Abstract
Despite the wealth of research that has been conducted on global terrorism over recent years, few empirical studies have addressed ‘single-issue’ terrorism, and little is known about the targeting strategies employed by these groups. This article examines the targeting in 247 bomb attacks carried out by violent animal rights and anti-abortion extremists worldwide between 1978 and 2008. Using non-metric multidimensional scaling (MDS) the empirical data are used to construct a model of targeting behaviour that shows four modes of attack; two of which are primarily designed to cause economic damage or fear, and two of which are potentially lethal to the target occupants. The model is then used to compare the tactics of extremists associated with the two different causes and the implications for prevention are discussed.
Similar content being viewed by others
References
Animal Liberation Front. (2010) The ALF credo and guidelines, http://www.animalliberationfront.com/ALFront/alf_credo.htm, accessed 28 January 2015.
Clarke, R.V. and Felson, M. (eds.) (2008) Introduction: Criminology, routine activity, and rational choice. In: Routine Activity and Rational Choice: Advances in Criminological Theory. Vol. 5. New Brunswick, NJ: Transaction Publishers, pp. 1–14.
Clarke, R.V. and Newman, G.R. (2006) Outsmarting the Terrorists. Westport, CT: Praeger Security International.
Clarke, R.V. and Newman, G.R. (2009) Reducing the opportunities for terrorism: Applying the principles of situational crime prevention. In: W.G.K. Stritzke, S. Lewandowsky, D. Denemark, J. Clare and F. Morgan (eds.) Terrorism and Torture: An Interdisciplinary Perspective. New York: Cambridge University Press, pp. 86–105.
Cohen, L.E. and Felson, M. (1979) Social change and crime rate trends: A routine activity approach. American Sociological Review 44 (4): 588–608.
Coupe, T. and Blake, L. (2006) Daylight and darkness targeting strategies and the risks of being seen at residential burglaries. Criminology 44 (2): 431–464.
Enders, W. and Sandler, T. (2005) The Political Economy of Terrorism. New York: Cambridge University Press.
Federal Bureau of Investigation. (1999) Terrorism in the United States 1999: 30 Years of Terrorism: A Special Retrospective Edition. U.S. Department of Justice, Counterterrorism Threat Assessment and Warning Unit, http://www.fbi.gov/stats-services/publications/terror_99.pdf, accessed 28 January 2015.
Federal Bureau of Investigation. (2008) Headline archives: Putting intel to work: Against ELF and ALF terrorists, http://www.fbi.gov/page2/june08/ecoterror_063008.html, accessed 28 January 2015.
Garrison, A. (2004) Defining terrorism: Philosophy of the bomb, propaganda by deed and change through fear and violence. Criminal Justice Studies 17 (3): 259–279.
Gerlach, L. (2001) The structure of social movements: Environmental activism and its opponents. In: J. Arquilla and D. Ronfeldt (eds.) Networks and Netwars: The Future of Terror, Crime and Militancy. Santa Monica, CA: RAND Corporation, pp. 289–310.
Juergensmeyer, M. (2000) Terror in the Mind of God: The Global Rise of Religious Violence. Ewing, NJ: University of California Press.
LaFree, G., Dugan, L., Xie, M. and Singh, P. (2012) Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. Journal of Quantitative Criminology 28 (1): 7–29.
Lum, C., Kennedy, L.W. and Sherley, A. (2006) Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology 2 (2): 489–516.
Monaghan, R. (2000) Single-issue terrorism: A neglected phenomenon? Studies in Conflict and Terrorism 23 (4): 255–265.
National Abortion Federation. (2009) NAF violence and disruption statistics, http://prochoice.org/wp-content/uploads/violence_stats.pdf, accessed 28 January 2015.
North American Animal Liberation Press Office. (2009) History of the animal liberation movement, http://www.animalliberationpressoffice.org/Background.htm, accessed 28 January 2015.
Paynich, R. and Hill, B. (2010) Fundamentals of Crime Mapping: Principles and Practice. Sudbury, MA: Jones and Bartlett.
Pridemore, W.A. and Freilich, J. (2007) The impact of state laws protecting abortion clinics and reproductive rights on crimes against abortion providers: Deterrence, backlash, or neither? Law and Human Behavior 31 (6): 611–627.
Sandler, T. and Lapan, H. (1988) The calculus of dissent: An analysis of terrorists’ choice of targets. Synthese 76 (2): 245–261.
Smith, G. (1998) Commentary No. 74: Single Issue Terrorism. Ottawa, ON: Canadian Security Intelligence Service.
Staniforth, A. (2009) Blackstone’s Counter-Terrorism Handbook. Oxford: Oxford University Press.
Trujillo, H. (2005) The radical environmentalist movement. In: B. Jackson, J. Baker, P. Chalk, K. Cragin, J. Parachini and H. Trujillo (eds.) Aptitude for Destruction. Vol. 2: Case Studies of Organizational Learning In Five Terrorist Group. Santa Monica, CA: RAND Corporation, pp. 141–175.
Victoroff, J. (2005) The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution 49 (1): 3–42.
Vohryzek-Bolden, M., Olson-Raymer, G. and Whamond, J.O. (2001) Domestic Terrorism and Incident Management: Issues and Tactics. Springfield, IL: Charles C Thomas.
Wilson, M. (1995) Structuring qualitative data: Multidimensional scalogram analysis. In: G.M. Breakwell, S. Hammond and C. Fife-Shaw (eds.) Research Methods in Psychology. London: Sage, pp. 259–273.
Wilson, M.A. and Lemanski, L. (2013) Apparent intended lethality: Toward a theory of terrorist intent. Dynamics of Asymmetric Conflict 6 (1–3): 1–21.
Acknowledgements
Support for this research was provided by the Department of Homeland Security, Human Factors/Behavioral Science Division, through the National Consortium for the Study of Terrorism and Responses to Terrorism (START). Any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the Department of Homeland Security. The authors are grateful to Richard Legault for his helpful comments on an earlier draft.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lemanski, L., Wilson, M. Targeting strategies in single-issue bomb attacks. Secur J 29, 53–71 (2016). https://doi.org/10.1057/sj.2015.44
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2015.44