What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note

被引:23
作者
Gill, Paul [1 ]
Corner, Emily [1 ]
McKee, Amy [2 ]
Hitchen, Paul [2 ]
Betley, Paul [3 ]
机构
[1] UCL, Dept Secur & Crime Sci, 35 Tavistock Sq, London WC1H 9EZ, England
[2] Counter Terrorism Policing North West, Manchester, Lancs, England
[3] Hilton Grp, Manchester, Lancs, England
基金
欧洲研究理事会;
关键词
Lone-actor terrorism; closed sources; risk assessment; risk management; THREAT ASSESSMENT; WOLF TERRORISM; ATTACK; PATTERNS; DISORDER; VIOLENCE; WOLVES;
D O I
10.1080/09546553.2019.1668781
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
This article contributes to the growing body of knowledge on lone-actor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.-based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor terrorists each demonstrated elements concerning (a) their grievance, (b) an escalation in their intent to act, (c) gaining capability?both psychologically and technically and (d) attack planning. The results also disaggregate our understanding of lone-actor terrorists in two ways. First, we compare the behaviors of the jihadist actors to those of the extreme-right. Second, we visualize Borum?s (2012) continuums of loneness, direction, and motivation. Collectively the results provide insight into the threat assessment and management of potential lone actors.
引用
收藏
页码:113 / 130
页数:18
相关论文
共 65 条
[51]   How to (better) find a perpetrator in a haystack [J].
Neuman, Yair ;
Cohen, Yochai ;
Neuman, Yiftach .
JOURNAL OF BIG DATA, 2019, 6 (01)
[52]  
PANTUCCI R, 2011, TYPOLOGY LONE WOLVES, P19
[53]   Establishing a joint agency response to the threat of lone-actor grievance-fuelled violence [J].
Pathe, Michele T. ;
Haworth, Debbie J. ;
Goodwin, Terri-ann ;
Holman, Amanda G. ;
Amos, Stephen J. ;
Winterbourne, Paul ;
Day, Leanne .
JOURNAL OF FORENSIC PSYCHIATRY & PSYCHOLOGY, 2018, 29 (01) :37-52
[54]   Who is the Lone Terrorist? A Study of Vehicle-Borne Attackers in Israel and the West Bank [J].
Perry, Simon ;
Hasisi, Badi ;
Perry, Gali .
STUDIES IN CONFLICT & TERRORISM, 2018, 41 (11) :899-913
[55]   Deadlier in the US? On Lone Wolves, Terrorist Groups, and Attack Lethality [J].
Phillips, Brian J. .
TERRORISM AND POLITICAL VIOLENCE, 2017, 29 (03) :533-549
[56]   The Stagnation in Terrorism Research [J].
Sageman, Marc .
TERRORISM AND POLITICAL VIOLENCE, 2014, 26 (04) :565-580
[57]   Research on Terrorism, 2007-2016: A Review of Data, Methods, and Authorship [J].
Schuurman, Bart .
TERRORISM AND POLITICAL VIOLENCE, 2020, 32 (05) :1011-1026
[58]   Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis [J].
Schuurman, Bart ;
Bakker, Edwin ;
Gill, Paul ;
Bouhana, Noemie .
JOURNAL OF FORENSIC SCIENCES, 2018, 63 (04) :1191-1200
[59]   Foreshadowing targeted violence: Assessing leakage of intent by public mass murderers [J].
Silver, James ;
Horgan, John ;
Gill, Paul .
AGGRESSION AND VIOLENT BEHAVIOR, 2018, 38 :94-100
[60]  
Simon J., 2013, Lone Wolf Terrorism: Understanding The Growing Threat