2,173
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Geography, Globalization, and Terrorism: The Plots of Jemaah Islamiyah

Pages 505-530
Published online: 15 Sep 2008
 

Globalization and terrorism have become connected in many people's minds. I argue that the technologies of globalization, such as cheap transportation and telecommunications, do not in many circumstances liberate terrorist groups to attack throughout the world or necessarily grant them more power vis-à-vis states. In politically open environments, terrorist networks can behave much like legitimate jet-setting transnational organizations. When terrorist groups face state hostility, many of the tools of globalization become unavailable to them, and their activities become dependent on routes over any advantageous topographical features along states' boundaries, such as thick jungle, treacherous mountains, and tiny, isolated islands. This not only limits the territorial scope of the group's activities, but also means that the lack of these advantages can lead to failure. To illustrate this argument, I trace how the Southeast Asian terrorist group Jemaah Islamiyah (JI) planned two plots in 2000 and 2001: the Christmas Eve 2000 bombings in Indonesia, which succeeded, and the Singapore plots in 2001, which failed. The technologies of globalization were a great deal of help to JI during periods of political openness, but when it came under political pressure, the importance of geography and borders returned, particularly with regard to logistics.

Justin V. Hastings recently received a PhD in political science from the University of California, Berkeley. He is currently an assistant professor at the Georgia Institute of Technology's Sam Nunn School of International Affairs.

The author would like to thank the Public Policy and Nuclear Threats program of the University of California's Institute on Global Conflict and Cooperation, and the National Security Education Program for the funding that made the fieldwork for this paper possible. He also appreciates the comments of the two anonymous reviewers from Security Studies.

 

Related research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.