Skip to main content

Advertisement

Log in

Loners, Colleagues, or Peers? Assessing the Social Organization of Radicalization

  • Published:
American Journal of Criminal Justice Aims and scope Submit manuscript

Abstract

This study explores the utility of a sociological model of social organization developed by Best and Luckenbill (1994) to classify the radicalization processes of terrorists (i.e., extremist perpetrators who engaged in ideologically motivated acts of violence) who are usually categorized as loner or lone wolf attackers. There are several organizational frameworks used to define or classify violent acts performed by individuals who may or may not have ties to extremist groups, but these studies largely ignore the role of social relationships in radicalization and the extent to which they inform our knowledge of terror. To address this gap, we apply the Best and Luckenbill model of social organization using a qualitative analysis of three case studies of four lone actor or small cell terrorists. The findings demonstrate lone actors are not always true loners in the context of radicalization, and highlights the ways that the Internet and social ties foster the radicalization processes of terror.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. The search engines used in this analysis include Lexis-Nexis; Proquest; Yahoo; Google; Copernic; News Library; Infotrac; Google Scholar; Amazon; Google U.S. Government; Federation of American Scientists; Google Video; Center for the Study of Intelligence; Surf Wax; Dogpile; Mamma; Librarians’ Internet Index; Scirus; All the Web; Google News; Google Blog; and Homeland Security Digital Library.

  2. At the time of the development of this study, there was insufficient material available in open source documents to justify the inclusion of Noor Salman, Omar Mateen’s wife, in the analysis. Though she has been charged with obstruction of justice and aiding and abetting Mateen’s attack, there is insufficient information currently available in publicly accessible documents to describe her direct or indirect role in the planning or execution of the shooting (e.g. Mazzei & Goldman, 2018). Thus, we excluded her from the analysis, and any family or friends of the other cases included. We chose to only focus on the direct actors involved in the execution of the offense for the sake of analytical parsimony.

References

  • 911 Call and Orlando Police Department’s (ODP) Crisis Negotiation Team Transcript. (2016, 2016). June, 12.

  • Abad-Santos, A. (2013). “I will die young”: The eerie subtext of Dzhokhar Tsarnaev on social media. The Atlantic, April 19, 2013. https://www.theatlantic.com/national/archive/2013/04/dzhokhar-tsarnaev-social-media-accounts/316092/. Accessed 3 May 2017.

  • Adler, P. A., & Adler, P. (2005). Self-injurers as loners: The social organization of solitary deviance. Deviant Behavior, 26(4), 345–378.

    Google Scholar 

  • Antinori, A. (2017). The jihadi wolf threat: The evolution of terror narratives between the (cyber-)social ecosystem and self-radicalization “ego-system”. The Hague: Europol.

    Google Scholar 

  • Asal, V., & Rethemeyer, R. K. (2008). The nature of the beast: Organizational structures and the lethality of terrorist attacks. The Journal of Politics, 70(2), 437–449.

    Google Scholar 

  • Bakker, E. (2006). Jihadi terrorists in Europe, their characteristics and the circumstances in which they joined the jihad: An exploratory study. The Hague, Netherlands Institute of International Relations: Clingendael Institute. Retrieved from https://www.clingendael.org/sites/default/files/pdfs/20061200_cscp_csp_bakker.pdf\. Accessed February 10, 2018.

  • Bartlett, J., & Miller, C. (2012). The edge of violence: Towards telling the difference between violent and nonviolent radicalization. Terrorism and Political Violence, 24(1), 1–21.

    Google Scholar 

  • Bates, R. A. (2012). Dancing with wolves: Today's lone wolf terrorists. The Journal of Public and Professional Sociology, 4(1), 1–25.

    Google Scholar 

  • Best, J., & Luckenbill, D.F. (1994). Organizing deviance, 2 nd edition. Trenton: Prentice Hall.

  • Bjorgo, T., & Horgan, J. (Eds.). (2009). Leaving terrorism behind: Individual and collective disengagement. New York City: Routledge.

    Google Scholar 

  • Blee, K. M. (2002). Inside organized racism: Women and men in the hate movement. Sacramento: University of California Press.

    Google Scholar 

  • Borum, R. (2011a). Radicalization into violent extremism I: A review of social science theories. Journal of Strategic Security, 4(4), 7–36.

    Google Scholar 

  • Borum, R. (2011b). Radicalization into violent extremism II: A review of conceptual models and empirical research. Journal of Strategic Security, 4(4), 37–62.

    Google Scholar 

  • Borum, R. (2013). Informing Lone‐Offender Investigations. Criminology & Public Policy, 12(1), 103–112.

    Google Scholar 

  • Chermak, S. M., Freilich, J. D., Parkin, W. S., & Lynch, J. P. (2012). American terrorism and extremist crime data sources and selectivity bias: An investigation focusing on homicide events committed by far-right extremists. Journal of Quantitative Criminology, 28(1), 191–218.

    Google Scholar 

  • Chermak, S. M., Freilich, J. D., & Suttmoeller, M. (2013). The organizational dynamics of far-right hate groups in the United States: Comparing violent to nonviolent organizations. Studies in Conflict and Terrorism, 36(3), 193–218.

    Google Scholar 

  • Chermak, S. M., & Gruenewald, J. (2015). Laying the Foundation for the Criminological Examination of right-wing, left-wing, and Al Qaeda inspired extremism in the United States. Terrorism and Political Violence, 27(1), 133–159.

    Google Scholar 

  • Cooper, M., Schmidt, M. S., & Schmidt, E. (2013). Boston suspects are seen as self-taught and fueled by web. New York Times, 23 April, 2013. http://www.nytimes.com/2013/04/24/us/boston-marathon-bombing-developments.html?pagewanted=alland_r=0. Accessed May 4, 2017.

  • Davis, L. E., Martini, J., & Cragin, K. (2017). A strategy to counter ISIL as a transregional threat. Santa Monica: RAND Corporation https://www.rand.org/pubs/perspectives/PE228.html. Accessed June 1, 2017.

    Google Scholar 

  • Decker, S. H., Bynum, T., & Weisel, D. (1998). A tale of two cities: Gangs as organized crime groups. In J. Miller, C. L. Maxson, & M. W. Klein (Eds.), The modern gang reader (pp. 73–93). Los Angeles: Roxbury Publishing Co.

    Google Scholar 

  • Forester, P. (2013). Boston bomber arrested: Tamerlan Tsarnaev’s hateful rage behind American dream. The Telegraph, 20 April, 2013. http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10007975/Boston-bomber-arrested-Tamerlan-Tsarnaevs-hateful-rage-behind-American-dream.html. Accessed 25 May 2017.

  • Freilich, J. D., Adamczyk, A., Chermak, S. M., Boyd, K., & Parkin, W. S. (2015). Disorganization, diversity and deadly far-right ideological violence: A county level analysis. Journal of Quantitative Criminology, 31, 383–411.

    Google Scholar 

  • Freilich, J. D., & Chermak, S. M. (2009). Preventing deadly encounters between law enforcement and American far-rightists. Crime Prevention Studies, 25(1), 141–172.

    Google Scholar 

  • Freilich, J. D., & Chermak, S. M. (2013). Terrorist use of the Internet: An analysis of strategies, objectives and law responses. In H. J. Sohn & S. K. Lee (Eds.), Cyberterrorism: Trends and responses (pp. 183–219). Seoul, South Korea: Korean Institute of Criminology.

    Google Scholar 

  • Freilich, J. D., Chermak, S. M., Belli, R., Gruenewald, J., & Parkin, W. S. (2014). Introducing the United States extremist crime database (ECDB). Terrorism and Political Violence, 26(2), 372–384.

    Google Scholar 

  • Freilich, J. D., Chermak, S. M., & Caspi, D. (2009). Critical events in the life trajectories of domestic extremist white supremacist groups. Criminology and Public Policy, 8(3), 497–530.

    Google Scholar 

  • Freilich, J. D., Chermak, S. M., & Gruenewald, J. (2015). The future of terrorism research: A review essay. International Journal of Comparative and Applied Criminal Justice, 39(4), 353–369.

    Google Scholar 

  • Freilich, J. D., & Pridemore, A. W. (2006). Mismeasuring militias: Limitations of advocacy group data and of state-level studies of paramilitary groups. Justice Quarterly, 23(1), 147–162.

    Google Scholar 

  • Gessen, M. (2015). The brothers: The road to an American tragedy. New York: Riverhead Books.

    Google Scholar 

  • Gill, P., & Corner, E. (2015). Lone-Actor Terrorist Use of the Internet & Behavioural Correlates. In L. Jarvis, S. Macdonald, T. Chen (Eds.), Terrorism online: Politics, Law, Technology and Unconventional Violence.

  • Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns & Processes. Criminology and Public Policy, 16 (1), 99–117.

  • Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent behaviors of lone-actor terrorists. Journal of Forensic Sciences, 59(2), 425–435.

    Google Scholar 

  • Glenza, J. (2015). Dylann Roof: the cold stare of a killer with a history of drug abuse and racism. The Guardian, 20 June, 2015.

  • Goldman, A. (2016). Orlando gunman’s wife breaks silence: “I was unaware.” The New York Times, 1 November 2016. available online at http://www.nytimes.com/2016/11/02/us/politics/orlando-shooting-omar-mateen-noor-salman.html?_r=0. Accessed 1 June 2017.

  • Gruenewald, J., Dooley, K. M. G., Suttmoeller, M. J., Freilich, J. D., & Chermak, S. M. (2016). A mixed-method analysis of fatal attacks on police by far-right extremists. Police Quarterly, 19, 216–245.

    Google Scholar 

  • Gruenewald, J., Chermak, S., & Freilich, J. (2013). Distinguishing “loner” attacks from other domestic extremist violence: A comparison of far-right homicide incident and offender characteristics. Criminology and Public Policy, 12(1), 63–91.

    Google Scholar 

  • Gruenewald, J., Chermak, S., & Frelich, J. (2013). Lone wolves and far-right terrorism in the United States. Studies in Conflict and Terrorism, 36(12), 1005–1024.

    Google Scholar 

  • Gutierrez, G., & Ortiz, E. (2016). Friend who told FBI about Orlando shooter Omar Mateen saw a 'red flag.' NBC News, June 21, 2016. http://www.nbcnews.com/storyline/orlando-nightclub-massacre/friend-who-told-fbi-about-orlando-shooter-omar-mateen-saw-n596496. Accessed May 15, 2017.

  • Hamm, M. (2007). Terrorism as crime: From Oklahoma City to Al Qaeda and beyond. New York University Press.

  • Hamm, M. S., & Spaaij, R. (2017). The age of lone wolf terrorism. New York: Columbia University Press.

    Google Scholar 

  • Harding, L., & Dodd, V. (2013). Tamerlan Tsarnaev's YouTube account shows jihadist radicalisation in pictures. The Guardian 22 April, 2013. https://www.theguardian.com/world/2013/apr/22/tamerlan-tsarnaev-youtube-jihadist-radicalisation. Accessed 20 May, 2017.

  • Harnden, T. (2015). Last Rhodesian' craved race war. The Sunday Times, 21 June, 2015.

  • Hegghammer, T. (2013). Should I stay or should I go? Explaining variation in western jihadists’ choice between domestic and foreign fighting. American Political Science Review, 107(1), 1–15.

    Google Scholar 

  • Hennessey-Fiske, M., Jarvie, J., & Del Quentin, W. (2016). As Orlando mourns, FBI starts investigation of shooters electronics. Chicago Tribune. http://digitaledition.chicagotribune.com/tribune/article_popover.aspx?guid=eba44b7c-ccd5-4179-b79c-c0f74300aff2. Accessed 20 May 2017.

  • Hewitt, C. (2003). Understanding terrorism in America: From the Klan to al Qaeda. New York: Psychology Press.

    Google Scholar 

  • Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. In M. Pittaro & F. Schmalleger (Eds.), Crimes of the internet (pp. 336–355). Westport, CT: Praeger.

    Google Scholar 

  • Holt, T. J. (2012). Exploring the intersections of technology, crime and terror. Terrorism and Political Violence, 24(2), 337–354.

    Google Scholar 

  • Holt, T. J. (2013). Exploring the social organisation and structure of stolen data markets. Global Crime, 14, 155–174.

    Google Scholar 

  • Holt, T. J., Freilich, J. D., & Chermak, S. M. (2016). Internet-based radicalization as enculturation to violent deviant subcultures. Deviant Behavior, 47, 1–15.

    Google Scholar 

  • Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017). Exploring the subculture of ideologically motivated cyber-attackers. Journal of Contemporary Criminal Justice, 33, 212–233.

    Google Scholar 

  • Jacobs, S., Filipov, D., & Wen, P. (2013). The fall of the house of Tsarnaev. The Boston Globe, 15 December 2013. http://www.bostonglobe.com/Page/Boston/2011-2020/WebGraphics/Metro/BostonGlobe.com/2013/12/15tsarnaev/tsarnaev.html. Accessed 1 June, 2017.

  • Kelley, K., & Gruenewald, J. (2015). Accomplishing masculinity through anti-lesbian, gay, bisexual, and transgender homicide: A comparative case study approach. Men and Masculinities, 18, 3–29.

    Google Scholar 

  • Koschade, S. (2006). A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict and Terrorism, 29, 559–575.

    Google Scholar 

  • LaFree, G., & Bersani, B. (2014). County-level correlates of terrorist attacks in the United States. Criminology and Public Policy, 13, 455–481.

    Google Scholar 

  • LaFree, G., Dugan, L., & Miller, E. (2015). Putting terrorism in context: Lessons from the global terrorism database. London: Routledge.

    Google Scholar 

  • Martin, G. (2006). Understanding terrorism: Challenges, perspectives, and issues, 2nd Edition. Thousand Oaks: Sage.

  • Mazzei, P., & Goldman, A. (2018). Widow of pulse nightclub killer goes on trial, a challenge for prosecutors. New York Times, March 1, 2018. https://www.nytimes.com/2018/03/01/us/pulse-trial-noor-salman-florida.html. Accessed March 5, 2018

  • McCauley, C., & Moskalenko, S. (2011). Friction: How radicalization happens to them and us. Oxford, Oxford University Press.

  • McDevitt, J., Levin, J., & Bennett, S. (2002). Hate crime offenders: An expanded typology. Journal of Social Issues, 58(2), 303–317.

    Google Scholar 

  • McPhee, M. R. (2017). Maximum harm: The Tsarnaev brothers, the FBI, and the road to the Marathon Bombing Fore Edge. Kindle Edition.

  • Messner, S. F., McHugh, S., & Felson, R. B. (2004). Distinctive characteristics of assaults motivated by bias. Criminology, 42(3), 585–618.

    Google Scholar 

  • Meyer, G. R. (1989). The social organization of the computer underground. Masters Thesis, Northern Illinois University. http://csrc.nist.gov/secpubs/hacker.txt. Accessed 1 April 2017.

  • Monahan, J. (2012). The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2), 167–205.

    Google Scholar 

  • Morlin, B. (2017). Dylann roof sentenced to death for racist killing spree at South Carolina Church. The Southern Poverty Law Center. https://www.splcenter.org/hatewatch/2017/01/10/dylann-roof-sentenced-death-racist-killing-spree-south-carolina-church. Accessed 1 April 2017.

  • Moskalenko, S., & McCauley, C. (2011). The psychology of lone-wolf terrorism. Counselling Psychology Quarterly, 24(2), 115–126.

    Google Scholar 

  • Neumann, P., Evans, R., & Pantucci, R. (2011). Locating Al Qaeda's Center of Gravity: The role of middle managers. Studies in Conflict and Terrorism, 34(11), 825–842.

    Google Scholar 

  • Pantucci, R. (2011). A typology of lone wolves: Preliminary analysis of lone Islamist terrorists. London, England: International Centre for the Study of Radicalisation and Political Violence.

  • Parkin, W. S., & Freilich, J. D. (2015). Routine activities and right-wing extremists: An empirical comparison of the victims of ideologically and non-ideologically motivated homicides committed by American far-rightists. Terrorism and Political Violence, 27, 182–203.

    Google Scholar 

  • Phillips, P. J., & Pohl, G. (2012). Economic profiling of the lone wolf terrorist: Can economics provide behavioral investigative advice? Journal of Applied Security Research, 7, 151–177.

    Google Scholar 

  • Robles, F., & Stewart, N. (2015). Dylann Roof’s past reveals trouble at home and school. The New York Times, July 16, 2015. https://www.nytimes.com/2015/07/17/us/charleston-shooting-dylann-roof-troubled-past.html. Accessed November 11, 2017.

  • Ross, B., Schwartz, R., Dukakis, A., & Ferran, L. (2016). Orlando shooter on Facebook: Now taste ISIS ‘vengeance.’ ABC News, June 15, 2016. http://abcnews.go.com/US/orlando-shooter-facebook-now-taste-isis-vengeance/story?id=39875518. Accessed May 1, 2017.

  • Schmid, A. P., & Jongman, A. J. (2005). Political terrorism: A New guide to actors, authors, concepts, data bases, theories, and literature (2nd ed.). New York, NY: Transaction Publishers.

    Google Scholar 

  • Schuurman, B. W., Bakker, E., Gill, P., & Bouhana, N. (2017). Lone actor terrorist attack planning and preparation: A data-driven analysis. Journal of Forensic Sciences. https://doi.org/10.1111/1556-4029.13676.

  • Shabad, R. (2016). FBI Director Comey highly confident Orlando shooter radicalized through internet. CBS News, 13 June 2016. http://www.cbsnews.com/news/fbi-director-comey-highly-confident-orlando-shooter-radicalized-through-internet/. Accessed May 1, 2017.

  • Silber, M. D. (2011). The al Qaida factor: Plots against the West. Philadelphia, PA: University of Pennsylvania Press.

    Google Scholar 

  • Silke, A. (2008). Research on terrorism: A review of the impact of 9/11 and the global war on, research on terrorism. In H. Chen, E. Reid, J. Sinai, A. Silke, & B. Ganor (Eds.), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (pp. 27–50). Hartford: Springer.

    Google Scholar 

  • Simi, P., & Futrell, R. (2010). American swastika: Inside the white power Movement's hidden spaces of hate. New York City: Rowman and Littlefield Publishers.

    Google Scholar 

  • Smith, B. L. (1994). Terrorism in America: Pipe bombs and pipe dreams. Albany, NY: SUNY Press.

    Google Scholar 

  • Smith, B. L., & Damphousse, K. R. (2009). Patterns of precursor behaviors in the life span of a US environmental terrorist group. Criminology and Public Policy, 8, 475–496.

    Google Scholar 

  • Spaaij, R. (2012). Understanding lone wolf terrorism: Global patterns, motivations and prevention. London: Springer.

    Google Scholar 

  • Spaaij, R. (2010). The enigma of lone wolf terrorism: An assessment. Studies in Conflict & Terrorism, 33, 854–870.

    Google Scholar 

  • Stern, J. (2003). Terror in the name of god: Why religious militants kill. New York: HarperCollins Publishers Inc..

    Google Scholar 

  • Suttmoeller, M., Chermak, S. M., & Freilich, J. D. (2015). The influence of external and internal correlates on the organizational death of domestic far-right extremist groups. Studies in Conflict and Terrorism, 38, 734–758.

    Google Scholar 

  • Szmania, S., & Fincher, P. (2017). Countering violent extremism online and offline. Criminology & Public Policy, 16(1), 119–125.

    Google Scholar 

  • Taylor, M., & Horgan, J. (2006). A conceptual framework for addressing the psychological process in the development of the terrorist. Terrorism and Political Violence, 18, 585–601.

    Google Scholar 

  • Weimann, G. (2011). Cyber-fatwas and terrorism. Studies in Conflict and Terrorism, 34, 765–781.

    Google Scholar 

  • Wiktorowicz, Q. (2004). Islamic activism: A social movement theory approach. Bloomington: Indiana University Press.

    Google Scholar 

  • Wilber, D. Q. (2016). The FBI investigated the Orlando mass shooter for 10 months- and found nothing. Here’s why. The Los Angeles Times July 14, 2016. http://www.latimes.com/nation/la-na-fbi-investigation-mateen-20160712-snap-story.html. Accessed 1 May, 2017.

  • Zimmerman, M. (2016). Orlando terrorist’s chilling Facebook posts from inside club revealed. Fox News Channel, June 15, 2016. http://www.foxnews.com/us/2016/06/15/orlando-terrorists-chilling-facebook-posts-from-inside-club-revealed.html. Accessed 1 May 2017.

Download references

Acknowledgements

This project was supported, in part, by Award No. 2014-ZA-BX-0004, awarded by the National Institute of Justice, Office of Justice Programs, and U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not reflect those of the Department of Justice.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas J. Holt.

Appendix: Case Study Template

Appendix: Case Study Template

Name:

Total documents identified:

Provide count of documents by type/category:

  1. 1.

    Please provide a timeline and overview life-history of the selected individual, from birth until final arrest (e.g., family, work, friends, mental health, military experience, prison) or death (dependent on the outcome of the incident).

  1. 2.

    General on-line involvement

    1. a.

      what sites did they have accounts on, or appear to participate in?

    2. b.

      how many of these sites were part of a radical/extremist ideology?

  1. 3.

    Emergence of the appearance of radicalization/acceptance of an extremist ideology

    1. a.

      off-line signs/markers

      1. i.

        Dates, locations, assessments provided by family, friends?

    2. b.

      on-line signs/markers

      1. i.

        Posting behaviors, what sites, dates?

  1. 4.

    The process of entry into the extremist movement and/or radicalization process

    a. What were the sources of their exposure to extremist ideology and what seemed to be most important and why?

    1. i.

      Was there an initial push into a search for extremist materials or ideology?

      1. 1.

        Negative social interaction with peer group?

      2. 2.

        Negative familial development (divorce, death of parent, etc)?

      3. 3.

        Individual failure at any pro-social activity (sports, employment, school)?

    2. ii.

      Was there an initial pull into searching for extremist materials or ideology?

      1. 1.

        Contact with a recruiter

      2. 2.

        Contact with someone else who was interested in extremist ideology

        1. a.

          Was this individual a friend, family member, or someone else?

  2. 5.

    What was their peer/collegial involvement like?

  3. 6.

    Did they socialize frequently with other peers generally?

  4. 7.

    Was this primarily on- or off-line?

  5. 8.

    Did they socialize frequently with others who are in extremist movements?

  6. 9.

    Was this primarily on- or off-line?

    1. a.

      Is the individual strongly attached with their parents/grandparents?

    2. b.

      Is the individual strongly attached with other family members?

    3. c.

      Is the individual married prior to joining an extremist movement / radicalizing?

    4. d.

      Is the individual strongly attached with religious groups or leaders?

      1. i.

        Do the religious groups or leaders share an extremist ideology?

    5. e.

      as the individual strongly attached to peers; i.e., do they have a strong peer group?

      1. i.

        Are the preponderance of individuals in this peer group involved in delinquent activities?

        1. 1.

          To what extent of seriousness were these activities (i.e. mostly misdemeanors or felonies)?

      2. ii.

        Are any of the individuals in this peer group also interested in extremist ideology?

        1. 1.

          on or off-line?

      3. iii.

        Are any of these individuals in this peer group also involved in extremist activity?

        1. 1.

          on or off-line?

  1. 10.

    Did their behavior change as a function of exposure to ideological materials on or off-line?

    1. i.

      Was there a noticeable change in behavior before and after their interest in

    2. ii.

      extremist ideology/materials?

      1. 1.

        Off-line

      2. 2.

        On-line

    3. iii.

      Was there a noticeable change in behavior before and after their joining of an extremist group/movement (if they did so)?

      1. 1.

        Off-line

      2. 2.

        On-line

    4. iv.

      Did the actor openly indicate the need to take action or use violence to further their ideology or achieve some goal?

      1. 1.

        Off-line

      2. 2.

        On-line

      3. 3.

        Did they have social media accounts?

      4. 4.

        Did they have discussion forum accounts? If so, what/where?

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Holt, T.J., Freilich, J.D., Chermak, S.M. et al. Loners, Colleagues, or Peers? Assessing the Social Organization of Radicalization. Am J Crim Just 44, 83–105 (2019). https://doi.org/10.1007/s12103-018-9439-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12103-018-9439-5

Keywords

Navigation