Skip to main content
Log in

Targeting strategies in single-issue bomb attacks

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Despite the wealth of research that has been conducted on global terrorism over recent years, few empirical studies have addressed ‘single-issue’ terrorism, and little is known about the targeting strategies employed by these groups. This article examines the targeting in 247 bomb attacks carried out by violent animal rights and anti-abortion extremists worldwide between 1978 and 2008. Using non-metric multidimensional scaling (MDS) the empirical data are used to construct a model of targeting behaviour that shows four modes of attack; two of which are primarily designed to cause economic damage or fear, and two of which are potentially lethal to the target occupants. The model is then used to compare the tactics of extremists associated with the two different causes and the implications for prevention are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

References

  • Animal Liberation Front. (2010) The ALF credo and guidelines, http://www.animalliberationfront.com/ALFront/alf_credo.htm, accessed 28 January 2015.

  • Clarke, R.V. and Felson, M. (eds.) (2008) Introduction: Criminology, routine activity, and rational choice. In: Routine Activity and Rational Choice: Advances in Criminological Theory. Vol. 5. New Brunswick, NJ: Transaction Publishers, pp. 1–14.

    Google Scholar 

  • Clarke, R.V. and Newman, G.R. (2006) Outsmarting the Terrorists. Westport, CT: Praeger Security International.

    Google Scholar 

  • Clarke, R.V. and Newman, G.R. (2009) Reducing the opportunities for terrorism: Applying the principles of situational crime prevention. In: W.G.K. Stritzke, S. Lewandowsky, D. Denemark, J. Clare and F. Morgan (eds.) Terrorism and Torture: An Interdisciplinary Perspective. New York: Cambridge University Press, pp. 86–105.

    Chapter  Google Scholar 

  • Cohen, L.E. and Felson, M. (1979) Social change and crime rate trends: A routine activity approach. American Sociological Review 44 (4): 588–608.

    Article  Google Scholar 

  • Coupe, T. and Blake, L. (2006) Daylight and darkness targeting strategies and the risks of being seen at residential burglaries. Criminology 44 (2): 431–464.

    Article  Google Scholar 

  • Enders, W. and Sandler, T. (2005) The Political Economy of Terrorism. New York: Cambridge University Press.

    Book  Google Scholar 

  • Federal Bureau of Investigation. (1999) Terrorism in the United States 1999: 30 Years of Terrorism: A Special Retrospective Edition. U.S. Department of Justice, Counterterrorism Threat Assessment and Warning Unit, http://www.fbi.gov/stats-services/publications/terror_99.pdf, accessed 28 January 2015.

  • Federal Bureau of Investigation. (2008) Headline archives: Putting intel to work: Against ELF and ALF terrorists, http://www.fbi.gov/page2/june08/ecoterror_063008.html, accessed 28 January 2015.

  • Garrison, A. (2004) Defining terrorism: Philosophy of the bomb, propaganda by deed and change through fear and violence. Criminal Justice Studies 17 (3): 259–279.

    Article  Google Scholar 

  • Gerlach, L. (2001) The structure of social movements: Environmental activism and its opponents. In: J. Arquilla and D. Ronfeldt (eds.) Networks and Netwars: The Future of Terror, Crime and Militancy. Santa Monica, CA: RAND Corporation, pp. 289–310.

    Google Scholar 

  • Juergensmeyer, M. (2000) Terror in the Mind of God: The Global Rise of Religious Violence. Ewing, NJ: University of California Press.

    Google Scholar 

  • LaFree, G., Dugan, L., Xie, M. and Singh, P. (2012) Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. Journal of Quantitative Criminology 28 (1): 7–29.

    Article  Google Scholar 

  • Lum, C., Kennedy, L.W. and Sherley, A. (2006) Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology 2 (2): 489–516.

    Google Scholar 

  • Monaghan, R. (2000) Single-issue terrorism: A neglected phenomenon? Studies in Conflict and Terrorism 23 (4): 255–265.

    Article  Google Scholar 

  • National Abortion Federation. (2009) NAF violence and disruption statistics, http://prochoice.org/wp-content/uploads/violence_stats.pdf, accessed 28 January 2015.

  • North American Animal Liberation Press Office. (2009) History of the animal liberation movement, http://www.animalliberationpressoffice.org/Background.htm, accessed 28 January 2015.

  • Paynich, R. and Hill, B. (2010) Fundamentals of Crime Mapping: Principles and Practice. Sudbury, MA: Jones and Bartlett.

    Google Scholar 

  • Pridemore, W.A. and Freilich, J. (2007) The impact of state laws protecting abortion clinics and reproductive rights on crimes against abortion providers: Deterrence, backlash, or neither? Law and Human Behavior 31 (6): 611–627.

    Article  Google Scholar 

  • Sandler, T. and Lapan, H. (1988) The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese 76 (2): 245–261.

    Article  Google Scholar 

  • Smith, G. (1998) Commentary No. 74: Single Issue Terrorism. Ottawa, ON: Canadian Security Intelligence Service.

    Google Scholar 

  • Staniforth, A. (2009) Blackstone’s Counter-Terrorism Handbook. Oxford: Oxford University Press.

    Google Scholar 

  • Trujillo, H. (2005) The radical environmentalist movement. In: B. Jackson, J. Baker, P. Chalk, K. Cragin, J. Parachini and H. Trujillo (eds.) Aptitude for Destruction. Vol. 2: Case Studies of Organizational Learning In Five Terrorist Group. Santa Monica, CA: RAND Corporation, pp. 141–175.

    Google Scholar 

  • Victoroff, J. (2005) The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution 49 (1): 3–42.

    Article  Google Scholar 

  • Vohryzek-Bolden, M., Olson-Raymer, G. and Whamond, J.O. (2001) Domestic Terrorism and Incident Management: Issues and Tactics. Springfield, IL: Charles C Thomas.

    Google Scholar 

  • Wilson, M. (1995) Structuring qualitative data: Multidimensional scalogram analysis. In: G.M. Breakwell, S. Hammond and C. Fife-Shaw (eds.) Research Methods in Psychology. London: Sage, pp. 259–273.

    Google Scholar 

  • Wilson, M.A. and Lemanski, L. (2013) Apparent intended lethality: Toward a theory of terrorist intent. Dynamics of Asymmetric Conflict 6 (1–3): 1–21.

    Article  Google Scholar 

Download references

Acknowledgements

Support for this research was provided by the Department of Homeland Security, Human Factors/Behavioral Science Division, through the National Consortium for the Study of Terrorism and Responses to Terrorism (START). Any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the Department of Homeland Security. The authors are grateful to Richard Legault for his helpful comments on an earlier draft.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Margaret Wilson.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lemanski, L., Wilson, M. Targeting strategies in single-issue bomb attacks. Secur J 29, 53–71 (2016). https://doi.org/10.1057/sj.2015.44

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2015.44

Keywords

Navigation