Patterns of behaviour in violent jihadist terrorists :: an analysis of six significant terrorist conspiracies in the UK /
The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited an...
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaften: | , |
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA :
RAND,
2011.
|
Schriftenreihe: | Technical report (Rand Corporation) ;
TR-923-ANT. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation." |
Beschreibung: | Title from PDF title page (viewed July 18, 2011). "Prepared for the Airey Neave Trust." |
Beschreibung: | 1 online resource (xiii, 100 pages) : illustrations (digital, PDF file) |
Bibliographie: | Includes bibliographical references (pages 57-62). |
ISBN: | 9780833059635 0833059637 1280126957 9781280126956 9786613530813 6613530816 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn741500866 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr bn||||||||| | ||
008 | 110718s2011 caua ob 000 0 eng d | ||
040 | |a AWC |b eng |e pn |c AWC |d EBLCP |d E7B |d COO |d GPM |d OCLCQ |d N$T |d OCLCA |d JSTOR |d DEBSZ |d OCLCQ |d YDXCP |d OCLCQ |d NKT |d IDEBK |d OCLCQ |d AZK |d OCLCF |d AGLDB |d CUS |d PIFAG |d ZCU |d OCLCQ |d MERUC |d OCLCQ |d JBG |d OCLCQ |d LND |d VFL |d LOA |d ICG |d OCL |d U3W |d VTS |d ICN |d OCLCQ |d CUY |d STF |d DKC |d CNTRU |d OCLCQ |d NJT |d SFB |d OCLCQ |d AJS |d OCLCQ |d OCLCO |d OCLCQ |d UX0 |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 770873499 |a 961551155 |a 962641528 |a 1125527255 |a 1241958344 |a 1246358350 |a 1247560955 | ||
020 | |a 9780833059635 |q (electronic bk.) | ||
020 | |a 0833059637 |q (electronic bk.) | ||
020 | |a 1280126957 | ||
020 | |a 9781280126956 | ||
020 | |a 9786613530813 | ||
020 | |a 6613530816 | ||
035 | |a (OCoLC)741500866 |z (OCoLC)770873499 |z (OCoLC)961551155 |z (OCoLC)962641528 |z (OCoLC)1125527255 |z (OCoLC)1241958344 |z (OCoLC)1246358350 |z (OCoLC)1247560955 | ||
037 | |a 22573/ctt3n9g5 |b JSTOR | ||
043 | |a e-uk--- | ||
050 | 4 | |a KF27 | |
072 | 7 | |a SOC |x 041000 |2 bisacsh | |
072 | 7 | |a SOC |x 023000 |2 bisacsh | |
072 | 7 | |a POL037000 |2 bisacsh | |
072 | 7 | |a HIS015000 |2 bisacsh | |
082 | 7 | |a 300 | |
088 | |a TR-923-ANT | ||
049 | |a MAIN | ||
100 | 1 | |a Clutterbuck, Lindsay. |0 http://id.loc.gov/authorities/names/no2008070917 | |
245 | 1 | 0 | |a Patterns of behaviour in violent jihadist terrorists : |b an analysis of six significant terrorist conspiracies in the UK / |c Lindsay Clutterbuck, Richard Warnes. |
246 | 3 | 0 | |a Analysis of six significant terrorist conspiracies in the United Kingdom |
260 | |a Santa Monica, CA : |b RAND, |c 2011. | ||
300 | |a 1 online resource (xiii, 100 pages) : |b illustrations (digital, PDF file) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Technical report ; |v TR-923-ANT | |
500 | |a Title from PDF title page (viewed July 18, 2011). | ||
500 | |a "Prepared for the Airey Neave Trust." | ||
520 | |a The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation." | ||
504 | |a Includes bibliographical references (pages 57-62). | ||
505 | 0 | |a Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. | |
546 | |a English. | ||
650 | 0 | |a Terrorists |x Conduct of life. | |
650 | 0 | |a Terrorists |x Social networks. | |
650 | 0 | |a Terrorists |v Case studies. | |
650 | 0 | |a Jihad. |0 http://id.loc.gov/authorities/subjects/sh85070535 | |
650 | 6 | |a Terroristes |x Morale pratique. | |
650 | 6 | |a Terroristes |x Réseaux sociaux. | |
650 | 6 | |a Terroristes |v Études de cas. | |
650 | 6 | |a Jihād. | |
650 | 7 | |a SOCIAL SCIENCE |x Essays. |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE |x Reference. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Terrorism. |2 bisacsh | |
650 | 7 | |a Jihad |2 fast | |
650 | 7 | |a Terrorists |2 fast | |
655 | 7 | |a Case studies |2 fast | |
700 | 1 | |a Warnes, Richard. | |
710 | 2 | |a RAND Europe. |0 http://id.loc.gov/authorities/names/n97080747 | |
710 | 2 | |a Rand Corporation. |0 http://id.loc.gov/authorities/names/n78083407 | |
758 | |i has work: |a Patterns of behaviour in violent jihadist terrorists (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG7XRxkJbtmvB8qj9qtP6X |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a Technical report (Rand Corporation) ; |v TR-923-ANT. |0 http://id.loc.gov/authorities/names/n2005069635 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=608672 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL826896 | ||
938 | |a ebrary |b EBRY |n ebr10520594 | ||
938 | |a EBSCOhost |b EBSC |n 608672 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis23934350 | ||
938 | |a YBP Library Services |b YANK |n 7298758 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn741500866 |
---|---|
_version_ | 1816881764664082432 |
adam_text | |
any_adam_object | |
author | Clutterbuck, Lindsay |
author2 | Warnes, Richard |
author2_role | |
author2_variant | r w rw |
author_GND | http://id.loc.gov/authorities/names/no2008070917 |
author_corporate | RAND Europe Rand Corporation |
author_corporate_role | |
author_facet | Clutterbuck, Lindsay Warnes, Richard RAND Europe Rand Corporation |
author_role | |
author_sort | Clutterbuck, Lindsay |
author_variant | l c lc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | K - Law |
callnumber-label | KF27 |
callnumber-raw | KF27 |
callnumber-search | KF27 |
callnumber-sort | KF 227 |
callnumber-subject | KF - United States |
collection | ZDB-4-EBA |
contents | Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. |
ctrlnum | (OCoLC)741500866 |
dewey-full | 300 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 300 - Social sciences |
dewey-raw | 300 |
dewey-search | 300 |
dewey-sort | 3300 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08008cam a2200817 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn741500866</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr bn|||||||||</controlfield><controlfield tag="008">110718s2011 caua ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AWC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">AWC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">E7B</subfield><subfield code="d">COO</subfield><subfield code="d">GPM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCA</subfield><subfield code="d">JSTOR</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NKT</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CUS</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LND</subfield><subfield code="d">VFL</subfield><subfield code="d">LOA</subfield><subfield code="d">ICG</subfield><subfield code="d">OCL</subfield><subfield code="d">U3W</subfield><subfield code="d">VTS</subfield><subfield code="d">ICN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CUY</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">CNTRU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NJT</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UX0</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">770873499</subfield><subfield code="a">961551155</subfield><subfield code="a">962641528</subfield><subfield code="a">1125527255</subfield><subfield code="a">1241958344</subfield><subfield code="a">1246358350</subfield><subfield code="a">1247560955</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833059635</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833059637</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280126957</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280126956</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613530813</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613530816</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)741500866</subfield><subfield code="z">(OCoLC)770873499</subfield><subfield code="z">(OCoLC)961551155</subfield><subfield code="z">(OCoLC)962641528</subfield><subfield code="z">(OCoLC)1125527255</subfield><subfield code="z">(OCoLC)1241958344</subfield><subfield code="z">(OCoLC)1246358350</subfield><subfield code="z">(OCoLC)1247560955</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt3n9g5</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e-uk---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KF27</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">023000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">300</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">TR-923-ANT</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clutterbuck, Lindsay.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008070917</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Patterns of behaviour in violent jihadist terrorists :</subfield><subfield code="b">an analysis of six significant terrorist conspiracies in the UK /</subfield><subfield code="c">Lindsay Clutterbuck, Richard Warnes.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Analysis of six significant terrorist conspiracies in the United Kingdom</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 100 pages) :</subfield><subfield code="b">illustrations (digital, PDF file)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Technical report ;</subfield><subfield code="v">TR-923-ANT</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from PDF title page (viewed July 18, 2011).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the Airey Neave Trust."</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 57-62).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists</subfield><subfield code="x">Conduct of life.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists</subfield><subfield code="x">Social networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Jihad.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85070535</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terroristes</subfield><subfield code="x">Morale pratique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terroristes</subfield><subfield code="x">Réseaux sociaux.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terroristes</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Jihād.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">Essays.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Jihad</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorists</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warnes, Richard.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">RAND Europe.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n97080747</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n78083407</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Patterns of behaviour in violent jihadist terrorists (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG7XRxkJbtmvB8qj9qtP6X</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Technical report (Rand Corporation) ;</subfield><subfield code="v">TR-923-ANT.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2005069635</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=608672</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL826896</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10520594</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">608672</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis23934350</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7298758</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Case studies fast |
genre_facet | Case studies |
id | ZDB-4-EBA-ocn741500866 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:54Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n97080747 http://id.loc.gov/authorities/names/n78083407 |
isbn | 9780833059635 0833059637 1280126957 9781280126956 9786613530813 6613530816 |
language | English |
oclc_num | 741500866 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xiii, 100 pages) : illustrations (digital, PDF file) |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | RAND, |
record_format | marc |
series | Technical report (Rand Corporation) ; |
series2 | Technical report ; |
spelling | Clutterbuck, Lindsay. http://id.loc.gov/authorities/names/no2008070917 Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. Analysis of six significant terrorist conspiracies in the United Kingdom Santa Monica, CA : RAND, 2011. 1 online resource (xiii, 100 pages) : illustrations (digital, PDF file) text txt rdacontent computer c rdamedia online resource cr rdacarrier Technical report ; TR-923-ANT Title from PDF title page (viewed July 18, 2011). "Prepared for the Airey Neave Trust." The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation." Includes bibliographical references (pages 57-62). Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. English. Terrorists Conduct of life. Terrorists Social networks. Terrorists Case studies. Jihad. http://id.loc.gov/authorities/subjects/sh85070535 Terroristes Morale pratique. Terroristes Réseaux sociaux. Terroristes Études de cas. Jihād. SOCIAL SCIENCE Essays. bisacsh SOCIAL SCIENCE Reference. bisacsh POLITICAL SCIENCE Terrorism. bisacsh Jihad fast Terrorists fast Case studies fast Warnes, Richard. RAND Europe. http://id.loc.gov/authorities/names/n97080747 Rand Corporation. http://id.loc.gov/authorities/names/n78083407 has work: Patterns of behaviour in violent jihadist terrorists (Text) https://id.oclc.org/worldcat/entity/E39PCG7XRxkJbtmvB8qj9qtP6X https://id.oclc.org/worldcat/ontology/hasWork Technical report (Rand Corporation) ; TR-923-ANT. http://id.loc.gov/authorities/names/n2005069635 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=608672 Volltext |
spellingShingle | Clutterbuck, Lindsay Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Technical report (Rand Corporation) ; Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. Terrorists Conduct of life. Terrorists Social networks. Terrorists Case studies. Jihad. http://id.loc.gov/authorities/subjects/sh85070535 Terroristes Morale pratique. Terroristes Réseaux sociaux. Terroristes Études de cas. Jihād. SOCIAL SCIENCE Essays. bisacsh SOCIAL SCIENCE Reference. bisacsh POLITICAL SCIENCE Terrorism. bisacsh Jihad fast Terrorists fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85070535 |
title | Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / |
title_alt | Analysis of six significant terrorist conspiracies in the United Kingdom |
title_auth | Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / |
title_exact_search | Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / |
title_full | Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. |
title_fullStr | Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. |
title_full_unstemmed | Patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. |
title_short | Patterns of behaviour in violent jihadist terrorists : |
title_sort | patterns of behaviour in violent jihadist terrorists an analysis of six significant terrorist conspiracies in the uk |
title_sub | an analysis of six significant terrorist conspiracies in the UK / |
topic | Terrorists Conduct of life. Terrorists Social networks. Terrorists Case studies. Jihad. http://id.loc.gov/authorities/subjects/sh85070535 Terroristes Morale pratique. Terroristes Réseaux sociaux. Terroristes Études de cas. Jihād. SOCIAL SCIENCE Essays. bisacsh SOCIAL SCIENCE Reference. bisacsh POLITICAL SCIENCE Terrorism. bisacsh Jihad fast Terrorists fast |
topic_facet | Terrorists Conduct of life. Terrorists Social networks. Terrorists Case studies. Jihad. Terroristes Morale pratique. Terroristes Réseaux sociaux. Terroristes Études de cas. Jihād. SOCIAL SCIENCE Essays. SOCIAL SCIENCE Reference. POLITICAL SCIENCE Terrorism. Jihad Terrorists Case studies |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=608672 |
work_keys_str_mv | AT clutterbucklindsay patternsofbehaviourinviolentjihadistterroristsananalysisofsixsignificantterroristconspiraciesintheuk AT warnesrichard patternsofbehaviourinviolentjihadistterroristsananalysisofsixsignificantterroristconspiraciesintheuk AT randeurope patternsofbehaviourinviolentjihadistterroristsananalysisofsixsignificantterroristconspiraciesintheuk AT randcorporation patternsofbehaviourinviolentjihadistterroristsananalysisofsixsignificantterroristconspiraciesintheuk AT clutterbucklindsay analysisofsixsignificantterroristconspiraciesintheunitedkingdom AT warnesrichard analysisofsixsignificantterroristconspiraciesintheunitedkingdom AT randeurope analysisofsixsignificantterroristconspiraciesintheunitedkingdom AT randcorporation analysisofsixsignificantterroristconspiraciesintheunitedkingdom |