Read Lone Wolf Terrorism Online
Authors: Jeffrey D. Simon
12
. Steven Emerson,
Jihad Incorporated: A Guide to Militant Islam in the US
(Amherst, NY: Prometheus Books, 2006), p. 479.
13
. John H. Campbell and Don DeNevi,
Profilers: Leading Investigators Take You inside the Criminal Mind
(Amherst, NY: Prometheus Books, 2004), p. 194; Malcolm Gladwell, “Dangerous Minds: Criminal Profiling Made Easy,”
New Yorker
, November 12, 2007,
http://www.newyorker.com/reporting/2007/11/12/071112fa_fact_gladwell
(accessed April 12, 2012); Melissa Ann Madden, “George Metesky: New York's Mad Bomber,” Dinge en Goete (Things and Stuff),
http://dingeengoete.blogspot.com/2012/03/george-metesky-new-yorks-mad-bomber.html
(accessed April 29, 2012).
14
. “Patterns of Global Terrorism: 2002,” United States Department of State, April 2003, appendix H, p. 161. International terrorism refers to “terrorism involving citizens or the territory of more than one country” (p. xiii). In other words, it involves terrorist incidents “in which terrorists go abroad to strike their targets, stay at home but select victims because of their connections to a foreign state (e.g., diplomats or the executives of foreign corporations), or attack international lines of commerce (e.g., airliners). It excludes the considerable amount of terrorist violence carried out by terrorists operating within their own country against their own nationals and in many countries by governments against their own citizens.” (Brian Michael Jenkins,
International Terrorism: The Other World War
, Rand Corp, R-3302-AF, November 1985, p. 4.) Domestic terrorist incidents are now combined with international ones in the annual US government statistics on terrorism, bringing the numbers to staggering totals. For example, the number of terrorist incidents in 2011 was 10,283! See
Country Reports on Terrorism: 2011
, United States Department of State, National Counterterrorism Center: Annex of Statistical Information, July 2012, p. 2.
15
. Spaaij, “
Enigma of Lone Wolf Terrorism
,” p. 862; Hewitt,
Understanding Terrorism in America
, p. 80.
16
. Ramon Spaaij,
Understanding Lone Wolf Terrorism: Global Patterns, Motivations, and Prevention
(New York: Springer, 2012), pp. 27â33.
17
. Ibid., p. 31.
18
.
Lone-Wolf Terrorism
, COT, Instituut voor Veiligheids- en Crisismanagement, Final draft, June 7, 2007, Case Study for Work Package 3, p. 80,
http://www.scribd.com/doc/34968770/Lone-Wolf-Terrorism
(accessed June 10, 2011).
19
. Michael Schwirtz, “Norway's Premier Vows to Keep an Open Society,”
New York Times
, July 27, 2011,
http://www.nytimes.com/2011/07/28/world/europe/28norway.html
(accessed August 2, 2011).
CHAPTER 8. A LOOK TOWARD THE FUTURE
1
. See, for example, Marvin J. Cetron and Owen Davies,
55 Trends Now Shaping the Future of Terrorism
(n.p.: CreateSpace, 2008);
Report of the Future of Terrorism Task Force
, Homeland Security Advisory Council, January 2007; Harvey W. Kushner, ed.,
The Future of Terrorism: Violence in the New Millennium
(Thousand Oaks, CA: Sage, 1998); Max Taylor and John Horgan, eds.,
The Future of Terrorism
(London: Routledge, 2000); Jon Meacham, ed.,
Beyond bin Laden: America and the Future of Terror
(New York: Random House, 2011).
2
. Jeffrey D. Simon,
The Terrorist Trap: America's Experience with Terrorism
(Bloomington: Indiana University Press, 1994), pp. 347â73.
3
. David C. Rapoport, “The Four Waves of Modern Terrorism,” in
Attacking Terrorism: Elements of a Grand Strategy
, ed. Audrey Kurth Cronin and James M. Ludes (Washington, DC: Georgetown University Press, 2004), pp. 46â73.
4
. Brian Michael Jenkins,
Al Qaeda in Its Third Decade: Irreversible Decline or Imminent Victory?
(Santa Monica, CA: RAND Corporation, 2012), p. 16.
5
.
EU Terrorism Situation and Trend Report (TE-SAT) 2012
, Europol, 2012, p. 4.
6
. Nic Robertson and Paul Cruickshank, “Sources: Saudi Counterterrorism Work Broke up New AQAP Plane Plot,” CNN, May 9, 2012,
http://www.cnn.com/2012/05/09/world/meast/al-qaeda-plot/index.html
(accessed May 10, 2012).
7
. “Russia Foils 2014 Winter Olympics Terror Plot, State Media Reports,” CNN, May 10, 2012,
http://www.cnn.com/2012/05/10/world/europe/russia-terror-plot/index.html
(accessed May 10, 2012).
8
. Allan Hall, “Germans Fear Rise in Left-Wing Terrorism after Seven Petrol Bombs Found in Berlin Rail Tunnel,”
Dailymail
, October 11, 2011,
http://www.dailymail.co.uk/news/article-2047791/Germans-fear-rise-left-wing-terrorism-seven-petrol-bombs-Berlin-rail-tunnel.html
(accessed May 8, 2012).
9
. Valentina Soria, “Not Welcome Here: The Resurgence of Far-Right Wing Extremism in Europe,” Royal United Services Institute, January 9, 2012,
http://www.rusi.org/analysis/commentary/ref:C4F0AD7935C9BD/
(accessed May 9, 2012).
10
. “Dungannon Man Patrick Carty Charged over âIraq-Style IED,'” BBC News, February 13, 2012,
http://www.bbc.co.uk/news/uk-northern-ireland-17013837
(accessed May 11, 2012).
11
. There have, however, been “low level” types of cyber attacks by many governments in recent years.
12
. Richard J. Danzig,
A Policymaker's Guide to Bioterrorism and What to Do about It
, Center for Technology and National Security Policy, National Defense University, December 2009, p. 10.
13
. Jeffrey D. Simon, “Technological and Lone Operator Terrorism: Prospects for
a Fifth Wave of Global Terrorism,” in
Terrorism, Identity, and Legitimacy: The Four Waves Theory and Political Violence
, ed. Jean E. Rosenfeld (London: Routledge, 2011), pp. 58â59.
14
. Ibid., p. 60.
15
.
Country Reports on Terrorism: 2011
, United States Department of State, July 2012, p. 269.
16
. Paul Avrich,
Sacco and Vanzetti: The Anarchist Background
(Princeton, NJ: Princeton University Press, 1991), p. 206.
17
. Jeffrey D. Simon, “Misunderstanding Terrorism,”
Foreign Policy
67 (Summer 1987): 111.
18
. Ibid.
19
. Katharine Q. Seelye and Elisabeth Bumiller, “Bush Labels Aerial Terrorist Attacks âActs of War,'”
New York Times
, September 13, 2001,
http://www.nytimes.com/2001/09/13/national/13BUSH.html
(accessed May 14, 2012).
20
. Scott Wilson and Al Kamen, “âGlobal War on Terror' Is Given New Name,”
Washington Post
, March 25, 2009,
http://www.washingtonpost.com/wp-dyn/content/article/2009/03/24/AR2009032402818.html
(accessed May 14, 2012).
CONCLUSION
1
. Albert Einstein, “The World as I See It,”
Forum and Century
84 (1931): 193â94.
2
. Rory O'Connor,
Friends, Followers, and the Future: How Social Media Are Changing Politics, Threatening Big Brands, and Killing Traditional Media
(San Francisco: City Lights Books, 2012), p. 264.
3
. David Willman,
The Mirage Man: Bruce Ivins, the Anthrax Attacks, and America's Rush to War
(New York: Bantam Books, 2011), p. 297.
APPENDIX
1
. Alex Schmid,
Political Terrorism: A Research Guide to Concepts, Theories, Data Bases, and Literature
(Amsterdam: North-Holland, 1984), pp. 119â58.
2
.
Patterns of Global Terrorism: 2003
, United States Department of State, April 2004, p. xii (italics added). The State Department's reports on terrorism are published during the subsequent year, so that the 2003 report on terrorism was issued in 2004, the 2004 report on terrorism was issued in 2005, and so forth. The title of the reports were changed from “Patterns of Global Terrorism” to “Country Reports on Terrorism” in April 2005, when the State Department issued its report for 2004. The new title has stayed in effect for subsequent reports.
3
.
Country Reports on Terrorism: 2004
, United States Department of State, April 2005, p. 1.
4
.
Country Reports on Terrorism: 2003
, United States Department of State, April 2004, p. xii (italics added).
5
.
Country Reports on Terrorism: 2004
, United States Department of State, April 2005, p. 1 (italics added).
6
. Secretary of Defense Donald Rumsfeld used the term “dead-enders” to describe the initial violent attacks against US troops in Iraq. See Donald Rumsfeld, “Remarks as Delivered by Secretary of Defense Donald H. Rumsfeld,” San Antonio, TX, Monday, August 25, 2003, to the Veterans of Foreign Wars, US Department of Defense,
http://www.defenselink.mil/speeches/speech.aspx?speechid=513
(accessed June 3, 2008). President Bush, however, preferred to use the term “terrorists.” In October 2003, Bush said that “the best way to describe the people who are conducting these attacks are cold-blooded killers, terrorsts [
sic
]. That's all they are. They're terrorists.” See George W. Bush, “President Bush, Ambassador Bremer Discuss Progress in Iraq,” White House Press Release, October 27, 2003,
http://merln.ndu.edu/merln/pfiraq/archive/wh/20031027-1.pdf
(accessed June 3, 2008).
7
.
Terrorism in the United States: 1994
, Terrorist Research and Analytical Center, National Security Division, US Department of Justice, Federal Bureau of Investigation, p. 24.
8
. Ibid., p. 26.
9
.
Terrorism in the United States: 1995
, Terrorist Research and Analytical Center, National Security Division, US Department of Justice, Federal Bureau of Investigation, p. ii.
10
.
Terrorism in the United States: 1999
, Counterterrorism Threat Assessment and Warning Unit, Counterterrorism Division, US Department of Justice, Federal Bureau of Investigation, p. ii.
11
. Ibid., p. 26. The FBI report used the spelling “Amil Kanzi.” The name has also been spelled as “Aimal Kasi” and “Aimal Kansi” in many other references.
12
. Patricia Davis and Maria Glod, “CIA Shooter Kasi, Harbinger of Terror, Set to Die Tonight,”
Washington Post
, November 14, 2002,
http://www.washingtonpost.com/ac2/wp-dyn/A55638-2002Nov14
(accessed July 9, 2010).
13
. Greg Krikorian, “No Link to Extremists in LAX Shootings,”
Los Angeles Times
, April 12, 2003, p. B3.
14
. Jeffrey D. Simon,
The Terrorist Trap: America's Experience with Terrorism
, 2nd ed. (Bloomington: Indiana University Press, 2001), pp. 49â51.
15
. Walter Laqueur,
The Age of Terrorism
(Boston: Little, Brown, 1987), p. 70.
16
. Benjamin Weiser, “A Guilty Plea in Plot to Bomb Times Square,”
New York Times
, June 22, 2010, p. A2.
Abdulmutallab, Umar Farouk,
20
,
56
,
213
ABIS.
See
Automated Biometric Identification System
Abu Nidal,
182
Action Directe of France,
27
Adani, Dror,
174
“Address to the American People” (Guiteau),
154
Afghanistan
Soviet invasion of in 1979,
27
US war in
end of US involvement in,
244
â
45
Nidal Malik Hasan opposing,
55
,
230
use of technology to identify terrorists,
193
,
195
â
96
,
198
.
See also
photo inserts
Aftergood, Steven,
200
air monitors to detect biological warfare agents,
293
â
94n16
airport security,
71
â
72
,
106
,
185
,
187
â
88
Future Attribute Screening Technology,
199
Al-Aqsa Martyrs Brigade,
113
,
124
al-Awlaki, Anwar.
See
Awlaki, Anwar al-
Albrecht, Susan (aka Ingrid Jaeger),
119
â
20
Alexander III (tsar),
115
ALF.
See
Animal Liberation Front (ALF)
Alfred P. Murrah Federal Building.
See
Oklahoma City, OK, bombing
Algeria, AQIM based in,
245
Allison, Graham,
112
Alphabet Bomber.
See
Kurbegovic, Muharem;
photo inserts
anthrax letters thought to be work of,
101
inspiring terrorism,
7
,
8
â
9
,
18
,
106
,
198
,
213
,
246
calling for more lone wolf “individual jihad,”
231
â
32
“leaderless terrorists,”
35
,
36
,
183
September 11, 2001, as a “black swan” event,
279
â
80n51
.
See also
September 11, 2001
use of the Internet,
142
,
210
,
246
â
47
US killing of high-level operatives,
54
,
231
,
245
.
See also
bin Laden, Osama
Yemen-based branch of,
20
.
See also
al Qaeda in the Arabian Peninsula (AQAP)
al Qaeda in Iraq,
125
al Qaeda in the Arabian Peninsula (AQAP),
186
â
87
,
210
,
213
,
245
,
246
Anwar al-Awlaki as spiritual leader of,
56
,
139
.
See also
photo inserts
al Qaeda in the Islamic Maghreb (AQIM),
245
al Sahab (media arm of al Qaeda),
210
American Airlines flights
bombing in 1979,
76
Richard Reid's attempt to bomb,
106
,
213
American Media, Inc.,
101
.
See also
photo inserts
Amerithrax Task Force,
101
Ames anthrax strain,
100
Amir, Geula,
172
Amir, Hagai,
174
Amir, Shlomo,
172
Amir, Yigal,
43
,
171
â
76
,
177
,
178
,
19
.
See also
photo inserts
Amoss, Ulius,
34
anarchy
Anarchist Wave of terrorism,
26
,
244
crackdown on after McKinley's death,
162
â
63
and Leon Czolgosz,
159
â
60
,
178
,
290n64
Russian anarchist movement,
26
,
114
Theodore Kaczynski's writings reflecting,
77
â
78
Andreas, Daniel,
44
Animal Liberation Front (ALF),
35
,
44
animal rights activists,
35
,
44
,
59
,
65
,
85
.
See also
van der Graaf, Volkert
Anna Karenina
(Tolstoy),
149
anthrax,
89
,
93
,
96
,
97
,
98
,
100
,
109
,
110
,
189
anthrax letters,
8
,
19
,
86
,
95
â
103
,
104
,
110
,
212
,
241
,
242
,
249
â
50
,
255
.
See also
Ivins, Bruce;
photo inserts
antiabortion militant movements,
35
,
45
,
60
,
62
â
63
,
85
,
204
,
225
,
231
,
283n38
.
See also
Rudolph, Eric
Anti-Colonial Wave of terrorism begun in 1920s,
26
,
244
Anti-Defamation League,
225
antigovernment ideology,
17
,
24
,
30
,
45
,
46
,
48
â
49
,
51
,
52
,
84
,
230
,
231
,
282n26
.
See also
Breivik, Anders; McVeigh, Timothy; Poplawski, Richard; secular lone wolves
anti-Islamic extremism,
24
,
29
â
30
,
52
,
64
,
84
,
202
,
230
,
275n91
.
See also
Breivik, Anders; Islamic extremism
anti-Semitic terrorism,
57
,
202
â
203
,
230
antisocial personality disorders,
131
â
32
AQAP.
See
al Qaeda in the Arabian Peninsula (AQAP)
AQIM.
See
al Qaeda in the Islamic Maghreb (AQIM)
Arafat, Yasser,
173
armed assaults.
See
shootings as a terrorist tactic
Army Medical Research Institute of Infectious Diseases.
See
US Army Medical Research Institute of Infectious Diseases (USAMRIID)
Army of God,
35
Arthur, Chester A.,
157
artist sketches of lone wolf attackers,
238
assassinations
of Martin Luther King, Jr.,
169
psychological makeup of lone wolf assassins,
176
â
79
of Robert Kennedy,
169
assassinations as a terrorist tactic,
40
,
145
â
79
,
183
of Abraham Lincoln,
157
aftermaths and impacts,
157
â
58
,
162
â
63
,
169
â
71
,
175
â
76
,
178
â
79
of Alfred Herrhausen,
121
of Archduke Franz Ferdinand,
148
â
49
assassination of Tsar Alexander II,
115
attempted assassinations
of Edwin Walker,
167
of Franklin D. Roosevelt,
177
of George Wallace,
177
of Gerald Ford,
177
of Harry S. Truman,
164
of Napoleon Bonaparte,
95
of Ronald Reagan,
177
categories of lone wolf assassins,
177
of Detlev Rohweder,
121
of George Tiller,
283n38
Ismailis (Shi'a Islamic sect),
145
of James A. Garfield,
149
â
58
,
176
,
287
â
88n15
.
See also
photo inserts
of John F. Kennedy,
148
,
164
â
71
of Markov, Georgi,
287n4
of Pim Fortuyn,
64
â
66
,
240
,
242
of Rajiv Gandhi,
123
of William McKinley,
158
â
63
.
See also
photo inserts
of Yitzhak Rabin,
43
,
171
â
76
,
241
Assassins: A Radical Sect in Islam, The
(Lewis),
145
Association Environmental Offensive (VMO),
65
Atlanta, GA, Eric Rudolph's bombings in,
59
â
61
,
61
,
86
,
215
,
225
Aum Shinrikyo cult,
42
,
90
â
91
,
93
,
108
Austin, TX, attack on IRS building,
30
,
202
,
209
,
225
Austria, mail bombings in,
217
â
19
,
240
â
41
Automated Biometric Identification System (ABIS) (used by Department of Defense),
196
Automated Biometric Identification System (IDENT) (used by Homeland Security),
195
Automatic Detection of Abnormal Behavior and Threats in Crowded Spaces (ADABTS),
200
AVA (military anthrax vaccine),
97
,
98
Awlaki, Anwar al-
and Nidal Malik Hasan,
31
,
56
,
139
,
202
and Roshonara Choudhry,
139
,
140
,
203
,
248
as a spiritual leader,
56
,
139
.
See also
photo inserts
Azzam, Abdullah,
285n69
Baader-Meinhof Gang,
36
,
113
,
119
.
See also
Red Army Faction of West Germany (RAF)
Bacillus anthracis
.
See
anthrax
Barak, Ehud,
175
Bar-Ilan University,
172
barricade-hostage incidents as a terrorist tactic,
40
,
109
hostage taking,
58
,
60
,
89
,
116
,
119
,
149
,
233
,
237
,
239
,
243
,
280n7
,
281
â
82n24
.
See also
hijackings; kidnappings
effect of on government,
263
Stockholm Syndrome,
117
â
18
,
119
Beam, Louis,
34
behavioral biometrics,
197
Beirut, attack on US Marine barracks,
123
,
282n27
Beslan School, attack on by Chechens,
124
Bhopal, India, explosion at a chemical factory,
73
bin Laden, Osama,
41
,
42
,
54
,
142
,
210
,
231
,
252
biological weapons,
7
,
40
,
89
,
92
,
109
,
226
air monitors to detect,
293
â
94n16
al Qaeda considering use of,
93
lone wolves using,
108
â
11
.
See also
anthrax; ricin
methods to identify,
189
potential threats in future,
249
â
50
Biometric Center of Excellence, Criminal Justice Information Services Division of the FBI,
196
,
216