Lone Wolf Terrorism (44 page)

Read Lone Wolf Terrorism Online

Authors: Jeffrey D. Simon

BOOK: Lone Wolf Terrorism
3.01Mb size Format: txt, pdf, ePub

12
. Steven Emerson,
Jihad Incorporated: A Guide to Militant Islam in the US
(Amherst, NY: Prometheus Books, 2006), p. 479.

13
. John H. Campbell and Don DeNevi,
Profilers: Leading Investigators Take You inside the Criminal Mind
(Amherst, NY: Prometheus Books, 2004), p. 194; Malcolm Gladwell, “Dangerous Minds: Criminal Profiling Made Easy,”
New Yorker
, November 12, 2007,
http://www.newyorker.com/reporting/2007/11/12/071112fa_fact_gladwell
(accessed April 12, 2012); Melissa Ann Madden, “George Metesky: New York's Mad Bomber,” Dinge en Goete (Things and Stuff),
http://dingeengoete.blogspot.com/2012/03/george-metesky-new-yorks-mad-bomber.html
(accessed April 29, 2012).

14
. “Patterns of Global Terrorism: 2002,” United States Department of State, April 2003, appendix H, p. 161. International terrorism refers to “terrorism involving citizens or the territory of more than one country” (p. xiii). In other words, it involves terrorist incidents “in which terrorists go abroad to strike their targets, stay at home but select victims because of their connections to a foreign state (e.g., diplomats or the executives of foreign corporations), or attack international lines of commerce (e.g., airliners). It excludes the considerable amount of terrorist violence carried out by terrorists operating within their own country against their own nationals and in many countries by governments against their own citizens.” (Brian Michael Jenkins,
International Terrorism: The Other World War
, Rand Corp, R-3302-AF, November 1985, p. 4.) Domestic terrorist incidents are now combined with international ones in the annual US government statistics on terrorism, bringing the numbers to staggering totals. For example, the number of terrorist incidents in 2011 was 10,283! See
Country Reports on Terrorism: 2011
, United States Department of State, National Counterterrorism Center: Annex of Statistical Information, July 2012, p. 2.

15
. Spaaij, “
Enigma of Lone Wolf Terrorism
,” p. 862; Hewitt,
Understanding Terrorism in America
, p. 80.

16
. Ramon Spaaij,
Understanding Lone Wolf Terrorism: Global Patterns, Motivations, and Prevention
(New York: Springer, 2012), pp. 27–33.

17
. Ibid., p. 31.

18
.
Lone-Wolf Terrorism
, COT, Instituut voor Veiligheids- en Crisismanagement, Final draft, June 7, 2007, Case Study for Work Package 3, p. 80,
http://www.scribd.com/doc/34968770/Lone-Wolf-Terrorism
(accessed June 10, 2011).

19
. Michael Schwirtz, “Norway's Premier Vows to Keep an Open Society,”
New York Times
, July 27, 2011,
http://www.nytimes.com/2011/07/28/world/europe/28norway.html
(accessed August 2, 2011).

CHAPTER 8. A LOOK TOWARD THE FUTURE

1
. See, for example, Marvin J. Cetron and Owen Davies,
55 Trends Now Shaping the Future of Terrorism
(n.p.: CreateSpace, 2008);
Report of the Future of Terrorism Task Force
, Homeland Security Advisory Council, January 2007; Harvey W. Kushner, ed.,
The Future of Terrorism: Violence in the New Millennium
(Thousand Oaks, CA: Sage, 1998); Max Taylor and John Horgan, eds.,
The Future of Terrorism
(London: Routledge, 2000); Jon Meacham, ed.,
Beyond bin Laden: America and the Future of Terror
(New York: Random House, 2011).

2
. Jeffrey D. Simon,
The Terrorist Trap: America's Experience with Terrorism
(Bloomington: Indiana University Press, 1994), pp. 347–73.

3
. David C. Rapoport, “The Four Waves of Modern Terrorism,” in
Attacking Terrorism: Elements of a Grand Strategy
, ed. Audrey Kurth Cronin and James M. Ludes (Washington, DC: Georgetown University Press, 2004), pp. 46–73.

4
. Brian Michael Jenkins,
Al Qaeda in Its Third Decade: Irreversible Decline or Imminent Victory?
(Santa Monica, CA: RAND Corporation, 2012), p. 16.

5
.
EU Terrorism Situation and Trend Report (TE-SAT) 2012
, Europol, 2012, p. 4.

6
. Nic Robertson and Paul Cruickshank, “Sources: Saudi Counterterrorism Work Broke up New AQAP Plane Plot,” CNN, May 9, 2012,
http://www.cnn.com/2012/05/09/world/meast/al-qaeda-plot/index.html
(accessed May 10, 2012).

7
. “Russia Foils 2014 Winter Olympics Terror Plot, State Media Reports,” CNN, May 10, 2012,
http://www.cnn.com/2012/05/10/world/europe/russia-terror-plot/index.html
(accessed May 10, 2012).

8
. Allan Hall, “Germans Fear Rise in Left-Wing Terrorism after Seven Petrol Bombs Found in Berlin Rail Tunnel,”
Dailymail
, October 11, 2011,
http://www.dailymail.co.uk/news/article-2047791/Germans-fear-rise-left-wing-terrorism-seven-petrol-bombs-Berlin-rail-tunnel.html
(accessed May 8, 2012).

9
. Valentina Soria, “Not Welcome Here: The Resurgence of Far-Right Wing Extremism in Europe,” Royal United Services Institute, January 9, 2012,
http://www.rusi.org/analysis/commentary/ref:C4F0AD7935C9BD/
(accessed May 9, 2012).

10
. “Dungannon Man Patrick Carty Charged over ‘Iraq-Style IED,'” BBC News, February 13, 2012,
http://www.bbc.co.uk/news/uk-northern-ireland-17013837
(accessed May 11, 2012).

11
. There have, however, been “low level” types of cyber attacks by many governments in recent years.

12
. Richard J. Danzig,
A Policymaker's Guide to Bioterrorism and What to Do about It
, Center for Technology and National Security Policy, National Defense University, December 2009, p. 10.

13
. Jeffrey D. Simon, “Technological and Lone Operator Terrorism: Prospects for
a Fifth Wave of Global Terrorism,” in
Terrorism, Identity, and Legitimacy: The Four Waves Theory and Political Violence
, ed. Jean E. Rosenfeld (London: Routledge, 2011), pp. 58–59.

14
. Ibid., p. 60.

15
.
Country Reports on Terrorism: 2011
, United States Department of State, July 2012, p. 269.

16
. Paul Avrich,
Sacco and Vanzetti: The Anarchist Background
(Princeton, NJ: Princeton University Press, 1991), p. 206.

17
. Jeffrey D. Simon, “Misunderstanding Terrorism,”
Foreign Policy
67 (Summer 1987): 111.

18
. Ibid.

19
. Katharine Q. Seelye and Elisabeth Bumiller, “Bush Labels Aerial Terrorist Attacks ‘Acts of War,'”
New York Times
, September 13, 2001,
http://www.nytimes.com/2001/09/13/national/13BUSH.html
(accessed May 14, 2012).

20
. Scott Wilson and Al Kamen, “‘Global War on Terror' Is Given New Name,”
Washington Post
, March 25, 2009,
http://www.washingtonpost.com/wp-dyn/content/article/2009/03/24/AR2009032402818.html
(accessed May 14, 2012).

CONCLUSION

1
. Albert Einstein, “The World as I See It,”
Forum and Century
84 (1931): 193–94.

2
. Rory O'Connor,
Friends, Followers, and the Future: How Social Media Are Changing Politics, Threatening Big Brands, and Killing Traditional Media
(San Francisco: City Lights Books, 2012), p. 264.

3
. David Willman,
The Mirage Man: Bruce Ivins, the Anthrax Attacks, and America's Rush to War
(New York: Bantam Books, 2011), p. 297.

APPENDIX

1
. Alex Schmid,
Political Terrorism: A Research Guide to Concepts, Theories, Data Bases, and Literature
(Amsterdam: North-Holland, 1984), pp. 119–58.

2
.
Patterns of Global Terrorism: 2003
, United States Department of State, April 2004, p. xii (italics added). The State Department's reports on terrorism are published during the subsequent year, so that the 2003 report on terrorism was issued in 2004, the 2004 report on terrorism was issued in 2005, and so forth. The title of the reports were changed from “Patterns of Global Terrorism” to “Country Reports on Terrorism” in April 2005, when the State Department issued its report for 2004. The new title has stayed in effect for subsequent reports.

3
.
Country Reports on Terrorism: 2004
, United States Department of State, April 2005, p. 1.

4
.
Country Reports on Terrorism: 2003
, United States Department of State, April 2004, p. xii (italics added).

5
.
Country Reports on Terrorism: 2004
, United States Department of State, April 2005, p. 1 (italics added).

6
. Secretary of Defense Donald Rumsfeld used the term “dead-enders” to describe the initial violent attacks against US troops in Iraq. See Donald Rumsfeld, “Remarks as Delivered by Secretary of Defense Donald H. Rumsfeld,” San Antonio, TX, Monday, August 25, 2003, to the Veterans of Foreign Wars, US Department of Defense,
http://www.defenselink.mil/speeches/speech.aspx?speechid=513
(accessed June 3, 2008). President Bush, however, preferred to use the term “terrorists.” In October 2003, Bush said that “the best way to describe the people who are conducting these attacks are cold-blooded killers, terrorsts [
sic
]. That's all they are. They're terrorists.” See George W. Bush, “President Bush, Ambassador Bremer Discuss Progress in Iraq,” White House Press Release, October 27, 2003,
http://merln.ndu.edu/merln/pfiraq/archive/wh/20031027-1.pdf
(accessed June 3, 2008).

7
.
Terrorism in the United States: 1994
, Terrorist Research and Analytical Center, National Security Division, US Department of Justice, Federal Bureau of Investigation, p. 24.

8
. Ibid., p. 26.

9
.
Terrorism in the United States: 1995
, Terrorist Research and Analytical Center, National Security Division, US Department of Justice, Federal Bureau of Investigation, p. ii.

10
.
Terrorism in the United States: 1999
, Counterterrorism Threat Assessment and Warning Unit, Counterterrorism Division, US Department of Justice, Federal Bureau of Investigation, p. ii.

11
. Ibid., p. 26. The FBI report used the spelling “Amil Kanzi.” The name has also been spelled as “Aimal Kasi” and “Aimal Kansi” in many other references.

12
. Patricia Davis and Maria Glod, “CIA Shooter Kasi, Harbinger of Terror, Set to Die Tonight,”
Washington Post
, November 14, 2002,
http://www.washingtonpost.com/ac2/wp-dyn/A55638-2002Nov14
(accessed July 9, 2010).

13
. Greg Krikorian, “No Link to Extremists in LAX Shootings,”
Los Angeles Times
, April 12, 2003, p. B3.

14
. Jeffrey D. Simon,
The Terrorist Trap: America's Experience with Terrorism
, 2nd ed. (Bloomington: Indiana University Press, 2001), pp. 49–51.

15
. Walter Laqueur,
The Age of Terrorism
(Boston: Little, Brown, 1987), p. 70.

16
. Benjamin Weiser, “A Guilty Plea in Plot to Bomb Times Square,”
New York Times
, June 22, 2010, p. A2.

Abdulmutallab, Umar Farouk,
20
,
56
,
213

ABIS.
See
Automated Biometric Identification System

Abu Nidal,
182

Action Directe of France,
27

Adani, Dror,
174

“Address to the American People” (Guiteau),
154

Afghanistan

and al Qaeda,
93
,
231

Soviet invasion of in 1979,
27

US war in

end of US involvement in,
244
–
45

Nidal Malik Hasan opposing,
55
,
230

use of technology to identify terrorists,
193
,
195
–
96
,
198
.
See also
photo inserts

Aftergood, Steven,
200

air monitors to detect biological warfare agents,
293
–
94n16

airport security,
71
–
72
,
106
,
185
,
187
–
88

Future Attribute Screening Technology,
199

Al-Aqsa Martyrs Brigade,
113
,
124

al-Awlaki, Anwar.
See
Awlaki, Anwar al-

Albrecht, Susan (aka Ingrid Jaeger),
119
–
20

Alexander II (tsar),
114
,
115

Alexander III (tsar),
115

ALF.
See
Animal Liberation Front (ALF)

Alfred P. Murrah Federal Building.
See
Oklahoma City, OK, bombing

Algeria, AQIM based in,
245

“Aliens of America,”
10
,
80
,
81

Allison, Graham,
112

Alphabet Bomber.
See
Kurbegovic, Muharem;
photo inserts

al Qaeda,
41
,
230
,
245
,
248

anthrax letters thought to be work of,
101

inspiring terrorism,
7
,
8
–
9
,
18
,
106
,
198
,
213
,
246

calling for more lone wolf “individual jihad,”
231
–
32

“leaderless terrorists,”
35
,
36
,
183

September 11, 2001, as a “black swan” event,
279
–
80n51
.
See also
September 11, 2001

use of the Internet,
142
,
210
,
246
–
47

US killing of high-level operatives,
54
,
231
,
245
.
See also
bin Laden, Osama

and WMDs,
93
–
94
,
112

Yemen-based branch of,
20
.
See also
al Qaeda in the Arabian Peninsula (AQAP)

al Qaeda in Iraq,
125

al Qaeda in the Arabian Peninsula (AQAP),
186
–
87
,
210
,
213
,
245
,
246

Anwar al-Awlaki as spiritual leader of,
56
,
139
.
See also
photo inserts

al Qaeda in the Islamic Maghreb (AQIM),
245

al Sahab (media arm of al Qaeda),
210

American Airlines flights

bombing in 1979,
76

Richard Reid's attempt to bomb,
106
,
213

American Media, Inc.,
101
.
See also
photo inserts

Amerithrax Task Force,
101

Ames anthrax strain,
100

Amir, Geula,
172

Amir, Hagai,
174

Amir, Shlomo,
172

Amir, Yigal,
43
,
171
–
76
,
177
,
178
,
19
.
See also
photo inserts

Amoss, Ulius,
34

anarchy

Anarchist Wave of terrorism,
26
,
244

crackdown on after McKinley's death,
162
–
63

and Émile Henry,
39
,
264

Galleanists,
16
,
140
,
186

and Leon Czolgosz,
159
–
60
,
178
,
290n64

Russian anarchist movement,
26
,
114

Theodore Kaczynski's writings reflecting,
77
–
78

Andreas, Daniel,
44

Animal Liberation Front (ALF),
35
,
44

animal rights activists,
35
,
44
,
59
,
65
,
85
.
See also
van der Graaf, Volkert

Anna Karenina
(Tolstoy),
149

anthrax,
89
,
93
,
96
,
97
,
98
,
100
,
109
,
110
,
189

anthrax letters,
8
,
19
,
86
,
95
–
103
,
104
,
110
,
212
,
241
,
242
,
249
–
50
,
255
.
See also
Ivins, Bruce;
photo inserts

antiabortion militant movements,
35
,
45
,
60
,
62
–
63
,
85
,
204
,
225
,
231
,
283n38
.
See also
Rudolph, Eric

Anti-Colonial Wave of terrorism begun in 1920s,
26
,
244

Anti-Defamation League,
225

antigovernment ideology,
17
,
24
,
30
,
45
,
46
,
48
–
49
,
51
,
52
,
84
,
230
,
231
,
282n26
.
See also
Breivik, Anders; McVeigh, Timothy; Poplawski, Richard; secular lone wolves

anti-Islamic extremism,
24
,
29
–
30
,
52
,
64
,
84
,
202
,
230
,
275n91
.
See also
Breivik, Anders; Islamic extremism

anti-Semitic terrorism,
57
,
202
–
203
,
230

antisocial personality disorders,
131
–
32

AQAP.
See
al Qaeda in the Arabian Peninsula (AQAP)

AQIM.
See
al Qaeda in the Islamic Maghreb (AQIM)

Arafat, Yasser,
173

armed assaults.
See
shootings as a terrorist tactic

Army Medical Research Institute of Infectious Diseases.
See
US Army Medical Research Institute of Infectious Diseases (USAMRIID)

Army of God,
35

Arthur, Chester A.,
157

artist sketches of lone wolf attackers,
238

Asahara, Shoko,
42
,
91
,
93

assassinations

of Martin Luther King, Jr.,
169

psychological makeup of lone wolf assassins,
176
–
79

of Robert Kennedy,
169

assassinations as a terrorist tactic,
40
,
145
–
79
,
183

of Abraham Lincoln,
157

aftermaths and impacts,
157
–
58
,
162
–
63
,
169
–
71
,
175
–
76
,
178
–
79

of Alfred Herrhausen,
121

of Archduke Franz Ferdinand,
148
–
49

assassination of Tsar Alexander II,
115

attempted assassinations

of Edwin Walker,
167

of Franklin D. Roosevelt,
177

of George Wallace,
177

of Gerald Ford,
177

of Harry S. Truman,
164

of Napoleon Bonaparte,
95

of Ronald Reagan,
177

of Stephen Timms,
140
–
41

categories of lone wolf assassins,
177

of Detlev Rohweder,
121

of George Tiller,
283n38

Ismailis (Shi'a Islamic sect),
145

of James A. Garfield,
149
–
58
,
176
,
287
–
88n15
.
See also
photo inserts

of John F. Kennedy,
148
,
164
–
71

of Markov, Georgi,
287n4

of Pim Fortuyn,
64
–
66
,
240
,
242

of Rajiv Gandhi,
123

of Theo van Gogh,
240
,
275n91

of William McKinley,
158
–
63
.
See also
photo inserts

of Yitzhak Rabin,
43
,
171
–
76
,
241

Assassins: A Radical Sect in Islam, The
(Lewis),
145

Association Environmental Offensive (VMO),
65

Atlanta, GA, Eric Rudolph's bombings in,
59
–
61
,
61
,
86
,
215
,
225

Aum Shinrikyo cult,
42
,
90
–
91
,
93
,
108

Austin, TX, attack on IRS building,
30
,
202
,
209
,
225

Austria, mail bombings in,
217
–
19
,
240
–
41

Automated Biometric Identification System (ABIS) (used by Department of Defense),
196

Automated Biometric Identification System (IDENT) (used by Homeland Security),
195

Automatic Detection of Abnormal Behavior and Threats in Crowded Spaces (ADABTS),
200

AVA (military anthrax vaccine),
97
,
98

Awlaki, Anwar al-

death of,
56
,
142
,
210
,
213

and Nidal Malik Hasan,
31
,
56
,
139
,
202

and Roshonara Choudhry,
139
,
140
,
203
,
248

as a spiritual leader,
56
,
139
.
See also
photo inserts

Azzam, Abdullah,
285n69

Baader, Andreas,
120
,
281n20

Baader-Meinhof Gang,
36
,
113
,
119
.
See also
Red Army Faction of West Germany (RAF)

Bacillus anthracis
.
See
anthrax

Barak, Ehud,
175

Bar-Ilan University,
172

barricade-hostage incidents as a terrorist tactic,
40
,
109

hostage taking,
58
,
60
,
89
,
116
,
119
,
149
,
233
,
237
,
239
,
243
,
280n7
,
281
–
82n24
.
See also
hijackings; kidnappings

effect of on government,
263

Stockholm Syndrome,
117
–
18
,
119

Beam, Louis,
34

Beeber, Miriam,
281
–
82n24

behavioral biometrics,
197

Beirut, attack on US Marine barracks,
123
,
282n27

Bertillon, Alphonse,
194
–
95

Beslan School, attack on by Chechens,
124

Bhopal, India, explosion at a chemical factory,
73

bin Laden, Osama,
41
,
42
,
54
,
142
,
210
,
231
,
252

biological weapons,
7
,
40
,
89
,
92
,
109
,
226

air monitors to detect,
293
–
94n16

al Qaeda considering use of,
93

lone wolves using,
108
–
11
.
See also
anthrax; ricin

methods to identify,
189

potential threats in future,
249
–
50

Biometric Center of Excellence, Criminal Justice Information Services Division of the FBI,
196
,
216

biometrics, use of to identify terrorists,
194
–
201
,
257

Other books

Sweet Caroline by Rachel Hauck
Second Thyme Around by Katie Fforde
This Bitter Earth by Bernice McFadden
Guilty Bastard (Grim Bastards MC #3) by Shelley Springfield, Emily Minton
Chapter one by jaden Nakaning
Super by Jim Lehrer
Dressmaker by Beryl Bainbridge