721
Views
6
CrossRef citations to date
0
Altmetric
Articles

Extremists and unconventional weapons: examining the pursuit of chemical and biological agents

&
Pages 23-42 | Received 27 Feb 2019, Accepted 25 Nov 2019, Published online: 11 Dec 2019

References

  • Ackerman, G. A., Asal, V., Johns, M., Binder, M. K., Murdie, A., Bale, J. M., & Rethemeyer, R. K. (2014). Anatomizing chemical and biological non-state adversaries identifying the adversary, final report. Retrieved from https://calhoun.nps.edu/handle/10945/46068
  • Ackerman, G. A., & Binder, M. K. (2015, April). Deriving new understandings of CB terrorism potentialities from individual perpetrator characteristics using the chemical and biological non-state adversaries database (CABNSAD). Presented at the 2015 International Studies Association Annual Convention, New Orleans, LA.
  • Ackerman, G. A., & Pinson, L. (2014). An army of one: Assessing CBRN pursuit and use by lone wolves and autonomous cells. Terrorism and Political Violence, 26(1), 226–245. doi: 10.1080/09546553.2014.849945
  • Asal, V. H., Ackerman, G. A., & Rethemeyer, R. K. (2012). Connections can be toxic: Terrorist organizational factors and pursuit of CBRN weapons. Studies in Conflict & Terrorism, 35(3), 229–254. doi: 10.1080/1057610X.2012.648156
  • Becker, M. H. (2019). When extremists become violent: Examining the association between social control, social learning, and engagement in violent extremism. Studies in Conflict & Terrorism. Retrieved from https://www.tandfonline.com/doi/full/10.1080/1057610X.2019.1626093
  • Berger, J. M. (2012, April 18). Patriot games. Foreign Policy. Retrieved from https://foreignpolicy.com/2012/04/18/patriot games/
  • Binder, M. K., & Ackerman, G. A. (2019). Pick your POICN: Introducing the profiles of incidents involving CBRN and non-state actors (POICN) database. Studies in Conflict & Terrorism. Retrieved from https://www.tandfonline.com/doi/full/10.1080/1057610X.2019.1577541
  • Blee, K. M. (2005). Women and organized racial terrorism in the United States. Studies in Conflict & Terrorism, 28(5), 421–433. doi: 10.1080/10576100500180303
  • Blettner, M., Sauerbrei, W., Schlehofer, B., Scheuchenpflug, T., & Freidenreich, C. (1999). Traditional reviews, meta-analyses and pooled analyses in epidemiology. International Journal of Epidemiology, 28(1), 1–9. doi: 10.1093/ije/28.1.1
  • Borum, R. (2011a). Radicalization into violent extremism I: A review of social science theories. Journal of Strategic Security, 4(4), 7–36. doi: 10.5038/1944-0472.4.4.1
  • Borum, R. (2011b). Radicalization into violent extremism II: A review of conceptual models and empirical research. Journal of Strategic Security, 4(4), 37–62. doi: 10.5038/1944-0472.4.4.2
  • Bower, P., Byford, S., Barber, J., Beecham, J., Simpson, S., Friedli, K., … Harvey, I. (2003). Meta-analysis of data on cost from trials of counselling in primary care: Using individual patient data to overcome sample size limitations in economic analysis. British Medical Journal, 326(2003), 1–6.
  • Burke, J. (2011, November 8). Who is Alaska militia member Mary Ann Morgan? Anchorage Daily News. Retrieved from https://www.adn.com/alaska-news/article/who-alaska-militia-member-mary-ann-morgan/2011/11/09/
  • Campbell, B., & Murdie, A. (2018). Keep the informants talking: The pursuit and use of CBRN weapons by terrorist organizations. Studies in Conflict & Terrorism. Retrieved from https://www.tandfonline.com/doi/full/10.1080/1057610X.2018.1531517
  • Carson, J. V., LaFree, G., & Dugan, L. (2012). Terrorist and non-terrorist criminal attacks by radical environmental and animal rights groups in the United States, 1970–2017. Terrorism and Political Violence, 24(2), 295–319. doi: 10.1080/09546553.2011.639416
  • CBS News. (2011, March 9). FBI arrests suspect in Wash. MLK day bomb case. Retrieved from https://www.cbsnews.com/news/fbi-arrests-suspect-in-wash-mlk-day-bomb-case/
  • Collaborative Group on Hormonal Factors in Breast Cancer. (1996). Breast cancer and hormonal contraceptives: Collaborative reanalysis of individual data on 53,297 women with breast cancers and 100,239 women without breast cancer from 54 epidemiological studies. The Lancet, 347(9017), 1713–1727. doi: 10.1016/S0140-6736(96)90806-5
  • Collier, D. (2005, May). A statistical rationale for qualitative research. Presented at the NSF workshop on interdisciplinary standards for systemic qualitative research, Arlington, VA.
  • Coveney, J. (2008, July 11). Firthlogit, Version 1.0. STATA Help. Retrieved from http://fmwww.bc.edu/RePEc/bocode/f/firthlogit.html
  • Crick, N. R., & Grotpeter, J. K. (1995). Relational aggression, gender, and social-psychological adjustment. Child Development, 66(3), 710–722. doi: 10.2307/1131945
  • Cunningham, D. (2003). Understanding state responses to left- versus right-wing threats: The FBI’s repression of the new left and the Ku Klux Klan. Social Science History, 27(3), 326–370.
  • Davis, S. (2013, October 13). Women use “indirect aggression” to succeed, study says. CBS News. Retrieved from https://www.cbsnews.com/news/women-use-indirect-aggression-to-succeed-study-says/
  • Ellis, P. D. (2014). Lone Wolf terrorism and weapons of mass destruction: An examination of capabilities and countermeasures. Terrorism and Political Violence, 26(1), 211–225. doi: 10.1080/09546553.2014.849935
  • Fernandez, M. (2017, August 14). Bombing plot in Oklahoma City is thwarted with arrest, F.B.I. says. New York Times. Retrieved from https://www.nytimes.com/2017/08/14/us/oklahoma-van-bomb-domestic-terrorism.html
  • Fesbach, N. D. (1969). Sex differences in children’s modes of aggressive responses toward outsiders. Merrill Palmer Quarterly of Behavior and Development, 15(3), 249–258.
  • Firth, D. (1993). Bias reduction of maximum likelihood estimates. Biometrika, 80, 27–38. doi: 10.1093/biomet/80.1.27
  • Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist use of the internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology & Public Policy, 16(1), 99–117. doi: 10.1111/1745-9133.12249
  • Gunaratna, R. (2002). Inside Al Qaeda: Global network of terror. New York: Columbia University Press.
  • Hanna, J., Cordery, D. V., Steel, D. G., Davis, W., & Harrold, T. C. (2017). The impact of the mode of survey administration on estimates of daily smoking for mobile phone only users. BMC Medical Research Methodology, 17(65), 1–9.
  • Hegghammer, T. (2013). Should I stay or should I go? Explaining variation in Western Jihadists’ choice between domestic and foreign fighting. American Political Science Review, 107(1), 1–15. doi: 10.1017/S0003055412000615
  • Hoffman, B. (2006). Inside terrorism. New York, NY: Columbia University Press.
  • Hopper, T. (2011, November 7). Alaska militia member tried to enter Yukon with pistol and ‘hoard’ of bomb making instructions. National Post. Retrieved from http://nationalpost.com/news/canada/alaskan-militia-member-tried-to-enter-yukon-with-bomb-instructions
  • Hosseinpoor, A. R., & Abouzahr, C. (2010). Graphical presentation of relative measures of association. The Lancet, 375(9722), 1254. doi: 10.1016/S0140-6736(10)60541-7
  • Hurwitz, E. (1982). Terrorists and chemical/biological weapons. Naval War College Review, 35(3), 36–40.
  • Jarman, N. (2004). From war to peace? Changing patterns of violence in Northern Ireland, 1990–2003. Terrorism and Political Violence, 16(3), 420–438. doi: 10.1080/09546550490509739
  • Jensen, M. A., Seate, A. A., & James, P. A. (2018). Radicalization to violence: A pathway approach to studying extremism. Terrorism and Political Violence. Retrieved from https://www.tandfonline.com/doi/full/10.1080/09546553.2018.1442330
  • King, G., Keohane, R. O., & Verba, S. (1994). Designing social inquiry: Scientific inference in qualitative research. Princeton, NJ: Princeton University Press.
  • King, G., & Zeng, L. (2001a). Logistic regression in rare events data. Political Analysis, 9(2), 137–163. doi: 10.1093/oxfordjournals.pan.a004868
  • King, G., & Zeng, L. (2001b). Explaining rare events in international relations. International Organization, 55(3), 693–715. doi: 10.1162/00208180152507597
  • Klausen, J., Morrill, T., & Libretti, R. (2016). The terrorist-age crime curve: An analysis of American Islamist terrorist offenders and age-specific propensity for participation in violent and nonviolent incidents. Social Science Quarterly, 97(1), 19–32. doi: 10.1111/ssqu.12249
  • LaFree, G., Jensen, M. A., James, P. A., & Safer-Lichtenstein, A. (2018). Correlates of violent political extremism in the United States. Criminology; An interdisciplinary Journal, 56(2), 233–268.
  • Laqueur, W. (2000). The new terrorism: Fanaticism and the arms of mass destruction. New York: Oxford University Press.
  • Lee, A. (2011). Who becomes a terrorist? Poverty, education, and the origins of political violence. World Politics, 63(2), 203–245. doi: 10.1017/S0043887111000013
  • Leitgöb, H. (2013). The problem with modeling rare events in ML-based logistic regression: Assessing potential remedies via MC simulations. Presentation at the 2013 European Survey Research Association Meeting, Ljubljana, Slovenia.
  • Lindekilde, L., O’Connor, F., & Schuurman, B. (2019). Radicalization patterns and modes of attack planning and preparation among lone-actor terrorists: An exploratory analysis. Behavioral Sciences of Terrorism and Political Aggression, 11(2), 113–133. doi: 10.1080/19434472.2017.1407814
  • Maskaliūnaité, A. (2015). Exploring the theories of radicalization. International Studies. Interdisciplinary Political and Cultural Journal, 17(1), 9–26. doi: 10.1515/ipcj-2015-0002
  • Maurer, S. M. (2009). WMD terrorism: Science and policy choices. Cambridge, MA: MIT Press.
  • Meulenbelt, S. E., & Nieuwenhuizen, M. S. (2015). Non-state actors’ pursuit of CBRN weapons: From motivation to potential humanitarian consequences. International Review of the Red Cross, 97(899), 831–858. doi: 10.1017/S1816383116000011
  • Miller, E. (2017). Ideological motivations of terrorism in the United States, 1970–2016. START. Retrieved from https://www.start.umd.edu/pubs/START_IdeologicalMotivationsOfTerrorismInUS_Nov2017.pdf
  • Miller, J. E. (2005). The Chicago guide to writing about multivariate analysis. Chicago, IL: University of Chicago Press.
  • Morlin, B. (2011a, March 10). The Spokane bomb attempt: Who is Kevin William Harpham? Southern Poverty Law Center. Retrieved from https://www.splcenter.org/hatewatch/2011/03/10/spokane-bomb-attempt-who-kevin-william-harpham
  • Morlin, B. (2011b, November 7). Feds hope to deny bail to Alaska militia suspect. Southern Poverty Law Center. Retrieved from https://www.splcenter.org/hatewatch/2011/11/07/feds-hope-deny-bail-alaska-militiasuspect
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2017). Chemical and Biological Non-state Adversaries Database, Version 2.71 [Data file]. Retrieved from Markus Binder ([email protected])
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2018). Profiles of individual radicalization in the United States [Data file]. Retrieved from http://www.start.umd.edu/pirus
  • Nemeth, S. (2014). The effect of competition on terrorist group operations. Journal of Conflict Resolution, 58(2), 336–362. doi: 10.1177/0022002712468717
  • Pels, T., & de Ruyter, D. J. (2012). The influence of education and socialization on radicalization: An exploration of theoretical presumptions and empirical research. Child & Youth Care Forum, 41(3), 311–325. doi: 10.1007/s10566-011-9155-5
  • Schils, N., & Pauwels, L. (2014). Explaining violent extremism for subgroups by gender and immigrant background, using SAT as a framework. Journal of Strategic Security, 7(3), 27–47. doi: 10.5038/1944-0472.7.3.2
  • Shellman, S. M., Levey, B. P., & Young, J. K. (2013). Shifting sands: Explaining and predicting phase shifts by dissident organizations. Journal of Peace Research, 50(3), 319–336. doi: 10.1177/0022343312474013
  • Simi, P., & Windisch, S. (2018). Why radicalization fails; barriers to mass casualty violence. Terrorism and Political Violence. Retrieved from https://www.tandfonline.com/doi/full/10.1080/09546553.2017.1409212
  • Simon, J. D. (1989). Terrorists and the potential use of biological weapons: A discussion of possibilities. Santa Monica, CA: RAND Corporation.
  • Sjoberg, L. (2011). Conclusion. In L. Sjoberg & C. E. Gentry (Eds.), Women, gender, and terrorism. (pp. 227–240) Athens, GA: University of Georgia Press.
  • Talbot, R. (2000). Myths in the representation of women terrorists. Éire-Ireland, 35(3-4), 165–186. doi: 10.1353/eir.2000.0032
  • Tucker, J. B. (2000). Introduction. In J. B. Tucker (Ed.), Toxic terror: Assessing terrorist use of chemical and biological weapons (pp. 1–14). Cambridge, MA: BCSIA.
  • Vaillancourt, T. (2013). Do human females use indirect aggression as an intrasex competition strategy? Philosophical Transactions of the Royal Society B: Biological Sciences, 368(1631), 1–7. doi: 10.1098/rstb.2013.0080
  • Wendt, M. (2007). Considerations before pooling data from two different cycles of the general social survey. Statistics Canada: Social and Aboriginal Statistics Division. Retrieved from http://www23.statcan.gc.ca/imdbbmdi/document/8011_D1_T9_V1-eng.pdf
  • Yeo, W. (2015, September 2). The growing threat of CBRN weapons. RSIS Commentary, 188. Retrieved from https://www.rsis.edu.sg/wp-content/uploads/2015/09/CO15188.pdf
  • Zwolski, K. (2011). Unrecognized and unwelcome? The role of the EU in preventing the proliferation of CBRN weapons, materials and knowledge. Perspectives on European Politics and Society, 12(4), 477–492. doi: 10.1080/15705854.2011.622962

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.