Read Lone Wolf Terrorism Online
Authors: Jeffrey D. Simon
66
. Porter,
Assassination
, p. 154.
67
. Gerald Posner,
Case Closed: Lee Harvey Oswald and the Assassination of JFK
(New York: Anchor Books, 2003), p. xii. Posner wrote the first edition of the book for Random House in 1993.
68
. Ibid., pp. 5â7.
69
. Ibid., pp. 10â11.
70
. Clarke,
American Assassins
, p. 108.
71
. Ibid.
72
. Porter,
Assassination
, pp. 140â41.
73
. Clarke,
American Assassins
, pp. 109â10.
74
. Ibid., pp. 110â11.
75
. Ibid., pp. 113â20.
76
. There has been speculation that Oswald might have changed his mind about killing Kennedy had his wife, Marina, given him assurances that their rocky relationship would improve. Oswald visited her the night before the assassination. They had been living apart, and Marina was staying with friends in Irving, Texas, while Oswald stayed in Dallas during the week for his job. Marina was surprised to see Oswald on a Thursday and rebuffed his pleas for her to come live with him. She even turned her back on him when he spoke. A panel of doctors told the Warren Commission that if Marina had been warm and affectionate to Oswald during that last visit, he might have changed his mind about the assassination. One doctor said, “I think what Marina had a chance to do unconsciously that night was to veto his plan without ever knowing of its existence, but she didn't. She really stamped it down hard.” See Posner,
Case Closed
, pp. 220â21.
77
. Simon,
Terrorist Trap
, pp. 262â63.
78
. Marshall McLuhan,
Understanding Media: The Extensions of Man
(New York: Mentor/Penguin, 1964), pp. 292â93.
79
. Porter,
Assassination
, p. 143.
80
. Mark Lane,
Rush to Judgment
(New York: Holt, Rinehart & Winston, 1966).
81
. Posner,
Case Closed
, pp. 412â13.
82
. Porter,
Assassination
, pp. 143â45.
83
. Ibid., pp. 145â48.
84
. Posner,
Case Closed
, p. 477.
85
. James G. Blight, Janet M. Lang, and David A. Welch,
Vietnam If Kennedy Had Lived: Virtual JFK
(Lanham, MD: Rowman & Littlefield, 2009), p. xiii.
86
. Sean Wilentz, “What If Kennedy Had Lived?”
New York Times
, November 21, 2003,
http://www.nytimes.com/2003/11/21/opinion/what-if-kennedy-had-lived.html
(accessed January 16, 2012). The Cuban missile crisis occurred in October 1962, when the world stood on the brink of nuclear war due to a US-Soviet confrontation over the placement of Soviet intermediate-range nuclear missiles in Cuba and a subsequent US naval blockade of Cuba to prevent Soviet vessels from delivering additional weapons to the island. The crisis ended when the Soviets agreed to remove the missiles already there and dismantle the missile sites in exchange for a US promise not to invade Cuba.
87
. Blight et al.,
Vietnam
, pp. 17â20.
88
. Ibid., pp. 107â108.
89
. Ehud Sprinzak, “Israel's Radical Right and the Countdown to the Rabin Assassination,” in
The Assassination of Yitzhak Rabin
, ed. Yoram Peri (Stanford, CA: Stanford University Press, 2000), p. 122.
90
.
Oslo I Accords (Declaration of Principles on Interim Self-Government Arrangements)
, Council on Foreign Relations, Essential Documents,
http://www.cfr.org/israel/oslo-accords-declaration-principles-interim-self-government-arrangements/p9674
(accessed February 16, 2012).
91
. Michael Karpin and Ina Friedman,
Murder in the Name of God: The Plot to Kill Yitzhak Rabin
(New York: Metropolitan Books, 1998), pp. 19â20.
92
. Sprinzak, “Israel's Radical Right,” pp. 121â23.
93
. Karpin and Friedman,
Murder in the Name of God
, pp. 105â106.
94
. Sprinzak, “Israel's Radical Right,” p. 121.
95
. Karpin and Friedman,
Murder in the Name of God
, p. 27.
96
. Sprinzak, “Israel's Radical Right,” p. 123.
97
. Serge Schmemann, “Rabin Killer and 2 Others Guilty of Related Plots against Leader,”
New York Times,
September 12, 1996,
http://www.nytimes.com/1996/09/12/world/rabin-killer-and-2-others-guilty-of-related-plots-against-leader.html
(accessed February 14, 2012).
98
. Sprinzak, “Israel's Radical Right,” p. 126.
99
. Nadav Gabay, “Peace Begins at Home: Toleration, Identity Politics, and the Changing Conception of Peacemaking in Israel after Yitzhak Rabin's Assassination,”
Social Identities
12, no. 3 (May 2006): 358.
100
. Sprinzak, “Israel's Radical Right,” p. 121.
101
. Yoram Peri, ed., “The Assassination: Causes, Meaning, Outcomes,” in
The Assassination of Yitzhak Rabin
(Stanford, CA: Stanford University Press, 2000), p. 49.
102
. Bill Clinton, “Finish Rabin's Work,”
New York Times
, November 4, 2010,
http://www.nytimes.com/2010/11/04/opinion/04clinton.html
(accessed February 17, 2012).
103
. Peri, “Assassination,” p. 57.
104
. Dan Perry, “Rabin's Assassin Convicted of Murder by Israeli Court,” Associated Press, March 27, 1996,
http://www.apnewsarchive.com/1996/Rabin-s-Assassin-Convicted-Of-Murder-By-Israeli-Court/id-2121d3a0c955c801ad444fa5b0d80c9d
(accessed February 17, 2012).
105
. Sprinzak, “Israel's Radical Right,” p. 125.
106
. Karpin and Friedman,
Murder in the Name of God
, p. 28.
107
. Joel Greenberg, “Rabin Assassin's Testimony: My Goal Was to Paralyze Him,”
New York Times
, January 24, 1996,
http://www.nytimes.com/1996/01/24/world/rabin-assassin-s-testimony-my-goal-was-to-paralyze-him.html
(accessed February 14, 2012).
108
. Dekmejian,
Spectrum of Terror
, pp. 25â38.
109
. Clarke,
American Assassins
, pp. 14â17.
CHAPTER 6. STRATEGIES FOR DEALING WITH LONE WOLF TERRORISM
1
. Marc Sageman,
Leaderless Jihad: Terror Networks in the Twenty-First Century
(Philadelphia: University of Pennsylvania Press, 2008), p. vii.
2
. Ibid., pp. viiâviii.
3
. Ibid., pp. 147â78.
4
. Paul Cruickshank and Tim Lister, “The âLone Wolf'âThe Unknowable Terror,” CNN, September 7, 2011,
http://security.blogs.cnn.com/2011/09/07/the-lone-wolf-the-unknowable-face-of-terror/
(accessed March 4, 2012).
5
.
Tenth Anniversary Report Card: The Status of the 9/11 Commission Recommendations
, National Security Preparedness Group, Bipartisan Policy Center, Washington, DC, September 2011, p. 7.
6
. Geraldo Rivera
,
“Are We Any Safer?” Fox News, September 9, 2011
,
http://www.foxnews.com/on-air/geraldo/blog/2011/09/09/are-we-any-safer
(accessed March 4, 2012).
7
. John Mueller and Mark G. Stewart,
Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security
(New York: Oxford University Press, 2011), p. 3.
8
. Jeffrey D. Simon,
The Terrorist Trap: America's Experience with Terrorism
, 2nd ed. (Bloomington: Indiana University Press, 2001), pp. 396â97.
9
. Paul Cruickshank, Nic Robertson, and Ken Shiffman, “How Safe Is the Cargo on Passenger Flights?” CNN, February 19, 2012,
http://www.cnn.com/2012/02/16/travel/cargo-terror-concerns/index.html
(accessed March 8, 2012).
10
. Ibid.
11
. Ibid.
12
. Ibid.
13
.
Semiannual Report on the Audit, Investigative, and Security Activities of the United States Postal Service, April 1âSeptember 30, 2008
, United States Postal Service, pp. 30â31.
14
. “Postal Strike: Spotting Mailbombs,” Global Security Solutions,
http://www.global-securitysolutions.com/scanna-msc-ltd-security-screening-and-detection/postal-strike-spotting-mailbombs.html
(accessed March 10, 2012).
15
. Barry Zellen, “Special Delivery: After Two Centuries, Letter-Bombs Continue Their Lethal Legacy,” Security Innovator, March 6, 2009,
http://securityinnovator.com/index.php?articleID=15842§ionID=27
(accessed March 9, 2012).
16
. Marcus Wohlsen, “Scientists Man Bioterror Front Lines Post-9/11,” Associated Press,
http://www.rdmag.com/News/2011/08/Life-Science-Biotechnology-Analytical-Scientists-man-bioterror-front-lines/
(accessed March 12, 2012). The deployment of the air monitors is known as the national BioWatch system. However, it was revealed in October 2012 that tests of the system by scientists found that BioWatch “operated with defective components that left it unable to detect lethal germs.” See David Willman, “BioWatch Technology Couldn't Detect Lethal Germs, Tests Found,”
Los Angeles Times
, October 22, 2012,
http://www.latimes.com/news/nationworld/nation/la-na-biowatch-faulty-assays-20121023,0,6634110.story
(accessed November 16, 2012).
17
. There is, however, x-ray technology that has been developed to specifically visualize and enhance powders inside packages. These are being used to inspect suspicious letters and packages. See “Postal Strike.”
18
. Ian Evans, “Report: London No Safer for All Its CCTV Cameras,”
Christian Science Monitor
, February 22, 2012,
http://www.csmonitor.com/World/Europe/2012/0222/Report-London-no-safer-for-all-its-CCTV-cameras
(accessed March 12, 2012).
19
. Christopher Hope, “1,000 CCTV Cameras to Solve Just One Crime, Met Police Admits,”
Telegraph
, August 25, 2009,
http://www.telegraph.co.uk/news/uknews/crime/6082530/1000-CCTV-cameras-to-solve-just-one-crime-Met-Police-admits.html
(accessed March 12, 2012).
20
.
Lone-Wolf Terrorism
, COT, Instituut voor Veiligheids-en Crisismanagement, Final draft, June 7, 2007, Case Study for Work Package 3, p. 22,
http://www.scribd.com/doc/34968770/Lone-Wolf-Terrorism
(accessed June 10, 2011).
21
. Ibid., pp. 77â78.
22
. “Real CrimeâNailing the Nailbomber,” Real Crime, June 4, 2007,
http://www.throng.co.nz/real-crime/real-crime-nailing-the-nailbomber
(accessed March 13, 2012).
23
.
Lone-Wolf Terrorism
, p. 77.
24
. Ian Evans, “London Riots Caught on CCTV Camera: âWe Will Pursue You' Say Police,”
Christian Science Monitor
, August 9, 2011,
http://www.csmonitor.com/World/Europe/2011/0809/London-riots-caught-on-CCTV-camera-We-will-pursue-you-say-police-VIDEO
(accessed March 16, 2012).
25
. Fred Burton, “The Challenge of the Lone Wolf,” Stratfor, May 30, 2007,
http://www.stratfor.com/challenge_lone_wolf
(accessed December 23, 2011).
26
. Scott Stewart and Fred Burton, “Lone Wolf Lessons,” Stratfor, 2009,
http://www.trapwire.com/stratforreport4.htm
(accessed March 15, 2012).
27
. Jeff Salton, “Smarter CCTV System to Be Used to Recognize and Prevent Crime,”
Gizmag
, September 29, 2009,
http://www.gizmag.com/intelligent-cctv-system-recognizes-prevents-crime/12971/
(accessed March 15, 2012).
28
. Michael Pollitt, “Surveillance: The Next Generation,”
Guardian
, February 18, 2009,
http://www.guardian.co.uk/technology/2009/feb/19/cctv-behaviour-patterns
(accessed March 15, 2012).
29
. “Could âSmart CCTV Surveillance' Help in Fight against Terror,” PRNewswire, July 18, 2011,
http://www.prnewswire.co.uk/cgi/news/release?id=150279
(accessed March 15, 2012).
30
. Mimi Hall, “Feds Focus on Detecting Bombs,”
USA Today
, November 27, 2007,
http://www.usatoday.com/news/nation/2007-11-26-bomb-detection_N.htm
(accessed March 9, 2012).
31
. Retired Department of Defense intelligence analyst, telephone interview with author, March 2, 2012.
32
. “Introduction to Biometrics,” National Science and Technology Council (NSTC), Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics, August 7, 2006,
http://www.biometrics.gov/ReferenceRoom/Introduction.aspx
(accessed March 19, 2012); “History of Biometrics,” Global Security, July 13, 2011,
http://www.globalsecurity.org/security/systems/biometrics-history.htm
(accessed March 18, 2012).
33
. “The Bertillon System,” US National Library of Medicine, National Institutes of Health, February 16, 2006,
http://www.nlm.nih.gov/visibleproofs/galleries/technologies/bertillon.html
(accessed March 19, 2012).
34
. “History of Biometrics.”
35
. “The FBI and the American Gangster, 1924â1938,” Federal Bureau of Investigation,
http://www.fbi.gov/about-us/history/a-centennial-history/fbi_and_the_american_gangster_1924-1938
(accessed March 17, 2012).
36
.
The National Biometrics Challenge
, National Science and Technology Council, Subcommittee on Biometrics and Identity Management, September 2011, p. 6; “Introduction to Biometrics.”
37
.
National Biometrics Challenge
, p. 5.
38
. Ibid., p. 6.
39
. Ibid., pp. 5, 16.
40
.
CJIS Annual Report 2011
, US Department of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, p. 20.