Pathways to terror: finding patterns prior to an attack

Download
Author
Freeman, Michael
Tucker, David
Merten, Steffen
Date
2010Metadata
Show full item recordAbstract
To ascertain whether terrorist attacks follow an observable pattern in their pre-attack activities this study first divides the terrorists’ pre-attack activities into nine phases: networking, training, general planning,
attack-specific recruitment, financing, operational planning, weapons procurement, logistical preparation, and operational preparation. With these phases in mind, we then examine a range of terrorism events and identify when each of these phases occurred. We have found that the cases follow a general pattern, yet there are outliers to the pattern. In general, however, the phases we identified do seem to represent a
necessary order. Some broad plan, along with networking and general training occur usually more than a year before an attack and are necessary before recruiting and financing can occur, which usually happens between six months and a year before an attack. Finally, operational planning, weapons procurement, logistical preparation, and operational preparation occur closest to the attack, typically only a few months before it occurs. This general progression is robust across types and scales of attacks and suggests that it might be used as an indication of the timing of possible future attacks.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
An analysis of the patterns of Argentine economic development
Beckman, Robert John (Monterey, California. Naval Postgraduate School, 1972-06);This paper analyzes the pattern of Argentine economic development from the mid-nineteenth century until the present day. Initially, an overview of the Argentine developmental experience is given, emphasizing the three ... -
Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2012);IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Technology for Homeland Security: Best Papers. As the field of homeland defense and security expands and matures, the contributions from various disciplines become ... -
Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks
Lanoue, Matthew J. (Monterey, CA; Naval Postgraduate School, 2021-06);Fifth Generation New Radio (5G NR) represents a shift in mobile telephony whereby the network architecture runs containerized software on commodity hardware. In preparation for this transition, numerous 4G Long Term Evolution ...