This book provides an in-depth analysis of probably the most horrific solo terrorist operation the world has ever seen. On 22 July 2011 Anders Behring Breivik killed 77 people when he bombed the Government District in Oslo, before he conducted a shooting attack against a political youth camp at Utøya. The main focus of the book is on the operational aspects of the events, particularly the target selection and decision-making process. Why did Breivik choose the targets he finally attacked, what influenced his decision-making and how did he do it?
Using unique source material, providing details never published before, the authors accurately explain how even this ruthless terrorist acted under a number of constraints in a profoundly dynamic process. This momentous work is a must read for scholars, students and practitioners within law enforcement, intelligence, security and terrorism studies.
Using unique source material, providing details never published before, the authors accurately explain how even this ruthless terrorist acted under a number of constraints in a profoundly dynamic process. This momentous work is a must read for scholars, students and practitioners within law enforcement, intelligence, security and terrorism studies.
"Cato Hemmingby and Tore Bjørgo draw on 220 hours and 1,200 pages of classified interviews with Breivik to provide a rare glimpse into the 'terrorist cycle' of attack preparations and logistics. ... intended equally for academics and law enforcement practitioners." (Matthew Feldman, THE, timeshighereducation.com, December, 2015)
"[This book] is based on a large range of data that would be the envy of any researcher. The authors do this privileged access justice with a phenomenal book that merits re-reading because it is so full of intimate granular level of data . . . But it is not just the data access that makes this piece of work unique. There is a lot for the field of research to learn from in terms of methodological approach." - Paul Gill, Senior Lecturer in Security and Crime Science, University College London, UK
"[This book] is based on a large range of data that would be the envy of any researcher. The authors do this privileged access justice with a phenomenal book that merits re-reading because it is so full of intimate granular level of data . . . But it is not just the data access that makes this piece of work unique. There is a lot for the field of research to learn from in terms of methodological approach." - Paul Gill, Senior Lecturer in Security and Crime Science, University College London, UK