Leaking in terrorist attacks: A review*

被引:13
作者
Dudenhoefer, Anne-Lynn [1 ]
Niesse, Charlotte [2 ]
Goergen, Thomas [2 ]
Tampe, Laura [1 ]
Megler, Marcella [2 ]
Groepler, Christina [1 ]
Bondue, Rebecca [1 ]
机构
[1] Psychol Hsch Berlin, Kolln Pk 2, D-10179 Berlin, Germany
[2] Deutsch Hsch Polizei, Munster, Germany
关键词
Terrorism; Leaking; Warning signs; Prevention; Risk assessment; WEAK SIGNALS; VIOLENCE; BEHAVIORS; HINDSIGHT; EXTREMISM; SCHOOLS; LEAKAGE; RISK;
D O I
10.1016/j.avb.2021.101582
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
In the recent past, the numbers of religiously- and politically-motivated terrorist attacks have increased, inevitably raising the question of effective measures to prevent further terrorist attacks. Empirical studies related to school shootings have shown that school shooters reliably (directly and indirectly) disclosed their intentions or plans prior to the attack, a phenomenon termed leaking or leakage. Leaking has been used for preventive purposes in this area of research. Recent research has indicated that leaking was also present prior to politically and religiously motivated terrorist attacks. In order to determine the current state of knowledge about leaking related to these offenses, we conducted a review of the international literature on religiously and politically motivated terrorist attacks. Up to 90% of the offenders showed some type of leaking prior to the attacks. A range of different forms of leaking could be observed. Leaking often occurred in the form of verbal communication with family and friends and/or via communication over the Internet. Terrorist offenders apparently tend to show leaking more often than other groups of mass murderers. Findings regarding similarities and dissimilarities in leaking between religiously motivated, jihadist and politically-motivated, far-right terrorist attacks were contradictory. We discuss the implications of these findings for practice and research as well as the strengths and possible weaknesses of the leaking concept.
引用
收藏
页数:12
相关论文
共 97 条
[1]  
Amman M., 2017, Making prevention a reality: Identifying, assessing, and managing the threats of targeted attacks
[2]  
[Anonymous], 2017, Security and Human Rights
[3]  
Band S.R., 1999, FBI LAW ENFOR BULL, V68, P9
[4]   Challenging the "Lone Wolf" Phenomenon in an Era of Information Overload [J].
Barnea, Avner .
INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2018, 31 (02) :217-234
[5]   The Impact of the Bystander's Relationship With the Victim and the Perpetrator on Intent to Help in Situations Involving Sexual Violence [J].
Bennett, Sidney ;
Banyard, Victoria L. ;
Edwards, Katie M. .
JOURNAL OF INTERPERSONAL VIOLENCE, 2017, 32 (05) :682-702
[6]  
Bergen Peter, 2016, New America
[7]  
Bockler N., 2015, J THREAT ASSESSMENT, V2, P153, DOI DOI 10.1037/TAM0000045
[8]  
Bockler N., 2017, Kriminalistik, V8, P497
[9]  
Bockler Nils, 2018, Int J Dev Sci, V12, P5, DOI 10.3233/DEV-180255
[10]  
Böckler N, 2017, VIOLENCE GEND, V4, P73, DOI 10.1089/vio.2017.0040