions D. Overview 1. Overview of the key learning outcomes of the class 2. Review of student and instructor expectations of the course E. Learning Activity and Student Assessment #1 - Student Experience 1. Students will individually complete an assessment questionnaire to determine their professional level experience with bombs and terrorism. 2. Upon completion of the questionnaire, students will review questions and answers using the questionnaire as a process of self-assessment for their prior knowledge related to bombs and terrorism. 3. Students will individually introduce themselves and indicate their level of experience in law enforcement and any related experience in dealing with bombs, explosives and terrorism related topics. 4. Students will also describe their level of responsibility as well as any previous training in bombs and terrorism courses they have completed. F. Key Takeaways 1. Officer safety Bombs and Terrorism for Patrol San Bernardino County Sheriff’s Department Expanded Course Outline 2. Better situational awareness 3. Current threats in the world II. Bombing Basics A. History 1. Brief history of criminal bombings 2. Recent criminal bombing incidents B. An overview of improvised explosive devices (IED) used by terrorists 1. Definitions 2. Essential components of an explosive device 1. Initiator 3.
    [Show full text]
  • Effective Risk Communications for the Counter Improvised Explosive Devices Threat: Volume I
    � � ��������������������������������������� � �������������������������������������������� � ���������������������������������������������������� ������������������������������������������ � ��������� Principal Investigator Vincent Covello, Ph.D. Co-Principal Investigators Steven Becker, Ph.D. Michael Palenchar, Ph.D. Ortwin Renn, Ph.D. Piet Sellke Support Team Theodore Tzavellas Paul Morrell Mark Pfeifle Alex Tzavellas Rachael Bynum December 2010 The U.S. Department of Homeland Security (DHS), Science and Technology Directorate, Human Factors/Behavioral Sciences Division provided support for this project under a contract (HSHQDC-10-C-0022) awarded to S4 Inc. for “Effective Risk Communications for the Counter Improvised Explosive Devices Threat”. S4 Inc. 8 NE Executive Park Suite 180 Burlington, MA 01803 703-418-0040 1 INTRODUCTION The goal of this project was to review the risk communication literature to identify effective methods for government officials and civic leaders to warn and instruct the public on appropriate actions to take before, during, and after a terrorist attack using an improvised explosive device (IED). The ultimate goal of DHS is to enhance the preparedness, safety, and resilience of the American people against the threat posed by improvised IEDs. This document consists of two volumes. Volume I reports the findings of the literature review as well as the findings from a conference of experts from government, academia, and industry conducted in September 2010. Volume II contains detailed research reports and supporting
    [Show full text]
  • Securing Transportation Assets & Operations
    Securing Transportation Assets & Operations Mitigation Strategies for Highway Modes INTRODUCTION The Transportation Security Administration (TSA) Highway and Motor Carrier (HMC) Section and the Bus Industry Safety Council (BISC) collaborated with multiple HMC stakeholders to create this security guidance, which serves to enhance security awareness among the industry. This guidance offers useful information, tips, and tools to strengthen the industry’s resistance to disruption of its critical services. It contains viable options for consideration, but these recommended measures are not required by TSA or the Department of Homeland Security (DHS). TSA does not intend for the information in this document to conflict with or supersede existing regulatory requirements, statutory requirements, or laws. Furthermore, stakeholders using this guidance should ensure practices align with company/organizational policies and protocols prior to implementation. While many of the security practices published in this document apply to all elements of the HMC community (i.e., trucking, commercial and school passenger carriers, and infrastructure), some meet only the needs of a specific stakeholder element. Where those circumstances occur, this guide attempts to note the exceptions. If you have questions, comments, or suggestions about the content of this document, please contact TSA at [email protected]. PLEASE NOTE: Always call 911 in the event of an emergency or immediate danger. Always follow organizational procedures, and when in doubt, err
    [Show full text]
  • Examining the Suicide Terror Movement in Afghanistan Matthew Dearing1
    The Culture & Conflict Review Vol. 2, No. 3, Summer 2008 Examining the Suicide Terror Movement in Afghanistan Matthew Dearing1 “When you do not have guns or bomber planes then your body is the only weapon that you use to resist people killing your families.”2 What is behind the surge of Improvised Explosive Devices (IED) and suicide attacks in Afghanistan? Suicide attacks in particular are a recent phenomenon in Afghanistan, increasing by 42 percent from 2006 to 2007.3 This article will examine some of the factors behind the increasing use of suicide and IED attacks as tactics of unconventional warfare in Afghanistan. It will analyze the strategic environment in which these types of operations are used and provide some policy recommendations for countering future IED attacks. It is important to understand that unconventional warfare is a “strategy of necessity” for the weaker side in an insurgency.4 As an asymmetric warfare tactic, suicide terrorism provides incentives for insurgents. In Afghanistan, IED and suicide missions are founded upon three fundamental aims – to compel the United States and ISAF to leave the perceived homeland of Pashtuns, to undermine the legitimacy of the U.S. backed government in Kabul, and to create a desperate environment that provides little alternative but to join the suicide jihad movement. While current evidence shows the Taliban have been only slightly successful in changing perceptions, the momentum could easily shift to their advantage. Current Events & Trends Recent attacks have been the most violent since U.S. operations began in 2001. On February 17, 2008, more than 100 Afghans were killed when a suicide bomber detonated his explosives vest at a dog-fighting match, targeting the chief 1 Matthew Dearing is a Research Associate with the Program for Culture & Conflict Studies.
    [Show full text]
  • Report on Incidents of Terrorism 2005
    National Counterterrorism Center Report on Incidents of Terrorism 2005 11 April 2006 NCTC Report on Incidents of Terrorism 2005 This page intentionally left blank i NCTC Report on Incidents of Terrorism 2005 FOREWORD: Consistent with its statutory mission to serve as the U.S. Government's knowledge bank on international terrorism, the National Counterterrorism Center (NCTC) is providing this report and statistical information to assist academics, policy makers and the public in understanding the data. The statistical information included in this report is drawn from the data NCTC maintains on the www.nctc.gov website. The report includes the following: -- this Foreword, which provides important context for the contents of this report; -- a methodology section that explains how the data was compiled and the inherent limitations of the data; -- NCTC observations related to the terrorism incident statistical material; -- statistical charts and graphs; and -- summaries of high fatality incidents during 2005 Section 2656f(b) of Title 22 of the U.S. Code requires the State Department to include in its annual report on terrorism "to the extent practicable, complete statistical information on the number of individuals, including United States citizens and dual nationals, killed, injured, or kidnapped by each terrorist group during the preceding calendar year." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each incident involving killings, kidnappings, and injuries is significantly limited by the availability of reliable open source information, particularly for events involving small numbers of casualties. The statistical material compiled in this report, therefore, is drawn from the number of incidents of "terrorism" that occurred in 2005, which is the closest figure that is practicable for NCTC to supply in satisfaction of the above-referenced statistical requirements.
    [Show full text]
  • Explosives Recognition and Response for First Responders
    Explosives Recognition and Response for First Responders I. Training Briefing A. A brief history of the civilian Bomb Squads in the United States. 1. Hazardous Devices School: began official training of all civilian Bomb Technicians in 1971. a. Butte County has had an accredited Bomb Squad since the early 1990’s. (1) Information about the current members. 2. Training requirements for Bomb Technicians B. Overview of training. 1. Commercial explosives, military ordnance, Improvised Explosive Devices (IEDs), statutes and response to possible explosives related incident. II. Chemical Explosives A. Rapid conversion of a solid or liquid explosive compound into gases. 1. Explosion - a rapid form of combustion. 2. The speed of the burning reaction constitutes the difference between combustion, explosion, and detonation. a. Detonation is defined as instantaneous combustion. B. Effects of an explosion 1. Blast Pressure a. Detonation produces expanding gases in a period of 1/10,000 of a second and reaches velocities of up to 13,000 mile per hour, producing 700 tons of pressure per square inch. b. The blast front will vaporize flesh and bone and pulverize concrete. c. Mass of expanding gas rolls outward in a spherical pattern like a giant wave. 2. Fragmentation a. Pipe bomb will reach about the same velocity as a military rifle bullet - approximately 2,700 feet per second. 3. Incendiary Thermal Effect a. High explosives will reach temperatures of about 8,000 degrees F. C. Explosives 1. Classification a. Low Explosives (1) Deflagrate (burn) rather than detonate (a) Burning is transmitted from one grain to the next Training OuTline 1 (2) Initiated by a flame/safety fuse (3) Primarily used as propellants and have pushing or heaving effect (4) Black powder/smokeless powder (5) Must be confined to explode (6) Burning rate of under 3,280 fps b.
    [Show full text]
  • Explosive Weapons Use in Syria, Report 4 Northeast Syria: Al Hassakeh, Ar Raqqa, and Deir Ez Zor Governorates
    The Carter Center Explosive Weapons Use in Syria, Report 4 Northeast Syria: Al Hassakeh, Ar Raqqa, and Deir Ez Zor Governorates Syria Conflict Mapping Project November 2020 0 Explosive Weapons Use in Syria | Report 4 Table of Contents Executive Summary .................................................................................................................................... 2 Introduction ................................................................................................................................................. 3 Main Study .................................................................................................................................................. 5 Al Hassakeh Governorate .......................................................................................................................... 8 Ar Raqqa Governorate ............................................................................................................................. 12 Deir Ez Zor Governorate ......................................................................................................................... 16 Conclusion ................................................................................................................................................. 20 Appendix - Terminology ........................................................................................................................... 22 1 Explosive Weapons Use in Syria | Report 4 Executive Summary • This nontechnical study aims
    [Show full text]
  • The Impact of Ieds on the Humanitarian Space in Afghanistan the Impact of Ieds on the Humanitarian Space in Afghanistan
    Research Paper Hannah Bryce and Henry Dodd International Security | April 2015 The Impact of IEDs on the Humanitarian Space in Afghanistan The Impact of IEDs on the Humanitarian Space in Afghanistan Summary Improvised explosive devices (IEDs) are an increasingly common feature of conflicts around the world. Consequently, they pose a growing threat to humanitarian organizations operating in conflict environments. While their impact on civilians and military operations is well documented, there has been little research on their specific impact on humanitarian operations and on those who undertake them. This paper considers the features of IEDs that distinguish them from other threats facing humanitarians and how their use may indicate a more fundamental challenge to the humanitarian sector: the erosion of the principles of neutrality and impartiality owing to the increasing militarization and politicization of humanitarian aid. Using the specific example of their effects in Afghanistan, this paper assesses the risks IEDs pose and highlights the negative impacts on humanitarian operations that measures used to mitigate this risk can have. • IEDs pose an unpredictable threat that is not confined to traditional battlefields and is difficult to mitigate. This research considers both IED attacks where humanitarian organizations are deliberately targeted and situations where they are inadvertently caught up in an attack. Since IEDs often cause blast and fragmentation to be projected over a wide area, the risk of harm beyond the immediate target is greater than with other forms of violence such as small arms fire. This risk of being accidentally or indirectly affected means that IEDs create uncertainty for humanitarian operations.
    [Show full text]
  • Landmine and Explosive Remnants of War Safety Handbook
    LANDMINES, EXPLOSIVE REMNANTS OF WAR AND IED SAFETY HANDBOOK 1 THE UNITED NATIONS AND CONTRIBUTING ORGANIZATIONS SHALL NOT BE HELD RESPONSIBLE FOR DEATHS OR INJURIES TO PERSONNEL AND/OR DAMAGE TO PROPERTY THAT MAY RESULT FROM THE USE OF THIS HANDBOOK. Any comments or questions concerning this handbook may be addressed to: United Nations Mine Action Service (UNMAS) New York, NY 10017 USA E-mail: [email protected] Website: www.mineaction.org © United Nations 2015 (3rd Edition) All rights reserved COVER PHOTOS Background, UN Photo / Iason Foounten Miner, UNMAS Photo / Marc Vaillant MINE ICONS Cover & Pages 8, 9, 36, 37, 56, 57, 76, 77, 88, 89, 96, 97 Critical Mass EDITOR Thomas Enke DESIGN & LAYOUT Mackenzie Crone UNITED NATIONS LANDMINES, EXPLOSIVE REMNANTS of WAR and IMPROVISED EXPLOSIVE DEVICES SAFETY HANDBOOK United Nations United Nations Mine Action Service (UNMAS) New York, NY 10017 USA E-mail: [email protected] Website: www.mineaction.org A manual for people working in environments contaminated by landmines and other explosive hazards including improvised explosive devices. 1 TABLE OF CONTENTS Acknowledgements 5 Introduction 6 1 The threat 9 1.1 Landmines 11 1.2 Unexploded ordnance 19 1.3 Abandoned ordnance 32 1.4 Improvised explosive devices and booby traps 33 37 2 Recognizing dangerous areas 2.1 Warning signs 38 2.2 Warning clues 42 2.3 Signs of fighting or military activity 45 2.4 Signs in the environment, dead animals and unusual objects 49 2.5 Local behaviour 53 3 Basic safety advice 57 3.1 Risk-taking behaviour 59 3.2 Common
    [Show full text]
  • The Effect of Assassinations on Institutions and War
    Hit or Miss? The Effect of Assassinations on Institutions and War By Benjamin F. Jones and Benjamin A. Olken* Assassinations are a persistent feature of the political landscape. Using a new data set of assassination attempts on all world leaders from 1875 to 2004, we exploit inherent randomness in the success or failure of assassination attempts to identify assassination’s effects. We find that, on average, successful assassinations of autocrats produce sustained moves toward democracy. We also find that assassinations affect the intensity of small-scale conflicts. The results document a contemporary source of institutional change, inform theories of conflict, and show that small sources of randomness can have a pronounced effect on history. “Assassination has never changed the history of the world.” - Benjamin Disraeli, 1865, on the death of Abraham Lincoln Assassinations of prominent political leaders have occurred throughout history. From Julius Caesar to Abraham Lincoln, from John F. Kennedy to Yitzhak Rabin, many leaders have met violent ends – and many others have escaped assassination narrowly. Had Hitler lingered 13 minutes longer in a Munich beer hall in 1939, he would likely have been killed by a waiting bomb. Whether or not objectionable, or illegal,1 assassination and assassination attempts are a persistent feature of the political landscape. In fact, as we will show below, a national leader has been assassinated in nearly two of every three years since 1950. * Jones: Kellogg School of Management, 2001 Sheridan Road, Evanston, IL 60614 (email: [email protected]); Olken: MIT Department of Economics, 50 Memorial Drive, Cambridge, MA 02142 (email: [email protected]).
    [Show full text]