1,212
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Terrorism as Process Narratives: A Study of Pre-Arrest Media Usage and the Emergence of Pathways to Engagement

&
Pages 1307-1326 | Published online: 11 Jul 2017
 

ABSTRACT

Terrorism is a highly irregular form of crime where multiple factors combine to create circumstances that are unique to each case of involvement, or attempted involvement, in terrorist violence. Yet, there are commonalities in the way in which efforts to become involved unfold as processes, reflected as sequential developments where different forces combine to create conditions where individuals seek to plan acts of violence. The best way to frame this involvement is through analytical approaches that highlight these procedural dimensions but are equally sensitive to the nuances of each case. Analysing pre-arrest media usage of convicted terrorists, this paper focuses on the ways in which belief pathways and operational pathways interact in five distinct cases of terrorist involvement in the UK in what are termed “process narratives.”

Notes

1. A. P. Schmid, “The Definition of Terrorism,” Routledge Handbook of Terrorism Studies (Abingdon, UK: Routledge, 2011); A. Richards, Conceptualising Terrorism (Oxford, UK: Oxford University Press, 2015).

2. C. Tilly, Contentious Performances (Cambridge, UK: Cambridge University Press, 2008); D. Della Porta, “Repertoires of Contention,” in The Wiley Blackwell Encyclopedia of Social and Political Movements, edited by David A. Snow, Donatella Della Porta, and Bert Klandermans (Hoboken, NJ: Wiley-Blackwell, 2013).

3. Networking, or social networking, it should be stressed is not limited to online realms. It also should not be confused with social network analysis, which dates back at least as far as the 1930s; e.g., J. L. Moreno, Who Shall Survive? Foundations of Sociometry, Group Psychotherapy and Sociodrama (Beacon, NY: Beacon House, [1934] 1953).

4. M. Taylor and J. Horgan, “A Conceptual Framework for Addressing Psychological Process in the Development of the Terrorist,” Terrorism and Political Violence 18, no. 4 (2006): 585–601.

5. C. Moore, “Foreign Bodies: Transnational Activism, the Insurgency in the North Caucasus and Beyond,” Terrorism and Political Violence 27, no. 3 (2015): 395–415.

6. Terrorism Act 2000. http://www.legislation.gov.uk/ukpga/2000/11/contents. As of January 2017; Terrorism Act 2006. http://www.legislation.gov.uk/ukpga/2006/11/contents. As of January, 2017.

8. Taylor and Horgan (see note 4 above).

9. M. B. Kelly, “A Review of Academic Permanent-Product Data Collection and Reliability Procedures in Applied Behavior Analysis Research,” Journal of Applied Behavior Analysis 9, no. 2 (1976): 211.

10. Taylor and Horgan (see note 4 above): 586.

11. M. Sageman, Understanding Terror Networks (Philadelphia, PA: University of Pennsylvania Press, 2004); J. Horgan, Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements (Abingdon: Routledge, 2009); A. W. Kruglanski and S. Fishman, “The Psychology of Terrorism: ‘Syndrome’ versus ‘Tool’ Perspectives,” Terrorism and Political Violence 18, no. 2 (2006): 193–215.

12. R. Borum, “Radicalization into Violent Extremism I: A Review of Social Science Theories,” Journal of Strategic Security 4, no. 4 (2011a): 7–36, 15.

13. Ibid.

14. R. Borum, “Understanding the Terrorist Mindset,” FBI Law Enforcement Bulletin 72, no. 7 (2003): 7–10; R. Borum, “Radicalization into Violent Extremism II: A Review of Conceptual Models and Empirical Research,” Journal of Strategic Security 4, no. 4 (2011b): 37–62; O. L. Georgeon, J. H. Morgan, J. Horgan, and K. Braddock, 2010, “Process Modeling for the Study of Non-State Political Violence,” https://liris.cnrs.fr/abstract/GeorgeonO-BRIMS2010.pdf. As of January 2017; A. P. Schmid, “Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review,” ICCT Research Paper, 2013) The Hague, March; F. M. Moghaddam, “The Staircase to Terrorism: A Psychological Exploration,” American Psychologist 60 (2005): 161–9; C. McCauley and S. Moskalenko, “Mechanisms of Political Radicalization: Pathways toward Terrorism,” Terrorism and Political Violence 20, no. 3 (2008): 415–33.

15. L. Rambo, Understanding Religious Conversions (New Haven, CT: Yale University Press, 1993).

16. D. S. Byrne, Complexity Theory and the Social Sciences: An Introduction (Abingdon, UK1`1: Routledge, 1998).

17. N. K. Hayles, Chaos and Order (Chicago, IL: University of Chicago Press, 1991).

18. Byrne (see note 16 above), 14.

19. M. Taylor, “Criminogenic Qualities of the Internet,” Dynamics of Asymmetric Conflict 8, no. 2 (2015): 97–106.

20. C. Mesjasz, “Complex System Studies and Terrorism,” in Conflict and Complexity Countering Terrorism, Insurgency, Ethnic and Regional Violence, edited by P. Fellman, Y. Bar-Yam, and A. A. Minai (New York: Springer, 2015): 43.

21. Taylor and Horgan (see note 4 above): 586–7, emphasis added.

22. D. Della Porta, Social Movements Political Violence, and the State: A Comparative Analysis of Italy and Germany (Cambridge, UK: Cambridge University Press, 1995).

23. Taylor and Horgan (see note 4 above): 593.

24. Borum (see note 12 above [2011a]): 9.

25. C. McCauley and S. Moskalenko, “Toward a Profile of Lone Wolf Terrorists: What Moves an Individual form Radical Opinion to Radical Action,” Terrorism and Political Violence 26, no. 1 (2014): 69–85.

26. Quintan Wiktorowicz, ed., Islamic Activism: A Social Movement Theory Approach (Bloomington, IN: Indiana University Press, 2004).

27. P. H. Wikström and N. Bouhana, “Analyzing Radicalization and Terrorism: A Situational Action Theory,” in The Handbook of the Criminology of Terrorism, edited by G. LaFree and J. D. Freilich (Hoboken, NJ: Wiley-Blackwell, 2016).

28. D. B. Cornish and R. V. Clarke, Introduction to The Reasoning Criminal: Rational Choice Perspectives on Offending (New Brunswick, NJ: Transaction, 2014), 2.

29. Home Office, 2012, “Channel Guidance,” https://www.gov.uk/government/publications/channel-guidance (accessed February 2017).

30. D. Hebdige, “Subculture: The Meaning of Style,” in The Subcultures Reader, 2nd ed., edited by K. Gelder (New York: Routledge, 2005), 121–32 .

31. Alex P. Schmid and Janny de Graaf, Violence as Communication: Insurgent Terrorism and the Western News Media (London: Sage, 1982).

32. McCauley and Moskalenko (see note 25 above).

33. T. Shibutani, “Reference Groups as Perspectives,” American Journal of Sociology 60, no. 6 (May 1955): 562–9.

34. McCauley and Moskalenko (see note 25 above).

35. G. Ramsay, Jihadi Culture on the World Wide Web (New York: Bloomsbury, 2014).

36. Intelligence and Security Committee of Parliament (2014), “Report on the Intelligence Relating to the Murder of Fusilier Lee Rigby,” Her Majesty’s Stationery Office, London.

37. See e.g. I. McCulloh and M. C. Kathleen, “Detecting Change in Longitudinal Social Networks,” Journal of Social Structure 12, no. 3 (2011).

38. J. M. Darley and B. Latane, “Bystander Intervention in Emergencies: Diffusion of Responsibility,” Journal of Personality and Social Psychology 8 (1968): 377–83; S. M. Garcia, W. Kim, G. B. Moskowitz, and J. M. Darley, “Crowded Minds: The Implicit Bystander Effect,” Journal of Personality and Social Psychology 83, no. 4 (2002): 843–53; B. Latane and J. M. Darley, “Group Inhibition of Bystander Intervention,” Journal of Personality and Social Psychology 10 (1968): 215–21; B. Latane and S. Nida, “Ten Years of Research on Group Size and Helping,” Psychological Bulletin 89 (1981), 308–24; M. Scully and M. Rowe, “Bystander Training within Organizations,” Journal of the International Ombudsman Association 2, no. 1 (2009): 89–96.

39. P. Gill, J. Horgan, and P. Deckert, “Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists,” Journal of Forensic Sciences 59, no. 2 (2014, March); P. Gill, Lone-Actor Terrorists: A Behavioural Analysis (Abingdon, UK: Routledge, 2015).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 425.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.