Skip to main content

Exploring the hidden social networks of ‘lone actor’ terrorists

Abstract

Terrorism has typically been considered an organized activity undertaken by networks of individuals who share a collective identity and purpose. In recent years, media, law enforcement and scholarly attention has increasingly focused on the construct of the lone actor terrorist. However, lone actor terrorism has suffered from significant conceptual confusion, particularly with regard to whether such actors actually radicalize and/or undertake acts of violence alone. In order to contribute to a more nuanced understanding of this emerging phenomenon, this paper analyzes five lone actor attacks perpetrated in Australia between September 2014 and the end of 2017. It examines what (if any) interpersonal relationships these lone actors had with others, along with the nature of such connections and any ideological or logistical support these individuals may have provided. A personal network design is used to visualize interpersonal relationships and explore the nature of such connections. The paper concludes by discussing implications for policy and practice, and for the construct of the lone actor.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Notes

  1. 1.

    Islamism refers to “activism justified with primary reference to Islam” ([19], p. 1).

  2. 2.

    While the terms lone wolf and lone actor are often used interchangeably, the term “lone actor” (or variants) is increasingly replacing the term “lone wolf” [27]. In this paper, we use the term “lone actor” for the same reasons others have shifted away from the term “lone wolf”.

References

  1. 1.

    Spaaij, R. (2010). The enigma of lone wolf terrorism: An assessment. Studies in Conflict and Terrorism, 33(9), 854–870.

    Google Scholar 

  2. 2.

    Bjørgo, T. (2005). Introduction. In T. Bjørgo (Ed.), Root causes of terrorism: Myths, realities, and ways forward. New York: Routledge.

    Google Scholar 

  3. 3.

    Atran, S. (2008). The making of a terrorist: A need for understanding from the field. Testimony before the House Appropriations Subcommittee on Homeland Security, Washington, DC, 12.

  4. 4.

    Everton, S. F. (2012). Disrupting dark networks. New York: Cambridge University Press.

    Google Scholar 

  5. 5.

    Harris-Hogan, S., & Barrelle, K. (2018). Young blood: Understanding the emergence of a new cohort of Australian jihadists. Terrorism and Political Violence, 1–22.

  6. 6.

    Malm, A., Nash, R., & Moghadam, R. (2017). Social network analysis and terrorism. In J. D. LaFree GaF (Ed.), The handbook of the criminology of terrorism (pp. 221–231). Wiley-Blackwell: Hoboken.

    Google Scholar 

  7. 7.

    Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.

    Google Scholar 

  8. 8.

    Sageman, M. (2008). The next generation of terror. Foreign Policy, 165, 37–42.

    Google Scholar 

  9. 9.

    BBC. (2016). 7 September. BBC: Australia’s PM gives terror warning at Asean summit https://www.bbc.com/news/world-australia-37283792.

  10. 10.

    Washington Post Staff. (2016, June 15). President Obama’s remarks on ‘radical Islam’ after Orlando shooting. The Washington Post. Reviwed at: https://www.washingtonpost.com/news/post-politics/wp/2016/06/14/president-obamas-remarks-after-national-security-council-meeting-on-islamic-state/?noredirect=on

  11. 11.

    Kaplan, J., Lööw, H., & Malkki, L. (2014). Introduction to the special issue on lone wolf and autonomous cell terrorists. Terrorism and Political Violence, 26(1), 1–12.

    Google Scholar 

  12. 12.

    Schuurman, B., Lindekilde, L., Malthaner, S., O’Connor, F., Gill, P., & Bouhana, N. (2019). End of the. Lone Wolf: The typology that should not have been Studies in Conflict and Terrorism., 42(8), 771–778.

    Google Scholar 

  13. 13.

    Spaaij, R., & Hamm, M. S. (2015). Endgame? Sports events as symbolic targets in lone wolf terrorism. Studies in Conflict & Terrorism, 38(12), 1022–1037.

    Google Scholar 

  14. 14.

    Pantucci, R., Ellis, C. & Chaplais, L. (2015). Lone-actor terrorism - literature review. Royal United Services Institute Countering Lone Actor Terrorism Series No. 1. London..

  15. 15.

    Hamm, M. S., & Spaaij, R. (2017). The age of lone wolf terrorism. New York: Columbia University Press.

    Google Scholar 

  16. 16.

    Pantucci, R. (2011). A typology of lone wolves: Preliminary analysis of lone Islamist terrorists. In Development in radicalization and political violence. London: International Centre for the Study of Radicalization and Political Violence.

    Google Scholar 

  17. 17.

    Ellis, C., Pantucci, R., de Roy van Zuijdewijn, J., Bakker, E., Gomis, B., Palombi, S., & Smith, M. (2016). Lone-actor terrorism final report. Countering Lone-Actor Terrorism Series No. 11. London: Royal United Services Institute for Defence and Security Studies.

    Google Scholar 

  18. 18.

    Berntzen, L.E. & Sandberg, S. (2014), The collective nature of lone wolf terrorism: Anders Behring Breivik and the anti-Islamic social movement. Terrorism and Political Violence, 26 (5), 759-779. .

  19. 19.

    Hegghammer, T. (2013). Should I stay or should I go? Explaining variation in Western jihadists’ choice between domestic and foreign fighting. American Political Science Review, 107(1), 1–15.

    Google Scholar 

  20. 20.

    Hoffman, B. (2017). Policy Analysis 2842 - Lone wolf: Passing fad or terror threat of the future? Available at: https://www.washingtoninstitute.org/policy-analysis/view/lone-wolf-passing-fad-or-terror-threat-of-the-future.

  21. 21.

    Nesser, P. (2012). Research note: Single actor terrorism: Scope, characteristics and explanations. Perspectives on Terrorism, 6(6), 61–73.

    Google Scholar 

  22. 22.

    Simcox, R. (2017). European Islamist plots and attacks since 2014 – And how the U.S. can help prevent them. Available at: https://www.heritage.org/europe/report/european-islamist-plots-and-attacks-2014-and-how-the-us-can-help-prevent-them.

  23. 23.

    Levitt, M. (2017). Policy Analysis 2842 - Lone wolf: Passing fad or terror threat of the future? Available at: https://www.washingtoninstitute.org/policy-analysis/view/lone-wolf-passing-fad-or-terror-threat-of-the-future.

  24. 24.

    Europol. (2018). European Union terrorism situation & trend report Te-stat, 2018. The Hague: European Union Agency for Law Enforcement Cooperation, 2018.

  25. 25.

    Australian Security Intelligence Organisation. (2017). ASIO annual report 2016–17. Canberra: Commonwealth of Australia.

    Google Scholar 

  26. 26.

    Public Safety Canada. (2017). 2017 public report on the terrorist threat to Canada: Building a safe and resilient Canada. Canada.

    Google Scholar 

  27. 27.

    Parker, D., Pearce, J. M., Lindekilde, L., & Rogers, M. B. (2019). Press coverage of lone-actor terrorism in the UK and Denmark: Shaping the reactions of the public, affected communities and copycat attackers. Critical Studies on Terrorism, 12(1), 110–131.

    Google Scholar 

  28. 28.

    Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent behaviors of lone-actor terrorists. Journal of Forensic Sciences, 59(2), 425–435.

    Google Scholar 

  29. 29.

    Perry, S., Hasisi, B., & Perry, G. (2019). Lone terrorists: A study of run-over attacks in Israel. European Journal of Criminology, 16(1), 102–123.

    Google Scholar 

  30. 30.

    Schuurman, B., Bakker, E., Gill, P., & Bouhana, N. (2018). Lone actor terrorist attack planning and preparation: A data-driven analysis. Journal of Forensic Sciences, 63(4), 1191–1200.

  31. 31.

    Hofmann, D. C. (2018). How “alone” are lone-actors? Exploring the ideological, signaling, and support networks of lone-actor terrorists. Studies in Conflict & Terrorism, 1–22.

  32. 32.

    Burcher, M., & Whelan, C. (2018). Social network analysis as a tool for criminal intelligence: Understanding its potential from the perspectives of intelligence analysts. Trends in Organized Crime, 21(3), 278–294.

  33. 33.

    Spaaij, R. (2011). Understanding lone wolf terrorism: Global patterns, motivations and prevention.New York. Springer Science & Business Media.

  34. 34.

    Hoffman, B. (2006). Inside terrorism. New York: Columbia University Press.

    Google Scholar 

  35. 35.

    Danish Security and Intelligence Service. (2011). The threat from solo terrorism and lone wolf terrorism. Denmark.

    Google Scholar 

  36. 36.

    Hewitt, C. (2003). Understanding terrorism in America. New York: Routledge.

    Google Scholar 

  37. 37.

    Gill, P. (2015). Lone-actor terrorists: A behavioural analysis. New York: Routledge.

    Google Scholar 

  38. 38.

    Stern, J. (2003). Terror in the name of god. New York: Ecco.

    Google Scholar 

  39. 39.

    Becker, M. (2014). Explaining lone wolf target selection in the United States. Studies in Conflict & Terrorism, 37, 959–978.

    Google Scholar 

  40. 40.

    Sageman, M. (2017). Turning to political violence: The emergence of terrorism. Philadelphia: University of Pennsylvania press.

    Google Scholar 

  41. 41.

    Marchment, Z., Bouhana, N., & Gill, P. (2018). Lone actor terrorists: A residence-to-crime approach. Terrorism and Political Violence, 1–26.

  42. 42.

    Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2018). Analyzing social networks. Los Angeles: Sage.

    Google Scholar 

  43. 43.

    Prell, C. (2012). Social network analysis: History, theory and methodology. London: Sage.

    Google Scholar 

  44. 44.

    Scott, J., & Carrington, P. J. (2011). The SAGE handbook of social network analysis. London: SAGE.

    Google Scholar 

  45. 45.

    Bright, D. A., Whelan, C., & Harris-Hogan, S. (2018). On the durability of terrorist networks: Revealing the hidden connections between Jihadist cells. Studies in Conflict and Terrorism., 43, 638–656. https://doi.org/10.1080/1057610X.2018.1494411.

  46. 46.

    Bouchard, M. (2015). Social networks, terrorism and counter-terrorism: Radical and connected. New York: Routledge.

    Google Scholar 

  47. 47.

    Burcher, M., & Whelan, C. (2015). Social network analysis and small group 'dark' networks: An analysis of the London bombers and the problem of 'fuzzy' boundaries. Global Crime, 16(2), 104–122.

    Google Scholar 

  48. 48.

    de Bie, J. L., de Poot, C. J., Freilich, J. D., & Chermak, S. M. (2017). Changing organizational structures of jihadist networks in the Netherlands. Social Networks, 48, 270–283.

    Google Scholar 

  49. 49.

    Harris-Hogan, S. (2012). Australian neo-jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35(4), 298–314.

    Google Scholar 

  50. 50.

    Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioural Sciences of Terrorism and Political Aggression, 5(2), 137–154.

    Google Scholar 

  51. 51.

    Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The application to counterterrorism and intelligence. Studies in Conflict and Terrorism, 29(6), 559–575.

    Google Scholar 

  52. 52.

    Krebs, V. E. (2002). Uncloaking terrorist networks. First Monday, 7(4).

  53. 53.

    Magouirk, J., Atran, S., & Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict & Terrorism, 31(1), 1–16.

    Google Scholar 

  54. 54.

    Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. Political Science & Politics, 44(1), 45–50.

    Google Scholar 

  55. 55.

    Porter, L. E., & Kebbell, M. R. (2011). Radicalization in Australia: Examining Australia's convicted terrorists. Psychiatry, Psychology and Law, 18(2), 212–231.

    Google Scholar 

  56. 56.

    Rodriguez, J.A. (2005). The march 11th terrorist network: In its weakness lies its strengths XXV International Sunbelt Conference. Los Angeles.

    Google Scholar 

  57. 57.

    Borgatti, S. P., Everett, M. G., & Freeman, L. C. (2002). Ucinet for windows: Software for social network analysis (p. 2006). Harvard, MA: Analytic Technologies.

    Google Scholar 

  58. 58.

    Ole, J. (2017). Finding into death with inquest: Ahmad Numan Haider. Melbourne: Coroners Court of Victoria.

    Google Scholar 

  59. 59.

    Banks, L. (2015, October 7). Farhad Jabar asked mum for his favourite meal, only to go out and commit brutal murder. In Daily telegraph Available at: https://www.dailytelegraph.com.au/news/nsw/farhad-jabar-asked-mum-for-his-favourite-meal-only-to-go-out-and-commit-brutal-murder/news-story/784c6f838a1b7277c343f22126c82a83.

  60. 60.

    R v Alou (No. 4) [2018] NSWSC 221 (1 March 2018). Available from http://www.austlii.edu.au/

  61. 61.

    Allard, T. & Ralson, N. (2015, October 10). Parramatta shooting: The last minutes before Farhad Jabar commits murder. Sydney Morning Herald.

  62. 62.

    R v Khan (No 11) [2019] NSWSC 594 (5 June 2019). Available from http://www.austlii.edu.au/

  63. 63.

    Doherty, B. (2017). 6 June. Yacqub Khayre: Melbourne siege gunman’s history of violent crime and drugs. The Guardian.

    Google Scholar 

  64. 64.

    Younger, E. & Anderson, S. (2017, 22 August). Brighton siege gunman Yacqub Khayre made bomb threat, inquest hears. ABC News. Reviewd at https://www.abc.net.au/news/2017-08-22/brighton-siege-inquest-examine-gunman-yacqub-khayre-parole/8829948.

  65. 65.

    Knaus, C., Davey, M. & Press, A.A. (2018, 6 June). Isis claims reponsbility for Melbourne siege that left two people dead. The Guardian. Reviewed at https://www.theguardian.com/australia-news/2017/jun/05/police-shoot-gunman-dead-and-free-hostage-in-melbourne

  66. 66.

    Goodman, R. (2018). 22 march. The Courier: Accused gun dealer charged over lighter.

    Google Scholar 

  67. 67.

    Commonwealth of Australia and State of New South Wales. (2015). Martin place siege joint commonwealth – New South Wales review. Canberra: Commonwealth of Australia.

    Google Scholar 

  68. 68.

    Glover, A. (2017). 10 Dec. In Middle eastern crime family ‘with links to Muslim extremists sold shotgun to terrorist man Haron Monis for $570’ days before the Lindt Café siege. The Daily: Mail.

    Google Scholar 

  69. 69.

    Coroners Court of New South Wales. (2017). Inquest into the deaths arising from the Lindt cafe siege: Findings and recommendations. Sydney: Coroners Court of New South Wales.

    Google Scholar 

  70. 70.

    Bricknell, S. (2012). Firearm trafficking and serious and organised crime gangs. AIC reports Research and Public Policy series. Canberra: Australian Institute of Criminology.

    Google Scholar 

  71. 71.

    Duquet, N., & Goris, K. (2018). Firearms acquisition by terrorists in Europe: Research findings and policy recommendations of project SAFTE. Brussels: Flemish Peace Institute.

    Google Scholar 

  72. 72.

    Harris-Hogan, S. (2015). Understanding the logic: An analysis of jihadist targeting and tactics in western countries from 2000 to mid-2012. Security Challenges, 11(1), 73–89.

    Google Scholar 

  73. 73.

    Gartenstein-Ross, D. (2011, 3 May). Bin Laden’s ‘war of a thousand cuts’ will live on. The Atlantic. Retrieved from https://www.theatlantic.com/international/archive/2011/05/bin-ladens-war-of-a-thousand-cuts-will-live-on/238228/

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to David Bright.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Bright, D., Whelan, C. & Harris-Hogan, S. Exploring the hidden social networks of ‘lone actor’ terrorists. Crime Law Soc Change 74, 491–508 (2020). https://doi.org/10.1007/s10611-020-09905-2

Download citation

Keywords

  • Illicit networks
  • Lone actor
  • Social network analysis
  • Social networks
  • Terrorism