The age of lone wolf terrorism /:
The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
La Vergne :
Columbia University Press,
2017.
|
Schriftenreihe: | Studies in transgression.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. In The Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination. Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers--whether jihadists, white supremacists, or other antigovernment extremists--and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens. |
Beschreibung: | 1 online resource (335 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780231543774 0231543778 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1023543806 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 180217s2017 xx ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCO |d DEGRU |d CNCGM |d IDEBK |d MERUC |d IDB |d OCLCQ |d YDX |d JSTOR |d WAU |d N$T |d GZM |d OCLCO |d OCLCQ |d COCUF |d CNNOR |d TEFOD |d STF |d LOA |d CUY |d ZCU |d ICG |d K6U |d OCLCQ |d U3W |d OCLCO |d CNCEN |d OCLCQ |d G3B |d LVT |d S8J |d S9I |d TKN |d D6H |d DKC |d AU@ |d OCLCQ |d SFB |d OCLCQ |d RECBK |d MM9 |d OCLCQ |d INTCL |d OCLCO |d OCLCQ |d AJB |d OCLCQ |d OCLCO |d OCLCL |d UEJ |d OCLCQ | ||
019 | |a 984686744 |a 990035507 |a 999654119 |a 1000382410 |a 1001979464 |a 1003183736 |a 1003990833 |a 1013960572 |a 1020001193 |a 1022691342 |a 1046104508 | ||
020 | |a 9780231543774 |q (electronic bk.) | ||
020 | |a 0231543778 |q (electronic bk.) | ||
020 | |z 9780231181747 | ||
020 | |z 0231181744 | ||
024 | 7 | |a 10.7312/hamm18174 |2 doi | |
035 | |a (OCoLC)1023543806 |z (OCoLC)984686744 |z (OCoLC)990035507 |z (OCoLC)999654119 |z (OCoLC)1000382410 |z (OCoLC)1001979464 |z (OCoLC)1003183736 |z (OCoLC)1003990833 |z (OCoLC)1013960572 |z (OCoLC)1020001193 |z (OCoLC)1022691342 |z (OCoLC)1046104508 | ||
037 | |a 1005411 |b MIL | ||
037 | |a 22573/ctt1tkx252 |b JSTOR | ||
037 | |a 827AA52B-39B6-4590-87A6-EC0DE839F890 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a HV6431 |b .H3456 2017 | |
072 | 7 | |a POL037000 |2 bisacsh | |
072 | 7 | |a SOC004000 |2 bisacsh | |
072 | 7 | |a LAW026000 |2 bisacsh | |
072 | 7 | |a BUS |x 032000 |2 bisacsh | |
072 | 7 | |a SOC |x 000000 |2 bisacsh | |
082 | 7 | |a 363.325 | |
049 | |a MAIN | ||
100 | 1 | |a Hamm, Mark S., |e author. | |
245 | 1 | 4 | |a The age of lone wolf terrorism / |c Mark S. Hamm and Ramon Spaaij. |
264 | 1 | |a La Vergne : |b Columbia University Press, |c 2017. | |
300 | |a 1 online resource (335 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
347 | |b PDF | ||
490 | 1 | |a Studies in Transgression | |
588 | 0 | |a Print version record. | |
505 | 0 | |a Intro; Table of Contents; Foreword; Introduction: The Age of Lone Wolf Terrorism; 1. Identifying Commonalities Among Lone Wolf Terrorists; 2. Old Wine in New Skin: Reimagining Lone Wolf Terrorism; 3. The American Lone Wolf Terrorist: Trends, Modus Operandi, and Background Factors; 4. The Roots of Radicalization; 5. The Enablers; 6. Broadcasting Intent: The Key to Preventing Lone Wolf Terrorism; 7. Triggering Events; 8. The Radicalization Model of Lone Wolf Terrorism; 9. The Little Rock Military Shooting; 10. The Pittsburgh Police Shooting; 11. Lone Wolf Sting Operations. | |
505 | 8 | |a 12. Lone Wolf Terrorism and FBI MythmakingConclusion: Countering Lone Wolf Terrorism; Appendix: List of Cases; Notes; Index. | |
520 | |a The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. In The Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination. Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers--whether jihadists, white supremacists, or other antigovernment extremists--and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens. | ||
504 | |a Includes bibliographical references and index. | ||
546 | |a In English. | ||
650 | 0 | |a Terrorists |x Psychology. | |
650 | 0 | |a Radicalization. |0 http://id.loc.gov/authorities/subjects/sh2016002172 | |
650 | 0 | |a Terrorism |x Prevention. |0 http://id.loc.gov/authorities/subjects/sh00007517 | |
650 | 6 | |a Terroristes |x Psychologie. | |
650 | 6 | |a Radicalisation. | |
650 | 6 | |a Terrorisme |x Prévention. | |
650 | 7 | |a POLITICAL SCIENCE |x Terrorism. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Infrastructure. |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE |x General. |2 bisacsh | |
650 | 7 | |a Radicalization |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
650 | 7 | |a Terrorists |x Psychology |2 fast | |
700 | 1 | |a Spaaij, R. F. J. |q (Ramon F. J.), |e author. |1 https://id.oclc.org/worldcat/entity/E39PBJppyKdJdy6RBHJ9rDVwG3 |0 http://id.loc.gov/authorities/names/n2004145450 | |
758 | |i has work: |a The age of lone wolf terrorism (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGWThxRCm7X4MV8JcWRjhb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Hamm, Mark S. |t Age of Lone Wolf Terrorism. |d La Vergne : Columbia University Press, ©2017 |z 9780231181747 |
830 | 0 | |a Studies in transgression. |0 http://id.loc.gov/authorities/names/no2016053572 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1628732 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a De Gruyter |b DEGR |n 9780231543774 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5275998 | ||
938 | |a EBSCOhost |b EBSC |n 1628732 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis37523081 | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00795728 | ||
938 | |a YBP Library Services |b YANK |n 13971323 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1023543806 |
---|---|
_version_ | 1816882413518716929 |
adam_text | |
any_adam_object | |
author | Hamm, Mark S. Spaaij, R. F. J. (Ramon F. J.) |
author_GND | http://id.loc.gov/authorities/names/n2004145450 |
author_facet | Hamm, Mark S. Spaaij, R. F. J. (Ramon F. J.) |
author_role | aut aut |
author_sort | Hamm, Mark S. |
author_variant | m s h ms msh r f j s rfj rfjs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6431 |
callnumber-raw | HV6431 .H3456 2017 |
callnumber-search | HV6431 .H3456 2017 |
callnumber-sort | HV 46431 H3456 42017 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Intro; Table of Contents; Foreword; Introduction: The Age of Lone Wolf Terrorism; 1. Identifying Commonalities Among Lone Wolf Terrorists; 2. Old Wine in New Skin: Reimagining Lone Wolf Terrorism; 3. The American Lone Wolf Terrorist: Trends, Modus Operandi, and Background Factors; 4. The Roots of Radicalization; 5. The Enablers; 6. Broadcasting Intent: The Key to Preventing Lone Wolf Terrorism; 7. Triggering Events; 8. The Radicalization Model of Lone Wolf Terrorism; 9. The Little Rock Military Shooting; 10. The Pittsburgh Police Shooting; 11. Lone Wolf Sting Operations. 12. Lone Wolf Terrorism and FBI MythmakingConclusion: Countering Lone Wolf Terrorism; Appendix: List of Cases; Notes; Index. |
ctrlnum | (OCoLC)1023543806 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06105cam a2200817 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1023543806</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">180217s2017 xx ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEGRU</subfield><subfield code="d">CNCGM</subfield><subfield code="d">IDEBK</subfield><subfield code="d">MERUC</subfield><subfield code="d">IDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">JSTOR</subfield><subfield code="d">WAU</subfield><subfield code="d">N$T</subfield><subfield code="d">GZM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">TEFOD</subfield><subfield code="d">STF</subfield><subfield code="d">LOA</subfield><subfield code="d">CUY</subfield><subfield code="d">ZCU</subfield><subfield code="d">ICG</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCO</subfield><subfield code="d">CNCEN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">LVT</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">TKN</subfield><subfield code="d">D6H</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">RECBK</subfield><subfield code="d">MM9</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INTCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">984686744</subfield><subfield code="a">990035507</subfield><subfield code="a">999654119</subfield><subfield code="a">1000382410</subfield><subfield code="a">1001979464</subfield><subfield code="a">1003183736</subfield><subfield code="a">1003990833</subfield><subfield code="a">1013960572</subfield><subfield code="a">1020001193</subfield><subfield code="a">1022691342</subfield><subfield code="a">1046104508</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780231543774</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0231543778</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780231181747</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0231181744</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.7312/hamm18174</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1023543806</subfield><subfield code="z">(OCoLC)984686744</subfield><subfield code="z">(OCoLC)990035507</subfield><subfield code="z">(OCoLC)999654119</subfield><subfield code="z">(OCoLC)1000382410</subfield><subfield code="z">(OCoLC)1001979464</subfield><subfield code="z">(OCoLC)1003183736</subfield><subfield code="z">(OCoLC)1003990833</subfield><subfield code="z">(OCoLC)1013960572</subfield><subfield code="z">(OCoLC)1020001193</subfield><subfield code="z">(OCoLC)1022691342</subfield><subfield code="z">(OCoLC)1046104508</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">1005411</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt1tkx252</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">827AA52B-39B6-4590-87A6-EC0DE839F890</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.H3456 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW026000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hamm, Mark S.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The age of lone wolf terrorism /</subfield><subfield code="c">Mark S. Hamm and Ramon Spaaij.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">La Vergne :</subfield><subfield code="b">Columbia University Press,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (335 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="b">PDF</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in Transgression</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro; Table of Contents; Foreword; Introduction: The Age of Lone Wolf Terrorism; 1. Identifying Commonalities Among Lone Wolf Terrorists; 2. Old Wine in New Skin: Reimagining Lone Wolf Terrorism; 3. The American Lone Wolf Terrorist: Trends, Modus Operandi, and Background Factors; 4. The Roots of Radicalization; 5. The Enablers; 6. Broadcasting Intent: The Key to Preventing Lone Wolf Terrorism; 7. Triggering Events; 8. The Radicalization Model of Lone Wolf Terrorism; 9. The Little Rock Military Shooting; 10. The Pittsburgh Police Shooting; 11. Lone Wolf Sting Operations.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">12. Lone Wolf Terrorism and FBI MythmakingConclusion: Countering Lone Wolf Terrorism; Appendix: List of Cases; Notes; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. In The Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination. Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers--whether jihadists, white supremacists, or other antigovernment extremists--and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorists</subfield><subfield code="x">Psychology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Radicalization.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2016002172</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00007517</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terroristes</subfield><subfield code="x">Psychologie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Radicalisation.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévention.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Terrorism.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Infrastructure.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Radicalization</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorists</subfield><subfield code="x">Psychology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Spaaij, R. F. J.</subfield><subfield code="q">(Ramon F. J.),</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJppyKdJdy6RBHJ9rDVwG3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2004145450</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The age of lone wolf terrorism (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGWThxRCm7X4MV8JcWRjhb</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Hamm, Mark S.</subfield><subfield code="t">Age of Lone Wolf Terrorism.</subfield><subfield code="d">La Vergne : Columbia University Press, ©2017</subfield><subfield code="z">9780231181747</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in transgression.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2016053572</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1628732</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9780231543774</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5275998</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1628732</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis37523081</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Recorded Books, LLC</subfield><subfield code="b">RECE</subfield><subfield code="n">rbeEB00795728</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13971323</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1023543806 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:13Z |
institution | BVB |
isbn | 9780231543774 0231543778 |
language | English |
oclc_num | 1023543806 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (335 pages) |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Columbia University Press, |
record_format | marc |
series | Studies in transgression. |
series2 | Studies in Transgression |
spelling | Hamm, Mark S., author. The age of lone wolf terrorism / Mark S. Hamm and Ramon Spaaij. La Vergne : Columbia University Press, 2017. 1 online resource (335 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Studies in Transgression Print version record. Intro; Table of Contents; Foreword; Introduction: The Age of Lone Wolf Terrorism; 1. Identifying Commonalities Among Lone Wolf Terrorists; 2. Old Wine in New Skin: Reimagining Lone Wolf Terrorism; 3. The American Lone Wolf Terrorist: Trends, Modus Operandi, and Background Factors; 4. The Roots of Radicalization; 5. The Enablers; 6. Broadcasting Intent: The Key to Preventing Lone Wolf Terrorism; 7. Triggering Events; 8. The Radicalization Model of Lone Wolf Terrorism; 9. The Little Rock Military Shooting; 10. The Pittsburgh Police Shooting; 11. Lone Wolf Sting Operations. 12. Lone Wolf Terrorism and FBI MythmakingConclusion: Countering Lone Wolf Terrorism; Appendix: List of Cases; Notes; Index. The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. In The Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination. Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers--whether jihadists, white supremacists, or other antigovernment extremists--and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens. Includes bibliographical references and index. In English. Terrorists Psychology. Radicalization. http://id.loc.gov/authorities/subjects/sh2016002172 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Terroristes Psychologie. Radicalisation. Terrorisme Prévention. POLITICAL SCIENCE Terrorism. bisacsh BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Radicalization fast Terrorism Prevention fast Terrorists Psychology fast Spaaij, R. F. J. (Ramon F. J.), author. https://id.oclc.org/worldcat/entity/E39PBJppyKdJdy6RBHJ9rDVwG3 http://id.loc.gov/authorities/names/n2004145450 has work: The age of lone wolf terrorism (Text) https://id.oclc.org/worldcat/entity/E39PCGWThxRCm7X4MV8JcWRjhb https://id.oclc.org/worldcat/ontology/hasWork Print version: Hamm, Mark S. Age of Lone Wolf Terrorism. La Vergne : Columbia University Press, ©2017 9780231181747 Studies in transgression. http://id.loc.gov/authorities/names/no2016053572 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1628732 Volltext |
spellingShingle | Hamm, Mark S. Spaaij, R. F. J. (Ramon F. J.) The age of lone wolf terrorism / Studies in transgression. Intro; Table of Contents; Foreword; Introduction: The Age of Lone Wolf Terrorism; 1. Identifying Commonalities Among Lone Wolf Terrorists; 2. Old Wine in New Skin: Reimagining Lone Wolf Terrorism; 3. The American Lone Wolf Terrorist: Trends, Modus Operandi, and Background Factors; 4. The Roots of Radicalization; 5. The Enablers; 6. Broadcasting Intent: The Key to Preventing Lone Wolf Terrorism; 7. Triggering Events; 8. The Radicalization Model of Lone Wolf Terrorism; 9. The Little Rock Military Shooting; 10. The Pittsburgh Police Shooting; 11. Lone Wolf Sting Operations. 12. Lone Wolf Terrorism and FBI MythmakingConclusion: Countering Lone Wolf Terrorism; Appendix: List of Cases; Notes; Index. Terrorists Psychology. Radicalization. http://id.loc.gov/authorities/subjects/sh2016002172 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Terroristes Psychologie. Radicalisation. Terrorisme Prévention. POLITICAL SCIENCE Terrorism. bisacsh BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Radicalization fast Terrorism Prevention fast Terrorists Psychology fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2016002172 http://id.loc.gov/authorities/subjects/sh00007517 |
title | The age of lone wolf terrorism / |
title_auth | The age of lone wolf terrorism / |
title_exact_search | The age of lone wolf terrorism / |
title_full | The age of lone wolf terrorism / Mark S. Hamm and Ramon Spaaij. |
title_fullStr | The age of lone wolf terrorism / Mark S. Hamm and Ramon Spaaij. |
title_full_unstemmed | The age of lone wolf terrorism / Mark S. Hamm and Ramon Spaaij. |
title_short | The age of lone wolf terrorism / |
title_sort | age of lone wolf terrorism |
topic | Terrorists Psychology. Radicalization. http://id.loc.gov/authorities/subjects/sh2016002172 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Terroristes Psychologie. Radicalisation. Terrorisme Prévention. POLITICAL SCIENCE Terrorism. bisacsh BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Radicalization fast Terrorism Prevention fast Terrorists Psychology fast |
topic_facet | Terrorists Psychology. Radicalization. Terrorism Prevention. Terroristes Psychologie. Radicalisation. Terrorisme Prévention. POLITICAL SCIENCE Terrorism. BUSINESS & ECONOMICS Infrastructure. SOCIAL SCIENCE General. Radicalization Terrorism Prevention Terrorists Psychology |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1628732 |
work_keys_str_mv | AT hammmarks theageoflonewolfterrorism AT spaaijrfj theageoflonewolfterrorism AT hammmarks ageoflonewolfterrorism AT spaaijrfj ageoflonewolfterrorism |