Skip to main content

Modus Operandi

  • Chapter
  • First Online:
Book cover Understanding Lone Wolf Terrorism

Part of the book series: SpringerBriefs in Criminology ((BRIEFSCRIMINOL))

  • 2935 Accesses

Abstract

In the aftermath of the double terrorist attack in Norway on 22 July 2011, it became apparent that the alleged perpetrator, Anders Behring Breivik, had meticulously planned the attacks. Breivik’s copious writings suggest that he planned his operations at least months in advance, gradually gathering the tools and the expertise he needed to carry out the attacks. Breivik [1] describes a long preparation phase during which he writes, reads, attends shooting classes, buys weapons, chemicals and other supplies, studies online bomb-making manuals, and spends the last 80 days manufacturing the explosive devices. Breivik [1, p. 1470] writes that it would have taken him only 30 days had he had experience:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Armed hijackings often involve the use of a firearm, knife or explosive device.

  2. 2.

    The anthrax letters sent in the United States in 2001 are a case in point. One main lesson to be learned from the anthrax exposure incidents is that terrorists do not have to kill many people to create panic and foment fear and insecurity. Indeed, as Hoffman [34] notes, “five persons dying in mysterious circumstances is quite effective at unnerving an entire nation”.

References

  1. Metzger T (n.d.) Laws for the lone wolf. http://www.resist.com/Articles/literature/LawsForTheLoneWolfByTomMetzger.htm. Accessed 15 August 2011

  2. Breivik A (2011) 2083: a European declaration of independence. http://www.washingtonpost.com/r/2010-2019/WashingtonPost/2011/07/24/National-Politics/Graphics/2083+-+A+European+Declaration+of+Independence.pdf. Accessed 26 July 2011

  3. Englund W (2011) In diary, Norwegian ‘crusader’ details months of preparation for attacks. The Washington Post, Washington (25 July)

    Google Scholar 

  4. Meland A, Brustad L (2011) Slik ble han terrorist på billigsalg. Dagbladet, Norway (1 Sept)

    Google Scholar 

  5. MacDougall I, Ritter K (2011) Norway suspect also considered other targets. Denver Post, Denver (31 July)

    Google Scholar 

  6. Anonymous (2010) Plane ‘hijacker’ had terror tip for Putin. The Moscow Times, 2 Aug. http://www.themoscowtimes.com/news/article/plane-hijacker-had-terror-tip-for-putin/411436.html. Accessed 20 Aug 2011

  7. Associated Press (2007) Man admits abortion clinic bomb attempt. The Washington Post, Washington (27 July)

    Google Scholar 

  8. Williams C (2004) Terrorism explained. New Holland, Sydney

    Google Scholar 

  9. Ganor B (2002) Defining terrorism: Is one man’s terrorist another man’s freedom fighter? Police Pract 3(4):287–304

    Article  Google Scholar 

  10. Juergensmeyer M (2000) Terror in the mind of God: the global rise of religious violence. University of California Press, Berkeley

    Google Scholar 

  11. Martin G (2003) Understanding terrorism: challenges, perspectives, and issues. Sage, Thousands Oaks

    Google Scholar 

  12. Karpin M, Friedman I (1998) Murder in the name of God: the plot to kill Yitzhak Rabin. Henry Holt and Co, New York

    Google Scholar 

  13. Sprinzak E (1999) Brother against brother: violence and extremism in Israeli politics from Altalena to the Rabin assassination. The Free Press, New York

    Google Scholar 

  14. Müller T (2006) Beestmensen: Vermomming leugens en strategie van seriemoordenaars. Mets and Schilt, Amsterdam

    Google Scholar 

  15. Friedrichsen G (1999) Nur irgendein Kasperl?. Der Spiegel, Hamburg, pp 184–186 (22 Feb)

    Google Scholar 

  16. Schwarz M (1999) Lebenslange Haft für österreichischen Bombenbauer. Berliner Zeitung, Berlin (11 March)

    Google Scholar 

  17. Burton F (2007) The challenge of the lone wolf. STRATFOR Global Intelligence. http://www.stratfor.com/challenge_lone_wolf. Accessed 3 August 2009

  18. Oranje J (2002) Verdachte volgde Fortuyn via internet. NRC Handelsblad, The Netherlands (8 June)

    Google Scholar 

  19. Public Prosecution of the Netherlands (2003) Closing speech public prosecutor, 1 April. http://www.om.nl/dossier/de_zaak_fortuyn/_de_zaak_fortuyn_nieuwsberichten/21709/. Accessed 3 May 2007

  20. Netherlands Broadcasting Foundation (NOS) (2004) Reconstructie van de moord. http://nos.nl/archief/2004/nieuws/index.html#@http://nos.nl/archief/2004/nieuws/dossiers/pim_fortuyn/2003/maart/2603_voorbeschouwing_proces.htm. Accessed 14 June 2007

  21. Kifner J (1995) Belief to blood: the making of Rabin’s killer. The New York Times, New York (19 Nov)

    Google Scholar 

  22. Lewis A (1995) On God’s orders. The New York Times, New York (6 Nov)

    Google Scholar 

  23. Metropolitan Police Service (2000) Copeland case special edition. The Job, 30 June

    Google Scholar 

  24. Buncombe A (2000) Inspiration’ came from Atlanta Olympics bomb. The Independent, 30 June

    Google Scholar 

  25. Metropolitan Police Service (2000) Operation marathon: Interviews with David Copeland. http://www.met.police.uk/news/stories/copeland/intervw.htm. Accessed 20 June 2007

  26. BBC (2000) Transcript of BBC Panorama: the nailbomber. Recorded from transmission BBC1. BBC, London, 30 June. http://news.bbc.co.uk/hi/english/static/audio_video/programmes/panorama/transcripts/transcript_30_06_00.txt. Accessed 10 June 2007

  27. Clough S (2000) Bombings ‘inspired by Atlanta attack’. The Daily Telegraph, 6 June

    Google Scholar 

  28. Clough S (2000) Copeland took nail bomb to a park to pass the time. The Daily Telegraph, 9 June

    Google Scholar 

  29. Phillips P (2011) Lone wolf terrorism. Peace Econ Peace Sci Public Policy 17(1)

    Google Scholar 

  30. Gurr N, Cole B (2000) The new face of terrorism: threats from weapons of mass destruction. I.B. Tauris, London

    Google Scholar 

  31. Simon JD (2000) The alphabet bomber. In: Tucker JB (ed) Toxic terror: assessing terrorist use of chemical and biological weapons. MIT Press, Cambridge, pp 71–94

    Google Scholar 

  32. Laqueur W (1999) The new terrorism: fanaticism and the arms of mass destruction. Oxford University Press, Oxford

    Google Scholar 

  33. Spaaij R, van der Veen F (2003) NBC-terrorisme in perspectief. Het Tijdschrift voor de Politie 65(6):18–24

    Google Scholar 

  34. Hoffman B (2002) Rethinking terrorism and counterterrorism since 9/11. Stud Confl Terror 25(5):303–316

    Article  Google Scholar 

  35. Burton F, Stewart S (2008) The ‘lone wolf’ disconnect. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/lone_wolf_disconnect. Accessed 3 Aug 2009

  36. Cruickshank P, Lister T (2011) The ‘lone wolf’—The unknowable terror. CNN Security Clearance Blog, 7 Sept. http://security.blogs.cnn.com/2011/09/07/the-lone-wolf-the-unknowable-face-of-terror/. Accessed 9 Sept 2011

  37. Walker C (2006) Cyber-terrorism: legal principle and law in the United Kingdom. Penn State Law Rev 110(3):625–665

    Google Scholar 

  38. Douglas J, Olshaker M (1999) The anatomy of motive. Scribner, New York

    Google Scholar 

  39. Evans PR (n.d.) Methodical terrorism: How and why. http://www.armyofgod.com/POCPaulRossEvansMethodicalTerrorism.html. Accessed 12 August 2011

  40. Tuman JS (2003) Communicating terror: The rhetorical dimensions of terrorism. Sage, Thousand Oaks

    Google Scholar 

  41. Stewart S, Burton F (2009) Lone wolf lessons. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20090603_lone_wolf_lessons. Accessed 4 November 2010

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramón Spaaij .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 The Author(s)

About this chapter

Cite this chapter

Spaaij, R. (2012). Modus Operandi. In: Understanding Lone Wolf Terrorism. SpringerBriefs in Criminology. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2981-0_7

Download citation

Publish with us

Policies and ethics