Abstract
The subject of this chapter is the review of threats and attack strategies from past events. This chapter is the result of the work carried out during the course of the European Union’s Horizon 2020 research and innovation project EXERTER: Security of Explosives pan-European Specialists Network (Grant Agreement: 786805, http://www.exerter-h2020.eu/). It is of fundamental importance that knowledge and analysis of past events will generate understanding and projections of the emerging threats and attack strategies and the evolution of these.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Bibliography
Teichman, J. (1996). How to define terrorism. In C. A. Gearty (Ed.), Terrorism. Aldershot: Dartmouth.
Cronin, A. K. (2003). Behind the curve: Globalization and international terrorism. International Security, 27(3), 30–58.
Rapoport, D. C. (2002). The four waves of rebel terror and September 11. Anthropoetics, 8(1), 1–17.
Neumann, P. R. (2016). Radicalized: New jihadists and the threat to the west. London: Bloomsbury Publishing.
Hoffman, B. (2006). Inside terrorism. New York: Columbia University Press.
Europol. (2019). TE-SAT 2018: EU terrorism situation and trend report. Publications Office of the European Union, p 13, 64
Simon, S., & Benjamin, D. (2000). America and the new terrorism. Survival, 42(1), 59.
European Parliament. (2018). The return of foreign fighters to EU soil: Ex-post evaluation. Brussels: European Parliamentary Research Service, pp 5–6. Retrieved from: https://www.europarl.europa.eu/thinktank/en/search.html?word=foreign+fighters
Das, R. (2016). The burden of insecurity: Using theories of international relations to make-sense of the state of post-9/11 politics. Online article. Retrieved from: http://relationsinternational.com/burden-insecurity-using-theories-international-relations-make-sense-state-post-911-politics
START (National Consortium for the Study of Terrorism and Responses to Terrorism). (2018). Global terrorism database (GTD). https://www.datagraver.com/case/people-killed-by-terrorism-per-year-in-western-europe-1970-2015 with data deriving from START.
Jones, S. G., Toucas, B., & Markusen, M. B. (2018). From the IRA to the Islamic state: The evolving terrorism threat in Europe. Washington, DC: Center for Strategic & International Studies, p iv.
Ganor, B. (2015). Global alert: The rationality of modern Islamist terrorism and the challenge to the liberal democratic world. New York: Columbia University Press, p 1.
Ellis, C., Pantucci, R., van Zuijdewijn, J. R., Bakker, E., Gomis, B., Palombi, S., & Smith, M. (2016). Lone-actor terrorism analysis paper (Countering lone-actor terrorism series no. 4). London: Royal United Services Institute for Defence and Security Studies, p iv.
Joosse, P. (2007). Leaderless resistance and ideological inclusion: The case of the Earth Liberation Front. Terrorism and Political Violence, 19(3), 351. https://doi.org/10.1080/09546550701424042
Tucker, D. (2001). What is new about the new terrorism and how dangerous is it? Terrorism and Political Violence, 13(3), 9. https://doi.org/10.1080/09546550109609688
Mockaitis, T. R. (2007). The “new” terrorism: Myths and reality. London: Greenwood Publishing Group, p 55.
Europol. (2020). TE-SAT 2019: EU Terrorism Situation and Trend Report. Publications Office of the European Union, p 20–21. Retrieved from https://www.europol.europa.eu/activities-services/main-reports/european-union-terrorism-situation-and-trend-report-te-sat-2020
Europol (2019). Do criminals dream of electric sheep? How technology shapes the future of crime and law enforcement. Publications Office of the European Union, p 10–15. Retrieved from https://www.europol.europa.eu/newsroom/news/do-criminals-dream-of-electric-sheep-how-technology-shapes-future-ofcrime-and-law-enforcement
Burton, F., & Stewart, S. (2008). The ‘lone wolf’ disconnect. Terrorism Intelligence Report-STRATFOR – Online article. Retrieved from https:// worldview.stratfor.com/article/lone-wolf-disconnect
Europol. (2019). Do criminals dream of electric sheep? How technology shapes the future of crime and law enforcement. Publications Office of the European Union. Online article, https://edition.cnn.com/2017/06/21/europe/brussels-train-station-attack/index.html
Acknowledgement
| The work reported has been performed during the course and funded by the European Union’s Horizon 2020 research and innovation project EXERTER: Security of Explosives pan-European Specialists Network (Grant Agreement: 786805). The content of this chapter “Threats and attack strategies used in past events” reflects only the authors’ views, and the European Union is not liable for any use that may be made of the information contained herein. |
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Daniilidis, I., Andriotis, S. (2021). Threats and Attack Strategies Used in Past Events: A Review. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-69460-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69459-3
Online ISBN: 978-3-030-69460-9
eBook Packages: EngineeringEngineering (R0)