References
- Abrahms, M., & Potter, P. B. (2015). Explaining terrorism: Leadership deficits and militant group tactics. International Organization, 69(2), 311–342. https://doi.org/https://doi.org/10.1017/S0020818314000411
- Abrahms, M., Ward, M., & Kennedy, R. (2018). Explaining civilian attacks: Terrorist networks, principal-agent problems and target selection. Perspectives on Terrorism, 12(1), 23–45.
- Ackerman, G., & Tamsett, J. (2009). Introduction. In Gary Ackerman & Jeremy Tamsett (eds.), Jihadists and weapons of mass destruction. CRC Press.
- Ackerman, G. A., & Pinson, L. E. (2014). An army of one: Assessing CBRN pursuit and use by lone wolves and autonomous cells. Terrorism and Political Violence, 26(1), 226–245. https://doi.org/https://doi.org/10.1080/09546553.2014.849945
- Ahmed, R. (2018). Terrorist ideologies and target selection. Journal of Applied Security Research, 13(3), 376–390. https://doi.org/https://doi.org/10.1080/19361610.2018.1463140
- Allison, G. (2004). Nuclear terrorism: The ultimate preventable catastrophe. Owl Books.
- Asal, V. H., Ackerman, G. A., & Rethemeyer, R. K. (2012). Connections can be toxic: Terrorist organizational factors and the pursuit of CBRN weapons. Studies in Conflict & Terrorism, 35(3), 229–254. https://doi.org/https://doi.org/10.1080/1057610X.2012.648156
- Asal, V. H., Rethemeyer, R. K., Anderson, I., Stein, A., Rizzo, J., & Rozea, M. (2009). The softest of targets: A study on terrorist target selection. Journal of Applied Security Research, 4(3), 258–278. https://doi.org/https://doi.org/10.1080/19361610902929990
- Becker, M. (2014). Explaining lone wolf target selection in the United States. Studies in Conflict & Terrorism, 37(11), 959–978. https://doi.org/https://doi.org/10.1080/1057610X.2014.952261
- Binder, M., & Moodie, M. (2009). Jihadists and chemical weapons. In Gary Ackerman & Jeremy Tamsett (eds.), Jihadists and weapons of mass destruction. CRC Press.
- Binder, M. K., & Ackerman, G. A. (2019). Pick your POICN: Introducing the profiles of incidents involving CBRN and non-state actors (POICN) database. Studies in Conflict & Terrorism, 1–24. https://doi.org/https://doi.org/10.1080/1057610X.2019.1577541
- Blair, C. P. (2009). Jihadists and nuclear weapons. In Gary Ackerman & Jeremy Tamsett (eds.), Jihadists and weapons of mass destruction. CRC Press.
- Campbell, B., & Murdie, A. (2018). Keep the informants talking: The pursuit and use of CBRN weapons by terrorist organizations. Studies in Conflict & Terrorism, 1–20. https://doi.org/https://doi.org/10.1080/1057610X.2018.1531517
- Charles, C. A. D., & Maras, M-H. (2015). Strengthening counterterrorism from the information of a successful terrorist attack and failed missions in the United States. Journal of Applied Security Research, 10(2), 155–180. https://doi.org/https://doi.org/10.1080/19361610.2015.1004513
- Drake, C. (1998). The role of ideology in terrorists’ target selection. Terrorism and Political Violence, 10(2), 53–85. https://doi.org/https://doi.org/10.1080/09546559808427457
- Ellis, P. D. (2014). Lone wolf terrorism and weapons of mass destruction: An examination of capabilities and countermeasures. Terrorism and Political Violence, 26(1), 211–225. https://doi.org/https://doi.org/10.1080/09546553.2014.849935
- Ferguson, C. D. (2009). Radiological weapons and Jihadist terrorism. In Gary Ackerman & Jeremy Tamsett (eds.), Jihadists and weapons of mass destruction. CRC Press.
- Ferguson, C. D., Potter, W. C., with Sands, A., Spector, L. S., & Wehling, F. L. (2005). The four faces of nuclear terrorism. Routledge.
- Fisher, T. W. (2015). Improving the intelligence community’s contribution to countering weapons of mass destruction. InterAgency Journal, 6(2), 17–27.
- Gill, P., & Corner, E. (2016). Lone-actor terrorist target choice. Behavioral Sciences & the Law, 34(5), 693–705. https://doi.org/https://doi.org/10.1002/bsl.2268
- Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist use of the internet by the numbers: Quantifying behaviors, patterns and processes. Criminology & Public Policy , 16(1), 99–117. https://doi.org/https://doi.org/10.1111/1745-9133.12249
- Guarrieri, T. R., & Meisel, C. J. (2019). Extremists and unconventional weapons: Examining the pursuit of chemical and biological agents. Behavioral Sciences of Terrorism and Political Aggression. Retrieved from. https://doi.org/https://doi.org/10.1080/19434472.2019.1698633.
- Harding, D. (2014). Threat management: The coordinated focus on the threat actor, their intentions and attack cycle. Journal of Applied Security Research, 9(4), 478–494. https://doi.org/https://doi.org/10.1080/19361610.2014.942825
- Hemmingby, C., & Bjørgo, T. (2018). Terrorist target selection: The case of Anders Behring Breivik. Perspectives on Terrorism, 12(6), 164–176.
- Jackson, B. A., & Frelinger, D. R. (2008). Rifling through the terrorists’ arsenal: Exploring groups’ weapon choices and technology strategies. Studies in Conflict & Terrorism, 31(7), 583–604. https://doi.org/https://doi.org/10.1080/10576100802159989
- Joint Counterterrorism Assessment Team. (n.d.). Counterterrorism guide for public safety and personnel. Retrieved from https://www.dni.gov/nctc/jcat/index.html.
- Kallenborn, Z., & Bleek, P. C. (2020). Avatars of the earth: Radical environmentalism and chemical, biological, radiological and nuclear (CBRN) weapons. Studies in Conflict & Terrorism , 43(5), 351–381. Retrieved from. https://doi.org/https://doi.org/10.1080/1057610X.2018.1471972
- Koehler, D., & Popella, P. (2018). Mapping far-right chemical, biological, radiological and nuclear (CBRN) terrorism efforts in the West: Characteristics of plots and perpetrators for future threat assessment. Terrorism and Political Violence, 1–25. https://doi.org/https://doi.org/10.1080/09546553.2018.1500365
- Koehler-Derrick, G., & Milton, D. J. (2019). Choose your weapon: The impact of strategic considerations and resource constraints on terrorist group weapon selection. Terrorism and Political Violence, 31(5), 909–928. https://doi.org/https://doi.org/10.1080/09546553.2017.1293533
- Langford, R. E. (2004). Introduction to weapons of mass destruction: Radiological, chemical and biological. John Wiley & Sons.
- Lindekilde, L., O’Connor, F., & Schuurman, B. (2019). Radicalization patterns and modes of attack planning and preparation among lone-actor terrorists: An exploratory analysis. Behavioral Sciences of Terrorism and Political Aggression, 11(2), 113–133. https://doi.org/https://doi.org/10.1080/19434472.2017.1407814
- Loeb, C. (2009). Jihadists and biological and toxin weapons. In Gary Ackerman & Jeremy Tamsett (eds.), Jihadists and weapons of mass destruction. CRC Press.
- Meulenbelt, S. E., & Nieuwenhuizen, M. S. (2015). Non-state actors’ pursuit of CBRN weapons: From motivation to potential humanitarian consequences. International Review of the Red Cross, 97(899), 831–858. https://doi.org/https://doi.org/10.1017/S1816383116000011
- National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2017). Profiles of incidents involving CBRN and non-state actors (POICN) [Data File]. Retrieved from Markus Binder ([email protected]).
- National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2019). Global Terrorism Database [Data File]. Retrieved from https://www.start.umd.edu/gtd/.
- Schuurman, B., Bakker, E., Gill, P., & Bouhana, N. (2018). Lone actor terrorist attack planning and preparation: A data-driven analysis. Journal of Forensic Sciences, 63(4), 1191–1200. https://doi.org/https://doi.org/10.1111/1556-4029.13676
- Stratfor. (2012). Defining the terrorist attack cycle. Retrieved from https://worldview.stratfor.com/article/defining-terrorist-attack-cycle.
- Tishler, N. A. (2018). Trends in terrorists’ weapons adoption and the study thereof. International Studies Review, 20(3), 368–394. https://doi.org/https://doi.org/10.1093/isr/vix038
- United States Army. (n.d.). Army antiterrorism officer ready reference. Retrieved from https://www.cdse.edu/documents/toolkits-physical/ato-ready-reference.pdf.
- United States Department of Homeland Security. (n.d). Introduction to the terrorist attack cycle (AWR-334). Retrieved from https://www.cisa.gov/publication/introduction-terrorist-attack-cycle-course-fact-sheet.
- Volders, B., & Sauer, T. (2016). Nuclear terrorism: Countering the threat. Routledge.
- Wadhwa, P., & Bhatia, M. P. S. (2015). Measuring radicalization in online social networks using Markov Chains. Journal of Applied Security Research, 10(1), 23–47. https://doi.org/https://doi.org/10.1080/19361610.2015.972265