Exploring patterns of behaviour in violent Jihadist terrorists : : an analysis of six significant terrorist conspiracies in the UK / / Lindsay Clutterbuck, Richard Warnes.
An examination of the groups/cells and their 38 core individuals involved in the six most serious violent Jihadist terrorist conspiracies and attacks in the UK between 2004 and 2007 to see if they exhibited any specific types of behaviour.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2011 |
Edition: | 1st ed. |
Language: | English |
Physical Description: | 1 online resource (114 p.) |
Notes: | Prepared for the Airey Neave Trust--cover. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628541804498 |
---|---|
ctrlnum |
(CKB)2550000000075182 (EBL)826896 (OCoLC)741500866 (SSID)ssj0000672844 (PQKBManifestationID)11424670 (PQKBTitleCode)TC0000672844 (PQKBWorkID)10635804 (PQKB)10610290 (MiAaPQ)EBC826896 (Au-PeEL)EBL826896 (CaPaEBR)ebr10520594 (EXLCZ)992550000000075182 |
collection |
bib_alma |
record_format |
marc |
spelling |
Clutterbuck, Lindsay. Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. 1st ed. Santa Monica, Calif. : RAND Corporation, 2011. 1 online resource (114 p.) text txt computer c online resource cr Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. An examination of the groups/cells and their 38 core individuals involved in the six most serious violent Jihadist terrorist conspiracies and attacks in the UK between 2004 and 2007 to see if they exhibited any specific types of behaviour. English Prepared for the Airey Neave Trust--cover. Includes bibliographical references. Terrorism Great Britain. Terrorism Religious aspects Islam. Warnes, Richard. |
language |
English |
format |
eBook |
author |
Clutterbuck, Lindsay. |
spellingShingle |
Clutterbuck, Lindsay. Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. |
author_facet |
Clutterbuck, Lindsay. Warnes, Richard. |
author_variant |
l c lc |
author2 |
Warnes, Richard. |
author2_variant |
r w rw |
author2_role |
TeilnehmendeR |
author_sort |
Clutterbuck, Lindsay. |
title |
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / |
title_sub |
an analysis of six significant terrorist conspiracies in the UK / |
title_full |
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. |
title_fullStr |
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. |
title_full_unstemmed |
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / Lindsay Clutterbuck, Richard Warnes. |
title_auth |
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / |
title_new |
Exploring patterns of behaviour in violent Jihadist terrorists : |
title_sort |
exploring patterns of behaviour in violent jihadist terrorists : an analysis of six significant terrorist conspiracies in the uk / |
publisher |
RAND Corporation, |
publishDate |
2011 |
physical |
1 online resource (114 p.) |
edition |
1st ed. |
contents |
Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals. |
isbn |
1-280-12695-7 9786613530813 0-8330-5963-7 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6433 |
callnumber-sort |
HV 46433 G7 C58 42011 |
geographic_facet |
Great Britain. |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
300 - Social sciences, sociology & anthropology |
dewey-ones |
300 - Social sciences |
dewey-full |
300 |
dewey-sort |
3300 |
dewey-raw |
300 |
dewey-search |
300 |
oclc_num |
741500866 |
work_keys_str_mv |
AT clutterbucklindsay exploringpatternsofbehaviourinviolentjihadistterroristsananalysisofsixsignificantterroristconspiraciesintheuk AT warnesrichard exploringpatternsofbehaviourinviolentjihadistterroristsananalysisofsixsignificantterroristconspiraciesintheuk |
status_str |
n |
ids_txt_mv |
(CKB)2550000000075182 (EBL)826896 (OCoLC)741500866 (SSID)ssj0000672844 (PQKBManifestationID)11424670 (PQKBTitleCode)TC0000672844 (PQKBWorkID)10635804 (PQKB)10610290 (MiAaPQ)EBC826896 (Au-PeEL)EBL826896 (CaPaEBR)ebr10520594 (EXLCZ)992550000000075182 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1806251883772248064 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01206nam a2200301 a 4500</leader><controlfield tag="001">993628541804498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#-n---------</controlfield><controlfield tag="008">120112s2011 cau ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-280-12695-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613530813</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-5963-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2550000000075182</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)826896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)741500866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000672844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11424670</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000672844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10635804</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10610290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC826896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL826896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10520594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992550000000075182</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e-uk---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6433.G7</subfield><subfield code="b">C58 2011</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">300</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clutterbuck, Lindsay.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring patterns of behaviour in violent Jihadist terrorists :</subfield><subfield code="b">an analysis of six significant terrorist conspiracies in the UK /</subfield><subfield code="c">Lindsay Clutterbuck, Richard Warnes.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, Calif. :</subfield><subfield code="b">RAND Corporation,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (114 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface -- Contents -- Acknowledgments -- Chapter 1: Introduction -- 1.1 An overview of relevant research -- 1.2 Research design -- 1.3 Outline of this report -- Chapter 2: Violent Jihadist groups/cells in the UK -- 2.1 Introduction -- 2.2 The six case studies -- 2.2.1 Operation Crevice -- 2.2.2 Operation Rhyme -- 2.2.3 7/7 -- 2.2.4 21/7 -- 2.2.5 Operation `Overt` -- 2.2.6 Operation `Seagram` -- Chapter 3: How the groups/cells were organised -- 3.1 Introduction -- 3.2 The motivation and aims of the groups/cells -- 3.2.1 Motivation -- 3.2.2 The influence of AQ in Pakistan on the aims of the groups/cells -- 3.2.3 Aims -- 3.3 Characteristics and behaviours of groups/cells relevant to their structure and function -- 3.3.1 Size -- 3.3.2 Links in the UK between groups/cells -- 3.3.3 Aspects of training and travel -- 3.4 Characteristics and behaviours of group/cell members relevant to group/cell structure and function -- 3.4.1 Sex and age range -- 3.4.2 Marital status and children -- 3.4.3 Residency and citizenship -- 3.4.4 Nationality, cultural heritage and origins -- 3.5 The personal behaviours of group/cell members -- 3.5.1 Behaviours relating to an individual's religion and religious practices -- 3.5.2 Behaviours relating to an individual's social relationships -- 3.5.3 Behaviours relating to an individual's general lifestyle -- 3.6 Characteristics and behaviours of the leaders of the groups/cells -- 3.6.1 Age, marital status and children -- 3.6.2 Heritage and origins -- 3.6.3 Experiences of violent Jihad and connections to AQ -- 3.6.4 Group/cell leaders and the links between groups/cells in the UK -- 3.7 Conclusion -- Chapter 4: How the groups/cells functioned -- 4.1 Attack planning and preparations -- 4.1.1 Intelligence, surveillance and reconnaissance (ISR) and "dry runs" -- 4.1.2 Targets attacked or selected -- 4.1.3 Targets considered -- 4.1.4 "Suicide videos" and other personal communications -- 4.1.5 Explosives -- 4.1.6 Premises -- 4.1.7 Use of documents to advance terrorist activity -- 4.1.8 Use of criminality to advance terrorist activity -- 4.1.9 Acquisition of firearms -- 4.1.10 Allaying suspicion -- 4.1.11 Other personal behaviours -- 4.2 Conclusion -- Chapter 5: Can past behaviour indicate potential future intentions? -- 5.1 Observable behaviours -- 5.1.1 Behaviours and their prevalence -- 5.2 The implications for counter-terrorism -- 5.2.1 A potential approach -- 5.3 The applicability of behaviours to other contexts -- 5.3.1 Other significant UK group/cell terrorist conspiracies -- 5.3.2 UK "Lone Attackers" and terrorism -- 5.3.3 The international applicability of the behaviours -- 5.4 Conclusion -- References -- Appendices -- Appendix A: Datasets of overall group/cell characteristics and behaviours -- Appendix B: Dataset of an individual's behaviour when acting on behalf of their particular group/cell -- Appendix C: Dataset of characteristics and potentially relevant personal behaviours in individuals.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An examination of the groups/cells and their 38 core individuals involved in the six most serious violent Jihadist terrorist conspiracies and attacks in the UK between 2004 and 2007 to see if they exhibited any specific types of behaviour.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Prepared for the Airey Neave Trust--cover.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">Great Britain.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Religious aspects</subfield><subfield code="x">Islam.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warnes, Richard.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-08-02 06:24:24 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-25 23:16:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350501390004498&Force_direct=true</subfield><subfield code="Z">5350501390004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350501390004498</subfield></datafield></record></collection> |