2013
DOI: 10.15353/cgjsc-rcessc.v2i2.61
|View full text |Cite
|
Sign up to set email alerts
|

C, B, R, or N: The Influence of Related Industry on Terrorists' Choice in Unconventional Weapons

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…According to Jackson and Frelinger (2008, p. 2), a perpetrator’s weapon of choice implies “the scale and scope of their violence”, and weapon choice has also been identified as important in understanding a perpetrator’s apparent intended lethality (Wilson & Lemanski, 2013). In regard to chemical, biological, and radiological weapons, the type of agent chosen may be indicative of factors such as the size of the chemical or biological industry in the country of attack or the perpetrator’s religious ideology, although there may also be differences based on whether these incidents are empty threats or actual attacks (Tishler, 2013). Indeed, previous research on product contamination has revealed that different agents may be used in threats and authentic attacks, as those agents which are easiest to obtain, such as household poisons (Dalziel, 2009) and foreign objects (Graves, Smith, & Batchelor, 1998), are most frequently used in attacks on the food supply, whereas more concerning and difficult to obtain biological agents may be more likely to be used in threats alone (Wilson & Kilbane, 2017).…”
Section: Assessing Threatsmentioning
confidence: 99%
“…According to Jackson and Frelinger (2008, p. 2), a perpetrator’s weapon of choice implies “the scale and scope of their violence”, and weapon choice has also been identified as important in understanding a perpetrator’s apparent intended lethality (Wilson & Lemanski, 2013). In regard to chemical, biological, and radiological weapons, the type of agent chosen may be indicative of factors such as the size of the chemical or biological industry in the country of attack or the perpetrator’s religious ideology, although there may also be differences based on whether these incidents are empty threats or actual attacks (Tishler, 2013). Indeed, previous research on product contamination has revealed that different agents may be used in threats and authentic attacks, as those agents which are easiest to obtain, such as household poisons (Dalziel, 2009) and foreign objects (Graves, Smith, & Batchelor, 1998), are most frequently used in attacks on the food supply, whereas more concerning and difficult to obtain biological agents may be more likely to be used in threats alone (Wilson & Kilbane, 2017).…”
Section: Assessing Threatsmentioning
confidence: 99%
“…This again emphasises the importance of considering threats and hoaxes separately from actual attacks, which has been highlighted by previous authors (e.g. Tishler, 2013), despite the sparse attention given to threats and hoaxes in the literature to date.…”
Section: Discussionmentioning
confidence: 55%
“…Finally, in less than 15 per cent of non-expert and 10 per cent of expert cases the actual agent used was either unknown or unreported, which could have a relatively minor impact on some of the other agents categories discussed. While examining these agents in more specific detail could provide a better understanding of agent choice among experts and non-experts, it is first important to consider the distinction between cases of actual contamination and threats or hoaxes, as different desired outcomes may require the use of different agents (Dalziel, 2009; Tishler, 2013; Kilbane, (in press)), regardless of the perpetrator’s knowledge.…”
Section: Resultsmentioning
confidence: 99%
“…In some cases, hoaxes are explicitly culled from analyses of terrorists' tactical choices (see, for instance, Asal, Ackerman, and Rethemeyer 2012;Ivanova and Sandler 2006;Ivanova and Sandler 2007), usually on the grounds that such events are not reflective of "serious" terrorism risk. 39 In others (Enders, Parise, and Sandler 1992;Enders, Sandler, and Cauley 1990;Prunckun Jr. and Mohr 1997;Rowlands, Littlewood, and Kilberg 2012;Tishler 2013a;Tishler 2013b), hoaxes are addressed-but always in relation (and usually subsidiary) to other tactical choices; they are never treated as the primary object of analysis.…”
Section: Insights Into Hoax Behaviour: Previous Empirical Researchmentioning
confidence: 99%
“…Regarding attack perpetrators, the authors find that a group's past CBRN use is a significant determinant of its future use; and that religious cults (but not religious fundamentalists) and transnationally-oriented groups are the most likely CBRN users. In Tishler (2013a;, multinomial logit regression-using chemical, biological, radiological, or nuclear as a categorical dependent variable-is used to test the technological determinism assumption that the more readily CBRN technology, materials, and knowledge are accessible to terrorists, the more likely the terrorists will be to use unconventional weapons of the corresponding kind. The study tests the technological determinism hypothesis on the full sample of WMDDB incidents, and then compares a stratified sample of serious attacks with that of hoaxes.…”
Section: Cbrn Terrorism: Parallel Data Sources and Frequently-hoaxed mentioning
confidence: 99%