840
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

Behavior Associations in Lone-Actor Terrorists

ORCID Icon, ORCID Icon & ORCID Icon
Pages 1386-1414 | Published online: 20 Aug 2020
 

ABSTRACT

Terrorist attacks carried out by individuals have significantly accelerated over the last twenty years. This type of lone-actor (LA) terrorism stands as one of the greatest security threats of our time. While the research on LA behavior and characteristics has produced valuable information on demographics, classifications, and warning signs, the relationship among these characteristics is yet to be addressed. Moreover, the means of radicalization and attacking have changed over decades. This study conducts an a-posteriori analysis of the temporal changes in LA terrorism and behavioral associations in LAs. We initially identify twenty-five binary behavioral characteristics of LAs and analyze 190 LAs. Next, we classify LAs according to ideology first, incident-scene behavior (determined via a virtual attacker-defender game) secondly, and, finally, the clusters obtained from the data. In addition, within each class, statistically significant associations and temporal relations are extracted using the A-priori algorithm. These associations would be instrumental in identifying the attacker’s type and intervening at the right time. The results indicate that while pre-9/11 LAs were mostly radicalized by the people in their environment, post-9/11 LAs are more diverse. Furthermore, association chains for different LA types present unique characteristic pathways to violence and after-attack behavior.

Correction Statement

This article has been corrected with minor changes. These changes do not impact the academic content of the article.

Notes

1. Gary LaFree and Joshua D. Freilich, “Bringing Criminology into the Study of Terrorism,” in The Handbook of Criminology of Terrorism, edited by Gary LaFree, and Joshua D. Freilich, (West Sussex: Wiley-Blackwell, 2017), 3–14.

2. Ramon Spaaij, “The Enigma of Lone Wolf Terrorism: An Assessment,” Studies in Conflict & Terrorism 33, no. 9 (2010): 854–870.

3. Natasha Quek, Growing Threat of White Supremacists (RSIS Commentaries. Singapore: Nanyang Technological University, 2019), 4.

4. Rafaello Pantucci, Claire Ellis, and Lorien Chaplais, “Lone-Actor Terrorism Literature Review,” Countering Lone-Actor Terrorism Series No. 1, (Royal United Service Institute for Defense and Security Studies, 2015).

5. Martin Durham, “Preparing for Armageddon: Citizen Militias, the Patriot Movement and the Oklahoma City Bombing,” Terrorism and Political Violence 8, no. 1, (2007): 65–79.

6. Spaaij, “Enigma,” 856. (see Note 2 above).

7. Paul Gill, John Horgan, and Paige Deckert, “Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists,” Journal of Forensic Sciences 59, no. 2 (2014): 425–435.

8. Spaaij, “Enigma,” 856.

9. Gill, Horgan, and Deckert, “Bombing Alone,” 434.

10. Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, and Pontus Svenson, “Harvesting and Analysis of Weak Signals for Detecting Lone Wolf Terrorists,” Security Informatics 2, no. 1 (2013): 1–11.

11. Raffaello Pantucci, “A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists,” (The International Center for the Study of Radicalization and Political Violence, 2011) 39.

12. Edwin Bakker and Beatrice De Graaf, “Preventing Lone Wolf Terrorism: Some CT Approaches Addressed,” Perspectives on Terrorism 5, no. 5–6 (2011): 43–50.

13. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and Analysis,” 3.

14. J. Reid Meloy, Jend Hoffmann, Angela Guldimann, and David James, “The Role of Warning Behaviors in Threat Assessment: An Exploration and Ggested Typology,” Behavioral Sciences & the Law30, no. 3 (2011): 256–279.

15. Bakker and de Graaf, “Preventing,” 47.

16. Daveed Gartenstein-Ross, “Radicalization: Social Media and the Rise of Terrorism,” (Hearing before the U.S. House of Representatives Committee on Oversight and Government Reform, Sub-committee on National Security, 2015) 28.

17. Ramon Spaaij, Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention (Dohdrecht: Springer Netherlands), 41.

18. Bakker and de Graaf, “Preventing,” 47.

19. Meloy, Hoffman, Guldimann, James, “Role of Warning,” 265.

20. J. R. Meloy, TRAP-18: Terrorist Radicalization Assessment Protocol User Manual Version 1.0 (Washington, DC: Global Institute of Forensic Research 2017).

21. J. Reid Meloy, Alasdair M. Goodwill, M.J. Meloy, Gwyn Amat, Maria Martinez, and Melinda Morgan, “Some TRAP-18 Indicators Discriminate Between Terrorist Attackers and Other Subjects of National Security Concern,” Journal of Threat Assessment and Management 6, no. 2 (2019): 93–110.

22. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and Analysis,” 1.

23. Meloy, Hoffman, Guldimann, James, “Role of warning,” 270.

24. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and Analysis,” 11.

25. Ibid.

26. Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Zurina Saaya, Rabiah Ahmad, and Zaki Masúd, “Identifying Cyber Violent Extremism (Cyber-VE) Components by Exploring Dark Web,” International Journal of Computer Science and Information Security 14, no. 9 (2016): 52–61.

27. Roger A. Bates, “Dancing with Wolves: Today’s Lone Wolf Terrorists,” The Journal of Public and Professional Sociology 4, no. 1 (2012): 1–14.

28. Pantucci, “Typology,” 14–32.

29. Bates, “Today,” 5–7.

30. Gill, Horgan, and Deckert, “Bombing Alone,” 426.

31. Reid J. Meloy and Paul Gill, “The Lone-Actor Terrorist and the TRAP-18,” Journal of Threat Assessment and Management 3, no. 1 (2016): 37–52.

32. Bakker and de Graaf, “Preventing,” 3–4.

33. Arie Perliger and Ami Pedahzur, “Social Network Analysis in the Study of Terrorism and Political Violence,” PS: Political Science and Politics 44, (2011): 45–50.

34. Ze Li, Duoyong Sun, Bo Li, Zhanfeng Li, and Aobo Li, “Terrorist group behavior prediction by wavelet transform- based pattern recognition,” Discrete Dynamics in Nature and Society, (2018): 1–16.

35. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and Analysis,” 9.

36. Spaaij, “Enigma,” 858.

37. Peter J. Phillips, “Lone wolf terrorism,” Peace Economics, Peace Science and Public Policy 17, no. 1, (2011): 1–29.

38. Ibid., 17.

39. Theodore J. Gordon, Yair Sharan, and Elizabeth Florescu, “Prospects for LoneWolf and SIMAD terrorism,” Technological Forecasting and Social Change 95, (2015): 234–251

40. Brian J. Phillips, “Deadlier in the U.S.? On Lone Wolves, Terrorist Groups, and Attack Lethality,” Terrorism and Political Violence 29, no. 3 (2015): 533–549.

41. Claire Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Benoît Gomis, Simon Palombi, and Melanie Smith, “Lone-Actor Terrorism,” (Royal United Service Institute for Defense and Security Studies, 2017).

42. Ibid.

43. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and Analysis,” 3–10.

44. J. M. Post, “Individual and group dynamics of terrorist behavior,” in Psychiatry: The State of the Art Volume 6 Drug Dependence and Alcoholism, Forensic Psychiatry, Military Psychiatry, edited by P. Pichot, P. Berner, R. Wolf, and K. Thau, (Boston, MA: Springer US, 1985), 381–386.

45. Mark S. Hamm and Ramon Spaaij, The Age of Lone Wolf Terrorism. (New York: Columbia University Press, 2017), 23.

46. Hamm and Spaaij, “Age,” 23.

47. Global Terrorism Database. https://www.start.umd.edu/gtd/. Accessed: 2019–07-03.

49. Jason R. Silva and Emily Ann Greene-Colozzi, “Fame-Seeking Mass Shooters in America: Severity, Characteristics, and Media Coverage,” Aggression and Violent Behavior 48, (2019): 24– 35.

50. Meloy and Gill, “TRAP-18,” 38–39.

51. Meloy, Goodwill, Meloy. Amat, Martinez, and Morgan, “Some TRAP-18 Indicators,” 100.

52. Hamm and Spaaij, “Age,” 23.

53. Lasse Lindekilde, Francis O’Connor, and Bart Schuurman, “Radicalization Patterns and Modes of Attack Planning and Preparation among Lone-Actor Terrorists: An Exploratory Analysis,” Behavioral Sciences of Terrorism and Political Aggression 11, no. 2, (2019): 113–133.

54. Richard Berk, Heidari Hoda, Jabbari Michael Kearns, and Aaron Roth. “Fairness in Criminal Justice Risk Assessments: The State of the Art,” Sociological Methods & Research, (2018).

55. Indrė Žliobaitė “Measuring Discrimination in Algorithmic Decision Making,” Data Mining and Knowledge Discovery 31 (2017): 1060–1089.

56. Hamm and Spaaij, “Age,” 23.

57. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and analysis,” 1–11.

58. Bakker and de Graaf, “Preventing,” 2–4.

59. Phillips, “Lone-wolf,” 17.

60. Meloy and Gill, “TRAP-18,” 38–39.

61. Gill, Horgan, and Deckert, “Bombing Alone,” 430–432.

62. Michael Tierney, “Spotting the Lone Actor: Combating Lone Wolf Terrorism through Financial Investigations,” Journal of Financial Crime 24, no. 4 (2017): 637–642.

63. McCauley and Moskalenko, “A Profile of Lone Wolf Terrorists,” 70–75.

64. Spaaij, “Enigma,” 856.

65. Spaaij, “Understanding,” 3–7.

66. Allison Smith, Risk Factors and Indicators Associated with Radicalization to Terrorism in the United States: What Research Sponsored by the National Institute of Justice Tells Us (National Institute of Justice, June 2018).

67. Soheil Eshghi, Grace-Rose Williams, Gualtiero B. Colombo, Liam D. Turner, David G. Rand, Roger M. Whitaker, and Leandros Tassiulas, “Mathematical Models for Social Group Behavior,” in 2017 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computed, Scalable Computing Commu- nications, Cloud Big Data Computing, Internet of People and Smart City Innovation (Smart- World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), (2017), 1–6.

68. Smith, “Risk Factors,” 7.

69. Gill, Horgan, and Deckert, “Bombing Alone,” 430–432.

70. Meloy and Gill, “TRAP-18,” 38–39.

71. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and analysis,” 1–11.

72. Meloy and Gill, “TRAP-18,” 38–39.

73. Ibid.

74. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and analysis,” 1–11.

75. Bakker and de Graaf, “Preventing,” 2–4.

76. Claire Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis, and Simon Palombi, “Analysing the Processes of Lone-Actor Terrorism: Research Findings,” Perspectives on Terrorism 10, no. 2, (2016): 33–41.

77. Joel A. Capellan, “Lone Wolf Terrorist or Deranged Shooter? a Study of Ideological Active Shooter Events in the United States,” Studies in Conflict & Terrorism 38, no. 6 (2015): 395–413.

78. Hamm and Spaaij, “Age,” 25.

79. Brynielsson, Horndahl, Johansson, Kaati, Mårtenson, and Svenson, “Harvesting and Analysis,” 9.

80. Michael Becker, “Explaining lone wolf target selection in the United States,” Studies in Conflict & Terrorism 37, no. 11 (2014): 959–978.

81. Ellis, Pantucci, van Zuijdewijn, Bakker, Smith, Gomis, Palombi, “Analyzing the Processes,” 35.

82. Gill, Horgan, and Deckert, “Bombing Alone,” 431.

83. Bill Roungas, Alexander Verbraeck, and Sebastiaan Meijer, “The future of contextual knowledge in gaming simulations: A research agenda,” in 2018 Winter Simulation Conference (WSC), (2018): 2435–2446, Dec 2018.

84. R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules in Large Databases,” in Proceedings of the 20th International Conference on Very Large Data Bases, VLDB ’94, (San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 1994), 487–499.

85. Peter Nijkamp, Gabriella Vindigni, and Paulo A.L.D. Nunes “Economic Valuation of Biodiversity: A Comparative study,” Ecological Economics 67, no. 2, (2008): 217– 231.

86. Suhem Parack, Zain Zahid, and Fatime Merchant, “Application of Data Mining in Educational Databases for Predicting Academic Trends and Patterns,” in 2012 IEEE International Conference on Technology Enhanced Education (ICTEE), (2012), 1–4.

87. Zohreh Nazeri, Eric Bloedorn, and Paul Ostwald, “Experiences in Mining Aviation Safety Data,” in SIGMOD ’01, (2001).

88. Agarwal and Srikant, “Fast Algorithms,” 487–499. 

89. Ke Luo and Jie Wu, “A New Method to Mine Valid Association Rules,” in 2003 International Conference on Machine Learning and Cybernetics 1, (2003), 88–93.

90. Binay Singh and Abhijit Mustafi, “A Novel Approach to Rank Association Rules Using Genetic Algorithm,” International Journal of Current Engineering and Technology 4, no:2 (2003): 850–859.

91. K.N.V.D. Sarath and Vadlamani Ravi, “Association Rule Mining Using Binary Particle Swarm Optimization,” Engineering Applications of Artificial Intelligence 26, no. 8, (2013): 1832– 1840.

92. Zhang Danping and Deng Jin, “The Data Mining of the Human Resources Data Warehouse in University Based on Association Rule,” Journal of Computers 6, no. 1 (2011): pp. 1832– 1840.

93. Wilhelmiina Hämäläinen, and Matti Nykänen, “Efficient Discovery of Statistically Significant Association Rules,” in 2008 Eighth IEEE International Conference on Data Mining, (2008), 203–212.

94. R. Gras and P. Kuntz, “Discovering R-Rules with a Directed Hierarchy,” Soft Computing 10, (2006): 453–460.

95. Bakker and de Graaf, “Preventing,” 47.

96. Louis Beam, “Leaderless Resistance,” The Seditionist 12, (1992): 1–7.

97. Ibid., 1.

98. Brian J Phillips, “Deadlier in the US? On Lone Wolves, Terrorist Groups, and Attack Lethality,” Terrorism and Political Violence 29, no. 3, (2017): 533–549.

99. Ibid., 539.

100. Shaul Mishal and Maoz Rosenthal, “Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations,” Studies in Conflict & Terrorism 28, no. 4, (2006): 275–293.

101. Simon Garfinkel, “Leaderless Resistance Today,” First Monday 8, no. 3, (2003).

102. Hamm and Spaaij, “Age,” 23.

103. Jeffrey William Lewis, “The Human Use of Human Beings: Suicide Bombing, Technological Innovation, and the Asymmetry of Modern Warfare,” Global Politics Review 2, no. 2, (2015): 9–27.

104. Bakker and de Graaf, “Preventing,” 47.

105. Lawrence J. Hubert and Joel R. Levin, “A General Statistical Framework for Assessing Categorical Clustering in Free Recall,” Psychological Bulletin 83, no. 6 (1976): 1072–1080.

Additional information

Funding

This material is based upon work supported by the National Science Foundation (Grant No. 1901721 and 1453276).

Notes on contributors

Ayca Altay

Ayca Altay is a PhD student at the Industrial & Systems Engineering Department. She received her BS, MS, and previous PhD degrees in Industrial Engineering from Istanbul Technical University, Istanbul, Turkey. Her doctoral dissertation focuses on game-theoretical models for lone-actor terrorism.

Melike Baykal-Gürsoy

Melike Baykal-Gürsoy is a Professor and the Director of Laboratory for Stochastic Systems, and of GRIST-Game Research for Infrastructure SecuriTy Lab, in the department of Industrial and Systems Engineering at Rutgers University.  She received her doctorate in Systems Engineering from the University of Pennsylvania, Philadelphia.  Her specific fields of interest include stochastic modeling, queueing, Markov decision processes, stochastic games, and their applications. The current research in the Laboratory for Stochastic Systems focuses on the areas of modeling, optimization and control of stochastic systems, such as transportation, communication, and production/inventory networks. In GRIST Lab, Dr. Baykal-Gürsoy and her team are developing game-theoretic models and algorithms in order to protect infrastructure networks and their users against intelligent adversaries. Her research and teaching have been supported through grants from NSF, United Nations, DOD, and Transportation Coordinating Council/Federal Transit Administration. Dr. Baykal-Gürsoy is the co-author of a book entitled An Introduction to Probability and Statistics.

Pernille Hemmer

Pernille Hemmer is an Associate Professor at Department of Psychology. She received her PhD from the Department of Cognitive Science at the University of California, Irvine. She completed a post-doctoral fellowship in the Department of Psychology at Syracuse University before joining the faculty at Rutgers University in 2012. Her research seeks to elucidate the relationship between mental representations and naturalistic environments. While her work has been focused on episodic and semantic memory, the overarching theme of her research is decision making in naturalistic environments. She uses ecologically valid stimuli to capitalize on the idea that humans work in concert with their environment and that people use their knowledge and expectations to make decisions in a broad range of cognitive tasks. Specifically, she focuses on complex environments in which people make real world decisions about situations where knowledge of the environment can be brought to bear. In these environments, she applies computational and Bayesian modeling to behavioral experiments. She explores how people use information from these environments in retrieving information from memory, and decision making in general. Her research has been recognized with a best-paper award for modeling of higher-level cognition, as well as an NSF CAREER grant.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 425.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.