Skip to main content

Threats and Attack Strategies Used in Past Events: A Review

  • Chapter
  • First Online:
Technology Development for Security Practitioners

Part of the book series: Security Informatics and Law Enforcement ((SILE))

  • 704 Accesses

Abstract

The subject of this chapter is the review of threats and attack strategies from past events. This chapter is the result of the work carried out during the course of the European Union’s Horizon 2020 research and innovation project EXERTER: Security of Explosives pan-European Specialists Network (Grant Agreement: 786805, http://www.exerter-h2020.eu/). It is of fundamental importance that knowledge and analysis of past events will generate understanding and projections of the emerging threats and attack strategies and the evolution of these.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Bibliography

  1. Teichman, J. (1996). How to define terrorism. In C. A. Gearty (Ed.), Terrorism. Aldershot: Dartmouth.

    Google Scholar 

  2. Cronin, A. K. (2003). Behind the curve: Globalization and international terrorism. International Security, 27(3), 30–58.

    Article  Google Scholar 

  3. Rapoport, D. C. (2002). The four waves of rebel terror and September 11. Anthropoetics, 8(1), 1–17.

    Google Scholar 

  4. Neumann, P. R. (2016). Radicalized: New jihadists and the threat to the west. London: Bloomsbury Publishing.

    Book  Google Scholar 

  5. Hoffman, B. (2006). Inside terrorism. New York: Columbia University Press.

    Google Scholar 

  6. Europol. (2019). TE-SAT 2018: EU terrorism situation and trend report. Publications Office of the European Union, p 13, 64

    Google Scholar 

  7. Simon, S., & Benjamin, D. (2000). America and the new terrorism. Survival, 42(1), 59.

    Article  Google Scholar 

  8. European Parliament. (2018). The return of foreign fighters to EU soil: Ex-post evaluation. Brussels: European Parliamentary Research Service, pp 5–6. Retrieved from: https://www.europarl.europa.eu/thinktank/en/search.html?word=foreign+fighters

  9. Das, R. (2016). The burden of insecurity: Using theories of international relations to make-sense of the state of post-9/11 politics. Online article. Retrieved from: http://relationsinternational.com/burden-insecurity-using-theories-international-relations-make-sense-state-post-911-politics

  10. START (National Consortium for the Study of Terrorism and Responses to Terrorism). (2018). Global terrorism database (GTD). https://www.datagraver.com/case/people-killed-by-terrorism-per-year-in-western-europe-1970-2015 with data deriving from START.

  11. Jones, S. G., Toucas, B., & Markusen, M. B. (2018). From the IRA to the Islamic state: The evolving terrorism threat in Europe. Washington, DC: Center for Strategic & International Studies, p iv.

    Google Scholar 

  12. Ganor, B. (2015). Global alert: The rationality of modern Islamist terrorism and the challenge to the liberal democratic world. New York: Columbia University Press, p 1.

    Book  Google Scholar 

  13. Ellis, C., Pantucci, R., van Zuijdewijn, J. R., Bakker, E., Gomis, B., Palombi, S., & Smith, M. (2016). Lone-actor terrorism analysis paper (Countering lone-actor terrorism series no. 4). London: Royal United Services Institute for Defence and Security Studies, p iv.

    Google Scholar 

  14. Joosse, P. (2007). Leaderless resistance and ideological inclusion: The case of the Earth Liberation Front. Terrorism and Political Violence, 19(3), 351. https://doi.org/10.1080/09546550701424042

    Article  Google Scholar 

  15. Tucker, D. (2001). What is new about the new terrorism and how dangerous is it? Terrorism and Political Violence, 13(3), 9. https://doi.org/10.1080/09546550109609688

    Article  Google Scholar 

  16. Mockaitis, T. R. (2007). The “new” terrorism: Myths and reality. London: Greenwood Publishing Group, p 55.

    Google Scholar 

  17. Europol. (2020). TE-SAT 2019: EU Terrorism Situation and Trend Report. Publications Office of the European Union, p 20–21. Retrieved from https://www.europol.europa.eu/activities-services/main-reports/european-union-terrorism-situation-and-trend-report-te-sat-2020

  18. Europol (2019). Do criminals dream of electric sheep? How technology shapes the future of crime and law enforcement. Publications Office of the European Union, p 10–15. Retrieved from https://www.europol.europa.eu/newsroom/news/do-criminals-dream-of-electric-sheep-how-technology-shapes-future-ofcrime-and-law-enforcement

  19. Burton, F., & Stewart, S. (2008). The ‘lone wolf’ disconnect. Terrorism Intelligence Report-STRATFOR – Online article. Retrieved from https:// worldview.stratfor.com/article/lone-wolf-disconnect

  20. Europol. (2019). Do criminals dream of electric sheep? How technology shapes the future of crime and law enforcement. Publications Office of the European Union. Online article, https://edition.cnn.com/2017/06/21/europe/brussels-train-station-attack/index.html

Download references

Acknowledgement

The work reported has been performed during the course and funded by the European Union’s Horizon 2020 research and innovation project EXERTER: Security of Explosives pan-European Specialists Network (Grant Agreement: 786805). The content of this chapter “Threats and attack strategies used in past events” reflects only the authors’ views, and the European Union is not liable for any use that may be made of the information contained herein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ioannis Daniilidis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Daniilidis, I., Andriotis, S. (2021). Threats and Attack Strategies Used in Past Events: A Review. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69460-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69459-3

  • Online ISBN: 978-3-030-69460-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics