Lone Wolf Terrorism: Understanding the Growing Threat

( 1 )
Hardcover
$17.84
BN.com price
(Save 31%)$26.00 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Hardcover)
  • All (30) from $6.89   
  • New (10) from $12.71   
  • Used (20) from $6.89   
Lone Wolf Terrorism: Understanding the Growing Threat

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.99
BN.com price
(Save 15%)$12.99 List Price

Editorial Reviews

Publishers Weekly
Terrorism expert Simon (The Terrorist Trap) explores the potential threat posed by a single person, or "lone wolf," in this unsettling look into how the current political and technological landscape has radicalized and empowered dangerous individuals. Defining "terrorism" is difficult—the U.S. State Department's definition is fluid, underscoring "premeditated, politically motivated violence perpetrated against non-combatants" without directly addressing the hazard of lone wolves like Timothy McVeigh; Anders Breivik, the Norwegian who killed 77 people in and around Oslo; and Nidal Malik Hasan, who opened fire at Fort Hood and killed 13 people. Simon explains that since the late 1880s, terrorism has come in distinct waves: the anarchist, the anti-colonial, the New Left, the religious, and now, overlapping with its predecessor, the technological. The author stresses the importance of the Internet, which has allowed radical outliers to participate in extremist communities via chat rooms, forums, and message boards, but Simon doesn't peg technology as merely an accessory to crime—he lays out several technological tactics to apprehend lone wolves, from increasing CCTV surveillance to investing in the study of biometrics. There's little to take comfort in, but Simon does a fine job separating unfounded fears from true threats. Photos. Agent: Marsal Lyon Literary Agency. (Feb.)
From the Publisher
"Simon’s book is a lucid survey of the phenomenon..." 
Foreign Affairs

"Lone Wolf Terrorism is a wake-up call to those who view terrorism solely as a threat that comes from large groups acting through well-organized networks. This mistaken view often leads to the conclusion that fighting terrorism is like waging a war with large military units. Instead it is often more akin to a police action fighting the mafia or looking to catch an individual criminal. Understanding the threat from lone wolf terrorists greatly improves our ability to combat the threat that confronts us."
- David L. Boren, former US senator, longest serving chairman of the US Senate Intelligence Committee, and current president of the University of Oklahoma

"Relying on a selective, but broad, gathering of case studies, Simon presents a lively and well-paced overview of a subject that is attracting increasing attention."
- John Mueller, PhD, Ohio State University, coauthor of Terror, Security, and Money

"Jeffrey D. Simon has provided a most lucid, concise, revealing, and fascinating analysis of the lone wolf - an intermittent feature of modern terror since the 1880s. Simon, a well-known, serious, and respected scholar of terrorism, examines the various purposes lone wolves serve and the reasons they have become so difficult to deal with. In addition, he develops an interesting and useful strategy to cope with them. Everyone interested in terrorism will recognize the importance of this classic study."
-David Rapoport, founder and coeditor of the Journal of Terrorism and Political Violence and author of The Four Waves of Modern Terror: An Essay in Generations

"This book is a must-read for anybody who wants to understand one of the foremost threats of our time. The narrative has elements of a mystery while providing insights into the nature of terrorism and ways to combat it. Jeffrey Simon has done a terrific service to academicians, policy makers, and the general public in this coherent and clear presentation about this important aspect of terrorism."
-Richard Sandor, PhD, chairman and CEO of Environmental Financial Products, and author of Good Derivatives: A Story of Financial and Environmental Innovation

Read More Show Less

Product Details

  • ISBN-13: 9781616146467
  • Publisher: Prometheus Books
  • Publication date: 2/19/2013
  • Pages: 320
  • Sales rank: 703,603
  • Product dimensions: 6.20 (w) x 9.10 (h) x 1.40 (d)

Read an Excerpt

LONE WOLF TERRORISM

UNDERSTANDING THE GROWING THREAT
By JEFFREY D. SIMON

Prometheus Books

Copyright © 2013 Jeffrey D. Simon
All right reserved.

ISBN: 978-1-61614-647-4


Chapter One

THE GROWING THREAT OF LONE WOLF TERRORISM

"The biggest concern we have right now ... is the lone wolf terrorist," President Barack Obama said in 2011. Central Intelligence Agency (CIA) director Leon Panetta told Congress a year earlier that "it's the lone-wolf strategy that I think we have to pay attention to as the main threat to this country." India's home secretary, G. K. Pillai, echoed those sentiments, warning that "terrorists can be anywhere. The real challenge is the lone wolf, someone who is not known." Australian foreign minister Stephen Smith joined the list of concerned public officials when he said in a radio interview that "we are now seeing emerging the potential so-called lone wolf escapade where we don't have sophisticated planning but an individual is seduced by the international jihad and as a lone wolf does extreme things." Whether it is homegrown terrorists influenced by jihadist websites and chat rooms or individuals bent on terrorist activity for a wide range of causes or issues, the threat of lone wolf terrorism is growing around the world.

It is understandable, however, if one is skeptical of anybody who writes that the terrorist threat is "growing" or "increasing" in any shape or form. Haven't we had enough warnings about terrorism over the years, often fueled by self-interested politicians, government officials, terrorism experts, and others? The Department of Homeland Security's ill-conceived "color-coded alert" system is still fresh in many minds, and its only effect was scaring people about terrorist threats that never materialized. Keeping the terrorist threat high in the public's mind and on the government's agenda is good for business, both for terrorists, who thrive on the psychological fear that terrorism evokes, and for those who talk, write, or consult about terrorism. But there is enough evidence to indicate that the lone wolf threat is real and is not likely to fade away anytime soon.

A dizzying array of recent lone wolf attacks and plots illustrates the diversity of this threat, as noted in the introduction. The twin terror attacks in Norway by an anti-Islamic extremist were among the worst lone wolf incidents in history. In the United States, lone wolf attacks in recent years have ranged from terrorists motivated by single issues and antigovernment ideology to those inspired by Islamic extremism and white supremacy. Britain has also experienced a diverse array of lone wolf incidents. A lone wolf Islamic extremist was arrested in April 2008 before he could carry out a suicide attack on a shopping center in Bristol. Among the items police found in a search of the man's apartment were the unstable explosive hexamethylene triper-oxide diamine (HMTD), an electrical circuit capable of detonating the explosive, and a suicide vest. Just over a month later, another lone wolf terrorist sympathetic to Islamic extremism was injured in a failed suicide attack in a restaurant in Exeter. He was preparing three nail bombs in the restaurant's bathroom when one accidently exploded in his hands. Lone wolf incidents in Britain also included a plot by a neo-Nazi to wage a violent campaign against "non-British" people using shrapnel bombs. When the man was arrested on the platform of a Suffolk train station in October 2008, police found two homemade explosives in his possession. A search of his home uncovered explosive ingredients and white supremacist and neo-Nazi literature. He also reportedly idolized Timothy McVeigh, the Oklahoma City bomber, and David Copeland, another lone wolf neo-Nazi, who became known as the "London Nailbomber."

Lone wolf terrorism is not limited to just a few incidents and places. Rather, it is increasingly occurring in countries throughout the world. How, then, can we explain the rise of lone wolf terrorism? Explanations for any type of terrorism are fraught with difficulties. The study of terrorism is a speculative endeavor at best, with cultural and personal biases potentially affecting explanations as to why individuals or groups may resort to violence against a wide range of targets. There have been explanations posited that range from poverty, alienation, and humiliation as the root causes of terrorism to explanations that focus on foreign state sponsorship of terrorist activity. The diverse nature of terrorism precludes any overall theory from being capable of explaining this phenomenon. It is difficult, for example, to argue that terrorism is due to specific conditions or situations when terrorism exists in virtually every country around the world. As Norwegian scholars Brynjar Lia and Katja H-W Skjolberg correctly point out, "We find terrorists among deprived and uneducated people, and among the affluent and well educated; we find terrorists among psychotic and 'normal' healthy people; and among people of both sexes and of all ages. Terrorism occurs in rich as well as in poor countries; in the modern industrialised world and in less developed areas; during a process of transition and development, prior to or after such a process; in former colonial states and in independent ones; and, in established democracies as well as in less democratic regimes."

One way, however, to explain the rise in lone wolf terrorism is to view it as part of an emerging trend in terrorism that can best be described as the "Technological Wave." This wave permeates all aspects of terrorism and is of immense value to the individual who wants to embark upon a campaign of terrorist violence.

THE TECHNOLOGICAL WAVE OF TERRORISM

The concept of "waves" of terrorist activity was first formulated by pioneering terrorism scholar David C. Rapoport to explain the history of modern terrorism. A wave can be thought of as a "cycle of activity in a given time period—a cycle characterized by expansion and contraction phases. A crucial feature is its international character; similar activities occur in several countries, driven by a common predominant energy that shapes the participating groups' characteristics and mutual relationships." According to Rapoport, there have been four basic waves of terrorism since the late 1880s. The first wave began with the anarchist movement of the late-nineteenth and early-twentieth centuries. The Anarchist Wave was followed by the Anti-Colonial Wave, which began in the 1920s; the New Left Wave, which began in the 1960s; and the Religious Wave, which began in 1979. While there can be overlap in the waves, as one ebbs and another emerges, the lifespan of a wave is a generation, or about forty years, "a suggestive time frame closest in duration to that of a human life cycle, in which dreams inspiring parents lose their attractiveness for children."

If Rapoport is correct, then we can expect the current Religious Wave to end, or at least be overtaken by a new wave of terrorism, by 2020. While it might be hard to imagine religious-inspired terrorism by organized, decentralized, or ad hoc groups not being the main form of terrorism for several more decades, given the numerous attacks perpetrated by Islamic extremists around the world, the history of terrorism has been characterized by the changing of the guard at different periods. Each of Rapoport's four waves, for example, was launched into a global movement by some type of grand event or incident. Rapoport points out that the wounding of a Russian police commander who had mistreated political prisoners in 1878 by Vera Zasulich inspired the Russian anarchist movement, particularly her proclamation that she was a "terrorist, not a killer," after she threw her weapon to the floor. She was acquitted at her trial and treated as a heroine after she was freed. German newspapers reported that the pro-Zasulich demonstrations meant a revolution was imminent in Russia.

The Treaty of Versailles, which ended World War I, precipitated the Anti-Colonial Wave, as the "victors applied the principle of national self-determination to break up the empires of the defeated states." The third wave, the New Left Wave, found its inspiration in the Vietnam War and the effective role of the Viet Cong in its battles with American and South Vietnamese troops. The war led to the formation of radical groups in the Third World and the West, where "the war stimulated enormous ambivalence among the youth about the value of the existing system. Many Western groups—such as the American Weather Underground, the West German Red Army Faction (RAF), the Italian Red Brigades, the Japanese Red Army, and the French Action Directe—saw themselves as vanguards for the Third World masses. The Soviet world encouraged the outbreaks and offered moral support, training, and weapons."

The fourth wave, the Religious Wave, was launched after the 1979 Iranian Revolution, which, along with the Soviet invasion of Afghanistan that same year, led to religious extremism in many parts of the world. The Iranian Revolution "was clear evidence to believers that religion now had more political appeal than did the prevailing third-wave ethos because Iranian Marxists could only muster meager support against the Shah." The Ayatollah Khomeini regime in Iran "inspired and assisted Shiite terror movements outside of Iran, particularly in Iraq, Saudi Arabia, Kuwait, and Lebanon."

While terrorist groups with religious agendas will undoubtedly be active for many years to come, a new wave, the Technological Wave, is emerging and making for a more level playing field among terrorists with different ideologies and agendas. No single type of terrorist ideology will dominate this new wave in the same way that anarchism, anticolonialism, "New Left" ideology, and religious fundamentalism dominated the preceding four waves. Instead, technology is there for all to take advantage of, offering any group or individual the opportunity to compete in the world of terrorism. We can see technology's influence in all aspects of terrorism, from the rapid growth in the use of technology by governments and militaries for surveillance, detection of weapons, counterterrorist operations, and other purposes to its use by a wide variety of terrorists.

No one type of terrorist movement has a monopoly on the use of technology. For example, virtually every terrorist group has a website and is utilizing the Internet for recruitment, spreading its message, communications, and a variety of other purposes. In terms of weapons, insurgents in Iraq have used sophisticated improvised explosive devices (IEDs) in their attacks. The insurgents have proved to be technologically adaptable, as they switched from first using remote-controlled IEDs to then using long wires buried in the ground (also known as "command wires") in order to detonate the bombs after US troops acquired the ability to successfully jam the remote-controlled devices. Another indication of the technological savvy of the Iraqi insurgents is their use of explosively formed penetrators (EFPs). The EFPs "fire a slug of high density metal at between 4,000 and 6,500 miles per hour with much more energy than roadside bombs made from artillery shells. The penetrator's high velocity punches a relatively small hole in a vehicle's armor, then sprays occupants inside with a stream of shrapnel."

IED and EFP technology is likely to be exported around the world as many insurgents leave Iraq and Afghanistan and take their terrorist campaigns to other countries. The Technological Wave will not only witness extremists from Iraq and Afghanistan using sophisticated IEDs and EFPs in different countries but will also include other terrorists, including lone wolves, who have their own agendas and who learn how to make the latest IEDs and EFPs from veterans of the Iraqi and Afghan insurgencies. They may also acquire the knowledge even without the cooperation of the militants from Iraq and Afghanistan, since it is difficult in the world of terrorism for one group or cell to keep weapons technology a secret from other extremists. Furthermore, there won't be the billion-dollar effort in other countries that the United States used in Iraq and Afghanistan to neutralize and defeat the IED and EFP threat. That will make it easier for extremists to use these and other technologically sophisticated weapons in their attacks.

THE INTERNET AND THE LONE WOLF

The most important aspect of the Technological Wave that helps explain the growing prominence of the lone wolf terrorist is the Internet. In fact, the Internet can be considered the grand event that helped launch the wave. The Internet is the "energy" for this new wave, continually revolutionizing the way information is gathered, processed, and distributed; the way communications are conducted and social networks are formed; and the way single individuals, such as lone wolves, can become significant players by using the Internet to learn about weapons, targets, and techniques.

By the first decade of the twenty-first century, the Internet was an integral part of everyday life for many people. One could find information on virtually any topic and feel connected to the world at large with a laptop computer or a smartphone. For the individual interested in perpetrating a terrorist attack, everything from how to build homemade bombs to maps and diagrams of potential targets were available on the Internet. So, too, were detailed accounts of terrorist incidents around the world, which lone wolves could study in order to determine what might work for them. In addition, the Internet provided a mechanism for lone wolves to become infatuated with extremist ideologies through the reading of websites, blogs, Facebook pages, and other tools available online. Lone wolves could also find other like-minded individuals on the Internet and obtain help from one or two other people in perpetrating an attack.

We only have to look at some of the recent lone wolf incidents to see the significant role that the Internet is playing for the individual terrorist. Anders Breivik, the Norwegian lone wolf who perpetrated the dual terrorist attacks in Norway, posted a fifteen-hundred-page manifesto on the Internet shortly before he embarked on his campaign of terror. The manifesto called for an end to "the Islamic colonisation and Islamisation of Western Europe" and blamed Norwegian politicians for allowing that to happen. He hoped his attacks would bring attention to his manifesto, which it certainly did, as his document suddenly became known throughout the world. Breivik was also influenced by anti-Islamic bloggers and writers in the United States whom he found on the Internet and whose quotations he used in his manifesto.

Another lone wolf who posted a manifesto on the Internet before his terrorist attack was Joseph Stack. After setting fire to his home in Austin, Texas, on the morning of February 18, 2010, Stack flew his single-engine plane into a downtown Austin office building in which nearly two hundred people worked for the Internal Revenue Service (IRS). One person besides Stack was killed in the attack. Stack was motivated by a hatred for the IRS, which he blamed for ruining his life. He was particularly upset with a 1986 change in the tax law that prevented contract software engineers like him from taking certain deductions. The new law made it difficult for information-technology professionals to work as self-employed individuals. This forced many of them to become company employees. In his manifesto, Stack wrote about the new tax law, saying that "they could only have been more blunt if they would have came out and directly declared me a criminal and non-citizen slave." Stack's manifesto revealed the frustration that was building up inside him. He wrote, "I would only hope that by striking a nerve that stimulates the inevitable double standard, knee-jerk government reaction that results in more stupid draconian restrictions people wake up and begin to see the pompous political thugs and their mindless minions for what they are. Sadly, though I spent my entire life trying to believe it wasn't so, but violence not only is the answer, it is the only answer."

Richard Poplawski, a white supremacist who killed three police officers in Pittsburgh, Pennsylvania, in April 2009, used the Internet to frequent a neo-Nazi chat room, "Stormfront," where he shared his racist, anti-Semitic, and antigovernment views with other likeminded individuals. Finding kindred souls on the Internet seemed to embolden Poplawski. His postings from November 2008 until March 2009 revealed an increasingly confrontational nature. He urged other white supremacists not to "retreat peaceably into the hills," but rather to strive for "ultimate victory for our people [by] taking back our nation." He also wrote that he would likely be "ramping up the activism" in the near future. Poplawski surfed the Internet to order the AK-47 assault-style rifle that he used in his attack. The Internet seller delivered the rifle to a store, where Poplawski purchased the weapon.

(Continues...)



Excerpted from LONE WOLF TERRORISM by JEFFREY D. SIMON Copyright © 2013 by Jeffrey D. Simon. Excerpted by permission of Prometheus Books. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Contents

FOREWORD by Brian Michael Jenkins....................7
ACKNOWLEDGMENTS....................13
INTRODUCTION....................15
CHAPTER 1. THE GROWING THREAT OF LONE WOLF TERRORISM....................23
CHAPTER 2. WHO ARE THE LONE WOLVES?....................39
CHAPTER 3. WHY LONE WOLVES ARE SO DANGEROUS....................89
CHAPTER 4. WHERE ARE THE WOMEN?....................113
CHAPTER 5. LONE WOLF ASSASSINS....................145
CHAPTER 6. STRATEGIES FOR DEALING WITH LONE WOLF TERRORISM....................181
CHAPTER 7. UNCOVERING THE LESSONS LEARNED....................229
CHAPTER 8. A LOOK TOWARD THE FUTURE....................243
CONCLUSION....................255
APPENDIX: DEFINING LONE WOLF TERRORISM....................259
NOTES....................267
INDEX....................305
Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted June 25, 2013

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)