TY - JOUR
T1 - What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note
AU - Gill, Paul
AU - Corner, Emily
AU - McKee, Amy
AU - Hitchen, Paul
AU - Betley, Paul
N1 - Publisher Copyright:
© 2019 Taylor & Francis.
PY - 2022
Y1 - 2022
N2 - This article contributes to the growing body of knowledge on lone-actor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.-based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor terrorists each demonstrated elements concerning (a) their grievance, (b) an escalation in their intent to act, (c) gaining capability—both psychologically and technically and (d) attack planning. The results also disaggregate our understanding of lone-actor terrorists in two ways. First, we compare the behaviors of the jihadist actors to those of the extreme-right. Second, we visualize Borum’s (2012) continuums of loneness, direction, and motivation. Collectively the results provide insight into the threat assessment and management of potential lone actors.
AB - This article contributes to the growing body of knowledge on lone-actor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.-based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor terrorists each demonstrated elements concerning (a) their grievance, (b) an escalation in their intent to act, (c) gaining capability—both psychologically and technically and (d) attack planning. The results also disaggregate our understanding of lone-actor terrorists in two ways. First, we compare the behaviors of the jihadist actors to those of the extreme-right. Second, we visualize Borum’s (2012) continuums of loneness, direction, and motivation. Collectively the results provide insight into the threat assessment and management of potential lone actors.
KW - Lone-actor terrorism
KW - closed sources
KW - risk assessment
KW - risk management
UR - http://www.scopus.com/inward/record.url?scp=85074695388&partnerID=8YFLogxK
U2 - 10.1080/09546553.2019.1668781
DO - 10.1080/09546553.2019.1668781
M3 - Article
SN - 0954-6553
VL - 34
SP - 113
EP - 130
JO - Terrorism and Political Violence
JF - Terrorism and Political Violence
IS - 1
ER -