Advertisement

Modus Operandi

  • Ramón SpaaijEmail author
Chapter
  • 2.3k Downloads
Part of the SpringerBriefs in Criminology book series (BRIEFSCRIMINOL)

Abstract

In the aftermath of the double terrorist attack in Norway on 22 July 2011, it became apparent that the alleged perpetrator, Anders Behring Breivik, had meticulously planned the attacks. Breivik’s copious writings suggest that he planned his operations at least months in advance, gradually gathering the tools and the expertise he needed to carry out the attacks. Breivik [1] describes a long preparation phase during which he writes, reads, attends shooting classes, buys weapons, chemicals and other supplies, studies online bomb-making manuals, and spends the last 80 days manufacturing the explosive devices. Breivik [1, p. 1470] writes that it would have taken him only 30 days had he had experience:

Keywords

Terrorist Attack Explosive Device Terrorist Incident Improvise Explosive Device Bomb Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Metzger T (n.d.) Laws for the lone wolf. http://www.resist.com/Articles/literature/LawsForTheLoneWolfByTomMetzger.htm. Accessed 15 August 2011
  2. 2.
  3. 3.
    Englund W (2011) In diary, Norwegian ‘crusader’ details months of preparation for attacks. The Washington Post, Washington (25 July)Google Scholar
  4. 4.
    Meland A, Brustad L (2011) Slik ble han terrorist på billigsalg. Dagbladet, Norway (1 Sept)Google Scholar
  5. 5.
    MacDougall I, Ritter K (2011) Norway suspect also considered other targets. Denver Post, Denver (31 July)Google Scholar
  6. 6.
    Anonymous (2010) Plane ‘hijacker’ had terror tip for Putin. The Moscow Times, 2 Aug. http://www.themoscowtimes.com/news/article/plane-hijacker-had-terror-tip-for-putin/411436.html. Accessed 20 Aug 2011
  7. 7.
    Associated Press (2007) Man admits abortion clinic bomb attempt. The Washington Post, Washington (27 July)Google Scholar
  8. 8.
    Williams C (2004) Terrorism explained. New Holland, SydneyGoogle Scholar
  9. 9.
    Ganor B (2002) Defining terrorism: Is one man’s terrorist another man’s freedom fighter? Police Pract 3(4):287–304CrossRefGoogle Scholar
  10. 10.
    Juergensmeyer M (2000) Terror in the mind of God: the global rise of religious violence. University of California Press, BerkeleyGoogle Scholar
  11. 11.
    Martin G (2003) Understanding terrorism: challenges, perspectives, and issues. Sage, Thousands OaksGoogle Scholar
  12. 12.
    Karpin M, Friedman I (1998) Murder in the name of God: the plot to kill Yitzhak Rabin. Henry Holt and Co, New YorkGoogle Scholar
  13. 13.
    Sprinzak E (1999) Brother against brother: violence and extremism in Israeli politics from Altalena to the Rabin assassination. The Free Press, New YorkGoogle Scholar
  14. 14.
    Müller T (2006) Beestmensen: Vermomming leugens en strategie van seriemoordenaars. Mets and Schilt, AmsterdamGoogle Scholar
  15. 15.
    Friedrichsen G (1999) Nur irgendein Kasperl?. Der Spiegel, Hamburg, pp 184–186 (22 Feb)Google Scholar
  16. 16.
    Schwarz M (1999) Lebenslange Haft für österreichischen Bombenbauer. Berliner Zeitung, Berlin (11 March)Google Scholar
  17. 17.
    Burton F (2007) The challenge of the lone wolf. STRATFOR Global Intelligence. http://www.stratfor.com/challenge_lone_wolf. Accessed 3 August 2009
  18. 18.
    Oranje J (2002) Verdachte volgde Fortuyn via internet. NRC Handelsblad, The Netherlands (8 June)Google Scholar
  19. 19.
    Public Prosecution of the Netherlands (2003) Closing speech public prosecutor, 1 April. http://www.om.nl/dossier/de_zaak_fortuyn/_de_zaak_fortuyn_nieuwsberichten/21709/. Accessed 3 May 2007
  20. 20.
    Netherlands Broadcasting Foundation (NOS) (2004) Reconstructie van de moord. http://nos.nl/archief/2004/nieuws/index.html#@http://nos.nl/archief/2004/nieuws/dossiers/pim_fortuyn/2003/maart/2603_voorbeschouwing_proces.htm. Accessed 14 June 2007
  21. 21.
    Kifner J (1995) Belief to blood: the making of Rabin’s killer. The New York Times, New York (19 Nov)Google Scholar
  22. 22.
    Lewis A (1995) On God’s orders. The New York Times, New York (6 Nov)Google Scholar
  23. 23.
    Metropolitan Police Service (2000) Copeland case special edition. The Job, 30 JuneGoogle Scholar
  24. 24.
    Buncombe A (2000) Inspiration’ came from Atlanta Olympics bomb. The Independent, 30 JuneGoogle Scholar
  25. 25.
    Metropolitan Police Service (2000) Operation marathon: Interviews with David Copeland. http://www.met.police.uk/news/stories/copeland/intervw.htm. Accessed 20 June 2007
  26. 26.
    BBC (2000) Transcript of BBC Panorama: the nailbomber. Recorded from transmission BBC1. BBC, London, 30 June. http://news.bbc.co.uk/hi/english/static/audio_video/programmes/panorama/transcripts/transcript_30_06_00.txt. Accessed 10 June 2007
  27. 27.
    Clough S (2000) Bombings ‘inspired by Atlanta attack’. The Daily Telegraph, 6 JuneGoogle Scholar
  28. 28.
    Clough S (2000) Copeland took nail bomb to a park to pass the time. The Daily Telegraph, 9 JuneGoogle Scholar
  29. 29.
    Phillips P (2011) Lone wolf terrorism. Peace Econ Peace Sci Public Policy 17(1)Google Scholar
  30. 30.
    Gurr N, Cole B (2000) The new face of terrorism: threats from weapons of mass destruction. I.B. Tauris, LondonGoogle Scholar
  31. 31.
    Simon JD (2000) The alphabet bomber. In: Tucker JB (ed) Toxic terror: assessing terrorist use of chemical and biological weapons. MIT Press, Cambridge, pp 71–94Google Scholar
  32. 32.
    Laqueur W (1999) The new terrorism: fanaticism and the arms of mass destruction. Oxford University Press, OxfordGoogle Scholar
  33. 33.
    Spaaij R, van der Veen F (2003) NBC-terrorisme in perspectief. Het Tijdschrift voor de Politie 65(6):18–24Google Scholar
  34. 34.
    Hoffman B (2002) Rethinking terrorism and counterterrorism since 9/11. Stud Confl Terror 25(5):303–316CrossRefGoogle Scholar
  35. 35.
    Burton F, Stewart S (2008) The ‘lone wolf’ disconnect. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/lone_wolf_disconnect. Accessed 3 Aug 2009
  36. 36.
    Cruickshank P, Lister T (2011) The ‘lone wolf’—The unknowable terror. CNN Security Clearance Blog, 7 Sept. http://security.blogs.cnn.com/2011/09/07/the-lone-wolf-the-unknowable-face-of-terror/. Accessed 9 Sept 2011
  37. 37.
    Walker C (2006) Cyber-terrorism: legal principle and law in the United Kingdom. Penn State Law Rev 110(3):625–665Google Scholar
  38. 38.
    Douglas J, Olshaker M (1999) The anatomy of motive. Scribner, New YorkGoogle Scholar
  39. 39.
    Evans PR (n.d.) Methodical terrorism: How and why. http://www.armyofgod.com/POCPaulRossEvansMethodicalTerrorism.html. Accessed 12 August 2011
  40. 40.
    Tuman JS (2003) Communicating terror: The rhetorical dimensions of terrorism. Sage, Thousand OaksGoogle Scholar
  41. 41.
    Stewart S, Burton F (2009) Lone wolf lessons. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20090603_lone_wolf_lessons. Accessed 4 November 2010

Copyright information

© The Author(s) 2012

Authors and Affiliations

  1. 1.School of Social SciencesLa Trobe UniversityMelbourneAustralia

Personalised recommendations