Read Lone Wolf Terrorism Online
Authors: Jeffrey D. Simon
lone wolves of the future learning to evade,
250
used for prevention and response,
215
â
17
verification vs. identification,
197
See also
face recognition; fingerprints; iris recognition;
photo inserts
; retina scanning
bioterrorism.
See
biological weapons
“Black Hand, The.”
See
“Union of Death”
“black swan” attacks,
107
,
279
â
80n51
Black Swan: The Impact of the Highly Improbable, The
(Taleb),
107
Black Tigers of the LTTE,
123
“black widows” in Chechen rebel movement,
124
,
125
,
135
Blaine, James G.,
151
,
152
,
154
,
155
,
178
Bledsoe, Carlos.
See
Muhammad, Abdulhakim Mujahid
Bloom, Mia,
283n36
bombings as a terrorist tactic,
vii
â
viii
,
37
,
40
,
44
,
61
,
101
,
104
,
109
,
132
,
226
as an “act of war,”
251
Congress passing law in 1956 on bombings of planes and commercial vehicles,
69
methods for identifying bombs,
186
â
89
monitoring purchases of bomb-making materials,
209
nail bombs,
24
,
31
,
190
,
203
,
213
.
See also
Copeland, David; Reilly, Nicky
psychological profiling,
217
â
19
use of by different types of lone wolves,
83
See also
Abu Nidal; Fuchs, Franz; Kaczynski, Theodore; Kurbegovic, Muharem; Lockerbie, Scotland, bombing plane over; Metesky, George; Narodnaya Volya; New York, NY; Norway; Oklahoma City, OK, bombing; planes and terrorism; Rudolph, Eric; suicide attacks; Tsarnaev, Dzhokhar; Tsarnaev, Tamerlan; vehicle bombing; Wall Street bombing of 1920; World Trade Center
Bonaparte, Napoleon, attempt to assassinate,
95
Book of Poison, The
(book found in Kurbegovic's apartment),
106
Booth, John Wilkes,
177
Boston Marathon bombing,
vii
â
viii
Boyle, Maureen,
191
Breivik, Anders,
49
â
54
,
86
,
202
,
231
,
242
,
257
,
272n42
manifesto of,
10
,
29
â
30
,
50
â
51
,
52
,
53
,
202
,
204
â
205
,
235
,
236
mental state of,
234
shootings at youth camp on Utoya Island,
10
,
19
,
40
,
83
,
230
,
240
,
241
use of the Internet,
29
â
30
,
52
,
84
,
202
,
204
â
205
,
206
vehicle bombs in Oslo,
10
,
19
,
40
,
83
,
230
,
241
See also
photo inserts
Bremer, Arthur,
177
Brinks armored car robbery,
281
â
82n24
Bristol, England, suicide bomb attempt,
24
Britain,
24
,
36
,
55
,
142
,
186
â
87
,
189
â
90
,
191
,
232
,
240
British case leading to the M'Naghten Rule,
289
â
90n58
See also
Choudhry, Roshonara; Copeland, David; Reilly, Nicky
British Overseas Airlines Corporation, hijackings,
116
Brokaw, Tom,
100
Buda, Mario,
15
,
16
,
18
,
19
,
94
â
95
,
104
â
105
,
241
.
See also
photo inserts
Bundy, McGeorge,
170
Bureau of Investigation (forerunner of FBI),
195
Bush, George W.,
182
,
252
,
303Appendixn6
Busic, Julienne and Zvonko,
116
â
17
,
118
Cambodia and Pol Pot,
286n1
Canadian Security Intelligence Service,
232
Carnegie Mellon University,
200
Castro, Fidel,
168
CCTV.
See
closed-circuit television
Celexa (antidepressant drug),
98
Central Intelligence Agency (CIA),
23
,
81
Kanzi killing two CIA employees,
261
Charleston, South Carolina, massacre in,
vii
,
ix
Chechnya,
112
rebel movement
efforts to sabotage the 2014 Winter Olympic Games in Russia,
246
use of rape to coerce women into combat,
283n36
chemical weapons as a terrorist tactic,
8
,
24
,
40
,
91
,
92
,
94
,
111
Alphabet Bomber's threats to use,
79
,
81
,
82
,
106
the Internet as a source of information,
106
,
108
potassium chloride, plan to use to poison water supplies,
93
threat to use in Cyprus,
72
â
74
,
85
as WMD of choice for lone wolves,
108
See also specific chemicals, i.e.,
potassium chloride, sarin gas,
etc.
Chernobyl, Soviet Union, nuclear reactor disaster,
73
Chesterton, IN, plane bombing over,
69
â
70
,
267n4
Chicago, AQAP attempt to send bombs to,
186
Chicago Tribune
(newspaper),
117
China, Boxer Rebellion in,
158
,
289n45
Choudhry, Roshonara,
139
â
43
,
203
,
234
,
248
,
285n69
.
See also
photo inserts
Christian Democrats party (in Netherlands),
64
“Christian extremism,”
51
.
See also
Breivik, Anders
Christian Identity movement,
44
,
45
,
57
,
63
CIA.
See
Central Intelligence Agency
Civil Aviation Administration,
69
,
264
Civil Service Commission,
157
civil-service reforms after Garfield assassinated,
150
,
157
CJIS.
See
Criminal Justice Information Services Division (CJIS) of the FBI
closed-circuit television (CCTV),
189
â
94
,
205
,
213
,
215
â
16
USS
Cole
(destroyer),
279
â
80n51
Commander Nemo of Force Majerus.
See
Koupparis, Panos
Committee on Public Safety in France,
286n1
communicate, encouraging lone wolves to,
222
â
24
and Lee Harvey Oswald,
148
,
166
,
178
lone wolves advocating end of,
81
,
85
community outreach to counterterrorism,
212
Conkling, Roscoe,
153
Consolidated Edison “Con Ed,”
219
,
220
,
221
,
223
“conspiracy” theories
and assassinations,
148
,
168
â
69
,
170
and September 11, 2001,
147
â
48
Copeland, David (aka “London Nailbomber”),
24
,
31
,
190
â
91
,
213
counter-ideology,
210
counterterrorism,
27
,
56
,
106
â
107
,
119
,
181
â
227
,
245
,
257
,
259
impact of lone wolves on,
252
â
53
Counterterrorism Division of the FBI,
208
Counterterrorism Section of the Department of Justice,
101
“Country Reports on Terrorism” (US State Department),
303Appendixn1
Covenant, the Sword, and the Arm of the Lord (white-supremacist group),
93
creative and innovative nature of lone wolves,
21
â
22
,
85
,
103
â
107
,
112
,
241
â
42
,
255
Criminal Justice Information Services Division (CJIS) of the FBI,
196
,
197
.
See also
photo inserts
criminal lone wolves,
45
,
67
â
74
,
83
,
84
,
85
,
86
,
263
.
See also
Graham, John Gilbert; Koupparis, Panos
Croatian extremists,
77
,
116
,
117
Cruise, Tom,
200
CSI
(TV show),
214
Cuba
Cuban missile crisis,
170
,
291n86
Oswald wishing to move to,
166
,
178
cyanide, use of in Tylenol capsules,
86
cyberterrorism as a terrorist tactic,
32
â
33
,
40
,
105
,
302n11
potential threats in future,
248
â
49
Cyprus, threat to use dioxin in,
72
â
74
,
84
,
86
Czolgosz, Leon,
158
â
63
,
176
,
177
,
178
,
290nn59
,
64
.
See also
photo inserts
Dallas, TX, and assassination of Kennedy,
167
Daschle, Tom,
100
Davis, David,
190
DDoS.
See
distributed denial of service attacks
“dead-enders,”
303Appendixn6
Death of a President, The
(Manchester),
148
Defenbaugh, Danny,
48
Dekmejian, R. Hrair,
146
,
176
â
77
denial of service.
See
distributed denial of service attacks
de Nugent, John,
58
Denver plane bombing.
See
Graham, John Gilbert
Department of Defense,
194
,
196
,
251
,
303Appendixn6
Department of Homeland Security,
23
â
24
,
36
,
195
and aftermath of the killing of bin Laden,
54
Automated Biometric Identification System (IDENT),
195
on dangers of lone wolves and rightwing extremists,
36
Future Attribute Screening Technology (FAST),
199
â
201
National Operations Center,
205
Counterterrorism Section,
101
Department of Transportation,
76
detection devices,
185
â
89
,
200
,
235
,
257
.
See also
closed-circuit television (CCTV)
Detroit, MI, attempted plane bombing over.
See
Abdulmutallab, Umar Farouk
Deutsche Bank,
121
din rodef
,
173
distributed denial of service attacks (DDoS),
105